HANNAM UNIVERSITY 1 Chapter 29 Internet Security.

Slides:



Advertisements
Similar presentations
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Advertisements

Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SSL AND E- COMMERCE S ECURITY gz2155 Guangwei Zhang.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to Cryptography
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Guide to Network Defense and Countermeasures Second Edition
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
IPSec 과 SSL 김태호. 1 목 차 IPSec 개요IPSec 개요 AH(Authentication Header)AH(Authentication Header) ESP(Encapsulation Security Payload)ESP(Encapsulation.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 29 Internet Security
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
24-1 Last time □ Message Integrity □ Authentication □ Key distribution and certification.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network Security7-1 Today r Collect Ch6 HW r Assign Ch7 HW m Ch7 #2,3,4,5,7,9,10,12 m Due Wednesday Nov 19 r Continue with Chapter 7 (Security)
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Secure connections.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display Chapter 10 Network Security.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 12 Network Security (2)
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Chapter 21 Distributed System Security Copyright © 2008.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
SSL(Secure Socket Layer) Guided By:- Presented By:- Richard Sinn Jimmy Mehta
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Chapter 14 Network Encryption
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
IPsec, SSL 박호용 박민호.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Chapter 8 Network Security.
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The University of Adelaide, School of Computer Science
Transport Layer Security (TLS)
Unit 8 Network Security.
Advanced Computer Networks
Network Security Chapter 8.
Presentation transcript:

HANNAM UNIVERSITY 1 Chapter 29 Internet Security

HANNAM UNIVERSITY 2 CONTENTS INTRODUCTION PRIVACY DIGITAL SIGNATURE SECURITY IN THE INTERNET APPLICATION LAYER SECURITY TRANSPORT LAYER SECURITY: TLS SECURITY AT THE IP LAYER: IPSEC FIREWALLS

HANNAM UNIVERSITY 3 INTRODUCTION 29.1

HANNAM UNIVERSITY 개요  보안에서 필요한 기능

HANNAM UNIVERSITY 5 PRIVACY 29.2

HANNAM UNIVERSITY 기밀성  비밀키 암호화

HANNAM UNIVERSITY 기밀성 In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

HANNAM UNIVERSITY 기밀성 Secret-key encryption is often called symmetric encryption because the same key can be used in both directions.

HANNAM UNIVERSITY 기밀성 Secret-key encryption is often used for long messages.

HANNAM UNIVERSITY 기밀성 We discuss one secret-key algorithm in Appendix E.

HANNAM UNIVERSITY 기밀성 KDC can solve the problem of secret-key distribution.

HANNAM UNIVERSITY 기밀성  공개키 암호화

HANNAM UNIVERSITY 기밀성 Public-key algorithms are more efficient for short messages.

HANNAM UNIVERSITY 기밀성 A CA can certify the binding between a public key and the owner.

HANNAM UNIVERSITY 기밀성  비밀키와 공개키의 결합

HANNAM UNIVERSITY 기밀성 To have the advantages of both secret-key and public-key encryption, we can encrypt the secret key using the public key and encrypt the message using the secret key.

HANNAM UNIVERSITY 17 DIGITAL SIGNATURE 29.3

HANNAM UNIVERSITY 디지털 서명  전체 문서에 서명

HANNAM UNIVERSITY 디지털 서명 Digital signature cannot be achieved using only secret keys.

HANNAM UNIVERSITY 디지털 서명 Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied.

HANNAM UNIVERSITY 디지털 서명  다이제스트에 서명

HANNAM UNIVERSITY 디지털 서명  송신자 측

HANNAM UNIVERSITY 디지털 서명  수신자 측

HANNAM UNIVERSITY 24 SECURITY IN THE INTERNET 29.4

HANNAM UNIVERSITY 인터넷 보안  인터넷 보안 기능 제공  응용 계층  Client 와 server 고려  전송 계층  새로운 계층 추가  IP 계층  OSPF, ICMP, IGMP 층과 같은 프로토콜을 위한 서비스

HANNAM UNIVERSITY 26 APPLICTION LAYER SECURITY 29.5

HANNAM UNIVERSITY 응용계층 보안  PGP(Pretty Good Privacy)  Phill Zimmermann 에 의해 개발  기밀성, 무결성, 인증, 부인방지 서비스 제공  무결성, 인증, 부인 방지를 위해 디지털 서명 사용  기밀성을 위해 비밀키와 공개키 암호화 조합 이용

HANNAM UNIVERSITY 응용계층 보안  송신측의 PGP

HANNAM UNIVERSITY 응용계층 보안  수신측의 PGP

HANNAM UNIVERSITY 응용계층 보안  SSH(Secure Shell)  보안을 제공하는 클라이언트 - 서버 프로그램  인증, 권한부여, 기밀성, 무결성, 터널링 기능 제공

HANNAM UNIVERSITY 31 TRANSPORT LAYER SECURITY (TLS) 29.6

HANNAM UNIVERSITY 전송계층 보안  TLS 의 위치

HANNAM UNIVERSITY 전송계층 보안  TLS(Transport Layer Security)  전송계층 보안 제공  넷스케이프사 개발 SSL(Secure Socket Layer)  IETF 에 의해 설계된 SSL 의 공개 버전  Handshake Protocol : 보안 협상, 브라우저 / 서버간 인 증  Data Exchange Protocol : 무결성, 기밀성 제공

HANNAM UNIVERSITY 전송계층 보안  핸드쉐이크 프로토콜

HANNAM UNIVERSITY 35 SECURITY AT THE IP LAYER (IPSec) 29.7

HANNAM UNIVERSITY IP 계층 보안 : IPSEC  인증

HANNAM UNIVERSITY IP 계층 보안 : IPSEC  헤더 형식

HANNAM UNIVERSITY IP 계층 보안 : IPSEC  ESP

HANNAM UNIVERSITY IP 계층 보안 : IPSEC  ESP 형식

HANNAM UNIVERSITY 40 FIREWALLS 29.8

HANNAM UNIVERSITY 방화벽

HANNAM UNIVERSITY 방화벽  패킷 - 필터 방화벽

HANNAM UNIVERSITY 방화벽 A packet-filter firewall filters at the network or transport layer.

HANNAM UNIVERSITY 방화벽  프록시 방화벽

HANNAM UNIVERSITY 방화벽 A proxy firewall filters at the application layer.