Download presentation
Presentation is loading. Please wait.
Published byHortense Banks Modified over 9 years ago
1
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
2
Network Security Physical Layer Security Link Layer Security Network Layer Security Transport Layer Security Application Layer Security Wire protection Link encryption Firewall, IPSec Process-to-process security User authentication, nonrepudiation Cryptography
3
Secrecy Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key cryptography Authentication Nonrepudiation Integrity Kerckhoff’s principle: All algorithms must be public; only the keys are secret Refreshness and Redundancy in the message
4
Columnar Transposition Cipher
5
One-Time Pad - Unbreakable
6
Key Distribution – The Weakest Link Using public-key cryptography for key distribution Alice Bob (E A, D A ) (E B, D B ) E B (P) P = D B (E B (P)) E A (R) R = D A (E A (R)) RSA is one way to realize this procedure
7
Digital Signature vs. Message Digest for Authentication Using symmetric-key Using public-key Alice Bob Big Brother A, K A (B, R A, t, P) K B (A, R A, t, P, K BB (A, t, P)) Alice Bob E B (D A (P)) D B (E B (D A (P)) D A (P) E A (D A (P) P K BB (A, t, MD(P)) P, D A (MD(P)) Add integrity checking too
8
Public Key Cryptograph Allow two people who do not share a common key to communicate with each other securely Makes signing messages possible without the presence of a trusted third party Signed MD make it possible to verify integrity of received message Problem: how to make your public key really public? Certificates (CA)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.