复旦大学:《信息安全》教学课件_11.1 IP Security

Information Security 11.1 IP Security Chapter 16 復大软件学院
1 Information Security 11.1 IP Security Chapter 16

Review Cryptography Authentication techniques PKL CA. cert 復大软件学院
2 Review • Cryptography • Authentication techniques • PKI, CA, cert

Review Cryptography Authentication techniques PKL CA. cert 系统安全 应用安全 网络安全 安全协议 安全的密码算法 復大软件学院
3 Review • Cryptography • Authentication techniques • PKI, CA, cert. 安全的密码算法 安全协议 系统安全 应用安全 网络安全

IP Security have a range of application specific security mechanisms eg. S/mime, Pgp, Kerberos, Ssl/hTtps however there are security concerns that cut across protocol layers would like security implemented by the network for all applications Q: If security mechanisms in app layer have implemented. Security is needed in network level? Or vice versa? 復大软件学院
4 IP Security • have a range of application specific security mechanisms – eg. S/MIME, PGP, Kerberos, SSL/HTTPS • however there are security concerns that cut across protocol layers • would like security implemented by the network for all applications • Q: If security mechanisms in app layer have implemented. Security is needed in network level? Or vice versa?

IPSec general IP Security mechanisms provides authentication confidentiality key management applicable to use over LANS, across public private WaNs, for the Internet 復大软件学院
5 IPSec • general IP Security mechanisms • provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet

IPSec Uses User system with IPSec Public(Internet) or Private Network Networking device with IPSec Networking device with IPSec Payload 復大软件学院
6 IPSec Uses

Benefits of iPsec in a firewall/router provides strong security to all traffic crossing the perimeter in a firewall/router is resistant to by pass is below transport layer, hence transparent to applications can be transparent to end users can provide security for individual users secures routing architecture 復大软件学院
7 Benefits of IPSec • in a firewall/router provides strong security to all traffic crossing the perimeter • in a firewall/router is resistant to bypass • is below transport layer, hence transparent to applications • can be transparent to end users • can provide security for individual users • secures routing architecture

IP Security Architecture specification is quite complex defined in numerous rfcs inc|.RFC2401/2402/2406/2408 many others, grouped by category mandatory in IPv6, optional in IPV4 have two security header extensions Authentication Header(AH) Encapsulating Security Payload(ESP) 復大软件学院
8 IP Security Architecture • specification is quite complex • defined in numerous RFC’s – incl. RFC 2401/2402/2406/2408 – many others, grouped by category • mandatory in IPv6, optional in IPv4 • have two security header extensions: – Authentication Header (AH) – Encapsulating Security Payload (ESP)

IPSec Services ESP (encryption ESP (encryption plus only) authentication) Access control Connectionless integrity Data origin authentication Rejection of replayed packets Confidentiality Limited traffic flow confidentiality 復大软件学院
9 IPSec Services

do Authentication Header(AH provides support for data integrity authentication of IP packets end system/router can authenticate user/app prevents address spoofing /replay attacks by tracking sequence numbers based on use of a mac HMAC-MD5-96 or HMAC-SHA-1-96 parties must share a secret key 復大软件学院
11 Authentication Header (AH) • provides support for data integrity & authentication of IP packets – end system/router can authenticate user/app – prevents address spoofing / replay attacks by tracking sequence numbers • based on use of a MAC – HMAC-MD5-96 or HMAC-SHA-1-96 • parties must share a secret key
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《信息安全》教学课件_10 Authentication Kerberos.pdf
- 复旦大学:《信息安全》教学课件_09 Authentication and supplements.pdf
- 复旦大学:《信息安全》教学课件_07-08 Public Key Infrastructure(PKI)公钥基础设施——公钥技术的应用.pdf
- 复旦大学:《信息安全》教学课件_06 The Intro to Information Security.pdf
- 复旦大学:《信息安全》教学课件_05 Message authentication and Hash function.pdf
- 复旦大学:《信息安全》教学课件_04 Public Key Cryptography, RSA.pdf
- 复旦大学:《信息安全》教学课件_03 Modern Block Ciphers.pdf
- 复旦大学:《信息安全》教学课件_02 Classical Encryption Techniques(cont.).pdf
- 复旦大学:《信息安全》教学课件_01 Classical Encryption Techniques.pdf
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 16 Simple Input and Output.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 15 Exceptions and Assertions.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 14 Applets, Images, and Audio.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 13 Creating User Interfaces.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 12 Event-Driven Programming.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 11 Getting Started with GUI Programming.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 10 Object-Oriented Modeling(oom).ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 9 Abstract Classes and Interfaces.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 8 Inheritance and Polymorphism.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 7 String.ppt
- 复旦大学:《程序设计》课程教学资源(PPT课件)Chapter 6 Objects and Classes.ppt
- 复旦大学:《信息安全》教学课件_11.2 Web & EC Security.pdf
- 复旦大学:《信息安全》教学课件_12-13 Software Security.pdf
- 复旦大学:《信息安全》教学课件_14 防火墙 Firewall.pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第1章 信息系统安全概述、第2章 密码学概论(1/3).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第2章 密码学概论(2/3).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(2/3).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(2/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(3/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第3章 现代加密算法(4/4)、第4章 密码应用(1/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第2章 密码学概论(3/3)、第3章 现代加密算法(1/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第4章 密码应用(2/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第4章 密码应用(3/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第4章 密码应用(4/4).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第5章 计算机病毒概述、第6章 典型计算机病毒分析(1/2).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第6章 典型计算机病毒分析(2/2)、第7章 新一代计算机病毒(1/2).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第7章 新一代计算机病毒(2/2)、第8章 程序安全与数据库安全(1/2).pdf
- 复旦大学:《信息安全原理》课程教学资源(PPT课件)第8章 程序安全与数据库安全(2/2).pdf
- 复旦大学:《电子商务 E-business》精品课程_教学大纲.pdf
- 《电子商务 E-business》课程阅读资料:NYU Electronic Commerce.pdf
- 《电子商务 E-business》阅读文献_Adapt and thrive—the journey to e-business on demand.pdf