复旦大学:《密码学基础》课程教学资源(课件讲稿)11.1 IP Security

密码学基础11.1 P Security 復大辱软件学院
1 密码学基础 11.1 IP Security

Review Cryptography Authentication techniques PKL CA cert 復大辱软件学院
2 Review • Cryptography • Authentication techniques • PKI, CA, cert

IP Security have a range of application specific security mechanisms eg. S/mime, Pgp, Kerberos, Ssl/Https however there are security concerns that cut across protocol layers would like security implemented by the network for all applications Q: If security mechanisms in app layer have implemented. Security is needed in network level? Or vice versa? 復大辱软件学院
3 IP Security • have a range of application specific security mechanisms – eg. S/MIME, PGP, Kerberos, SSL/HTTPS • however there are security concerns that cut across protocol layers • would like security implemented by the network for all applications • Q: If security mechanisms in app layer have implemented. Security is needed in network level? Or vice versa?

ota Security facilities in TCP/IP HttpfTpsmTp S/MIME PGP SET Http Ftp SmtP SSL or tls Kerberos SMTP Http TCP TCP UDP TCP IP/IPSec IP IP (a) Network Level (b)Transport Level (c)Application Level 復大辱软件学院
4 Security facilities in TCP/IP

IPSec general IP Security mechanisms ° provides authentication confidentiality key management applicable to use over LANs, across public private WANs,& for the Internet 復大辱软件学院
5 IPSec • general IP Security mechanisms • provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet

IPSec Uses User system with IPSec Public(Internet) or Private Network Networking device with IPSec Networking device with IPSe 復大辱软件学院
6 IPSec Uses

Benefits of iPsec in a firewall/router provides strong security to all traffic crossing the perimeter in a firewall router is resistant to bypass is below transport layer, hence transparent to applications can be transparent to end users can provide security for individual users secures routing architecture 復大辱软件学院
7 Benefits of IPSec • in a firewall/router provides strong security to all traffic crossing the perimeter • in a firewall/router is resistant to bypass • is below transport layer, hence transparent to applications • can be transparent to end users • can provide security for individual users • secures routing architecture

o IP Security Architecture specification is quite complex defined in numerous rfCs -inc|.RFC2401/2402/2406/2408 many others, grouped by category mandatory in IPv6, optional in IPv4 have two security header extensions Authentication Header(ah) Encapsulating Security payload(EsP) 復大辱软件学院
8 IP Security Architecture • specification is quite complex • defined in numerous RFC’s – incl. RFC 2401/2402/2406/2408 – many others, grouped by category • mandatory in IPv6, optional in IPv4 • have two security header extensions: – Authentication Header (AH) – Encapsulating Security Payload (ESP)

PSec Services AH ESP (encryption ESP (encryption plus only) authentication) Access control Connectionless integrity Data origin authentication Rejection of replayed ackets Confidentiality Limited traffic flow confidentiality 復大辱软件学院
9 IPSec Services

IPSec Services Access control Connectionless integrity Data origin authentication Rejection of replayed packets a form of partial sequence integrity Confidentiality(encryption) Limited traffic flow confidentiality 復大辱软件学院
10 IPSec Services • Access control • Connectionless integrity • Data origin authentication • Rejection of replayed packets – a form of partial sequence integrity • Confidentiality (encryption) • Limited traffic flow confidentiality
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(2/2)Authentication – Basic protocol constructions – Kerberos.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)09-10(1/2)Authentication - 身份认证.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)07-08 PKI(Public Key Infrastructure)公钥基础设施——公钥技术的应用.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)06 Stream Cipher.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)05 Message authentication and Hash function.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)04 Public Key Cryptography, RSA.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)03 Modern Block Ciphers.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)02 Introduction to Cryptography -Classical Encryption Techniques(cont.).pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)01 Classical Encryption Techniques.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_14 - Synchronization.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_13- Collective behaviors+Drone flocking.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_12- Community+Opinion dynamics+consensus.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_11- Spreading on networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_10- Evolutionary game.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_9- TimeseriesNetworks and ECG.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_8- Modelling networks_image.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_7- Robustness and fragile.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_6- Scale free networks.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_5- NW+Searching+Pagerank.pdf
- 复旦大学:《网络科学导论 Introduction to Network Science》教学课件_4- Small world model.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)11.2 Web & EC Security.pdf
- 复旦大学:《密码学基础》课程教学资源(课件讲稿)12 Block Chain 区块链 - 密码解决方案集大成者.pdf
- 河南中医药大学:《数据库规划与设计》课程教学资源(Oracle实验指导)实验7 创建及管理Oracle数据表.pdf
- 天津大学:基因序列的比对、挖掘和功能分析(邹权).ppt
- 东南大学:《计算机视觉基础》课程教学资源(课程介绍).pdf
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第10讲 计算机辅助翻译的具体工作流程.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第11讲 翻译项目的管理.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第12讲(实践课3).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第13讲(讨论课1).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第14讲 基于CAT翻译记忆库的翻译研究.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第15讲(讨论课2).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第16讲 计算机辅助翻译技术的发展前景.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第17讲 本地化与翻译的发展和革新.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第18讲(讨论课3).ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第1讲《计算机辅助翻译》课程内容与发展历史.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第2讲 计算机辅助翻译的主要形式.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第3讲 CAT的核心技术——翻译记忆库介绍.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第4讲 语言资源模板字段和设置.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第5讲 翻译记忆库的维护、Winalign的使用与翻译文件批量导入.ppt
- 《计算机辅助翻译》课程PPT教学课件(Computer Aided Translation)第6讲(实践课1).ppt