- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Chapters 8Network Security.ppt
Prof. Rick Han, University of Colorado at Boulder Chapters 8Network Security Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu Announcements Recap of Previous Lecture Recap of Previous Lecture (2) Cryptography Principles of Confusion and Diffusion Principles of Confusion and Diffusion (2) Principles of Confusion and Diffusion (3) Symmetric-Key Cryptography Symmetric-Key Cryptography (2) Symmetric-Key Cryptography (3) Symmetric-Key Cryptography (4) Symmetric-Key Cryptography (5) Symmetric-Key Cryptography (6) Symmetric-Key Cryptography (7) Symmetric-Key Cryptography (8) Symmetric-Key Cryptography (9) Public-Key Cryptography Public-Key Cryptography (2) Public-Key Cryptography (3) RSA example: Public-Key Cryptography (4) Public-Key Cryptography (5) Authentication (1) Authentication (2) Authentication (3) Authentication (4) * Programming Assignment #3 due May 2 HW #4 handed back today, solutions on Web tonight In Chapter 8, read all sections. Need a volunteer for FCQ’s. Next, Network Security Samba/SMB Enables file-sharing between UNIX and Windows SMB is basis of Windows’ Network Neighborhood Originally built on top of NETBIOS, now directly above TCP/UDP Samba server on Linux emulates SMB protocol, enables Windows client to see Linux files Security Confidentiality Authentication Authorization Integrity Non-repudiation Availability Cryptography Plaintext - encryption - ciphertext - decryption - plaintext Modern encryption algorithms use secret keys Algorithm itself can be known Cryptanalysis attacks: Brute force Cipher-text only Plaintext-only Chosen-plaintext Adaptive Chosen-plaintext = differential cryptanalysis Encryption algorithm also called a cipher Cryptography has evolved so that modern encryption and decryption use secret keys Only have to protect the keys! = Key distribution problem Cryptographic algorithms can be openly published Encryption Decryption plaintext ciphertext plaintext Encryption Decryption plaintext ciphertext plaintext
您可能关注的文档
- a.归纳本文的情节发展步骤。.ppt
- A={4,5,6,8}B={3,5,7,8}C={5,8}.ppt
- AAA EVAR手术病例.ppt
- AAS and FES(Ch 9, 7th e, WMDS).PPT
- ABAQUS非线性用户单元的开发.ppt
- abcdefg123.ppt
- Aben Studio2004.9.ppt
- AbleSKy 网络公选课.ppt
- About plan.ppt
- About text I.ppt
- Chapters 9 - 10.Check out and Accounts Settlement.ppt
- Chapters 9 - 10.ppt
- Chapters 9.ppt
- Chen Ping2012-06-11.ppt
- Chen SongNorth-LENT.ppt
- chendanping.ppt
- Cheng Dong Primary School Chen Juan Di.ppt
- ChengDu IoT Industry Development Alliance.ppt
- Child PsychologyCognitive Development.ppt
- China Automobile Dealers Association.ppt
最近下载
- 人教版历史九年级上册全套教学课件.pptx
- DL_T 1074-2019 电力用直流和交流一体化不间断电源(代替DL_T 1074-2007).docx VIP
- 2025秋统编版(2024)道德与法治一年级上册教学设计(全册) .pdf
- 白癜风中西医防治(王砚宁)_部分1.pdf VIP
- 第二单元生物制品生产等基本技术61课件.pptx VIP
- 最全监理大纲(共486页).docx
- DLT_5293-2013 电气装置安装工程 电气设备交接试验报告统一格式.docx VIP
- MZT213-2024学术类社会团体自身建设指南.pdf VIP
- 职业素养与职业礼仪.docx VIP
- 政务视联网系统解决方案.pptx VIP
文档评论(0)