SlideShare uma empresa Scribd logo
1 de 43
Internet and Intranet Protocols and Applications ,[object Object],[object Object]
What is network security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet security threats ,[object Object],[object Object],[object Object],[object Object],[object Object],A B C src:B dest:A  payload
Internet security threats ,[object Object],[object Object],[object Object],[object Object],A B C src:B  dest:A  payload
Internet security threats ,[object Object],[object Object],[object Object],[object Object],A B C SYN SYN SYN SYN SYN SYN SYN
Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptography Algorithms ,[object Object],[object Object],Figure 7.3 goes here plaintext plaintext ciphertext K A K B
Friends and enemies: Alice, Bob, Trudy ,[object Object],[object Object],[object Object],[object Object],Figure 7.1 goes here
Cryptography Basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Symmetric Key Ciphers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Symmetric key cryptography ,[object Object],[object Object],plaintext:  abcdefghijklmnopqrstuvwxyz ciphertext:  mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc E.g.:
DES: Data Encryption Standard ,[object Object],[object Object],[object Object],[object Object],[object Object]
Symmetric key  crypto: DES ,[object Object],[object Object],[object Object],DES operation
Public key cryptography ,[object Object]
How do public key algorithms work? ,[object Object],[object Object],[object Object],[object Object],[object Object]
RSA encryption algorithm ,[object Object],Need d B ( ) and e B ( ) such that Need public and private keys for d B ( ) and e B ( ) Two inter-related requirements: d  (e  (m))  =  m   B B 1 2
RSA: Choosing keys 1.  Choose two large prime numbers  p, q.   (e.g., 1024 bits each) 2.  Compute  n  = pq,  z = (p-1)(q-1 ) 3.  Choose  e  ( with  e<n)  that has no common factors with z. ( e, z  are “relatively prime”). 4.  Choose  d  such that  ed-1  is  exactly divisible by  z . (in other words:  ed  mod  z  = 1  ). 5.   Public  key is  ( n,e ).   Private  key is  ( n,d ).
RSA: Encryption, decryption 0.   Given ( n,e ) and ( n,d ) as computed above 2.  To decrypt received bit pattern,  c , compute (i.e., remainder when  c   is divided by  n ) d 1.  To encrypt bit pattern,  m , compute c = m  mod   n e (i.e., remainder when  m   is divided by  n ) e m = c  mod   n d m  =  (m  mod   n) e mod   n d Magic happens!
RSA example: Bob chooses  p=5, q=7 .  Then  n=35, z=24 . e=5   (so  e, z   relatively prime). d=29  (so  ed-1  exactly divisible by z. letter m m e l 12 1524832 17 c 17 481968572106750915091411825223072000 12 letter l encrypt: decrypt: c = m  mod  n e m = c  mod  n d c d
Authentication ,[object Object],Protocol ap1.0:   Alice says “I am Alice” Failure scenario??
Authentication: another try Protocol ap2.0:   Alice says “I am Alice” and sends her IP address along to “prove” it. Failure scenario?
Authentication: another try Protocol ap3.0:   Alice says “I am Alice” and sends her secret password to “prove” it. Failure scenario?
Authentication: yet another try Protocol ap3.1:   Alice says “I am Alice” and sends her encrypted  secret password to “prove” it. Failure scenario? I am Alice encrypt(password)
Authentication: yet another try Goal:   avoid playback attack Failures, drawbacks? Figure 7.11 goes here Nonce:   number (R) used only once in a lifetime ap4.0:   to prove Alice “live”, Bob sends Alice  nonce , R.  Alice must return R, encrypted with shared secret key
Authentication: ap5.0 ,[object Object],[object Object],[object Object],[object Object],Figure 7.12 goes here
ap5.0: security hole ,[object Object],Figure 7.14 goes here
Digital Signatures   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signatures (more) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Message Digests ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital signature = Signed message digest ,[object Object],[object Object]
Hash Function Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Intermediaries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Distribution Center (KDC) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Certification Authorities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pretty good privacy (PGP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A PGP signed message:
Secure sockets layer (SSL) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSL (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object]
SSL (continued) ,[object Object],[object Object],[object Object],[object Object]
SSL (continued) ,[object Object],[object Object],[object Object]
Ipsec: Network Layer Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ipsec: (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESP Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Header (AH) Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Network security
Network securityNetwork security
Network security
Sisir Ghosh
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
jsk1950
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
rameshvvv
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
Piyush Mittal
 

Mais procurados (15)

Network security
Network securityNetwork security
Network security
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
security
securitysecurity
security
 
Cryptography Attacks and Applications
Cryptography Attacks and ApplicationsCryptography Attacks and Applications
Cryptography Attacks and Applications
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Quan nguyen symmetric versus asymmetric cryptography
Quan nguyen   symmetric versus asymmetric cryptographyQuan nguyen   symmetric versus asymmetric cryptography
Quan nguyen symmetric versus asymmetric cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Basics of coding theory
Basics of coding theoryBasics of coding theory
Basics of coding theory
 
A 2,000-BIT MESSAGE IS USED TO GENERATE A 256-BIT HASH. ONE THE AVERAGE, HOW ...
A 2,000-BIT MESSAGE IS USED TO GENERATE A 256-BIT HASH. ONE THE AVERAGE, HOW ...A 2,000-BIT MESSAGE IS USED TO GENERATE A 256-BIT HASH. ONE THE AVERAGE, HOW ...
A 2,000-BIT MESSAGE IS USED TO GENERATE A 256-BIT HASH. ONE THE AVERAGE, HOW ...
 

Destaque

Facebook的广告营销
Facebook的广告营销Facebook的广告营销
Facebook的广告营销
jackigreat
 
Overview of Internet.ppt
Overview of Internet.pptOverview of Internet.ppt
Overview of Internet.ppt
Videoguy
 
Intranet Mailing System Rahul Raj
Intranet Mailing System Rahul RajIntranet Mailing System Rahul Raj
Intranet Mailing System Rahul Raj
vishnu56
 

Destaque (15)

Mq Lecture
Mq LectureMq Lecture
Mq Lecture
 
Facebook的广告营销
Facebook的广告营销Facebook的广告营销
Facebook的广告营销
 
Minerals
MineralsMinerals
Minerals
 
Overview of Internet.ppt
Overview of Internet.pptOverview of Internet.ppt
Overview of Internet.ppt
 
Wap
WapWap
Wap
 
How to Rethink Your Company Intranet to Deliver Business Value
How to Rethink Your Company Intranet to Deliver Business ValueHow to Rethink Your Company Intranet to Deliver Business Value
How to Rethink Your Company Intranet to Deliver Business Value
 
Creating A Measurable Intranet Strategy Prescient Digital Media
Creating A Measurable Intranet Strategy Prescient Digital MediaCreating A Measurable Intranet Strategy Prescient Digital Media
Creating A Measurable Intranet Strategy Prescient Digital Media
 
Intranet Mailing System Rahul Raj
Intranet Mailing System Rahul RajIntranet Mailing System Rahul Raj
Intranet Mailing System Rahul Raj
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Communication protocols
Communication protocolsCommunication protocols
Communication protocols
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
Communication protocols - Embedded Systems
Communication protocols - Embedded SystemsCommunication protocols - Embedded Systems
Communication protocols - Embedded Systems
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Developing an Intranet Strategy
Developing an Intranet StrategyDeveloping an Intranet Strategy
Developing an Intranet Strategy
 

Semelhante a 1329 n 9460

Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
Sri Prasanna
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
Kai Koenig
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Young Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
David Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Tony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Luis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Fraboni Ec
 

Semelhante a 1329 n 9460 (20)

20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 
13
1313
13
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
 
A TLS Story
A TLS StoryA TLS Story
A TLS Story
 
Chapter 8 v6.0
Chapter 8 v6.0Chapter 8 v6.0
Chapter 8 v6.0
 
rsa.pdf
rsa.pdfrsa.pdf
rsa.pdf
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
crypto1.ppt
crypto1.pptcrypto1.ppt
crypto1.ppt
 
needed.ppt
needed.pptneeded.ppt
needed.ppt
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

1329 n 9460

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. RSA: Choosing keys 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1 ) 3. Choose e ( with e<n) that has no common factors with z. ( e, z are “relatively prime”). 4. Choose d such that ed-1 is exactly divisible by z . (in other words: ed mod z = 1 ). 5. Public key is ( n,e ). Private key is ( n,d ).
  • 18. RSA: Encryption, decryption 0. Given ( n,e ) and ( n,d ) as computed above 2. To decrypt received bit pattern, c , compute (i.e., remainder when c is divided by n ) d 1. To encrypt bit pattern, m , compute c = m mod n e (i.e., remainder when m is divided by n ) e m = c mod n d m = (m mod n) e mod n d Magic happens!
  • 19. RSA example: Bob chooses p=5, q=7 . Then n=35, z=24 . e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z. letter m m e l 12 1524832 17 c 17 481968572106750915091411825223072000 12 letter l encrypt: decrypt: c = m mod n e m = c mod n d c d
  • 20.
  • 21. Authentication: another try Protocol ap2.0: Alice says “I am Alice” and sends her IP address along to “prove” it. Failure scenario?
  • 22. Authentication: another try Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it. Failure scenario?
  • 23. Authentication: yet another try Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. Failure scenario? I am Alice encrypt(password)
  • 24. Authentication: yet another try Goal: avoid playback attack Failures, drawbacks? Figure 7.11 goes here Nonce: number (R) used only once in a lifetime ap4.0: to prove Alice “live”, Bob sends Alice nonce , R. Alice must return R, encrypted with shared secret key
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.

Notas do Editor

  1. Division algorithm: a = qm +r, then r = a mod m