南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)03 Symmetric Key Cryptography

Symmetric Key Cryptography Haipeng Dai haipengdai@nju.edu.cn 313 CS Building Department of Computer Science and Technology Nanjing University
Symmetric Key Cryptography Haipeng Dai haipengdai@nju.edu.cn 313 CS Building Department of Computer Science and Technology Nanjing University

Basic Terms Threat,vulnerability,attack,and intrusion Threat:attackers,angry employees,etc. Vulnerability:weakness of a system Attack:actions to make harm to a system by modifying the system,reading information from the system,or stopping the system from serving its legitimate users -Passive attacks:read information in a system ●e.g,Eavesdropping -Active attacks:modify a system e.g.,message modification,insertion,deletion,replay Intrusion:successfully modifying a system or reading information from the system 2
2 Basic Terms Threat, vulnerability, attack, and intrusion Threat: attackers, angry employees, etc. Vulnerability: weakness of a system Attack: actions to make harm to a system by modifying the system, reading information from the system, or stopping the system from serving its legitimate users ─ Passive attacks: read information in a system ● e.g., Eavesdropping ─ Active attacks: modify a system ● e.g., message modification, insertion, deletion, replay Intrusion: successfully modifying a system or reading information from the system

Seven Security Properties Authentication ■ Confidentiality ■Integrity ·Non-repudiation Authorization ■Freshness Availability 3
3 Seven Security Properties Authentication Confidentiality Integrity Non-repudiation Authorization Freshness Availability

Security Property 1:Authentication Authentication(authenticity) -Verify an identity claimed to be -Mechanisms: ·Something the user is -e.g.,fingerprint or retinal pattern,DNA sequence,unique bio-electric signals produced by the living body,or other biometric identifier Something the user has -e.g.,ID card,security token,software token or cell phone Something the user knows -e.g.,a password,a pass phrase or a personal identification number(PIN) Something the user does -e.g.,voice recognition,signature,or gait 4
4 Security Property 1: Authentication Authentication (authenticity) ─ Verify an identity claimed to be ─ Mechanisms: ● Something the user is – e.g., fingerprint or retinal pattern, DNA sequence, unique bio-electric signals produced by the living body, or other biometric identifier ● Something the user has – e.g., ID card, security token, software token or cell phone ● Something the user knows – e.g., a password, a pass phrase or a personal identification number (PIN) ● Something the user does – e.g., voice recognition, signature, or gait

Security Property 2:Confidentiality Confidentiality (secrecy) -Protect information from leaking. Two types: Message content confidentiality Message header confidentiality:who talks to whom is secret. -Mechanisms ●Encryption ●Traffic padding 5
5 Security Property 2: Confidentiality Confidentiality (secrecy) ─ Protect information from leaking. ─ Two types: ● Message content confidentiality ● Message header confidentiality: who talks to whom is secret. ─ Mechanisms ● Encryption ● Traffic padding

Security Property 3:Integrity Integrity -Protect system/data from being modified. -System integrity Prevent modification to system e.g.,communication system:message modification,insertion,deletion,and replay (integrity of communication channels) -Data integrity Prevent modification to data e.g.,communication system:message modification -Mechanisms: ●Message Digest 6
6 Security Property 3: Integrity Integrity ─ Protect system/data from being modified. ─ System integrity ● Prevent modification to system – e.g., communication system: message modification, insertion, deletion, and replay (integrity of communication channels) ─ Data integrity ● Prevent modification to data – e.g., communication system: message modification ─ Mechanisms: ● Message Digest

Security Property 4:Non-repudiation Non-repudiation -Prevent someone from denying their action. .E.g.,creating a message. -Mechanisms: ●Message Digest 7
7 Security Property 4: Non-repudiation Non-repudiation ─ Prevent someone from denying their action. ● E.g., creating a message. ─ Mechanisms: ● Message Digest

Security Property 5:Authorization Authorization -Give someone permission to do something(such as access a resource) and enforce that they don't do anything beyond their permission -Mechanisms: ●Access Control 8
8 Security Property 5: Authorization Authorization ─ Give someone permission to do something (such as access a resource) and enforce that they don’t do anything beyond their permission ─ Mechanisms: ● Access Control

Security Property 6:Freshness Freshness -Verify that message is recent,is not replayed -e.g.,a check becomes invalid if not cashed within 6 months The expired check still has integrity,but not freshness -Mechanisms ●Nonce ●Expiration time 9
9 Security Property 6: Freshness Freshness ─ Verify that message is recent, is not replayed ─ e.g., a check becomes invalid if not cashed within 6 months ● The expired check still has integrity, but not freshness. ─ Mechanisms ● Nonce ● Expiration time

Security Property 7:Availability Availability: -Keep service available to legitimate users -Deny of Service attacks 10
10 Security Property 7: Availability Availability: ─ Keep service available to legitimate users ─ Deny of Service attacks
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)02 Security Principles.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)01 Introduction(戴海鹏).pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 09 图形用户界面的设计与实现.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 08 数据结构与算法.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 07 Java 工具类.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 06 继承与多态.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 05 Java 类.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 05 Java 类.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 04 Java 语言基础.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 03 Java 编程入门.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 03 Java 编程入门.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 02 Java 概述.ppt
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 10 Java 高级编程.pdf
- 南京大学:《Java语言程序设计 Programming in Java》课程教学资源(教案讲义)Lecture 01 面向对象软件开发概述.pdf
- 电子科技大学:《Linux操作系统内核技术 The Linux Kernel Technology》课程教学资源(课件讲稿)第四讲 内核模块不可调试之谜.pdf
- 电子科技大学:《Linux操作系统内核技术 The Linux Kernel Technology》课程教学资源(课件讲稿)第三讲 指针存储之谜.pdf
- 电子科技大学:《Linux操作系统内核技术 The Linux Kernel Technology》课程教学资源(课件讲稿)第二讲 程序员技术手段.pdf
- 电子科技大学:《Linux操作系统内核技术 The Linux Kernel Technology》课程教学资源(课件讲稿)第一讲 课程概述(李林).pdf
- 电子科技大学:《机器学习 Machine Learning》课程教学资源(课件讲稿)第9章 Markov马尔科夫分类.pdf
- 电子科技大学:《机器学习 Machine Learning》课程教学资源(课件讲稿)第8章 特征提取与降维.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)04 Advanced Encryption Standard(AES).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)05 Asymmetric Key Cryptography.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)06 Number Theory.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)07 Hashes and Message Digests.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)08 Authentication Using Asymmetric Keys.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)09 Authentication Using Symmetric Keys.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)10 Kerberos.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)11 Public-Key Infrastructure.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)12 Secure Socket Layer(SSL)、TLS(Transport Layer Security).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)13 Human Authentication.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)14 Buffer Overflow Attacks.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)15 Bloom Filters and its Variants.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)16 Bloom Filter for Network Security.pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)17 Web Security(Cookies and Cross Site Scripting,XSS).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)18 Web Security(SQL Injection and Cross-Site Request Forgery).pdf
- 南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)19 Firewall Design Methods.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)MPI A Message-Passing Interface Standard(Version 2.2).pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)An Asymmetric Distributed Shared Memory Model for Heterogeneous Parallel Systems.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Software and the Concurrency Revolution.pdf
- 《GPU并行编程 GPU Parallel Programming》课程教学资源(参考文献)Some Computer Organizations and Their Effectiveness.pdf