Presentation is loading. Please wait.

Presentation is loading. Please wait.

The University of Adelaide, School of Computer Science

Similar presentations


Presentation on theme: "The University of Adelaide, School of Computer Science"— Presentation transcript:

1 The University of Adelaide, School of Computer Science
31 December 2018 Computer Networks, 5th Edition Chapter 8 Network Security Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 — Instructions: Language of the Computer

2 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.1 Symmetric-key encryption and decryption. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

3 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.2 Cipher block chaining (CBC). Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

4 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.3 Public-key encryption. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

5 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.4 Authentication using public keys. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

6 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.5 Computing a MAC (a) versus computing an HMAC (b). Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

7 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.6 Tree-structured certification authority hierarchy. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

8 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.7 A challenge-response protocol. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

9 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.8 A public-key authentication protocol that depends on synchronization. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

10 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.9 A public-key authentication protocol that does not depend on synchronization. Alice checks her own timestamp against her own clock, and likewise for Bob. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

11 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.10 The Needham–Schroeder authentication protocol. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

12 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.11 Kerberos authentication. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

13 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.12 A man-in-the-middle attack. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

14 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.13 PGP’s steps to prepare a message for ing from Alice to Bob. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

15 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.14 Using SSH port forwarding to secure other TCP-based applications. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

16 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.15 Secure transport layer inserted between application and TCP layers. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

17 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.16 Handshake protocol to establish TLS session. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

18 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.17 IPsec’s ESP format. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

19 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.18 An IP packet with a nested IP packet encapsulated using ESP in tunnel mode. Note that the inner and outer packets have different addresses. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

20 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.19 Use of an Authentication Server in i. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

21 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.20 A firewall filters packets flowing between a site and the rest of the Internet. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved

22 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 8.21 Diagram for Exercise 18. Chapter 8 Copyright © 2012, Elsevier Inc. All rights Reserved


Download ppt "The University of Adelaide, School of Computer Science"

Similar presentations


Ads by Google