Chapter 8. Network Security
Chapter 8. Network Security
Network Security
Cryptography
• Introduction to Cryptography
• Substitution Ciphers
• Transposition Ciphers
• One-Time Pads
• Two Fundamental Cryptographic Principles
Need for Security
A transposition cipher.
One-Time Pads
An outline of
Rijndael.
AES (3)
• RSA
• Other Public-Key Algorithms
RSA
• One good method was discovered by a group at M.I.T.
(Rivest et al., 1978). It isknown by the initials of the three
discoverers (Rivest, Shamir, Adleman): RSA.
• Symmetric-Key Signatures
• Public-Key Signatures
• Message Digests
• The Birthday Attack
Digital Signature
• The authenticity of many legal, financial, and other documents is
determined by the presence or absence of an authorized handwritten
signature.
• And photocopies do not count. For computerized message systems to
replace the physical transport of paper-and-ink documents, a method
must be found to allow documents to be signed in an unforgeable
way.
• The problem of devising a replacement for handwritten signatures is
a difficult one. Basically, what is needed is a system by which one
party can send a signed message to another party in such a way that
the following conditions hold:
• BB sees that the message is from Alice, decrypts it, and sends a
message to Bob as shown. The message to Bob contains the plaintext
of Alice’s message and also the signed message KBB(A, t, P). Bob
now carries out Alice’s request.
One potential problem with the signature protocol of Fig. 8-18 is Trudy
replaying either message. To minimize this problem, timestamps are
used throughout.
Furthermore, Bob can check all recent messages to see if RA was used
in any of them. If so, the message is discarded as a replay. Note that
based on the timestamp, Bob will reject very old messages. To guard
against instant replay attacks, Bob just checks the RA of every incoming
message to see if such a message has been received from Alice in the
past hour. If not, Bob can safely assume this is a new request.
Public-Key Signatures
• For one thing, Bob can prove that a message was sent by Alice only
as long as DA remains secret. If Alice discloses her secret key, the
argument no longer holds, because anyone could have sent the
message, including Bob himself.
• Certificates
• X.509
• Public Key Infrastructures
Problems with Public-Key Encryption
• IPsec
• Firewalls
• Virtual Private Networks
• Wireless Security
IPsec
A PGP message.
Web Security
• Threats
• Secure Naming
• SSL – The Secure Sockets Layer
• Mobile Code Security
Secure Naming
• Privacy
• Freedom of Speech
• Copyright
Anonymous Remailers
(a) Three zebras and a tree. (b) Three zebras, a tree, and
the
complete text of five plays by William Shakespeare.