ECE 453 Introduction to Computer Networks Lecture 19

  • Slides: 13
Download presentation
ECE 453 – Introduction to Computer Networks Lecture 19 – Network Security (II) 1

ECE 453 – Introduction to Computer Networks Lecture 19 – Network Security (II) 1

Network Security Application Layer Security User authentication, nonrepudiation Transport Layer Security Process-to-process security Network

Network Security Application Layer Security User authentication, nonrepudiation Transport Layer Security Process-to-process security Network Layer Security Firewall, IPSec Link Layer Security Link encryption Physical Layer Security Wire protection Cryptography 2

Cryptography Secrecy n n n Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key

Cryptography Secrecy n n n Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key cryptography Authentication Nonrepudiation Integrity Kerckhoff’s principle: All algorithms must be public; only the keys are secret Refreshness and Redundancy in the message 3

IPsec Where to put security? A framework for multiple services, algorithms, and granularities n

IPsec Where to put security? A framework for multiple services, algorithms, and granularities n Services: secrecy, integrity, prevent replay attack Connection-oriented n SA (Security Association) 4

IPsec The IPsec authentication header in transport mode for IPv 4 (a)ESP in transport

IPsec The IPsec authentication header in transport mode for IPv 4 (a)ESP in transport mode. (b)ESP in tunnel mode. 5

Firewalls A firewall consisting of two packet filters and an application gateway 6

Firewalls A firewall consisting of two packet filters and an application gateway 6

Virtual Private Networks (a) A leased-line private network. (b) A virtual private network 7

Virtual Private Networks (a) A leased-line private network. (b) A virtual private network 7

8

8

9

9

Authentication Based on a Shared Secret Key The challenge-response protocol The reflection attack A

Authentication Based on a Shared Secret Key The challenge-response protocol The reflection attack A shortened protocol Using HMAC to counter reflection 10 attack

Establishing a Shared Key: The Diffie-Hellman Key Exchange The bucket brigade or man-in-the-middle attack

Establishing a Shared Key: The Diffie-Hellman Key Exchange The bucket brigade or man-in-the-middle attack 11

Authentication Using a Key Distribution Center Potential replay attack 12

Authentication Using a Key Distribution Center Potential replay attack 12

Authentication Using Public-Key Cryptography 13

Authentication Using Public-Key Cryptography 13