McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Security at the Network Layer: IPSec
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to Cryptography
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 29 Internet Security
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 2 The OSI Model and TCP/IP Protocol Suite.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display Chapter 10 Network Security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 12 Network Security (2)
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 22 Upper OSI Layers Session Layer Presentation Layer Application Layer WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 23 Upper OSI Layers.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 19 Data Encryption.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
HANNAM UNIVERSITY 1 Chapter 29 Internet Security.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Twelve Network Security.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Security Outline Encryption Algorithms Authentication Protocols
Chapter 8 Network Security.
Message Security, User Authentication, and Key Management
Security at the Application Layer: PGP and S/MIME
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The University of Adelaide, School of Computer Science
Unit 8 Network Security.
Advanced Computer Networks
Presentation transcript:

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CONTENTS INTRODUCTION PRIVACY DIGITAL SIGNATURE SECURITY IN THE INTERNET APPLICATION LAYER SECURITY TRANSPORT LAYER SECURITY: TLS SECURITY AT THE IP LAYER: IPSEC FIREWALLS

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 INTRODUCTION 29.1

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-1 Aspects of security

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PRIVACY 29.2

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-2 Secret-key encryption

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Secret-key encryption is often called symmetric encryption because the same key can be used in both directions.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Secret-key encryption is often used for long messages.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 We discuss one secret-key algorithm in Appendix E.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 KDC can solve the problem of secret-key distribution.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-3 Public-key encryption

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Public-key algorithms are more efficient for short messages.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A CA can certify the binding between a public key and the owner.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-4 Combination

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 To have the advantages of both secret-key and public-key encryption, we can encrypt the secret key using the public key and encrypt the message using the secret key.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 DIGITAL SIGNATURE 29.3

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-5 Signing the whole document

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Digital signature cannot be achieved using only secret keys.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-6 Signing the digest

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-7 Sender site

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-8 Receiver site

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 SECURITY IN THE INTERNET 29.4

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 APPLICTION LAYER SECURITY 29.5

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure 29-9 PGP at the sender site

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure PGP at the receiver site

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 TRANSPORT LAYER SECURITY (TLS) 29.6

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Position of TLS

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Handshake protocol

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 SECURITY AT THE IP LAYER (IPSec) 29.7

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Authentication

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Header format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure ESP

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure ESP format

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 FIREWALLS 29.8

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Firewall

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Packet-filter firewall

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A packet-filter firewall filters at the network or transport layer.

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Figure Proxy firewall

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 A proxy firewall filters at the application layer.