0% found this document useful (0 votes)
42 views19 pages

Chapter 8 CN

Uploaded by

Honor Swift
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
42 views19 pages

Chapter 8 CN

Uploaded by

Honor Swift
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 19
OE! Network Security, Ch 9) te man can iokaceph it ad se place of me osginal mE ~ Moaifeaton > eavesdrppet snases meee 0 ~ Computer Nehoorks are a shored resource used _ BY iy appstone pr may affennk: ure pan basi chectve ts te commineate seculy owe an em vreature mean. 4 ancaton > A race ty be Sen by aoa = pong ieee ~ Users sometinen swank fo encypt the messages —_ = HH set tlth the gurl of keeping anyone ho ie - {-taiesdropping_on #8 channel patie tea) ey Physical = Tie. ens he eae ac r See on af the. eqtpmest ae ply: =| Nehoowk see has become ave: ey important -issye with Steal caaegt | thea 4 eo hua ke) Some chysical -prolec toa fncte (gel bese pee jin ari “aay +4o_at inauthongesl_perco’ \ — iste and eve chokl of loft ex poced Computes -sycitms should ndt be. lace! in the bo rent ~Bisthealy oteehay deve: a rut 1 a [Inteerapion a at tn ay of Ue = pane sysieme ene 8 fore. oe | = Cob es, jamming ales op linen > As a. meuoye is. communicated. roxy —nehense_,eavesdsppere ao Lisken din ube i for im Pee on beefy tp tes lak dak, while , (rl ts senices jr securect Communica bor, Weeping. information owk of the srs, wate a Dich thal reag és nd} tampred Pent of ide “Prainext | A enessage in. ite ro ul per reasable. \ | Authentication Eatab lishing : ale TE deals with dslevniniof wer e boy an attacket.— ‘ ‘alti do befpm reveal cersibve infor encypton Algpatin Apt tnt creates Cpe [Non Refudiaton ! AbLty fo prove tae tte send 1 plainent» gaa. achually sent theda: “Tf: sequne or set of values a toat_an nage | Availabilty : Computes. oscetsare available fo ralet_on = [* share partes ‘chen _neededls Re cs eal a be unreadable by - eae inkstsled_rocipieah, wgphge=phy ze ste poe pconvesing. — cach spe -reprs. to the tls and echniques | oe aprons t_secure fpr communication _| Se boeboren. the | feels an onmake messages |S lnrune fo attacks raph ae i Sa = pride Mevalpbabetecipne. z wialse town ah taesas slp ia ncubstidied byaamsiho characte shiptedy | | the ~aoainen-chrazachse = 10 thi ciphestenk goss of th paaliena e— Jent prach a character io the plaintext | ee is alumys changed 4 same characka inthe | e— | ‘change 4 othos charmed inthe maldle - ee & didded nko grip of charackers and | use acet of ki | Macys elceel| ag: co! wey veya S| Trancpecition Cipher — = Subsbhehion cipher preserve the —— festa digquise ther “ciphers bors = [or example, if the algosithn saya that letter A | = ia tte potent deat cate ae a - Traneposihion ‘tho letters i changed te D2 nok disguise trem. “Charnchers ramain unchanged but. tei prsinoe | | AgtL = [aaB S= e] ae | are changed tp crake the elpretest L [én io ke [Rey = Deeyotoo J I [ese 0. [Reyes] yet [eee =] : per 6 = = = jalphabelic Subshitution ach occurance of a chamches con havea. “subatitubon 1, chamcter A could be_changed fo} differents: e eXam| Foning of the dent, but tt Coutel be [=D in the J Crypteg raphy, 5 Pajkert fe public enogphn ey LQ an A > sy meee Key mmebie Key ai Decry seat [ean > re ( ofa hey) rrr ~key) = le ~Ciprentext at aoe e+ ‘eres Receiver Symmene Key Cypragraphy = Pubic key Crypto aD ats SIS te, the came bey te ae eat engin 8 deogon Block Ciphos a fas seat =e © Disk iphes proces rscaga in beet, each of which aa ape SA ee ‘inka te _{Deoypr : =~ position unit, also called P-boxe) « substixkon uni 2 8 Sy (alte called G-bones) ond exclusive “28 (et } open decgpkon Key _z metre Kei gpg hy Pesrmitaton P- bax) __ “ee Zl mi : Ay ~ Petmutation. box jaratels the frecibonal taupanition Public key 21 A tipha_jpr characters, >t pole key poperhy tana hoo keys a — There. ave three. types 6} P-benes in modern, black ciphers at aie. ke - SS —stoight Pbonet, expansion Ptoxes_b Compmnssion ite key @ atonal be fu Pale heres #6 s a nl jon ea “Tpvsak. ey i Keph bythe maven Ss : Bd The sender uses the public key of the receives te 5 ‘tf MA = sreapten and the rieiva was his priate key Jor eet faass Sig ome envygpton ane decypton eyo raathemabcally ae iat oe 3 Me BES Cove anon sud) Spee aot cam mon oy a cymmetie-bey block ciphe publshed — T¥ then a camer sees hey dagen rh Gperabuns ond | Gy, ne National Instituke of Standards and Technvl- ey frally fea Teesatene WF Sohich 13 the fovewe of Te dy 3 1 33 Se bitte! permmhton i 1e 0} the mostly wed encyphon scheme is the I DES algorithm shere the al - | 4 the ala _Encwyphen aigethn abbots = [pes, rents Pes: & 64 Bir phenkert SA ABE Cpheilen Eneypton ant Peeion in DES Dterae0 ; - othe plontont 2 pressed in 64-bit blocks and the hy Sin bgt—— dan in @4-bit blocks. The same : oe te see {ex both eonyphin_aod.d ~The enuyphon procem 1s reade_o} rao. permutations wold is called inal andi pesmulabors yond (6 aounct_ iterakone = The Pes ‘gerihm_essenaly “conics 4, “a-seviet permmedations > subsihe ons block walvich to be car vasa) 3 ak ab yoo [pean (tr Ter 1 Lexpusion Fven\! [ i cae! Feary, | Ge eiew Hs en t. ntenlie | glean ee amg 4 oa = ES yes 16 wounds Fath youncl ef DES isa Feist! Gphet % SA (Rivest, Shami b Adieman) > mest common publie=beyalgoathen : ~ prinnde_ley tsa pair of numbos dn) > publikei, th a pair 6{ number (sn) Apri — So - 1) chence jun large prime pb 12) Gompulenepsg Fe (pn 4) Z) chonse a umber, e,less than_n ond wlatively prime ie Ze, @ and 2 haw. np common factor than Oe ENO AEe al cuth that exd zd most 2 wm, (exd)rod z=! " f= mel mod n) eal ety) a) 6 5) tw eneyphon for deogghon erogphon Devyphon aIIIINILIIIN: BSA * DANGER’ (say) eel Gat) = 41040 enoyphen hey — public key. Se! -chonge ¢ such frat € prime te 2. e783 ‘say ) oe Plaintex mani reprieniatn _m® C= ef (orm a. 4 6u aR A y 1 D N 4 244 6 3 aus a € 5 425 a & 6 ae Defy Helwan Aioaihm Ths protocol aioiws shrenget 4 estnblich « shered key > lp Defpe Heltnan Algosthon,the communicating frien Se eachange pub infprmatin fom whih they ie ale. IILII- ° Be iat the hoo partes cheeses hoo numbers N DG Nis a lange pine number such tnat (W1/2. also be a prime number Ge alee a prime number These hoo numbers need ot be confidenbal dT canbe public. dad IPI ddd: = a 2 Ss — 21-6" mod A Caeulaie k= (Be J'rmd N F aluo calculate H= (2)? rma PRL We gona Ne Ap e 2 = fed “Signahie ic am auberheaton wechanism WE thal enables“the creat op 0 mevage f ale BE a cede that ack at signatiw «The Signabire guarentee the sourte and fokeg wily of the _ menage La gin! agosto! ov i aa = hen participating in qinancial er fagal trnsackony, MF pains nto femal at mts sigratird ov by entering a PIV ;but shen a frson want te sign an elechonie document ¢o that later he will be abl fo prove that it is his: document hen ne needs fo Creake a digital nature» A diginl signahie is a security froxedue that uses per of priv public hey Paces ‘The concer Wes a + appued foo sy Greamert Boe west menage and te signature are sent fo the recesver The receiver receives the mowaye ‘ane a and fpr venpiesbon. uses the public the signer appued te the verily 8 Thommen be hie private Wg onthns 40 ign i) ‘9 ‘the: to. ‘The force now i Ipise ver Toga agra Proce A digi tal signature may be famed by eneyphm ce it rth frm ba by ene a hash en the mene Phe tek senders private fey . This encoe hash. becomes the digital 2g agrahire bis Canale een with the document — (ase em cya oe. zs Signahuwe ceingcote — Venu 41 pe dak was Noy tev I Ake hoo heather agree » the dats ie Leith, b the user's diqihl signature ts vali WA [Note A digitll ciqnaluw uses the poate ard igitally. cigned Data a eerie Digitally cig) \ i publ ‘an diphete by eaypiogpiems uses the Invern e cb rial keys tre feceisen | Bigharure Pe =a —— Rear BS Doty Good Privacy (pap) pablie key EH > wai invented by Pht) Zimmor mann to provid —~ a TO BY e-mail with inlegrity ,authertahar and privas tom 2 eae Ft PUP is high-quiiy enayption soften Hiaf® Wy me hashes are equal, the signature te Bm ae aut Peles fp rag cone vecbat par 13g ng 1 data filer - POP employs Some g the lojesk Dans Ft ' Pog Some g tole wes digitally signs a document, a hash gig kechniquer of erenyphon ine luc public Kees is generated por the deciiment trough o.compler gig Cypteg b digital eigna tie toate ate! Compuleon that gereratet a bi Bu, RE gehewl icen 4 Pur, rire urbe» art then encod wih te users B privale key a encoded hash becomes the digit! signature are is eltver storel ith the deeument or tawimitted wlth the doutnent later ,if someone woanks fo vesity thet this document belongs, to his user. ret hash is crealed pom the! dota mont ‘Tho original hash wohich has been ‘onewolod at & tI . a) 4 [per }—____} ‘he simplest Sconasio is to cend the e-mai | menage in plunlert a a } me 7 ts authentication, A sign the menage A erstos ST a digest a the mooage B sign it with A's pavale ma “3 agro vate AS PENS = eB Say ——F : \Cine\ woprovernent sto make ane pocket wane BS Yoata | “Yee w cowpact the monagf i= com predaed - A uh e ©. a V (Shai) “Hepa a mp LZ Confidentiality in an @-mail system can be oubrevel gag ee caption’ wis ow tine enn Keg, 0m shown “bein » aya Reap Qk, aoe Fags ee GM eee z | fies fe ft FF con erenlt session Key «wae tre senion d REAL ELITE L ey we enengpt the menage ahd me ager S SAS ane Gy Yoey withane menage « Hower, Jo bwiect ave cevion Kec ATR@ erenepla it Yoon B rewiver the pocket, he frst eeayphs the Senion hey , using his privale ep) . He then uses The sewion hey 4 cleaypt tne nash a the men: Aya detomproésing the vest 6 the 1) Boorse: A Aigett g who menage checks fo see if IF Is equal te the digest sent by A» If Ht 12, 4n00 the mevage 1 authentic oF layer Sera S81 (secure Cocket layer) SSL ts designed to provide security arc tom prwction servicer fo cata generated pom the appticatm layer: Sst ean receive dal por appit- cation= lagen. froheat» the micived data is. ex my signed and encyypted «The dah is then a ile tramaporn layer frofeeal- ee [Appian layer ] SSL o Tis Te rT locaten @ sot and Te t SSL prokdes sever) servicer on daa rmeived bem the application layer . 2 Frgmenthen : Sst divides tne date ino blocks 3 COR Drescian 2 Fath teancnnnh ms hE eee gS ws sino behoren the client and sex von = Message lategnhy L uses a keyed hash quncton FS Ay dinate Dra Puthenkcatin Code (MAC) 7 > Conjidenbality - To provide congidentiow hy , _ i : Symone key Syptymnphy is used: = Framing - A hneacler iS adiba to the " nestled payylend - socypied Pay ea ‘wo impotent 2S concep SSL secsim and Ee St | connection - aa Coanecttn - for SSL, connections. ore Beer to-pest co wlohenships: Evry cannechon ie associated — la with one seston a Seewon - a An SS\ gapadon fe an assotiatom botoren q cent and server «Secon fe created using Handshake protocol: Alter o cession Te eslablished , the foo forties” hove common ‘aprmation ‘Such as fre session, identper the cextifeate outhentica ing eh 4} ther , the Compression method » ett Tunnel In Tun. AV tre welwomk layer, Secumh) is appied behoeen too host; tuo ulers 0% hock and a wouter. The \ purpose of Pec ts te binleck those applications that usec the seavce oytre ne hoor layer directly such as routing protocol - IP Secusiy ic a collection of protocols. designed by TETE to provide securby jx 0 patket at nebook level Vee moses Peec helps Create authenticated and con} identi) packets ts fhe IP lx 'Psee operates in” one o} hoo modes « ‘Tarapoe eae at Ih trawpoct mode ,1Psee protec what is. clebiem pom the tarpon? layer Aereee layer - Other woos, anspor) mode profech the Pay lind fe be encapsulated inthe nehootk layer . The trumapost mode does nd} Protect tne IP header - W only Protech the packet from the havupor lager. Teowspem layer ° reanr aye ap See Inyo. a Sarwan eee who tava. Tew 1p Pale Tunnel Mode 9 Tunnol mode ,1P See protec the entive IP Packet Ie taken an IP packet, ineludin we fy Putherkiaton Heades (Bn) preteced Not Wade defines ow re of fain carve by mA A = R header , applies IPsec securihy metno mR tne entre Peace and then adds a new IP aa RR ma Neon ty pe lPaaeal bo eS Wsee layer WPSee-m | [rset a “We, [ie=F Neo IP Ryind ‘| a4 OP po Heads a the IP dat Taso Securihy Protocol - [PSec defines eo prvtocele the Authenkeation Hesde (An) protocol and the Eneapeulaing Securipy Pay tod CEsP) proba) Rutnenkeaton Header Protood) ~ derigned 4p authenteale the source host and ‘Jo chau ‘the integriny of the baylond carried in me \P packet PH is placed in the a Jae locabon., baied ob te mode (heupee oF Rinnet) AH provider source authenticaion and dato integshy bub not privagy Paying Tength > 1 Sefet ‘tre.length of the authenkeaton a wha) gent ly Seu p enoeie Inder 3 It plays the rele Be clrevat Idenkier and & same fr aly ak dusing a connection jwence NuMbe -> Hwvides over inpormaton ia vee nae igen “3 "mn #1 cheshaton Dans te pe roult of applying : 4 ash funckon to tne entire 1P dotagram EsP | Eneapa latin aa Payload ) Buinertoston does ne} provide Cones sony do provides couree authenbiator and data + ESPis quthenbiaton data Fe Ackled ab Ancendt AL the bnutracl int inh a adds a header and haiter a ? Heads [ESP heartos it )rotenteada, FY 1? heade [ESP head "0" 4 he aie JSP hai a in CY 7 a ea Padi \a Seqiny | 1 Thad bape iog) Ba ‘ o ig 1P See ESP famat & ‘lirtwal Private Neboone ( vpn) ey One of the applications of IPSec ts tn ea viral privaie nehsotte ey P VPN is a privake nehoott that wes a pa Public nebwerk 1 conrect remote citer or wea frgether. The VPN uses “virtual” conrechons, 4 youted through the Indeinel porn the buinesss a Prvale need ty tre romole cile or employee. re keielgy We he CoP potest q hose Ak in Ate noe) ey Ap ae ~ Vpn vr“) + pri, an employee al home connects tn yy Penal ae prow Aovough @ DSL ay eh, qeotem conrochon. Once the Us0rN connected ty ; the Inleanet ,tunnolirg software creates a secure canneckon acmss the Inkenet fo the corepora le computing Centos a8 shron v9 bgure Socevirg Wiles LANs — enue: WEP (Wired Equivalent, Proban)tis a date-Unk lavel Secumby preactibed by gos. 17 Staniaid . WEP is meant te provde J lowe! of Secuiy similar to that found in volw d nehoorts WEF promle authentication and etek: oregphan betwean a hort and a vies actew point using hic shaed hey appraach When Goal! sectinby is enabled each tation hata secret key chanel with the base chrkon. One established Keys generally remain sia ble ber months or yoo. WEP ereyphon user a sheam cipher based on the PCy Algorithm. BCy genemies a heyerean hal KORE with ne Platten 42 Gorin the Cipheatent » Algpathon DB soumt a0-bit cymmobic ke assumed tobe known t both o ke ts tr & the a cele (39) 's appended te the Go pit key to create 64-bit key thal will be was t a ee ey tad tone Mey stren: W+ks—[2, }Direl | ® not Plain text 3Tr oy W Cipher text > wedatn ‘vorAl Wi-Fi Prkcted Aecew (WPA) is a wireless Secumby prota feigned do addan and p he kwon Cetusihy iscuet in WEP WPA pronder useu with & hig Her bevel of assuraree “tr foie dats will main paket ey Inteopihy Pritecd CTRL) fos ah one nfl worn Wi-Fi Prolected Aeven 2, baved on Teee easeIliy is a witolew Secuihy brotew in which only authorized vse can acten a wirlen dowte juolth feakeres cupposting shorg® ¢ £49, AES (dvanced ee tetas ee nent rou A ag a a wm a a 2 A a a a a ea cs) Ba es a ot ” kt t : ex irexalle Valid FTP Request s = Invalid Teineh Bequest oo Co-oxporale lan. ouhside wer ld A fromall cea system Lor grup of stems) that etporees ov sectithy (polity beloeen & secure infernal Meboork and an untrusted nebcove cuth as the Intemet A firerall va secanty syeem intended to molec an Organizahon's ne hott oairst exlewd veats, suth os hackers, >Coming orm another nebvork uth as -the Inlernel - A frrawall iy usualy clamifed ox 0 packet - fille frewal anda ery bouedt fre.) / Applicaton lew! gateumy ee FRMe Firewall . Pocket fille girenall, the fist generakon seni is eceertally a wute that has been eae to glia Out certain 1P addrmes ov ‘ped number -Mrew #5 Of voLteM berform 0 Static examinaton & x 1p sie Re bo numbeu then erin abn a Amman thine ae sforedl 10 there dabes “Tnese hyper & routes are rplatvely Simple ia denign + ln simple wed. packed fille bronall va router thal user a fillering table fo deude which pacteh muh be distoxeed Paeet tle soure iP il Fiske ja 340° ot ~ 2 ® & Fig: Shekel - pile brew! 1) letomieg ples Bom ho 121-3400 ar bioteed 2) levwming ltd destined fe any intayal TEuDeT sere (pon 25) am blockal- 5) Ie pkb destined fur tnkanal hott tga: (68-08 are blued 4) Outgoing pits deskned fa an HITP sexes (po 2) a blacked The organization doo nk wat employeet 4o browo the lntem ef FREE HM na LH ppcatan Gakuey / Pry. pews ¥ Gomelmes a menage ‘s need to be by. pad on the information available OF the app. layer -for an exampl?, an organisa tian wants by age ison eon oe ye et Boxy hrevall ctanda betreen the cocstom es compuber ‘ard the corpora ton Comput os “ GE 5 au fant Figs: An je ire. Vohen the user ebiont proce sere a me Ane appuicakon op teaten gateway iiplementa hina Newey FUN a server procer fo receive the quest Te server vhen’ the by in the Appleston Jovel and finde ou if the est is. Reatorable «If it A. the server acl oa chient pren cand sendi the my ES real server] if in nd the menage é arsppe: and crm menaae v sent to exbinal wen PF i ket based Tuer Ady 7 Sion plrti hy ~ Tens pa rong to wen = ego pee Disady. Diypeal ty sett cel filha rules ta qoedhank wot RB 5 Ppptication Gatewny Adv = Huger security thon pee file ‘ ~ Only need to ceruibnige a fo allowable appl ithovr - Easy to lw and audit all ‘nce mipg talpe. Disadv. ~ Addibonad preemi ney Overhead On enh conre chon - Terr TTT ea Gromple_De fhe Het man @=7 and Neoz IX chooses 4-3 ond Gatutlate Ry= GA* mol N= 91 B cheer 426 and Glaulae Ry G’meiNeg RP sendz the numbe ot +e @ B sends tre number 4 WA A calculates the 5 letric ke. Ke Cty moby J = 43mod 23 a8 B aleulales tho symmetic ke Kz Ce3%med n 3 Ca )Smod 23 Erample: 88h det Pee gel n= pr =9> z= (PY1q>) = 60 UE MHL PE an \e. Pointert ben) bec SO, choose e such that edn Bb fame to 2 Ade be then C= m*mod n . + 6nd a3 EE ve ats) > eee) el must be hy dooyoo , ledmets ( % Naw 1-37 sthen (et-9) tractly divible ty 60 such Heat Corr) ss auatie by 40 G80 which ¢ DOUL Ua Aa of toe bs capac hy 4A frame hae 913 Ymoigh a chenne! haw Caleutale the pacenkye ef lene “G awumag ne ls he @ the cyanne! te be 2dmg Ale ne channel efferent? Woah 9 your Wlommendakon futher 2 = Boo boys Zour rund bp bee Trewsmiesion Tine = Frame Sg copay = we fh = OS ms See Korn ‘rovnl tip fox Me frame = 2x0.Smu = 4 nw Pevontige g hawwission= we if Pew Pawentxe g idienen « (og) xen 7. L 12 xt = osx f= 95 7 Example _of pels ne pxq = 221 2 = pq = 192 enay phon key (public key) ‘e’ clei find @ Such Which Ts a Numba that ip Prime to 2 and must be 12042 esl F G@cp(@, 2) = 0 p\is2 e-2F Gcp lez) = 9° 21088, e- 3,= Ge (e,2) = 90 at @cp (e,z) = 9° 626 5 Gole2)-yes 0 Noo, det find te, (dxedmod zat deat 2xDZ fe fel, ae (1+ 19ax)) = 193 = 0? seas 2-2, a> 2 a 25 fe 2, ¢ (+ e2n2)Z = 2S =? An F? rIItTntuueba DHE Laat

You might also like