欢迎来到第壹文秘! | 帮助中心 分享价值,成长自我!
第壹文秘
全部分类
  • 幼儿/小学教育>
  • 中学教育>
  • 高等教育>
  • 研究生考试>
  • 外语学习>
  • 资格/认证考试>
  • 论文>
  • IT计算机>
  • 法律/法学>
  • 建筑/环境>
  • 通信/电子>
  • 医学/心理学>
  • ImageVerifierCode 换一换
    首页 第壹文秘 > 资源分类 > PPT文档下载
    分享到微信 分享到微博 分享到QQ空间

    网络信息安全原理简介.ppt

    • 资源ID:164257       资源大小:937KB        全文页数:42页
    • 资源格式: PPT        下载积分:10金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    下载资源需要10金币
    邮箱/手机:
    温馨提示:
    快捷下载时,如果您不填写信息,系统将为您自动创建临时账号,适用于临时下载。
    如果您填写信息,用户名和密码都是您填写的【邮箱或者手机号】(系统自动生成),方便查询和重复下载。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    网络信息安全原理简介.ppt

    1网络信息安全原理简介网络信息安全原理简介2OutlineFoundations: rwhat is security?rcryptographyrauthenticationrmessage integrityrkey distribution and certificationSecurity in practice:rapplication layer: secure e-mailrtransport layer: Internet commerce, SSL, SETrnetwork layer: IP security3Friends and enemies: Alice, Bob, Trudyrwell-known in network security worldrBob, Alice (lovers!) want to communicate “securely”rTrudy, the “intruder” may intercept, delete, add messagesFigure 7.1 goes here4What is network security?Secrecy: only sender, intended receiver should “understand” msg contentsmsender encrypts msgmreceiver decrypts msgAuthentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection5Internet security threatsPacket sniffing: mbroadcast mediampromiscuous NIC reads all packets passing bymcan read all unencrypted data (e.g. passwords)me.g.: C sniffs Bs packetsABCsrc:B dest:A payload6Internet security threatsIP Spoofing: mcan generate “raw” IP packets directly from application, putting any value into IP source address fieldmreceiver cant tell if source is spoofedme.g.: C pretends to be BABCsrc:B dest:A payload7Internet security threatsDenial of service (DOS): mflood of maliciously generated packets “swamp” receivermDistributed DOS (DDOS): multiple coordinated sources swamp receiverme.g., C and remote host SYN-attack AABCSYNSYNSYNSYNSYNSYNSYN8The language of cryptographysymmetric key crypto: sender, receiver keys identicalpublic-key crypto: encrypt key public, decrypt key secret Figure 7.3 goes hereplaintextplaintextciphertextKAKB9Symmetric key cryptographysubstitution cipher: substituting one thing for anothermmonoalphabetic cipher: substitute one letter for anotherplaintext: abcdefghijklmnopqrstuvwxyzciphertext: mnbvcxzasdfghjklpoiuytrewqPlaintext: bob. i love you. aliceciphertext: nkn. s gktc wky. mgsbcE.g.:Q: How hard to break this simple cipher?:brute force (how hard?)other?10Symmetric key crypto: DESDES: Data Encryption StandardrUS encryption standard NIST 1993r56-bit symmetric key, 64 bit plaintext inputrHow secure is DES?mDES Challenge: 56-bit-key-encrypted phrase (“Strong cryptography makes the world a safer place”) decrypted (brute force) in 4 monthsmno known “backdoor” decryption approachrmaking DES more securemuse three keys sequentially (3-DES) on each datummuse cipher-block chaining11Symmetric key crypto: DESinitial permutation 16 identical “rounds” of function application, each using different 48 bits of keyfinal permutationDES operation12Public Key Cryptographysymmetric key cryptorrequires sender, receiver know shared secret keyrQ: how to agree on key in first place (particularly if never “met”)?public key cryptographyrradically different approach Diffie-Hellman76, RSA78rsender, receiver do not share secret keyrencryption key public (known to all) rdecryption key private (known only to receiver)13Public key cryptographyFigure 7.7 goes here14Public key encryption algorithmsneed d ( ) and e ( ) such thatd (e (m) = m BBBB.need public and private keysfor d ( ) and e ( ).BBTwo inter-related requirements:12RSA: Rivest, Shamir, Adelson algorithm15RSA: Choosing keys1. Choose two large prime numbers p, q. (e.g., 1024 bits each)2. Compute n = pq, z = (p-1)(q-1)3. Choose e (with en) that has no common factors with z. (e, z are “relatively prime”).4. Choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ).5. Public key is (n,e). Private key is (n,d).16RSA: Encryption, decryption0. Given (n,e) and (n,d) as computed above1. To encrypt bit pattern, m, computec = m mod ne(i.e., remainder when m is divided by n)e2. To decrypt received bit pattern, c, computem = c mod nd(i.e., remainder when c is divided by n)dm = (m mod n)e mod ndMagichappens!17RSA example:Bob chooses p=5, q=7. Then n=35, z=24.e=5 (so e, z relatively prime).d=29 (so ed-1 exactly divisible by z. lettermmec = m mod nel12152483217cm = c mod nd1748196857210675091509141182522307200012cdletterlencrypt:decrypt:18AuthenticationGoal: Bob wants Alice to “prove” her identity to himProtocol ap1.0: Alice says “I am Alice”Failure scenario?19Authentication: another tryProtocol ap2.0: Alice says “I am Alice” and sends her IP address along to “prove” it.Failure scenario?20Authentication: another tryProtocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it.Failure scenario?21Authentication: yet another tryProtocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it.Failure scenario?I am Aliceencrypt(password)22Authentication: yet another tryGoal: avoid playback attackFailures, drawbacks?Figure 7.11 goes hereNonce: number (R) used onlyonce in a lifetimeap4.0: to prove Alice “live”, Bob sends Alice nonce, R. Alicemust return R, encrypted with shared secret key23Figure 7.12 goes hereAuthentication: ap5.0ap4.0 requires shared symmetric keymproblem: how do Bob, Alice agree on k

    注意事项

    本文(网络信息安全原理简介.ppt)为本站会员(p**)主动上传,第壹文秘仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知第壹文秘(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 1wenmi网站版权所有

    经营许可证编号:宁ICP备2022001189号-1

    本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。第壹文秘仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知第壹文秘网,我们立即给予删除!

    收起
    展开