Download presentation
Presentation is loading. Please wait.
Published byAlexia Gibson Modified over 9 years ago
1
PEER-TO-PEER SECURITY PRESENTEDBY SHRUTI PARIHAR
2
STEGANOGRAPHY DENIAL OF SERVICE ATTACK IMPERSONATION ENCRYPTION CRACKING NON-ENCRYPTED IM EAVESDROPPING TROJANS, VIRUSES, BUGS SECURITY ISSUES IN P2P
4
P2P SECURITY PROTOCOL CONCEPTS PEER GROUPS GROUP AUTHORITY ACL MANAGEMENT GROUP MEMBERSHIP K -1 GA (G, EXP, g Ra mod p) signed by GA K -1 GA (G, EXP, g Ra mod p) signed by GA
5
P2P SECURITY PROTOCOL (contd.) TWO-PHASES LOGIN PROTOCOL USER LOGIN AUTHORITY LOGIN MUTUAL AUTHENTICATION PROTOCOL PROTOCOL
6
P2P SECURITY PROTOCOL (contd.) LOGIN PROTOCOL OVERVIEW PASSWORD, PASSWORD-ID, ACL’s DIFFIE-HELMAN KEY EXCHANGE g Rtu mod p, g Rta mod p, K = g RtuRta mod p g Rtu mod p, g Rta mod p, K = g RtuRta mod p CHALLENGE RESPONSE RSA ENCRYPTED CERTIFICATES
7
P2P SECURITY PROTOCOL (contd.) LOGIN PROTOCOL U->A: H, G, PID, P(g Rtu mod p), D K rand = g RtuRta mod p A->U: H, P(g Rta mod p), K rand (C A ), D U->A: K rand (H, REQUEST, C A, C U, D) A->U: K rand (H, C U, RESPONSE, D)
8
P2P SECURITY PROTOCOL (contd.) MUTUAL AUTHENTICATION PROTOCOL OVERVIEW DIGITAL CERTIFICATES DIFFIE-HELMAN KEY EXCHANGE g Rtu mod p, g Rta mod p, K = g RtuRta mod p g Rtu mod p, g Rta mod p, K = g RtuRta mod p CHALLENGE RESPONSE
9
P2P SECURITY PROTOCOL (contd.) MUTUAL AUTHENTICATION U1->U2: H, G, GM U1, D K= g Ru1Ru2 mod p U2->U1: H, GM U2, K(C U2 ), D U1->U2: K(H, C U1, C U2, D) U2->U1: K(H, C U1, D) K rand = g Ru1Ru2Cu1Cu2 mod p
10
QUESTIONS ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.