网络信息安全原理简介.ppt
《网络信息安全原理简介.ppt》由会员分享,可在线阅读,更多相关《网络信息安全原理简介.ppt(42页珍藏版)》请在优知文库上搜索。
1、1网络信息安全原理简介网络信息安全原理简介2OutlineFoundations: rwhat is security?rcryptographyrauthenticationrmessage integrityrkey distribution and certificationSecurity in practice:rapplication layer: secure e-mailrtransport layer: Internet commerce, SSL, SETrnetwork layer: IP security3Friends and enemies: Alice, Bob,
2、 Trudyrwell-known in network security worldrBob, Alice (lovers!) want to communicate “securely”rTrudy, the “intruder” may intercept, delete, add messagesFigure 7.1 goes here4What is network security?Secrecy: only sender, intended receiver should “understand” msg contentsmsender encrypts msgmreceiver
3、 decrypts msgAuthentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection5Internet security threatsPacket sniffing: mbroadcast mediampromiscuous NIC reads all packets passi
4、ng bymcan read all unencrypted data (e.g. passwords)me.g.: C sniffs Bs packetsABCsrc:B dest:A payload6Internet security threatsIP Spoofing: mcan generate “raw” IP packets directly from application, putting any value into IP source address fieldmreceiver cant tell if source is spoofedme.g.: C pretend
5、s to be BABCsrc:B dest:A payload7Internet security threatsDenial of service (DOS): mflood of maliciously generated packets “swamp” receivermDistributed DOS (DDOS): multiple coordinated sources swamp receiverme.g., C and remote host SYN-attack AABCSYNSYNSYNSYNSYNSYNSYN8The language of cryptographysym
6、metric key crypto: sender, receiver keys identicalpublic-key crypto: encrypt key public, decrypt key secret Figure 7.3 goes hereplaintextplaintextciphertextKAKB9Symmetric key cryptographysubstitution cipher: substituting one thing for anothermmonoalphabetic cipher: substitute one letter for anotherp
7、laintext: abcdefghijklmnopqrstuvwxyzciphertext: mnbvcxzasdfghjklpoiuytrewqPlaintext: bob. i love you. aliceciphertext: nkn. s gktc wky. mgsbcE.g.:Q: How hard to break this simple cipher?:brute force (how hard?)other?10Symmetric key crypto: DESDES: Data Encryption StandardrUS encryption standard NIST
8、 1993r56-bit symmetric key, 64 bit plaintext inputrHow secure is DES?mDES Challenge: 56-bit-key-encrypted phrase (“Strong cryptography makes the world a safer place”) decrypted (brute force) in 4 monthsmno known “backdoor” decryption approachrmaking DES more securemuse three keys sequentially (3-DES
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络 信息 安全 原理 简介