CH 07
CH 07
Network Security
Chapter 7
Fourth Edition
by William Stallings
Lecture slides by Lawrie Brown
Placement of Encryption
have two major placement alternatives
link encryption
end-to-end encryption
Placement of Encryption
Placement of Encryption
when using end-to-end encryption must
Placement of Encryption
can place encryption function at various
Traffic Analysis
is monitoring of communications flows
between parties
Key Distribution
symmetric schemes require both parties to
Key Distribution
4.
Key Hierarchy
typically have a hierarchy of keys
session key
temporary key
used for encryption of data between users
for one logical session then discarded
master key
Random Numbers
Pseudorandom Number
Generators (PRNGs)
often use deterministic algorithmic
known as pseudorandom
numbers
Generators (PRNGs)
Linear Congruential
Generator
xi = xi-12 mod n
where n=p.q, and primes p,q=3 mod 4
Published Sources
Summary
have considered: