Top Banner
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
13

1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

Dec 25, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

1

ECE453 – Introduction to Computer Networks

Lecture 19 – Network Security (II)

Page 2: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

2

Network Security

Physical Layer Security

Link Layer Security

Network Layer Security

Transport Layer Security

Application Layer Security

Wire protection

Link encryption

Firewall, IPSec

Process-to-process security

User authentication, nonrepudiation

Cryptography

Page 3: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

3

Cryptography

Secrecy Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key cryptography

Authentication NonrepudiationIntegrity

Kerckhoff’s principle: All algorithms must be public; only the keys are secret

Refreshness and Redundancy in the message

Page 4: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

4

IPsec

Where to put security?A framework for multiple services, algorithms, and granularities Services: secrecy, integrity, prevent

replay attack

Connection-oriented SA (Security Association)

Page 5: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

5

IPsec

The IPsec authentication header in transport mode for IPv4

(a)ESP in transport mode.

(b)ESP in tunnel mode.

Page 6: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

6

Firewalls

A firewall consisting of two packet filters and an application gateway

Page 7: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

7

Virtual Private Networks

(a) A leased-line private network. (b) A virtual private network

Page 8: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

8

Page 9: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

9

Page 10: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

10

Authentication Based on a Shared Secret Key

The challenge-response protocol A shortened protocol

The reflection attack Using HMAC to counter reflection attack

Page 11: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

11

Establishing a Shared Key:The Diffie-Hellman Key Exchange

The bucket brigade or man-in-the-middle attack

Page 12: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

12

Authentication Using a Key Distribution Center

Potential replay attack

Page 13: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

13

Authentication Using Public-Key Cryptography