Lecture TCP-IP protocol suite - Chapter 29: Internet security

ppt
Số trang Lecture TCP-IP protocol suite - Chapter 29: Internet security 41 Cỡ tệp Lecture TCP-IP protocol suite - Chapter 29: Internet security 591 KB Lượt tải Lecture TCP-IP protocol suite - Chapter 29: Internet security 0 Lượt đọc Lecture TCP-IP protocol suite - Chapter 29: Internet security 1
Đánh giá Lecture TCP-IP protocol suite - Chapter 29: Internet security
4.4 ( 17 lượt)
Nhấn vào bên dưới để tải tài liệu
Để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

Chapter 29 Internet Security McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 CONTENTS • • • • • • • • INTRODUCTION PRIVACY DIGITAL SIGNATURE SECURITY IN THE INTERNET APPLICATION LAYER SECURITY TRANSPORT LAYER SECURITY: TLS SECURITY AT THE IP LAYER: IPSEC FIREWALLS McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 29.1 INTRODUCTION McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-1 McGraw-Hill Aspects of security ©The McGraw-Hill Companies, Inc., 2000 29.2 PRIVACY McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-2 McGraw-Hill Secret-key encryption ©The McGraw-Hill Companies, Inc., 2000 In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Secret-key encryption is often called symmetric encryption because the same key can be used in both directions. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Secret-key encryption is often used for long messages. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 We discuss one secret-key algorithm in Appendix E. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 KDC can solve the problem of secret-key distribution. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-3 McGraw-Hill Public-key encryption ©The McGraw-Hill Companies, Inc., 2000 Public-key algorithms are more efficient for short messages. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 A CA can certify the binding between a public key and the owner. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-4 McGraw-Hill Combination ©The McGraw-Hill Companies, Inc., 2000 To have the advantages of both secret-key and public-key encryption, we can encrypt the secret key using the public key and encrypt the message using the secret key. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 29.3 DIGITAL SIGNATURE McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-5 McGraw-Hill Signing the whole document ©The McGraw-Hill Companies, Inc., 2000 Digital signature cannot be achieved using only secret keys. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-6 McGraw-Hill Signing the digest ©The McGraw-Hill Companies, Inc., 2000 Figure 29-7 McGraw-Hill Sender site ©The McGraw-Hill Companies, Inc., 2000 Figure 29-8 McGraw-Hill Receiver site ©The McGraw-Hill Companies, Inc., 2000 29.4 SECURITY IN THE INTERNET McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 29.5 APPLICTION LAYER SECURITY McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-9 McGraw-Hill PGP at the sender site ©The McGraw-Hill Companies, Inc., 2000 Figure 29-10 McGraw-Hill PGP at the receiver site ©The McGraw-Hill Companies, Inc., 2000 29.6 TRANSPORT LAYER SECURITY (TLS) McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-11 McGraw-Hill Position of TLS ©The McGraw-Hill Companies, Inc., 2000 Figure 29-12 McGraw-Hill Handshake protocol ©The McGraw-Hill Companies, Inc., 2000 29.7 SECURITY AT THE IP LAYER (IPSec) McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-13 McGraw-Hill Authentication ©The McGraw-Hill Companies, Inc., 2000 Figure 29-14 McGraw-Hill Header format ©The McGraw-Hill Companies, Inc., 2000 Figure 29-15 McGraw-Hill ESP ©The McGraw-Hill Companies, Inc., 2000 Figure 29-16 McGraw-Hill ESP format ©The McGraw-Hill Companies, Inc., 2000 29.8 FIREWALLS McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-17 Firewall McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-18 McGraw-Hill Packet-filter firewall ©The McGraw-Hill Companies, Inc., 2000 A packet-filter firewall filters at the network or transport layer. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000 Figure 29-19 McGraw-Hill Proxy firewall ©The McGraw-Hill Companies, Inc., 2000 A proxy firewall filters at the application layer. McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.