复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)25 Secure Communication with an Insecure Internet Infrastructure

Secure communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructure

Internet Design Decisions and Securit Origin as a small and cooperative network ( largely trusted infrastructure) Global Addressing ( every sociopath is your next-door neighbor) Connection-less datagram service ( cant verify source, hard to protect bandwidth) Dan geer
Internet Design Decisions and Security ◼ Origin as a small and cooperative network (=> largely trusted infrastructure) ◼ Global Addressing (=> every sociopath is your next-door neighbor*) ◼ Connection-less datagram service (=> can’t verify source, hard to protect bandwidth) * Dan Geer

Internet Design Decisions and Securit anyone can connect (> ANYONE can connect) Millions of hosts run nearly identical software ( single exploit can create epidemic Most internet users know about as much as Senator Stevens aka the tubes guy (> God help us all.)
Internet Design Decisions and Security ◼ Anyone can connect (=> ANYONE can connect) ◼ Millions of hosts run nearly identical software (=> single exploit can create epidemic) ◼ Most Internet users know about as much as Senator Stevens aka “the tubes guy” (=> God help us all…)

Our Narrow focus YO es a Protecting network resources and limiting connectivity(Last time) a Creating a secure channel for communication (today) a Preventing software vulnerabilities& malware,or soclal engineering
Our “Narrow” Focus ◼ Yes: ❑ Protecting network resources and limiting connectivity (Last time) ❑ Creating a “secure channel” for communication (today) ◼ No: ❑ Preventing software vulnerabilities & malware, or “social engineering

Secure communication with an Untrusted Infrastructure Bob ISP D ISP B ISP C ISP A Alice
Secure Communication with an Untrusted Infrastructure ISP A ISP D ISP C ISP B Alice Bob

Secure communication with an Untrusted Infrastructure Mallory Bob ISP B ISP C ISP A Alice
Secure Communication with an Untrusted Infrastructure ISP A ISP D ISP C ISP B Alice Bob Mallory

Secure communication with an Untrusted Infrastructure ISP D ISP B ISP C ISP A Alice Hello. 'm “Bob
Secure Communication with an Untrusted Infrastructure ISP A ISP D ISP C ISP B Alice Hello, I’m “Bob

What do we need for a secure communication channel? Authentication(Who am I talking to? Confidentiality(Is my data hidden?) Integrity(Has my data been modified? Availability(Can I reach the destination?
What do we need for a secure communication channel? ◼ Authentication (Who am I talking to?) ◼ Confidentiality (Is my data hidden?) ◼ Integrity (Has my data been modified?) ◼ Availability (Can I reach the destination?)

What is cryptography? cryptography is about communication in the presence of adversaries Ron rivest tricks to approximate mag/c"other crazy cryptography is using math and Unknown 441 TA
What is cryptography? "cryptography is about communication in the presence of adversaries." - Ron Rivest “cryptography is using math and other crazy tricks to approximate magic” - Unknown 441 TA

What is cryptography? Tools to help us build secure communication channels that provide 1) Authentication 2) Integrity 3)Confidentiality
What is cryptography? Tools to help us build secure communication channels that provide: 1) Authentication 2) Integrity 3) Confidentiality
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)23 mobile_Wireless Networking.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)22 Queue Management and QoS.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)21 Peer-to-Peer(p2p).ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)20 The Web.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)19 TCP Performance.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)18 tcpdetails_More TCP & Congestion.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)17 TCP & Congestion Control.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)16 Transport Protocols.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)15 Virtual Circuits, ATM, MPLS.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)14 ip-grab-bag(IP Wrap up).ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)13 DNS.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)12 Inter-Domain Routing BGP(Border Gateway Protocol).ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)11 Multicast.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)10 Intra-Domain Routing.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)09 IP Packets.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)08 Software School.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)07 Ethernet.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)06 Physical Layer(Cont)& Data Link Layer.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)05 physical_Transmission.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)04 Socket Programming.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)25 security-dosfirewall——Attacks and Countermeasures.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)26 Wireless, Ad-Hoc Networks, Sensor Networks.ppt
- 复旦大学:《计算机网络》课程PPT课件_10 IP-Prot——Routers and Routing.pdf
- 《数据库系统》参考书籍:《Database Management Systems》2nd Ed(Raghu Ramakrishnan / Johannes Gehrke).pdf
- 《数据库系统》课程参考资料:DB2系统管理员指南 IBM DB2 Version 8 Administrator Guide(1/3)Planning.pdf
- 《数据库系统》课程参考资料:DB2系统管理员指南 IBM DB2 Version 8 Administrator Guide(2/3)Implementation.pdf
- 《数据库系统》课程参考资料:DB2 SQL指南 IBM DB2 Universal Database SQL Reference Volume 1 Version 8(1/2).pdf
- 《数据库系统》课程参考资料:DB2系统管理员指南 IBM DB2 Version 8 Administrator Guide(3/3)Performance.pdf
- 《数据库系统》课程参考资料:DB2 SQL指南 IBM DB2 Universal Database SQL Reference Volume 2 Version 8(2/2).pdf
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_1.奚亚蓉——电信局程控机房维护管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_2.吴小莉——检测管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_3.周瑾——图书借阅管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_4.邓彦——上药三厂科技图书信息管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_5.蒋君伟——医院管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_6.缪晶——进销存管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_7.王菻华——进口货代管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_8.孙建英——库存管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_9.樊庆萍——图书借阅管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_10.李建蓉——资料管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_11.周颖——中学教务管理系统.doc