• Mạng máy tính 1 - Chapter 9: IntrudersMạng máy tính 1 - Chapter 9: Intruders

    most promising approach to improving password security allow users to select own password but have system verify it is acceptable ▫ simple rule enforcement (see earlier slide) ▫ compare against dictionary of bad passwords ▫ use algorithmic (markov model or bloom filter) to detect poor choices

    pdf25 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 865 | Lượt tải: 0

  • Mạng máy tính 1 - Chapter 8: IP securityMạng máy tính 1 - Chapter 8: IP security

    Internet Security Association and Key Management Protocol provides framework for key management defines procedures and packet formats to establish, negotiate, modify, & delete SAs independent of key exchange protocol, encryption alg, & authentication method

    pdf20 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 798 | Lượt tải: 1

  • Mạng máy tính 1 - Chapter 7: Web securityMạng máy tính 1 - Chapter 7: Web security

    merchant sends payment gateway a payment capture request gateway checks request then causes funds to be transferred to merchants account notifies merchant using capture response

    pdf27 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 755 | Lượt tải: 0

  • Mạng máy tính 1 - Chapter 6: Electronic mail securityMạng máy tính 1 - Chapter 6: Electronic mail security

    Does not rely on certificate authorities in PGP every user is own CA ▫ can sign keys for users they know directly (certificates are like X.509) forms a “web of trust” ▫ trust keys have signed ▫ can trust keys others have signed if have a chain of signatures to them key ring includes trust indicators users can also revoke their keys

    pdf26 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 766 | Lượt tải: 0

  • Mạng máy tính 1 - Chapter 5: Digital signaturesMạng máy tính 1 - Chapter 5: Digital signatures

    (Step 1) Key generation: Every entity generates a public-private key pair ▫ choose a random private key ▫ compute the public key (Step 2) Registration: Every entity should ▫ provide proof of their identity (to the CA) (Step 3) Obtain certificate from the CA ▫ CA signs a certificate which binds the identity of A to A’s public key

    pdf23 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 797 | Lượt tải: 0

  • Mạng máy tính 1 - Chapter 4: Message authenticationMạng máy tính 1 - Chapter 4: Message authentication

    Sheart of the algorithm processing message in 1024-bit blocks consists of 80 rounds ▫ updating a 512-bit buffer ▫ using a 64-bit value Wt derived from the current message block ▫ and a round constant based on cube root of first 80 prime numbers

    pdf32 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 872 | Lượt tải: 0

  • Mạng máy tính 1 - Chapter 3: Public key cryptographyMạng máy tính 1 - Chapter 3: Public key cryptography

    Based on the difficulty of discrete log problem (like DH) All entities agree on a prime p (say 200 digits long) and a generator g Alice chooses a random value a as her private key (a < p also has typically the same number of digits as p) Alice compute α = ga mod p as her public key

    pdf67 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 847 | Lượt tải: 1

  • Mạng máy tính 1 - Chapter 2: Symmetric ciphersMạng máy tính 1 - Chapter 2: Symmetric ciphers

    Shave considered: ▫ Symmetric cipher model and terminology ▫ Classical ciphers ▫ Modern cipher techniques  block vs stream ciphers  Feistel cipher design & structure  DES details & strength ▫ Differential & Linear Cryptanaly

    pdf44 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 813 | Lượt tải: 0

  • Mạng máy tính 1 - Cryptography & network securityMạng máy tính 1 - Cryptography & network security

    Symmetric Cipher Model Classical Substitution Ciphers ▫ Caesar Cipher ▫ Monoalphabetic Cipher ▫ Playfair Cipher ▫ Polyalphabetic Ciphers ▫ Vigenère Cipher Cryptanalysis using letter frequencies

    pdf36 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 797 | Lượt tải: 0

  • Mạng máy tính 1 - Attacks overviewMạng máy tính 1 - Attacks overview

    DoS attack or DDoS is an attempt to make a computer resource unavailable to its intended users. Methods of attack ▫ ICMP flood ▫ Teardrop Attacks ▫ Peer-to-peer attacks

    pdf17 trang | Chia sẻ: nguyenlam99 | Ngày: 10/01/2019 | Lượt xem: 785 | Lượt tải: 0