- 9
- 0
- 约1.23万字
- 约 54页
- 2017-12-30 发布于湖北
- 举报
信息安全原理与技术Protocols.pptx
Part III: Protocols Part 3 ? ProtocolsProtocolHuman protocols ? the rules followed in human interactionsExample: Asking a question in classNetworking protocols ? rules followed in networked communication systemsExamples: HTTP, FTP, etc.Security protocol ? the (communication) rules followed in a security applicationExamples: SSL, IPSec, Kerberos, etc. Part 3 ? ProtocolsProtocolsProtocol flaws can be very subtleSeveral well-known security protocols have significant flawsIncluding WEP, GSM, and IPSecImplementation errors can also occurRecently, IE implementation of SSLNot easy to get protocols right… Part 3 ? ProtocolsIdeal Security ProtocolMust satisfy security requirementsRequirements need to be preciseEfficientMinimize computational requirementMinimize bandwidth usage, delays…RobustWorks when attacker tries to break itWorks if environment changes (slightly)Easy to implement, easy to use, flexible…Difficult to satisfy all of these! Part 3 ? ProtocolsChapter 9: Simple Security Protocols “I quite agree with you,” said the Duchess; “and the moral of that is?‘Be what you would seem to be’?orif youd like it put more simply?‘Never imagine yourself not to beotherwise than what it might appear to others that what you wereor might have been was not otherwise than what you had been would have appeared to them to be otherwise.’ ”?Lewis Carroll, Alice in WonderlandSeek simplicity, and distrust it.? Alfred North Whitehead Part 2 ? Access ControlSecure Entry to NSAInsert badge into readerEnter PINCorrect PIN?Yes? EnterNo? Get shot by security guard Part 3 ? ProtocolsATM Machine ProtocolInsert ATM cardEnter PINCorrect PIN?Yes? Conduct your transaction(s)No? Machine (eventually) eats card Part 3 ? ProtocolsAuthentication Protocols Part 3 ? ProtocolsAuthenticationAlice must prove her identity to BobAlice and Bob can be humans or computersMay also require Bob to prove he’s Bob (mutual authentication)Probably need to establish a session keyMay have other requirements, such asPublic key
您可能关注的文档
最近下载
- 传统基材润湿流平(氟碳硅烷嵌段).pdf VIP
- 南京财经大学2024-2025学年第1学期《高等数学(上)》期末考试试卷(B卷)附参考答案.pdf
- C4D课程考试试题及参考答案.doc VIP
- 2025年陕西公务员申论考试真题及答案B卷.docx VIP
- [渝粤教育] 西北工业大学 航天器控制原理 mooc 资料.docx VIP
- 航天器控制原理(西北工业大学)中国大学MOOC 慕课 章节测验 期末考试答案.pdf VIP
- 精品解析:2025年陕西省中考数学试题(原卷版).docx VIP
- 四维度主力跟踪.pdf
- 2022年陕西省中考数学真题(原卷版).docx VIP
- 大众网关控制器和bcm车身控制模块针脚定义非常有用.pdf VIP
原创力文档

文档评论(0)