1 ece453 – introduction to computer networks lecture 19 – network security (ii)

13
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

Upload: allen-cunningham

Post on 25-Dec-2015

225 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

1

ECE453 – Introduction to Computer Networks

Lecture 19 – Network Security (II)

Page 2: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

2

Network Security

Physical Layer Security

Link Layer Security

Network Layer Security

Transport Layer Security

Application Layer Security

Wire protection

Link encryption

Firewall, IPSec

Process-to-process security

User authentication, nonrepudiation

Cryptography

Page 3: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

3

Cryptography

Secrecy Substitution cipher Transposition cipher One-time pad Symmetric-key cryptography Public-key cryptography

Authentication NonrepudiationIntegrity

Kerckhoff’s principle: All algorithms must be public; only the keys are secret

Refreshness and Redundancy in the message

Page 4: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

4

IPsec

Where to put security?A framework for multiple services, algorithms, and granularities Services: secrecy, integrity, prevent

replay attack

Connection-oriented SA (Security Association)

Page 5: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

5

IPsec

The IPsec authentication header in transport mode for IPv4

(a)ESP in transport mode.

(b)ESP in tunnel mode.

Page 6: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

6

Firewalls

A firewall consisting of two packet filters and an application gateway

Page 7: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

7

Virtual Private Networks

(a) A leased-line private network. (b) A virtual private network

Page 8: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

8

Page 9: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

9

Page 10: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

10

Authentication Based on a Shared Secret Key

The challenge-response protocol A shortened protocol

The reflection attack Using HMAC to counter reflection attack

Page 11: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

11

Establishing a Shared Key:The Diffie-Hellman Key Exchange

The bucket brigade or man-in-the-middle attack

Page 12: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

12

Authentication Using a Key Distribution Center

Potential replay attack

Page 13: 1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)

13

Authentication Using Public-Key Cryptography