当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

西南师范大学:《计算机网络》课程教学资源(PPT课件讲稿,英文版)Chapter 7 Network Security

资源类别:文库,文档格式:PPT,文档页数:82,文件大小:759KB,团购合买
Chapter 7 Network Security Computer Networking A Top Down Approach Featuring the Internet, The power Point slides are based on the 2nd edition material provided by Jim Kurose, Keith Ross Lf Kurose and K.w. ross Addison-Wesley, July
点击下载完整版文档(PPT)

Chapter 7 Network Security Computer Networking A Top Down Approach Featuring the Internet The power point slides are based on the 2nd edition material provided by Jim Kurose, Keith Ros JF Kurose and K.W. ross Addison-Wesley, Juf 2002 Network Security 7-1

Network Security 7-1 Chapter 7 Network Security Computer Networking: A Top Down Approach Featuring the Internet, 2nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002. The PowerPoint Slides are based on the material provided by J.F Kurose and K.W. Ross

Chapter 7: Network Security Chapter goals: O understand principles of network security o cryptography and its many uses beyond confidentiality o authentication o message integrity o key distribution O security in practice o firewalls o security in application transport network link layers Network Security 7-2

Network Security 7-2 Chapter 7: Network Security Chapter goals:  understand principles of network security:  cryptography and its many uses beyond “confidentiality”  authentication  message integrity  key distribution  security in practice:  firewalls  security in application, transport, network, link layers

Chapter 7 roadmap 7.1 What is network security? 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key distribution and certification 7.6 Access control: firewalls 7.7 Attacks and counter measures 7. 8 Security in many layers Network Security 7-3

Network Security 7-3 Chapter 7 roadmap 7.1 What is network security? 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key Distribution and certification 7.6 Access control: firewalls 7.7 Attacks and counter measures 7.8 Security in many layers

What is network security? Confidentiality: only sender, intended receiver should "understand"message contents o sender encrypts message o receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards without detection Access and Availability: services must be accessible and available to users Network Security 7-4

Network Security 7-4 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents  sender encrypts message  receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and Availability: services must be accessible and available to users

Friends and enemies: Alice Bob. Trudy o well-known in network security world o Bob, Alice (lovers! )want to communicate "securely o Trudy(intruder)may intercept, delete, add messages Alice Bob channe data, control messages data secure secure data sender recelver Trudy Network Security 7-5

Network Security 7-5 Friends and enemies: Alice, Bob, Trudy  well-known in network security world  Bob, Alice (lovers!) want to communicate “securely”  Trudy (intruder) may intercept, delete, add messages secure sender secure receiver channel data, control messages data data Alice Bob Trudy

Who might Bob, Alice be? g.. well real-life bobs and alices o Web browser/server for electronic transactions(e., on-line purchases O on-line banking client/server U DNS servers D routers exchanging routing table updates D other examples? Network Security 7-6

Network Security 7-6 Who might Bob, Alice be?  … well, real-life Bobs and Alices!  Web browser/server for electronic transactions (e.g., on-line purchases)  on-line banking client/server  DNS servers  routers exchanging routing table updates  other examples?

There are bad guys(and girls)out there! Q: What can a bad guy"do? A: a lotl D eavesdrop: intercept messages o actively insert messages into connection o impersonation: can fake(spoof) source address in packet (or any field in packet) hjacking: take over"ongoing connection by removing sender or receiver inserting himself In place o denial of service: prevent service from being used by others(e.g, by overloading resources) more on this later… Network Security 7-7

Network Security 7-7 There are bad guys (and girls) out there! Q: What can a “bad guy” do? A: a lot!  eavesdrop: intercept messages  actively insert messages into connection  impersonation: can fake (spoof) source address in packet (or any field in packet)  hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place  denial of service: prevent service from being used by others (e.g., by overloading resources) more on this later ……

Chapter 7 roadmap 7. 1 What is network security 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key distribution and certification 7.6 Access control: firewalls 7.7 Attacks and counter measures 7. 8 Security in many layers Network Security 7-8

Network Security 7-8 Chapter 7 roadmap 7.1 What is network security? 7.2 Principles of cryptography 7.3 Authentication 7.4 Integrity 7.5 Key Distribution and certification 7.6 Access control: firewalls 7.7 Attacks and counter measures 7.8 Security in many layers

The language of cryptography ⊙A|ices ⊙≥Bobs encryption decryption. s. key key plaintext, encryption_ciphertext decryption plaintext algorithm symmetric key crypto: sender, receiver keys identical public-key crypto: encryption key public, decryption key secret(private) Network Security 7-9

Network Security 7-9 The language of cryptography symmetric key crypto: sender, receiver keys identical public-key crypto: encryption key public, decryption key secret (private) plaintext ciphertext plaintext K A encryption algorithm decryption algorithm Alice’s encryption key Bob’s decryption key K B

Symmetric key cryptograph substitution cipher: substituting one thing for another o monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewg E.g. Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc Q: How hard to break this simple cipher? 口 brute force( how haro? 口 other? Network Security 7-10

Network Security 7-10 Symmetric key cryptography substitution cipher: substituting one thing for another  monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc E.g.: Q: How hard to break this simple cipher?: ❑ brute force (how hard?) ❑ other?

点击下载完整版文档(PPT)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共82页,可试读20页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有