Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

Similar presentations


Presentation on theme: "1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)"— Presentation transcript:

1 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

2 2 Network Security Physical Layer Security Link Layer Security Network Layer Security Transport Layer Security Application Layer Security Wire protection Link encryption Firewall, IPSec Process-to-process security User authentication, nonrepudiation Cryptography

3 3 Secrecy Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key cryptography Authentication Nonrepudiation Integrity Kerckhoff’s principle: All algorithms must be public; only the keys are secret Refreshness and Redundancy in the message

4 4 IPsec Where to put security? A framework for multiple services, algorithms, and granularities Services: secrecy, integrity, prevent replay attack Connection-oriented SA (Security Association)

5 5 IPsec The IPsec authentication header in transport mode for IPv4 (a)ESP in transport mode. (b)ESP in tunnel mode.

6 6 Firewalls A firewall consisting of two packet filters and an application gateway

7 7 Virtual Private Networks (a) A leased-line private network. (b) A virtual private network

8 8

9 9

10 10 Authentication Based on a Shared Secret Key The challenge-response protocol A shortened protocol The reflection attack Using HMAC to counter reflection attack

11 11 Establishing a Shared Key: The Diffie-Hellman Key Exchange The bucket brigade or man-in-the-middle attack

12 12 Authentication Using a Key Distribution Center Potential replay attack

13 13 Authentication Using Public-Key Cryptography


Download ppt "1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)"

Similar presentations


Ads by Google