22
1 Chapter 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

Embed Size (px)

Citation preview

Page 1: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

1

Chapter 8

Network Security

Computer Networks, 5th Edition

Copyright © 2012, Elsevier Inc. All rights Reserved

Page 2: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

2Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.1 Symmetric-key encryption and decryption.

Page 3: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

3Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.2 Cipher block chaining (CBC).

Page 4: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

4Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.3 Public-key encryption.

Page 5: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

5Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.4 Authentication using public keys.

Page 6: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

6Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.5 Computing a MAC (a) versus computing an HMAC (b).

Page 7: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

7Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.6 Tree-structured certification authority hierarchy.

Page 8: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

8Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.7 A challenge-response protocol.

Page 9: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

9Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.8 A public-key authentication protocol that depends on synchronization.

Page 10: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

10Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.9 A public-key authentication protocol that does not depend on synchronization. Alice checks her own timestamp against her own clock, and likewise for Bob.

Page 11: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

11Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.10 The Needham–Schroeder authentication protocol.

Page 12: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

12Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.11 Kerberos authentication.

Page 13: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

13Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.12 A man-in-the-middle attack.

Page 14: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

14Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.13 PGP’s steps to prepare a message for emailing from Alice to Bob.

Page 15: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

15Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.14 Using SSH port forwarding to secure other TCP-based applications.

Page 16: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

16Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.15 Secure transport layer inserted between application and TCP layers.

Page 17: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

17Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.16 Handshake protocol to establish TLS session.

Page 18: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

18Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.17 IPsec’s ESP format.

Page 19: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

19Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.18 An IP packet with a nested IP packet encapsulated using ESP in tunnel mode. Note that the inner and outer packets have different addresses.

Page 20: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

20Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.19 Use of an Authentication Server in 802.11i.

Page 21: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

21Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.20 A firewall filters packets flowing between a site and the rest of the Internet.

Page 22: Chapter 8 Network Security - Elsevier 8 Network Security Computer Networks, 5th Edition Copyright © 2012, Elsevier Inc. All rights Reserved Copyright © 2012, Elsevier Inc. All rights

22Copyright © 2012, Elsevier Inc. All rights Reserved

FIGURE 8.21 Diagram for Exercise 18.