Download presentation
Presentation is loading. Please wait.
Published byAllen Cunningham Modified over 9 years ago
1
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
2
2 Network Security Physical Layer Security Link Layer Security Network Layer Security Transport Layer Security Application Layer Security Wire protection Link encryption Firewall, IPSec Process-to-process security User authentication, nonrepudiation Cryptography
3
3 Secrecy Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key cryptography Authentication Nonrepudiation Integrity Kerckhoff’s principle: All algorithms must be public; only the keys are secret Refreshness and Redundancy in the message
4
4 IPsec Where to put security? A framework for multiple services, algorithms, and granularities Services: secrecy, integrity, prevent replay attack Connection-oriented SA (Security Association)
5
5 IPsec The IPsec authentication header in transport mode for IPv4 (a)ESP in transport mode. (b)ESP in tunnel mode.
6
6 Firewalls A firewall consisting of two packet filters and an application gateway
7
7 Virtual Private Networks (a) A leased-line private network. (b) A virtual private network
8
8
9
9
10
10 Authentication Based on a Shared Secret Key The challenge-response protocol A shortened protocol The reflection attack Using HMAC to counter reflection attack
11
11 Establishing a Shared Key: The Diffie-Hellman Key Exchange The bucket brigade or man-in-the-middle attack
12
12 Authentication Using a Key Distribution Center Potential replay attack
13
13 Authentication Using Public-Key Cryptography
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.