计算机网络英文版课件:slide 15 Network Security_第1页
计算机网络英文版课件:slide 15 Network Security_第2页
计算机网络英文版课件:slide 15 Network Security_第3页
计算机网络英文版课件:slide 15 Network Security_第4页
计算机网络英文版课件:slide 15 Network Security_第5页
已阅读5页,还剩44页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

NetworkSecurityContentsIntroductionCryptographySymmetric-KeyAlgorithmsPublic-KeyAlgorithmsDigitalSignaturesManagementofPublicKeysCommunicationSecurityAuthenticationProtocolsNeedforSecuritySomepeoplewhocausesecurityproblemsandwhyIntroductionNetworksecurityproblemscanbedividedroughlyintofourcloselyintertwinedareas:secrecy,authentication,nonrepudiation,andintegritycontrol.Secrecy,alsocalledconfidentiality,hastodowithkeepinginformationoutofthehandsofunauthorizedusers.Authenticationdealswithdeterminingwhomyouaretalkingtobeforerevealingsensitiveinformationorenteringintoabusinessdeal.Nonrepudiationdealswithsignatures:Howdoyouprovethatyourcustomerreallyplacedanelectronicorderfortenmillionleft-handeddoohickeysat89centseachwhenhelaterclaimsthepricewas69cents?Whereintheprotocolstacknetworksecuritybelongs.Inthephysicallayer,Inthedatalinklayer,Inthenetworklayer,Inthetransportlayer,IntheapplicationlayerCryptographyIntroductiontoCryptographySubstitutionCiphersTranspositionCiphersAnIntroductiontoCryptographyTheencryptionmodel(forasymmetric-keycipher)SubstitutionCiphersInasubstitutionciphereachletterorgroupoflettersisreplacedbyanotherletterorgroupofletterstodisguiseit.plaintext:abcdefghijklmnopqrstuvwxyzciphertext:QWERTYUIOPASDFGHJKLZXCVBNMForthekeyabove,theplaintextattack

wouldbetransformedintotheciphertextQZZQEA.TranspositionCiphersAtranspositioncipher.Symmetric-KeyAlgorithmsSymmetric-keyalgorithms:usedthesamekeyforencryptionanddecryptionCryptographicalgorithmscanbeimplementedineitherhardware(forspeed)orinsoftware(forflexibility).DES–TheDataEncryptionStandardProductCiphersBasicelementsofproductciphers.(a)P-box.(b)S-box.(c)Product.SubstitutionsareperformedbyS-boxesP-boxcanbemadetoperformanytranspositionDataEncryptionStandardThedataencryptionstandard.(a)Generaloutline.

(b)Detailofoneiteration.Thecircled+meansexclusiveOR.Public-KeyAlgorithmsAradicallynewkindofcryptosystem,oneinwhichtheencryptionanddecryptionkeysweredifferent,andthedecryptionkeycouldnotfeasiblybederivedfromtheencryptionkey.Inthiskindofcryptosystem,the(keyed)encryptionalgorithm,E,andthe(keyed)decryptionalgorithm,D,hadtomeetthreerequirements.Theserequirementscanbestatedsimplyasfollows:D(E(P))=PItisexceedinglydifficulttodeduceDfromE.Ecannotbebrokenbyachosenplaintextattack.Theencryptionalgorithmandthekeyaremadepublic,hencethenamepublic-keycryptography.Public-keycryptographyrequireseachusertohavetwokeys:apublickey,usedbytheentireworldforencryptingmessagestobesenttothatuser,andaprivatekey,whichtheuserneedsfordecryptingmessages.RSAOnegoodpublic-KeyalgorithmswasdiscoveredbyagroupatM.I.T.(Rivestetal.,1978).Itisknownbytheinitialsofthethreediscoverers(Rivest,Shamir,Adleman):RSA.TheRSAmethodisbasedonsomeprinciplesfromnumbertheory.Howtousethemethod:Choosetwolargeprimes,pandq(typically1024bits).Computen=pxqandz=(p-1)x(q-1).Chooseanumberrelativelyprimetozandcallitd.Findesuchthatexd=1modz.Withtheseparameterscomputedinadvance,wearereadytobeginencryption.groupingtheplaintextintoblocksofkbits,wherekisthelargestintegerforwhich2k<nistrue.Toencryptamessage,P,computeC=Pe(modn).TodecryptC,computeP=Cd(modn).

RSAAnexampleoftheRSAalgorithmp=3andq=11n=33andz=20d=7,e=3DigitalSignaturesTheauthenticityofmanylegal,financial,andotherdocumentsisdeterminedbythepresenceorabsenceofanauthorizedhandwrittensignature.Forcomputerizedmessagesystemstoreplacethephysicaltransportofpaperandinkdocuments,amethodmustbefoundtoallowdocumentstobesignedinanunforgeableway.Basically,whatisneededisasystembywhichonepartycansendasignedmessagetoanotherpartyinsuchawaythatthefollowingconditionshold:Thereceivercanverifytheclaimedidentityofthesender.Thesendercannotlaterrepudiatethecontentsofthemessage.Thereceivercannotpossiblyhaveconcoctedthemessagehimself.Symmetric-KeySignaturesOneapproachtodigitalsignaturesistohaveacentralauthoritythatknowseverythingandwhomeveryonetrusts.DigitalsignatureswithBigBrotherPublic-KeySignaturesDigitalsignaturesusingpublic-keycryptographyItwouldbeniceifsigningdocumentsdidnotrequireatrustedauthority.thepublic-keyencryptionanddecryptionalgorithmshavethepropertythatE(D(P))=Pinaddition,ofcourse,totheusualpropertythatD(E(P))=P.

MessageDigestsAnauthenticationschemethatdoesnotrequireencryptingtheentiremessagemessagedigest:aone-wayhashfunction,MD,thattakesanarbitrarilylongpieceofplaintextandfromitcomputesafixed-lengthbitstring.messagedigesthasfourimportantpropertiesGivenP,itiseasytocomputeMD(P).GivenMD(P),itiseffectivelyimpossibletofindPGivenPnoonecanfindP'suchthatMD(P')=MD(P).Achangetotheinputofeven1bitproducesaverydifferentoutput.Computingamessagedigestfromapieceofplaintextismuchfasterthanencryptingthatplaintextwithapublic-keyalgorithm.Avarietyofmessagedigestfunctionshavebeenproposed.ThemostwidelyusedonesareMD5(Rivest,1992)andSHA-1(NIST,1993).SHA-1(SecureHashAlgorithm)processesinputdatain512-bitblocks,onlyunlikeMD5,itgeneratesa160-bitmessagedigestMessageDigestsDigitalsignaturesusingmessagedigestsSHA-1UseofSHA-1andRSAforsigningnonsecretmessages.ManagementofPublicKeysCertificatesX.509PublicKeyInfrastructuresProblemswithPublic-KeyEncryptionAwayforTrudytosubvertpublic-keyencryptionAsafirstattemptatdistributingpublickeyssecurely,wecouldimagineakeydistributioncenteravailableon-line24hoursadaytoprovidepublickeysondemand.AnorganizationthatcertifiespublickeysisnowcalledaCA(CertificationAuthority).CertificatesApossiblecertificateanditssignedhash.TheCAthenissuesacertificatesimilartotheoneinFig.8-24andsignsitsSHA-1hashwiththeCA'sprivatekey.ThisschemedoesnotrequiretheCAtobeon-lineforverificationX.509IfeverybodywhowantedsomethingsignedwenttotheCAwithadifferentkindofcertificate,managingallthedifferentformatswouldsoonbecomeaproblem.Tosolvethisproblem,astandardforcertificateshasbeendevisedandapprovedbyITU.ThestandardiscalledX.509andisinwidespreaduseontheInternet.TheIETFversionofX.509isdescribedinRFC3280.X.509isawaytodescribecertificatesX.509ThebasicfieldsofanX.509certificate.Forexample,ifBobworksintheloandepartmentoftheMoneyBank,hisX.500addressmightbe:/C=US/O=MoneyBank/OU=Loan/CN=Bob/

Public-KeyInfrastructuresPKI(PublicKeyInfrastructure):forcertifyingpublickeysAPKIhasmultiplecomponents,includingusers,CAs,certificates,anddirectories.WhatthePKIdoesisprovideawayofstructuringthesecomponentsanddefinestandardsforthevariousdocumentsandprotocols.Public-KeyInfrastructures(a)AhierarchicalPKI.(b)Achainofcertificates.RAs(RegionalAuthorities)trustanchorsCommunicationSecurityCommunicationsecurity:howtogetthebitssecretlyandwithoutmodificationfromsourcetodestinationandhowtokeepunwantedbitsoutsidethedoor.IPsec(IPsecurity)FirewallsIPsecThecompleteIPsecdesignisaframeworkformultipleservices,algorithmsandgranularities.Thereasonformultipleservicesisthatnoteveryonewantstopaythepriceforhavingalltheservicesallthetime,sotheservicesareavailablealacarte.Themajorservicesaresecrecy,dataintegrity,andprotectionfromreplayattacks(intruderreplaysaconversation).

Allofthesearebasedonsymmetric-keycryptographybecausehighperformanceiscrucial.Thereasonforhavingmultiplealgorithmsisthatanalgorithmthatisnowthoughttobesecuremaybebrokeninthefuture.BymakingIPsecalgorithm-independent,theframeworkcansurviveevenifsomeparticularalgorithmislaterbroken.ThereasonforhavingmultiplegranularitiesistomakeitpossibletoprotectasingleTCPconnection,alltrafficbetweenapairofhosts,oralltrafficbetweenapairofsecurerouters,amongotherpossibilities.IPSecThoughitisintheIPlayer,IPSecisconnectionoriented.tohaveanysecurity,akeymustbeestablishedandusedforsomeperiodoftime—inessence,akindofconnection.A''connection''inthecontextofIPseciscalledanSA(securityassociation).

AnSAisasimplexconnectionbetweentwoendpointsandhasasecurityidentifierassociatedwithit.Ifsecuretrafficisneededinbothdirections,twosecurityassociationsarerequired.Securityidentifiersarecarriedinpacketstravelingonthesesecureconnectionsandareusedtolookupkeysandotherrelevantinformationwhenasecurepacketarrives.IPsechastwoprincipalparts.Thefirstpartdescribestwonewheadersthatcanbeaddedtopacketstocarrythesecurityidentifier,integritycontroldata,andotherinformation.Theotherpart,ISAKMP(InternetSecurityAssociationandKeyManagementProtocol)dealswithestablishingkeys.IPSecIPseccanbeusedineitheroftwomodes.Intransportmode:theIPsecheaderisinsertedjustaftertheIPheader.TheProtocolfieldintheIPheaderischangedtoindicatethatanIPsecheaderfollowsthenormalIPheader(beforetheTCPheader).TheIPsecheadercontainssecurityinformation,primarilytheSAidentifier,anewsequencenumber,andpossiblyanintegritycheckofthepayload.Intunnelmode:theentireIPpacket,headerandall,isencapsulatedinthebodyofanewIPpacketwithacompletelynewIPheader.Tunnelmodeisusefulwhenthetunnelendsatalocationotherthanthefinaldestination.Insomecases,theendofthetunnelisasecuritygatewaymachine,forexample,acompanyfirewall.IPsecTheIPsecauthenticationheaderintransportmodeforIPv4.IPsecAHheaderTheNextheaderfieldisusedtostorethepreviousvaluethattheIPProtocolfieldhadbeforeitwasreplacedwith51toindicatethatanAHheaderfollows.ThePayloadlengthisthenumberof32-bitwordsintheAHheaderminus2.TheSecurityparametersindexistheconnectionidentifierTheSequencenumberfieldisusedtonumberallthepacketssentonanSA.theAuthenticationdata,whichisavariable-lengthfieldthatcontainsthepayload'sdigitalsignature.WhentheSAisestablished,thetwosidesnegotiatewhichsignaturealgorithmtheyaregoingtouse.SinceIPsecisbasedonsymmetric-keycryptographyandthesenderandreceivernegotiateasharedkeybeforesettingupanSA,thesharedkeyisusedinthesignaturecomputation.Thesharedkeyisnottransmitted,ofcourse.IPSecTheAHheaderdoesnotallowencryptionofthedata,soitismostlyusefulwhenintegritycheckingisneededbutsecrecyisnotneeded.OnenoteworthyfeatureofAHisthattheintegritycheckcoverssomeofthefieldsintheIPheader,namely,thosethatdonotchangeasthepacketmovesfromroutertorouter.TheTimetolivefieldchangesoneachhop,forexample,soitcannotbeincludedintheintegritycheck.However,theIPsourceaddressisincludedinthecheck,makingitimpossibleforanintrudertofalsifytheoriginofapacket.IPsec(a)ESPintransportmode.(b)ESPintunnelmode.FirewallsthedangerofinformationleakingoutadangerofinformationleakinginInparticular,viruses,worms,andotherdigitalpestscanbreachsecurity,destroyvaluabledata,andwastelargeamountsofadministrators'timetryingtocleanupthemesstheyleave.Consequently,mechanismsareneededtokeep''good''bitsinand''bad''bitsout.Firewalls:acompanycanhavemanyLANsconnectedinarbitraryways,butalltraffictoorfromthecompanyisforcedthroughanelectronicdrawbridge(firewall),asshowninFig.8-29

FirewallsAfirewallconsistingoftwopacketfiltersandanapplicationgateway

Firewalls-PacketfiltersEverypacketmusttransittwofiltersandanapplicationgatewaytogoinorout.Packetsmeetingsomecriterionareforwardednormally.Packetfiltersaretypicallydrivenbytablesconfiguredbythesystemadministrator.Thesetableslistsourcesanddestinationsthatareacceptable,sourcesanddestinationsthatareblocked,anddefaultrulesaboutwhattodowithpacketscomingfromorgoingtoothermachines.Blockingoutgoingpacketsistrickiersomesitesnotsticktothestandardportnumberingconventionsforsomeimportantservices,suchasFTP(FileTransferProtocol),portnumbersareassigneddynamicallyblockingUDPpacketsisevenharderFirewalls-ApplicationGatewayTheapplicationgatewayoperatesattheapplicationlevel.thegatewaydecideswhethertotransmitordiscardthemessagebasedonheaderfields,messagesize,oreventhecontent.FirewallsproblemsstillexistanintruderoutsidethefirewallcanputinfalsesourceaddressestobypassthischeckinsidershipsoutsecretdocumentsbyencryptingthemorevenphotographingthemandshippingthephotosasJPEGfiles,whichbypassesanywordfilters.awholeotherclassofattacksthatfirewallscannotdealwith:DoS(DenialofService)attacks,DDoS(DistributedDenialofService)attackAuthenticationProtocolsAuthenticationdealswiththequestionofwhetheryouareactuallycommunicatingwithaspecificprocess.Authorizationisconcernedwithwhatthatprocessispermittedtodo.Thegeneralmodelthatallauthenticationprotocolsusepublic-keycryptographyiswidelyusedfortheauthenticationprotocolsthemselvesandforestablishingthesessionkeyasecretsessionkeyforuseintheupcomingconversationAuthenticationprotocolsAuthenticationBasedonaSharedSecretKeyEstablishingaSharedKey:Diffie-HellmanAuthenticationUsingaKeyDistributionCenterAuthenticationUsingKerberosAuthenticationUsingPublic-KeyCryptographyAuthenticationBasedonaSharedSecretKeyFigure8-32Two-wayauthenticationusingachallenge-responseprotocolassumethatAliceandBobalreadyshareasecretkey,KAB

AuthenticationBasedonaSharedSecretKeyassumethatAliceandBobalreadyshareasecretkey,KABThisprotocolisbasedonaprinciplefoundinmanyauthenticationprotocols:onepartysendsarandomnumbertotheother,whothentransformsitinaspecialwayandthenreturnstheresult.Suchprotocolsarecalledchallenge-responseprotocols.notationused:A,BaretheidentitiesofAliceandBobRi'sarethechallenges,wherethesubscriptidentifiest

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论