Download presentation
Presentation is loading. Please wait.
Published byAmice Anderson Modified over 9 years ago
1
Confidentiality using Conventional Encryption Chapter 5
2
Vulnerability points In-house –Corrupted workstation Extra machine with sniffer –Wiring closet Sneaky rewiring – for example to phone line –Corrupted server/router Hacked – routed to man-in-the middle Interception on external network –Wireless interception –Interception in external packet network DNS attack IP spoofing
3
Encryption points Link encryption –IP and higher headers are encrypted – less traffic analysis –Requires trust in packet network –Many keys required –Host authentication only End-to-end encryption –Link headers must be in clear –Packets show link headers –One key per user pair –User responsible and can decide not to encrypt –Can be either protocol (TCP layer) or application layer
4
Traffic Confidentiality Defends against traffic analysis –Partner identity –How much communication –Message characteristics – length, response patterns –Relation with external events Defenses –Link encryption hides users’ headers –Traffic padding (send useless random patterns) – used for end-to- end –Packet tunneling (real thing hidden within innocent-looking packet)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.