版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Lecture
slides
by
Lawrie
Brown
for
“Cryptographyand
Network
Security”,
5/e,
by
William
Stallings,
brieflyreviewing
the
text
outline
from
Ch
0,and
then
presenting
the
content
from
Chapter
1
–
“Introduction”.Cryptography
andNetwork
SecurityOverview
&
Chapter
1Fifth
Edition
by
William
StallingsLecture
slides
by
Lawrie
BrownThis
quote
from
the
start
of
Ch0
”Reader’s
Guide”
sets
the
scene
for
why
we
want
to
study
these
issues.Chapter
0
–
Reader’s
GuideThe
art
of
war
teaches
us
to
rely
not
on
thelikelihood
of
the
enemy"s
not
coming,
buton
our
own
readiness
to
receive
him;
noton
the
chance
of
his
not
attacking,
butrather
on
the
fact
that
we
have
made
ourposition
unassailable.—The
Art
ofWar,
Sun
TzuThe
material
in
this
book
is
organized
into
four
broad
categories:•
Cryptographic
algorithms:
This
is
the
study
of
techniques
for
ensuring
the
secrecy
and/or
authenticity
ofinformation.
The
three
main
areas
ofstudy
in
this
category
are:
1.
symmetric
encryption,
2.
asymmetric
encryption,
and
3.
cryptographic
hashfunctions,
withthe
related
topics
ofmessage
authentication
codes
and
digital
signatures.•
Mutual
trust:
This
is
the
study
of
techniques
and
algorithms
for
providingmutual
trust
in
two
main
areas.
First,
key
management
anddistributiondeals
with
establishing
trust
inthe
encryption
keys
used
betweentwo
communicatingentities.
Second,
user
authentication
deals
withestablish
trust
in
the
identity
of
a
communicating
partner.•
Network
security:
This
area
covers
the
use
of
cryptographic
algorithms
in
network
protocols
and
network
applications.•
Computersecurity:
In
this
book,
we
use
this
term
to
refer
to
the
security
of
computers
against
intruders
(e.g.,
hackers)
and
malicious
software(e.g.,
viruses).
Typically,
the
computer
to
be
secured
is
attached
to
anetwork
and
the
bulk
of
the
threats
arise
from
the
network.RoadmapCryptographic
algorithms symmetric
ciphers asymmetric
encryption hash
functionsMutual
TrustNetwork
SecurityComputer
SecurityThroughout
this
book,
we
describe
the
most
important
standards
in
use
or
being
developed
for
various
aspects
of
cryptography
andnetwork
security.
Various
organizations
have
been
involved
in
the
development
or
promotionof
these
standards
including:•
NIST
isa
U.S.
federal
agency
that
deals
withmeasurement
science,
standards,
and
technologyrelated
to
U.S.
government
useand
to
the
promotion
of
U.S.
private-sector
innovation.
Despite
its
national
scope,
NIST
Federal
Information
Processing
Standards
(FIPS)
andSpecial
Publications
(SP)
have
a
worldwide
impact.•
ISOC
is
a
professional
membership
society
with
worldwide
organizational
and
individual
membership.
It
provides
leadership
in
addressingissues
that
confront
the
future
of
the
Internet
and
is
the
organizationhome
for
the
groups
responsible
for
Internet
infrastructure
standards,
includingthe
Internet
Engineering
Task
Force
(IETF)
and
the
Internet
Architecture
Board
(IAB).
These
organizations
develop
Internet
standards
and
related
specifications,
all
of
which
are
published
as
Requests
for
Comments
(RFCs).•
ITUis
aninternational
organization
within
the
United
Nations
Systemin
which
governments
and
the
private
sector
coordinate
global
telecomnetworks
and
services
The
ITU
Telecommunication
Standardization
Sector
(ITU-T)
is
one
of
the
three
sectors
of
the
ITU.
ITU-T"s
mission
is
theproduction
of
standards
covering
all
fields
of
telecommunications.
ITU-T
standards
are
referred
to
as
Recommendations.•
ISO
is
a
worldwide
federation
of
national
standards
bodies
frommore
than
140
countries,
one
fromeach
country.
ISO
isanongovernmentalorganizationthat
promotes
the
development
of
standardization
and
related
activities
with
a
view
to
facilitating
the
international
exchange
of
goodsand
services,
and
to
developingcooperation
in
the
spheres
of
intellectual,
scientific,
technological,
and
economic
activity.
ISO"s
work
results
ininternationalagreements
that
are
published
as
International
Standards.Standards
OrganizationsNational
Institute
of
Standards
&Technology
(NIST)Internet
Society
(ISOC)International
Telecommunication
UnionTelecommunication
StandardizationSector
(ITU-T)International
Organization
forStandardization
(ISO)This
quote
from
the
start
of
Ch
1
reflects
afundamental
principle
that
we
must
understand
the
strength
of
the
algorithms
we
use
in
order
to
have
asuitable
level
of
security.Chapter
1
–
IntroductionThe
combination
of
space,
time,
andstrength
that
must
be
considered
as
thebasic
elements
of
this
theory
of
defensemakes
this
a
fairly
complicated
matter.Consequently,
it
is
not
easy
to
find
a
fixedpoint
of
departure..—On
War,
Carl
Von
ClausewitzThe
NIST
Computer
Security
Handbook
[NIST95]
defines
the
term
computer
security
as
shown
on
this
slide.
This
definitionintroduces
threekey
objectives
that
are
at
the
heart
of
computer
security
as
we
see
on
the
next
slide.Computer
Securitythe
protection
afforded
to
an
automatedinformation
system
in
order
to
attain
theapplicable
objectives
of
preserving
theintegrity,
availability
and
confidentialityinformation
system
resources
(includeshardware,
software,
firmware,information/data,
and
telecommunications)These
three
concepts
formwhat
is
often
referred
to
as
the
CIA
triad
(Figure
1.1).
The
three
concepts
embody
the
fundamental
securityobjectives
for
both
data
and
for
information
and
computing
services.
FIPS
PUB
199
provides
a
useful
characterization
of
these
three
objectives
intermsof
requirements
and
the
definition
of
a
loss
of
security
in
each
category:•
Confidentiality
(covers
both
data
confidentialityand
privacy):
preserving
authorized
restrictions
on
information
access
and
disclosure,
includingmeans
for
protecting
personal
privacy
and
proprietary
information.
Aloss
of
confidentiality
is
the
unauthorized
disclosure
of
information.•
Integrity
(covers
both
data
and
system
integrity):
Guarding
against
improper
information
modification
or
destruction,
and
includes
ensuringinformation
non-repudiation
and
authenticity.
Aloss
of
integrity
is
the
unauthorized
modification
or
destruction
of
information.•
Availability:
Ensuring
timely
and
reliable
access
to
and
use
of
information.
A
loss
of
availabilityis
the
disruption
of
access
to
or
use
ofinformation
or
an
information
system.Although
the
use
of
the
CIA
triad
to
define
security
objectives
is
well
established,
some
in
the
security
field
feel
that
additional
concepts
areneeded
to
present
a
complete
picture.
Two
of
the
most
commonly
mentioned
are:•
Authenticity:
The
property
of
being
genuine
and
being
able
to
be
verified
and
trusted;
confidence
in
the
validityof
a
transmission,
a
message,or
message
originator.•
Accountability:
The
security
goal
that
generates
the
requirement
for
actions
of
an
entity
to
be
traced
uniquely
to
that
entity.Key
Security
ConceptsWe
can
define
three
levels
of
impact
onorganizations
or
individuals
should
there
be
a
breach
of
security
(i.e.,
a
loss
of
confidentiality,
integrity,
oravailability).
These
levels
are
defined
in
FIPS
PUB
199:•
Low:
The
loss
could
be
expected
to
have
a
limited
adverse
effect
onorganizational
operations,
organizational
assets,
or
individuals.
A
limitedadverse
effect
means
that,
for
example,
the
loss
of
confidentiality,
integrity,
or
availabilitymight
(i)
cause
a
degradation
in
mission
capability
to
anextent
and
duration
that
the
organizationis
able
to
perform
its
primaryfunctions,
but
the
effectiveness
of
the
functions
is
noticeably
reduced;
(ii)result
in
minor
damage
to
organizational
assets;
(iii)
result
in
minor
financial
loss;
or
(iv)
result
in
minor
harmto
individuals.•
Moderate:
The
loss
could
be
expected
to
have
a
serious
adverse
effect
onorganizational
operations,
organizational
assets,
or
individuals.
Aserious
adverse
effect
means
that,
for
example,
the
loss
might
(i)
cause
a
significant
degradation
in
mission
capability
to
an
extent
and
duration
thatthe
organization
is
able
to
perform
its
primaryfunctions,
but
the
effectiveness
of
the
functions
is
significantly
reduced;
(ii)
result
in
significantdamage
to
organizational
assets;
(iii)
result
in
significant
financial
loss;
or
(iv)
result
in
significant
harmto
individuals
that
does
not
involve
loss
of
lifeor
serious,
life-threatening
injuries.•
High:
The
loss
could
be
expected
to
have
a
severe
or
catastrophic
adverse
effect
onorganizational
operations,
organizational
assets,orindividuals.
A
severe
or
catastrophic
adverse
effect
means
that,
for
example,
the
loss
might
(i)
causea
severe
degradation
in
or
lossof
missioncapability
to
an
extent
and
duration
that
the
organizationis
not
able
to
performone
or
more
of
its
primary
functions;
(ii)
result
in
major
damage
toorganizational
assets;
(iii)
result
inmajor
financial
loss;
or
(iv)
result
in
severe
or
catastrophic
harmto
individuals
involving
loss
oflife
or
serious
lifethreatening
injuries.Levels
of
Impactcan
define
3
levels
of
impact
from
asecurity
breachLowModerateHighWe
now
provide
some
examples
of
applications
that
illustrate
the
requirements
just
enumerated.•
Confidentiality-
Student
grade
information
is
an
asset
whose
confidentialityis
considered
to
be
highly
important
by
students.
Grade
informationshould
onlybe
available
to
students,
their
parents,
and
employees
that
require
the
information
to
do
their
job.
Student
enrollment
information
mayhaveamoderate
confidentiality
rating.
While
still
coveredby
FERPA,
this
information
is
seen
by
more
people
on
a
daily
basis,
is
less
likely
to
betargeted
than
grade
information,
and
results
in
less
damage
if
disclosed.
Directory
information,
such
as
lists
of
students
or
facultyor
departmentallists,
may
be
assigned
a
low
confidentialityrating
or
indeed
no
rating.
This
information
is
typicallyfreelyavailable
to
the
public
and
published
on
aschool"s
Web
site.•
Integrity
–
Considera
hospital
patient"s
allergy
information
stored
in
a
database.
The
doctor
should
be
able
to
trust
that
the
information
is
correct
and
current.
Now
suppose
that
an
employee
(e.g.,
a
nurse)
who
is
authorized
to
view
and
update
this
information
deliberately
falsifies
thedata
to
cause
harmto
the
hospital.
The
database
needs
to
be
restored
to
atrusted
basis
quickly,
and
it
should
be
possible
to
trace
the
error
backto
the
person
responsible.
Patient
allergyinformation
is
an
example
of
an
asset
with
a
high
requirement
for
integrity.
Inaccurate
information
couldresult
in
serious
harmor
death
to
a
patient
and
expose
the
hospital
to
massive
liability.•
Availability-
The
more
critical
a
component
orservice,
the
higher
is
the
level
of
availability
required.
Consider
a
system
that
providesauthenticationservices
for
critical
systems,
applications,
and
devices.
Aninterruption
of
service
results
in
the
inability
for
customers
to
accesscomputing
resources
and
staff
to
access
the
resources
they
need
to
performcritical
tasks.
The
loss
of
the
service
translates
into
a
large
financialloss
in
lost
employee
productivity
and
potential
customer
loss.Examples
of
SecurityRequirementsconfidentiality
–
student
gradesintegrity
–
patient
informationavailability
–
authentication
serviceComputer
security
is
both
fascinatingand
complex.
Some
of
the
reasons
follow:1.
Computer
security
is
not
as
simple
as
it
might
first
appear
to
the
novice.
The
requirements
seemto
be
straightforward,
but
the
mechanisms
usedto
meet
those
requirements
can
be
quite
complex
and
subtle.2.
In
developing
a
particular
securitymechanismor
algorithm,
one
must
always
consider
potential
attacks
(often
unexpected)
on
those
securityfeatures.3.
Hence
procedures
used
to
provide
particular
services
are
often
counterintuitive.4.
Having
designed
various
security
mechanisms,
it
is
necessary
to
decide
where
to
use
them.5.
Security
mechanisms
typically
involve
more
than
a
particular
algorithm
or
protocol,
but
also
require
participants
to
have
secret
information,leading
to
issues
of
creation,
distribution,
and
protection
of
that
secret
information.6.
Computer
security
is
essentially
abattle
of
wits
between
aperpetrator
who
tries
to
find
holes
and
the
designer
or
administrator
who
tries
toclose
them.7.
There
isa
natural
tendency
on
the
part
of
users
and
systemmanagers
to
perceive
little
benefit
fromsecurity
investment
until
a
security
failureoccurs.8.
Security
requires
regular
monitoring,
difficult
intoday"s
short-term
environment.9.
Security
is
still
too
often
an
afterthought
-
incorporated
after
the
design
is
complete.10.
Many
users
/
securityadministrators
viewstrong
security
as
an
impediment
to
efficient
and
user-friendly
operation
of
an
information
systemoruse
of
information.Computer
Security
Challengesnot
simplemust
consider
potential
attacksprocedures
used
counter-intuitiveinvolve
algorithms
and
secret
infomust
decide
where
to
deploy
mechanismsbattle
of
wits
between
attacker
/
adminnot
perceived
on
benefit
until
failsrequires
regular
monitoringtoo
often
an
after-thoughtregarded
as
impediment
to
using
systemTo
assess
effectively
the
security
needs
of
an
organization
and
to
evaluate
and
choose
various
security
products
and
policies,
the
managerresponsible
for
security
needs
some
systematic
wayof
defining
the
requirements
for
security
and
characterizingthe
approaches
to
satisfyingthoserequirements.
This
is
difficult
enough
in
a
centralized
data
processing
environment;
withthe
use
of
local
and
wide
area
networks
the
problems
arecompounded.
ITU-T
Recommendation
X.800,
Security
Architecture
forOSI,
defines
such
a
systematic
approach.
The
OSI
securityarchitecture
is
useful
to
managers
asaway
of
organizing
the
task
of
providingsecurity.OSI
Security
ArchitectureITU-T
X.800
“Security
Architecture
forOSI”defines
a
systematic
way
of
defining
andproviding
security
requirementsfor
us
it
provides
a
useful,
if
abstract,overview
of
concepts
we
will
studyThe
OSI
security
architecture
focuses
on
security
attacks,
mechanisms,
and
services.
These
can
be
defined
brieflyas
follows:•
Security
attack:
Any
action
that
compromises
the
security
of
information
owned
by
an
organization.•
Security
mechanism:
A
process
(or
a
device
incorporating
such
aprocess)
that
is
designed
to
detect,
prevent,
or
recover
froma
securityattack.•
Security
service:
Aprocessing
or
communication
service
that
enhances
the
security
of
the
data
processingsystems
and
the
informationtransfers
of
anorganization.
The
services
are
intended
to
counter
security
attacks,
and
they
make
use
of
one
or
more
security
mechanisms
toprovide
the
service.In
the
literature,
the
terms
threat
and
attack
are
commonly
used
to
meanmore
orless
the
same
thing.
Table
1.1
provides
definitions
taken
fromRFC
2828,
Internet
Security
Glossary.Threat
-
A
potential
for
violationof
security,
which
exists
when
there
isa
circumstance,
capability,
action,
or
event
that
could
breach
security
andcause
harm.
That
is,
a
threat
is
a
possible
danger
that
might
exploit
a
vulnerability.Attack-
Anassault
on
systemsecurity
that
derives
froman
intelligent
threat;
that
is,
an
intelligent
act
that
is
a
deliberate
attempt
(especially
in
thesense
of
a
method
or
technique)
to
evade
security
services
and
violate
the
security
policy
of
a
system.Aspects
of
Securityconsider
3
aspects
of
information
security:security
attacksecurity
mechanismsecurity
servicenote
termsthreat
–
a
potential
for
violation
of
securityattack
–
an
assault
on
system
security,
adeliberate
attempt
to
evade
security
servicesA
useful
means
of
classifyingsecurity
attacks,
used
both
in
X.800
and
RFC
2828,
is
in
terms
of
passive
attacks
and
active
attacks.
A
passiveattack
attempts
to
learn
or
make
use
of
information
from
the
systembut
does
not
affect
system
resources.Passive
attacks
are
in
the
nature
of
eavesdropping
on,
or
monitoring
of,
transmissions.
The
goal
of
the
opponent
is
to
obtain
information
that
isbeing
transmitted.
Two
types
of
passive
attacks
are:+
release
of
message
contents
-
as
shown
above
in
Stallings
Figure
1.2a
here+
traffic
analysis
-
monitor
traffic
flow
to
determine
location
and
identity
of
communicating
hosts
and
could
observe
the
frequency
and
lengthofmessages
beingexchangedThese
attacks
are
difficult
to
detect
because
they
do
not
involve
any
alteration
of
the
data.Passive
AttacksActive
attacks
involve
some
modification
of
the
data
streamor
the
creation
of
a
false
streamand
can
be
subdivided
into
four
categories:masquerade,
replay,
modification
of
messages,
and
denial
of
service:masquerade
of
one
entity
as
some
otherreplay
previous
messages
(as
shown
above
in
Stallings
Figure
1.3b)modify/alter
(part
of)
messages
in
transit
to
produce
an
unauthorized
effectdenial
of
service
-
prevents
or
inhibits
the
normal
use
or
managementof
communications
facilitiesActive
attacks
present
the
opposite
characteristics
of
passive
attacks.
Whereas
passive
attacks
are
difficult
to
detect,
measures
are
available
toprevent
their
success.
On
the
other
hand,
it
is
quite
difficult
to
prevent
active
attacks
absolutely,
because
of
the
wide
variety
of
potential
physical,software,
and
network
vulnerabilities.
Instead,
the
goal
is
to
detect
active
attacks
and
to
recover
fromany
disruption
or
delays
caused
by
them.Active
AttacksConsider
the
role
of
a
security
service,
and
what
may
be
required.Note
both
similarities
and
differences
withtraditional
paper
documents,
which
for
example:have
signatures
&
dates;need
protection
fromdisclosure,
tampering,
or
destruction;maybe
notarized
or
witnessed;maybe
recorded
or
licensedSecurity
Serviceenhance
security
of
data
processing
systemsand
information
transfers
of
an
organizationintended
to
counter
security
attacksusing
one
or
more
security
mechanismsoften
replicates
functions
normally
associatedwith
physical
documents
which,
for
example,
have
signatures,
dates;
needprotection
from
disclosure,
tampering,
ordestruction;
be
notarized
or
witnessed;
berecorded
or
licensedState
here
a
couple
of
definitions
of
“security
services”
fromrelevant
standards.
X.800
defines
a
security
service
asa
service
provided
by
aprotocol
layer
of
communicating
open
systems,
which
ensures
adequate
security
of
the
systems
or
of
data
transfers.
Perhaps
a
clearerdefinition
is
found
in
RFC
2828,
which
provides
the
following
definition:
a
processing
or
communication
service
thatis
provided
by
a
system
to
give
a
specific
kind
of
protection
to
system
resources;
security
services
implement
security
policies
and
are
implemented
by
security
mechanisms.Security
ServicesX.800:“a
service
provided
by
a
protocol
layer
ofcommunicating
open
systems,
which
ensuresadequate
security
of
the
systems
or
of
datatransfers”RFC
2828:“a
processing
or
communication
serviceprovided
by
a
system
to
give
a
specific
kind
ofprotection
to
system
resources”This
list
is
taken
from
Stallings
Table
1.2
which
provides
details
of
the
5
Security
Service
categories
and
the
14
specific
services
given
in
X.800.This
list
includes
the
various
"classic"
security
services
which
are
traditionally
discussed.
Note
there
is
a
degree
ofambiguity
as
to
the
meaning
ofthese
terms,
and
overlap
in
their
use.
The
broad
service
categories
are:authentication
is
concerned
with
assuring
that
a
communication
is
authentic.
Two
specific
authentication
services
are
defined
in
X.800:
Peerentity
authentication:
provides
corroboration
of
the
identity
of
a
peer
entity
inan
association;
and
Data
originauthentication:
providescorroboration
of
the
source
of
a
data
unit.access
control
is
the
ability
to
limit
and
control
the
access
to
host
systems
and
applications
via
communications
links.confidentiality
is
the
protection
of
transmitted
data
frompassive
attacks,
and
the
protection
of
traffic
flow
fromanalysis.integrity
assures
that
messages
are
received
as
sent,
with
no
duplication,
insertion,
modification,
reordering,
replay,
or
loss.availability
is
the
property
of
a
system
/
resource
being
accessible
and
usable
upon
demand
by
anauthorized
systementity,
according
toperformance
specifications
for
the
system.Security
Services
(X.800)
Authentication
-
assurance
that
communicatingentity
is
the
one
claimedhave
both
peer-entity
&
data
origin
authentication
Access
Control
-
prevention
of
theunauthorized
use
of
a
resource
Data
Confidentiality
–protection
of
data
fromunauthorized
disclosure
Data
Integrity
-
assurance
that
data
received
isas
sent
by
an
authorized
entity
Non-Repudiation
-
protection
against
denial
byone
of
the
parties
in
a
communicationAvailability
–
resource
accessible/usableNow
introduce
“Security
Mechanism”
which
are
the
specific
means
of
implementing
one
or
more
security
services.
Note
these
mechanisms
spana
wide
range
of
technical
components,
but
one
aspect
seen
in
many
is
the
use
of
cryptographic
techniques.Security
Mechanismfeature
designed
to
detect,
prevent,
orrecover
from
a
security
attackno
single
mechanism
that
will
support
allservices
requiredhowever
one
particular
element
underliesmany
of
the
security
mechanisms
in
use:cryptographic
techniqueshence
our
focus
on
this
topicSome
examples
of
mechanisms
from
X.800.
Note
that
the
“specif
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 高一物理暑假作业《圆周运动》专题含答案
- 2024年初二英语知识点总结梳理
- 2024年小学体育《前滚翻》教案
- 人教版八年级下册数学10.1二元一次方程组的概念课件
- FP设计应用教程 1
- 202版全面租房合同协议书合同
- 4.2 波形与文本仿真
- 2026年九年级数学中考模拟试卷(陕西卷)
- 2026年全国临床执业医师考试第四单元点睛提分卷二
- 2026年上海市虹口区初三语文二模试卷及答案
- 2026江苏苏州资管集团下属公司招聘14人笔试历年参考题库附带答案详解
- 第10课 诚信贵如金 课件(内嵌视频)-2025-2026学年道德与法治二年级下册统编版
- 《彩色的梦》公开课课件
- 湖北新八校2026年高三下4月联考高考二模化学试卷
- 2024-2025学年广东省深圳实验学校八年级(下)期中数学试卷及答案
- 2026河南黄金叶投资管理有限公司所属企业大学生招聘29人备考题库(第一批次)及参考答案详解(预热题)
- 2026年托育机构保育人员培训大纲与技能等级评定指南
- 托育机构保教人员培训大纲(试行)
- 2026高三三轮复习策略
- 房产巡检监督制度
- 2026年中考数学模拟试卷及答案解析(共四套)
评论
0/150
提交评论