




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
NetworkSecurityContentsIntroductionCryptographySymmetric-KeyAlgorithmsPublic-KeyAlgorithmsDigitalSignaturesManagementofPublicKeysCommunicationSecurityAuthenticationProtocolsNeedforSecuritySomepeoplewhocausesecurityproblemsandwhyIntroductionNetworksecurityproblemscanbedividedroughlyintofourcloselyintertwinedareas:secrecy,authentication,nonrepudiation,andintegritycontrol.Secrecy,alsocalledconfidentiality,hastodowithkeepinginformationoutofthehandsofunauthorizedusers.Authenticationdealswithdeterminingwhomyouaretalkingtobeforerevealingsensitiveinformationorenteringintoabusinessdeal.Nonrepudiationdealswithsignatures:Howdoyouprovethatyourcustomerreallyplacedanelectronicorderfortenmillionleft-handeddoohickeysat89centseachwhenhelaterclaimsthepricewas69cents?Whereintheprotocolstacknetworksecuritybelongs.Inthephysicallayer,Inthedatalinklayer,Inthenetworklayer,Inthetransportlayer,IntheapplicationlayerCryptographyIntroductiontoCryptographySubstitutionCiphersTranspositionCiphersAnIntroductiontoCryptographyTheencryptionmodel(forasymmetric-keycipher)SubstitutionCiphersInasubstitutionciphereachletterorgroupoflettersisreplacedbyanotherletterorgroupofletterstodisguiseit.plaintext:abcdefghijklmnopqrstuvwxyzciphertext:QWERTYUIOPASDFGHJKLZXCVBNMForthekeyabove,theplaintextattack
wouldbetransformedintotheciphertextQZZQEA.TranspositionCiphersAtranspositioncipher.Symmetric-KeyAlgorithmsSymmetric-keyalgorithms:usedthesamekeyforencryptionanddecryptionCryptographicalgorithmscanbeimplementedineitherhardware(forspeed)orinsoftware(forflexibility).DES–TheDataEncryptionStandardProductCiphersBasicelementsofproductciphers.(a)P-box.(b)S-box.(c)Product.SubstitutionsareperformedbyS-boxesP-boxcanbemadetoperformanytranspositionDataEncryptionStandardThedataencryptionstandard.(a)Generaloutline.
(b)Detailofoneiteration.Thecircled+meansexclusiveOR.Public-KeyAlgorithmsAradicallynewkindofcryptosystem,oneinwhichtheencryptionanddecryptionkeysweredifferent,andthedecryptionkeycouldnotfeasiblybederivedfromtheencryptionkey.Inthiskindofcryptosystem,the(keyed)encryptionalgorithm,E,andthe(keyed)decryptionalgorithm,D,hadtomeetthreerequirements.Theserequirementscanbestatedsimplyasfollows:D(E(P))=PItisexceedinglydifficulttodeduceDfromE.Ecannotbebrokenbyachosenplaintextattack.Theencryptionalgorithmandthekeyaremadepublic,hencethenamepublic-keycryptography.Public-keycryptographyrequireseachusertohavetwokeys:apublickey,usedbytheentireworldforencryptingmessagestobesenttothatuser,andaprivatekey,whichtheuserneedsfordecryptingmessages.RSAOnegoodpublic-KeyalgorithmswasdiscoveredbyagroupatM.I.T.(Rivestetal.,1978).Itisknownbytheinitialsofthethreediscoverers(Rivest,Shamir,Adleman):RSA.TheRSAmethodisbasedonsomeprinciplesfromnumbertheory.Howtousethemethod:Choosetwolargeprimes,pandq(typically1024bits).Computen=pxqandz=(p-1)x(q-1).Chooseanumberrelativelyprimetozandcallitd.Findesuchthatexd=1modz.Withtheseparameterscomputedinadvance,wearereadytobeginencryption.groupingtheplaintextintoblocksofkbits,wherekisthelargestintegerforwhich2k<nistrue.Toencryptamessage,P,computeC=Pe(modn).TodecryptC,computeP=Cd(modn).
RSAAnexampleoftheRSAalgorithmp=3andq=11n=33andz=20d=7,e=3DigitalSignaturesTheauthenticityofmanylegal,financial,andotherdocumentsisdeterminedbythepresenceorabsenceofanauthorizedhandwrittensignature.Forcomputerizedmessagesystemstoreplacethephysicaltransportofpaperandinkdocuments,amethodmustbefoundtoallowdocumentstobesignedinanunforgeableway.Basically,whatisneededisasystembywhichonepartycansendasignedmessagetoanotherpartyinsuchawaythatthefollowingconditionshold:Thereceivercanverifytheclaimedidentityofthesender.Thesendercannotlaterrepudiatethecontentsofthemessage.Thereceivercannotpossiblyhaveconcoctedthemessagehimself.Symmetric-KeySignaturesOneapproachtodigitalsignaturesistohaveacentralauthoritythatknowseverythingandwhomeveryonetrusts.DigitalsignatureswithBigBrotherPublic-KeySignaturesDigitalsignaturesusingpublic-keycryptographyItwouldbeniceifsigningdocumentsdidnotrequireatrustedauthority.thepublic-keyencryptionanddecryptionalgorithmshavethepropertythatE(D(P))=Pinaddition,ofcourse,totheusualpropertythatD(E(P))=P.
MessageDigestsAnauthenticationschemethatdoesnotrequireencryptingtheentiremessagemessagedigest:aone-wayhashfunction,MD,thattakesanarbitrarilylongpieceofplaintextandfromitcomputesafixed-lengthbitstring.messagedigesthasfourimportantpropertiesGivenP,itiseasytocomputeMD(P).GivenMD(P),itiseffectivelyimpossibletofindPGivenPnoonecanfindP'suchthatMD(P')=MD(P).Achangetotheinputofeven1bitproducesaverydifferentoutput.Computingamessagedigestfromapieceofplaintextismuchfasterthanencryptingthatplaintextwithapublic-keyalgorithm.Avarietyofmessagedigestfunctionshavebeenproposed.ThemostwidelyusedonesareMD5(Rivest,1992)andSHA-1(NIST,1993).SHA-1(SecureHashAlgorithm)processesinputdatain512-bitblocks,onlyunlikeMD5,itgeneratesa160-bitmessagedigestMessageDigestsDigitalsignaturesusingmessagedigestsSHA-1UseofSHA-1andRSAforsigningnonsecretmessages.ManagementofPublicKeysCertificatesX.509PublicKeyInfrastructuresProblemswithPublic-KeyEncryptionAwayforTrudytosubvertpublic-keyencryptionAsafirstattemptatdistributingpublickeyssecurely,wecouldimagineakeydistributioncenteravailableon-line24hoursadaytoprovidepublickeysondemand.AnorganizationthatcertifiespublickeysisnowcalledaCA(CertificationAuthority).CertificatesApossiblecertificateanditssignedhash.TheCAthenissuesacertificatesimilartotheoneinFig.8-24andsignsitsSHA-1hashwiththeCA'sprivatekey.ThisschemedoesnotrequiretheCAtobeon-lineforverificationX.509IfeverybodywhowantedsomethingsignedwenttotheCAwithadifferentkindofcertificate,managingallthedifferentformatswouldsoonbecomeaproblem.Tosolvethisproblem,astandardforcertificateshasbeendevisedandapprovedbyITU.ThestandardiscalledX.509andisinwidespreaduseontheInternet.TheIETFversionofX.509isdescribedinRFC3280.X.509isawaytodescribecertificatesX.509ThebasicfieldsofanX.509certificate.Forexample,ifBobworksintheloandepartmentoftheMoneyBank,hisX.500addressmightbe:/C=US/O=MoneyBank/OU=Loan/CN=Bob/
Public-KeyInfrastructuresPKI(PublicKeyInfrastructure):forcertifyingpublickeysAPKIhasmultiplecomponents,includingusers,CAs,certificates,anddirectories.WhatthePKIdoesisprovideawayofstructuringthesecomponentsanddefinestandardsforthevariousdocumentsandprotocols.Public-KeyInfrastructures(a)AhierarchicalPKI.(b)Achainofcertificates.RAs(RegionalAuthorities)trustanchorsCommunicationSecurityCommunicationsecurity:howtogetthebitssecretlyandwithoutmodificationfromsourcetodestinationandhowtokeepunwantedbitsoutsidethedoor.IPsec(IPsecurity)FirewallsIPsecThecompleteIPsecdesignisaframeworkformultipleservices,algorithmsandgranularities.Thereasonformultipleservicesisthatnoteveryonewantstopaythepriceforhavingalltheservicesallthetime,sotheservicesareavailablealacarte.Themajorservicesaresecrecy,dataintegrity,andprotectionfromreplayattacks(intruderreplaysaconversation).
Allofthesearebasedonsymmetric-keycryptographybecausehighperformanceiscrucial.Thereasonforhavingmultiplealgorithmsisthatanalgorithmthatisnowthoughttobesecuremaybebrokeninthefuture.BymakingIPsecalgorithm-independent,theframeworkcansurviveevenifsomeparticularalgorithmislaterbroken.ThereasonforhavingmultiplegranularitiesistomakeitpossibletoprotectasingleTCPconnection,alltrafficbetweenapairofhosts,oralltrafficbetweenapairofsecurerouters,amongotherpossibilities.IPSecThoughitisintheIPlayer,IPSecisconnectionoriented.tohaveanysecurity,akeymustbeestablishedandusedforsomeperiodoftime—inessence,akindofconnection.A''connection''inthecontextofIPseciscalledanSA(securityassociation).
AnSAisasimplexconnectionbetweentwoendpointsandhasasecurityidentifierassociatedwithit.Ifsecuretrafficisneededinbothdirections,twosecurityassociationsarerequired.Securityidentifiersarecarriedinpacketstravelingonthesesecureconnectionsandareusedtolookupkeysandotherrelevantinformationwhenasecurepacketarrives.IPsechastwoprincipalparts.Thefirstpartdescribestwonewheadersthatcanbeaddedtopacketstocarrythesecurityidentifier,integritycontroldata,andotherinformation.Theotherpart,ISAKMP(InternetSecurityAssociationandKeyManagementProtocol)dealswithestablishingkeys.IPSecIPseccanbeusedineitheroftwomodes.Intransportmode:theIPsecheaderisinsertedjustaftertheIPheader.TheProtocolfieldintheIPheaderischangedtoindicatethatanIPsecheaderfollowsthenormalIPheader(beforetheTCPheader).TheIPsecheadercontainssecurityinformation,primarilytheSAidentifier,anewsequencenumber,andpossiblyanintegritycheckofthepayload.Intunnelmode:theentireIPpacket,headerandall,isencapsulatedinthebodyofanewIPpacketwithacompletelynewIPheader.Tunnelmodeisusefulwhenthetunnelendsatalocationotherthanthefinaldestination.Insomecases,theendofthetunnelisasecuritygatewaymachine,forexample,acompanyfirewall.IPsecTheIPsecauthenticationheaderintransportmodeforIPv4.IPsecAHheaderTheNextheaderfieldisusedtostorethepreviousvaluethattheIPProtocolfieldhadbeforeitwasreplacedwith51toindicatethatanAHheaderfollows.ThePayloadlengthisthenumberof32-bitwordsintheAHheaderminus2.TheSecurityparametersindexistheconnectionidentifierTheSequencenumberfieldisusedtonumberallthepacketssentonanSA.theAuthenticationdata,whichisavariable-lengthfieldthatcontainsthepayload'sdigitalsignature.WhentheSAisestablished,thetwosidesnegotiatewhichsignaturealgorithmtheyaregoingtouse.SinceIPsecisbasedonsymmetric-keycryptographyandthesenderandreceivernegotiateasharedkeybeforesettingupanSA,thesharedkeyisusedinthesignaturecomputation.Thesharedkeyisnottransmitted,ofcourse.IPSecTheAHheaderdoesnotallowencryptionofthedata,soitismostlyusefulwhenintegritycheckingisneededbutsecrecyisnotneeded.OnenoteworthyfeatureofAHisthattheintegritycheckcoverssomeofthefieldsintheIPheader,namely,thosethatdonotchangeasthepacketmovesfromroutertorouter.TheTimetolivefieldchangesoneachhop,forexample,soitcannotbeincludedintheintegritycheck.However,theIPsourceaddressisincludedinthecheck,makingitimpossibleforanintrudertofalsifytheoriginofapacket.IPsec(a)ESPintransportmode.(b)ESPintunnelmode.FirewallsthedangerofinformationleakingoutadangerofinformationleakinginInparticular,viruses,worms,andotherdigitalpestscanbreachsecurity,destroyvaluabledata,andwastelargeamountsofadministrators'timetryingtocleanupthemesstheyleave.Consequently,mechanismsareneededtokeep''good''bitsinand''bad''bitsout.Firewalls:acompanycanhavemanyLANsconnectedinarbitraryways,butalltraffictoorfromthecompanyisforcedthroughanelectronicdrawbridge(firewall),asshowninFig.8-29
FirewallsAfirewallconsistingoftwopacketfiltersandanapplicationgateway
Firewalls-PacketfiltersEverypacketmusttransittwofiltersandanapplicationgatewaytogoinorout.Packetsmeetingsomecriterionareforwardednormally.Packetfiltersaretypicallydrivenbytablesconfiguredbythesystemadministrator.Thesetableslistsourcesanddestinationsthatareacceptable,sourcesanddestinationsthatareblocked,anddefaultrulesaboutwhattodowithpacketscomingfromorgoingtoothermachines.Blockingoutgoingpacketsistrickiersomesitesnotsticktothestandardportnumberingconventionsforsomeimportantservices,suchasFTP(FileTransferProtocol),portnumbersareassigneddynamicallyblockingUDPpacketsisevenharderFirewalls-ApplicationGatewayTheapplicationgatewayoperatesattheapplicationlevel.thegatewaydecideswhethertotransmitordiscardthemessagebasedonheaderfields,messagesize,oreventhecontent.FirewallsproblemsstillexistanintruderoutsidethefirewallcanputinfalsesourceaddressestobypassthischeckinsidershipsoutsecretdocumentsbyencryptingthemorevenphotographingthemandshippingthephotosasJPEGfiles,whichbypassesanywordfilters.awholeotherclassofattacksthatfirewallscannotdealwith:DoS(DenialofService)attacks,DDoS(DistributedDenialofService)attackAuthenticationProtocolsAuthenticationdealswiththequestionofwhetheryouareactuallycommunicatingwithaspecificprocess.Authorizationisconcernedwithwhatthatprocessispermittedtodo.Thegeneralmodelthatallauthenticationprotocolsusepublic-keycryptographyiswidelyusedfortheauthenticationprotocolsthemselvesandforestablishingthesessionkeyasecretsessionkeyforuseintheupcomingconversationAuthenticationprotocolsAuthenticationBasedonaSharedSecretKeyEstablishingaSharedKey:Diffie-HellmanAuthenticationUsingaKeyDistributionCenterAuthenticationUsingKerberosAuthenticationUsingPublic-KeyCryptographyAuthenticationBasedonaSharedSecretKeyFigure8-32Two-wayauthenticationusingachallenge-responseprotocolassumethatAliceandBobalreadyshareasecretkey,KAB
AuthenticationBasedonaSharedSecretKeyassumethatAliceandBobalreadyshareasecretkey,KABThisprotocolisbasedonaprinciplefoundinmanyauthenticationprotocols:onepartysendsarandomnumbertotheother,whothentransformsitinaspecialwayandthenreturnstheresult.Suchprotocolsarecalledchallenge-responseprotocols.notationused:A,BaretheidentitiesofAliceandBobRi'sarethechallenges,wherethesubscriptidentifiest
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 公司财务管理流程
- 慢性病患者康复计划
- 家具印刷管理细则
- 心理咨询服务制度实施方案制定计划
- 2025重庆市永川区教育委员会招聘公益性岗位人员1人笔试备考试题及答案解析
- 如何引导初高中学生建立正确的人际交往观念
- 实施仪表工业绿色生产方案
- 园艺养护技巧:花草长寿不难
- 2025兴业银行总行国际业务部交易银行部招聘考试含答案
- 2025下半年北京密云区事业单位招聘62人笔试备考试题及答案解析
- 西语国家概况
- 成人学士学位英语1000个高频必考词汇汇总
- GB/T 5271.29-2006信息技术词汇第29部分:人工智能语音识别与合成
- 全屋定制家居橱柜衣柜整装安装服务规范
- GB/T 28248-2012印制板用硬质合金钻头
- 沥青及沥青混合料试验作业指导书
- 义务教育阶段学生艺术素质测评指标体系小学音乐
- 茶叶生产加工常用表格
- 妊娠合并HIV(医学PPT课件)
- Minitab(高级)
- 工学结合的课程开发与教学设计
评论
0/150
提交评论