欢迎来到天天文库
浏览记录
ID:7931280
大小:1.40 MB
页数:224页
时间:2018-03-02
《computer science cryptography cryptography and data security ppt slides (2001 gutmann)外语英文电子书》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、CryptographyandDataSecurityPeterGutmannUniversityofAucklandhttp://www.cs.auckland.ac.nz/~pgut001SecurityRequirementsConfidentiality•ProtectionfromdisclosuretounauthorisedpersonsIntegrity•MaintainingdataconsistencyAuthentication•AssuranceofidentityofpersonororiginatorofdataNon-repudiation•
2、Originatorofcommunicationscan’tdenyitlaterSecurityRequirements(ctd)Availability•LegitimateusershaveaccesswhentheyneeditAccesscontrol•UnauthorisedusersarekeptoutTheseareoftencombined•Userauthenticationusedforaccesscontrolpurposes•Non-repudiationcombinedwithauthenticationSecurityThreatsInfo
3、rmationdisclosure/informationleakageIntegrityviolationMasqueradingDenialofserviceIllegitimateuseGenericthreat:Backdoors,trojanhorses,insiderattacksMostInternetsecurityproblemsareaccesscontrolorauthenticationones•Denialofserviceisalsopopular,butmostlyanannoyanceAttackTypesPassiveattackcano
4、nlyobservecommunicationsordataActiveattackcanactivelymodifycommunicationsordata•Oftendifficulttoperform,butverypowerful–Mailforgery/modification–TCP/IPspoofing/sessionhijackingSecurityServicesFromtheOSIdefinition:•Accesscontrol:Protectsagainstunauthoriseduse•Authentication:Providesassuran
5、ceofsomeone'sidentity•Confidentiality:Protectsagainstdisclosuretounauthorisedidentities•Integrity:Protectsfromunauthoriseddataalteration•Non-repudiation:ProtectsagainstoriginatorofcommunicationslaterdenyingitSecurityMechanismsThreebasicbuildingblocksareused:•Encryptionisusedtoprovideconfi
6、dentiality,canprovideauthenticationandintegrityprotection•Digitalsignaturesareusedtoprovideauthentication,integrityprotection,andnon-repudiation•Checksums/hashalgorithmsareusedtoprovideintegrityprotection,canprovideauthenticationOneormoresecuritymechanismsarecombinedtoprovideasecurityserv
7、iceServices,Mechanisms,AlgorithmsAtypicalsecurityprotocolprovidesoneormoreservices•Servicesarebuiltfrommechanisms•MechanismsareimplementedusingalgorithmsConventionalEncryptionUsesasharedkeyProblemofcommunicatingalargemessageinsecretreducedtocommunicatingasmallkeyins
此文档下载收益归作者所有