版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Chapter 11Security Protocols,Network Security Threats Security and Cryptography Cryptographic Algorithms,Chapter 11Security Protocols,Network Security Threats,Network Security,The combination of low-cost powerful computing and high-performance networks is a two-edged sword: Many powerful new service
2、s and applications are enabled But computer systems and networks become highly susceptible to a wide variety of security threats Network security involves countermeasures to protect computer systems from intruders Firewalls, security protocols, security practices,Threats, Security Requirements, and
3、Countermeasures,Network Security Threats Eavesdropping, man-in-the-middle, client and server impostors Denial of Service attacks Viruses, worms, and other malicious code Network Security Requirements Privacy, Integrity, Authentication, Non-Repudiation, Availability Countermeasures Communication chan
4、nel security Border security,Security Requirements,Security threats motivate the following requirements: Privacy: information should be readable only by intended recipient Integrity: recipient can confirm that a message has not been altered during transmission Authentication: it is possible to verif
5、y that sender or receiver is who he claims to be Non-repudiation: sender cannot deny having sent a given message. Availability: of information and services,Eavesdropping偷听,Information transmitted over network can be observed and recorded by eavesdroppers (using a packet sniffer) Information can be r
6、eplayed in attempts to access server Requirements: privacy, authentication, non-repudiation,Client Impostor 仿冒,Impostors attempt to gain unauthorized access to server Ex. bank account or database of personal records For example, in IP spoofing impostor sends packets with false source IP address Requ
7、irements: privacy, authentication,Denial of Service Attack,Attacker can flood a server with requests, overloading the server resources Results in denial of service to legitimate clients Distributed denial of service attack on a server involves coordinated attack from multiple (usually hijacked) comp
8、uters Requirement: availability,Server Impostor,An impostor impersonates a legitimate server to gain sensitive information from a client E.g. bank account number and associated user password Requirements: privacy, authentication, non-repudiation,Client,Server,Man in the middle,Man-in-the-Middle Atta
9、ck,An impostor manages to place itself as man in the middle convincing the server that it is legitimate client convincing legitimate client that it is legitimate server gathering sensitive information and possibly hijacking session Requirements: integrity, authentication,Malicious Code恶意代码,A client
10、becomes infected with malicious code Opening attachments in email messages Executing code from bulletin boards or other sources Virus: code that, when executed, inserts itself in other programs Worms: code that installs copies of itself in other machines attached to a network Many variations of mali
11、cious code Requirements: privacy, integrity, availability,Countermeasures,Secure communication channels Encryption Cryptographic checksums and hashes Authentication Digital Signatures,Countermeasures(Count.),Secure borders Firewalls Virus checking Intrusion detection Authentication Access Control,Ch
12、apter 11Security Protocols,Security and Cryptography,Cryptography,Encryption: transformation of plaintext message into encrypted (and unreadable) message called ciphertext Decryption: recovery of plaintext from ciphertext Cipher: algorithm for encryption result is the digital signature Transmitter s
13、ends message and signature To check the signature: Receiver obtains hash of message Receiver decrypts signature using senders public key Receiver compares hash computed from message and hash obtained from signature Procedure also ensures message integrity,Secret Key vs. Public Key,Public key systems
14、 have more capabilities Secret key: privacy, integrity, authentication Public key: all of above + digital signature Public key algorithms are more complex Require more processing and hence much slower than secret key Practice: Use public key method during session setup to establish a session key Use
15、 secret key cryptography during session using the session key,Chapter 11Security Protocols,Cryptographic Algorithms,1、Data Encryption Standard,DES adopted by U.S. National Bureau of Standards in 1977 Most widely-used secret key system Efficient hardware implementation Encryption: Electronic Codebook
16、 (ECB) Mode Message broken into 64-bit blocks Each 64-bit plaintext block encrypted separtely into 64-bit cyphertext Original version of DES uses a 56-bit key Decryption: Encryption operations performed in reverse order,DES Algorithm,Initial permutation is independent of key Final permutation is inv
17、erse of initial permutation Penultimate step swaps 32-bits on left with 32-bits on the right Intermediate 16 iterations apply a different key that is derived from the original 56-bit key,DES Iteration,64-bit block divided into Li 1 and Ri 1 halves Left output Li = Ri 1 Right output Ri = Li 1 XOR f(R
18、i 1, Ki) bitwise XOR f(.,.) as follows: Ri 1 expanded to 48 bits using fixed re-ordering & duplication pattern XORed with Ki Each resulting group of 6-bits is mapped into 4-bit output according to substitution mapping,Cipher Block Chaining,ECB mode encrypts 64-bit blocks independently Attacker can u
19、se knowledge about pattern in message to attack encrypted sequence of blocks Cipher Block Chaining (CBC) introduces dependency between consecutive blocks Current plaintext block is XORed with preceding ciphertext block First plaintext block XORed with an initialization vector that is transmitted to
20、receiver in ciphertext,Cipher Block Chaining,DES Security,DES vulnerable to brute-force attack 56-bit key is too short Has been broken in less than one day using a specially-designed computer Triple-DES (3DES) Provides better security Uses two 56-bit keys C = EK1(DK2(EK1(P) P = DK1(EK2(DK1(P) Instea
21、d of “triple encryption”, use encryption-decryption-encryption If K1 = K2, reduces to original DES,2、RSA Public Key Algorithm,Named after Rivest, Shamir, and Adleman Modular arithmetic & factorization of large numbers Let n = pq, where p & q are two large numbers n typically several hundred bits lon
22、g, i.e. 512 bits 2s = n ,s is the length of a block. Plaintext must be shorter than n Find e relatively prime to (p 1)(q 1) i.e. e has no common factors with (p 1)(q 1) Public key is e,n Let d be multiplicative inverse of e de = 1 modulo (p 1)(q 1) Private key is d,n,Encryption & Decryption,Fact: For Pn and n, p, q, d as above: Pde mod n = P mod n Encryption: C = Pe mod n Result is number less than n
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 上海杉达学院《社会工作理论》2025-2026学年期末试卷
- 上海体育大学《温病学》2025-2026学年期末试卷
- 产科并发症的护理和管理方案
- 检验科:血糖监测方案
- 妇产科宫颈癌筛查监测方案
- 2026年成人高考教育学原理单套试卷
- 2026年成人高考高起专语文(文)押题单套试卷
- 企业组织变革与战略人力资源管理要点之研究
- 英语学习中复合句入门详解(主句与从句的核心区别)
- 2026年5月证券从业资格考试证券市场基础知识真题单套试卷
- 2026湖南省博物馆编外工作人员公开招聘考试参考题库及答案解析
- 2026绍兴嵊州市事业单位招聘53人-统考考试备考试题及答案解析
- 2026内蒙古环投集团社会招聘17人考试参考试题及答案解析
- GB/T 4343.2-2026家用电器、电动工具和类似器具的电磁兼容要求第2部分:抗扰度
- 2026年扬州市广陵区事业单位公开招聘工作人员37人笔试参考题库及答案解析
- 2026上半年北京事业单位统考大兴区招聘137人备考题库(第一批)新版附答案详解
- 2026年南宁教师编制考试试题及答案
- 广东省化工(危险化学品)企业安全隐患排查指导手册(工业气体生产经营企业专篇)
- 广西南宁市第四十七中学2026届中考模拟金典卷数学试题(七)试题含解析
- 第七章 相交线与平行线单元检测(含答案)-2025-2026学年人教版七年级数学下册
- 西安亮丽电力集团有限责任公司招聘笔试题库2026
评论
0/150
提交评论