intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Lecture TCP-IP protocol suite - Chapter 29: Internet security

Chia sẻ: Pppppp Pppppp | Ngày: | Loại File: PPT | Số trang:41

57
lượt xem
3
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.

Chủ đề:
Lưu

Nội dung Text: Lecture TCP-IP protocol suite - Chapter 29: Internet security

  1. Chapter 29 Internet Security McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  2. CONTENTS •  INTRODUCTION •  PRIVACY •  DIGITAL SIGNATURE •  SECURITY IN THE INTERNET •  APPLICATION LAYER SECURITY •  TRANSPORT LAYER SECURITY: TLS •  SECURITY AT THE IP LAYER: IPSEC •  FIREWALLS McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  3. 29.1 INTRODUCTION McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  4. Figure  29­1 Aspects of security McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  5. 29.2 PRIVACY McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  6. Figure  29­2 Secret­key encryption McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  7. In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  8. Secret-key encryption is often called symmetric encryption because the same key can be used in both directions. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  9. Secret-key encryption is often used for long messages. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  10. We discuss one secret-key algorithm in Appendix E. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  11. KDC can solve the problem of secret-key distribution. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  12. Figure  29­3 Public­key encryption McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  13. Public-key algorithms are more efficient for short messages. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  14. A CA can certify the binding between a public key and the owner. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  15. Figure  29­4 Combination McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  16. To have the advantages of both secret-key and public-key encryption, we can encrypt the secret key using the public key and encrypt the message using the secret key. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  17. 29.3 DIGITAL SIGNATURE McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  18. Figure  29­5 Signing the whole document McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  19. Digital signature cannot be achieved using only secret keys. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
  20. Digital signature does not provide privacy. If there is a need for privacy, another layer of encryption/decryption must be applied. McGraw­Hill ©The McGraw­Hill Companies, Inc., 2000
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2