Presentation is loading. Please wait.

Presentation is loading. Please wait.

PEER-TO-PEER SECURITY PRESENTEDBY SHRUTI PARIHAR.

Similar presentations


Presentation on theme: "PEER-TO-PEER SECURITY PRESENTEDBY SHRUTI PARIHAR."— Presentation transcript:

1 PEER-TO-PEER SECURITY PRESENTEDBY SHRUTI PARIHAR

2  STEGANOGRAPHY  DENIAL OF SERVICE ATTACK  IMPERSONATION  ENCRYPTION CRACKING  NON-ENCRYPTED IM  EAVESDROPPING  TROJANS, VIRUSES, BUGS SECURITY ISSUES IN P2P

3

4 P2P SECURITY PROTOCOL CONCEPTS  PEER GROUPS  GROUP AUTHORITY  ACL MANAGEMENT  GROUP MEMBERSHIP K -1 GA (G, EXP, g Ra mod p) signed by GA K -1 GA (G, EXP, g Ra mod p) signed by GA

5 P2P SECURITY PROTOCOL (contd.) TWO-PHASES  LOGIN PROTOCOL  USER LOGIN  AUTHORITY LOGIN  MUTUAL AUTHENTICATION PROTOCOL PROTOCOL

6 P2P SECURITY PROTOCOL (contd.) LOGIN PROTOCOL OVERVIEW  PASSWORD, PASSWORD-ID, ACL’s  DIFFIE-HELMAN KEY EXCHANGE g Rtu mod p, g Rta mod p, K = g RtuRta mod p g Rtu mod p, g Rta mod p, K = g RtuRta mod p  CHALLENGE RESPONSE  RSA ENCRYPTED CERTIFICATES

7 P2P SECURITY PROTOCOL (contd.) LOGIN PROTOCOL U->A: H, G, PID, P(g Rtu mod p), D K rand = g RtuRta mod p A->U: H, P(g Rta mod p), K rand (C A ), D U->A: K rand (H, REQUEST, C A, C U, D) A->U: K rand (H, C U, RESPONSE, D)

8 P2P SECURITY PROTOCOL (contd.) MUTUAL AUTHENTICATION PROTOCOL OVERVIEW  DIGITAL CERTIFICATES  DIFFIE-HELMAN KEY EXCHANGE g Rtu mod p, g Rta mod p, K = g RtuRta mod p g Rtu mod p, g Rta mod p, K = g RtuRta mod p  CHALLENGE RESPONSE

9 P2P SECURITY PROTOCOL (contd.) MUTUAL AUTHENTICATION U1->U2: H, G, GM U1, D K= g Ru1Ru2 mod p U2->U1: H, GM U2, K(C U2 ), D U1->U2: K(H, C U1, C U2, D) U2->U1: K(H, C U1, D) K rand = g Ru1Ru2Cu1Cu2 mod p

10 QUESTIONS ?


Download ppt "PEER-TO-PEER SECURITY PRESENTEDBY SHRUTI PARIHAR."

Similar presentations


Ads by Google