Part2-Apps-Security.pptx

Professor at Université catholique de Louvain (UCL) and co-founder at Tessares
May. 23, 2023
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
Part2-Apps-Security.pptx
1 of 94

More Related Content

Similar to Part2-Apps-Security.pptx

NotaCon 2011 - Networking for PentestersNotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersRob Fuller
ProjectTox: Free as in freedom Skype replacementProjectTox: Free as in freedom Skype replacement
ProjectTox: Free as in freedom Skype replacementWei-Ning Huang
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
Why and How to use Onion Networking - #EMFCamp2018Why and How to use Onion Networking - #EMFCamp2018
Why and How to use Onion Networking - #EMFCamp2018Alec Muffett
Where’s Wally? How to Privately Discover your Friends on the InternetWhere’s Wally? How to Privately Discover your Friends on the Internet
Where’s Wally? How to Privately Discover your Friends on the InternetPanagiotis Papadopoulos
crypto2sshcrypto2ssh
crypto2sshHasan Sharif

More from Olivier Bonaventure

Part3-reliable.pptxPart3-reliable.pptx
Part3-reliable.pptxOlivier Bonaventure
Part10-router.pptxPart10-router.pptx
Part10-router.pptxOlivier Bonaventure
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptxOlivier Bonaventure
Part9-congestion.pptxPart9-congestion.pptx
Part9-congestion.pptxOlivier Bonaventure
Part11-lan.pptxPart11-lan.pptx
Part11-lan.pptxOlivier Bonaventure
Part5-tcp-improvements.pptxPart5-tcp-improvements.pptx
Part5-tcp-improvements.pptxOlivier Bonaventure

Recently uploaded

Guide to play with a GOD-TIER Swain adc.pptxGuide to play with a GOD-TIER Swain adc.pptx
Guide to play with a GOD-TIER Swain adc.pptxMizuBeats
Second messenger.pptxSecond messenger.pptx
Second messenger.pptxLaraibzafar15
The value of measuring your accessibility maturityThe value of measuring your accessibility maturity
The value of measuring your accessibility maturityIntopia
DSL - EDM OFFER - DUNK.pptxDSL - EDM OFFER - DUNK.pptx
DSL - EDM OFFER - DUNK.pptxMarcLewis35
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPrIGF 2023: Sustainability of Complementary Connectivity Initiatives
APrIGF 2023: Sustainability of Complementary Connectivity InitiativesAPNIC

Part2-Apps-Security.pptx

Editor's Notes

  1. An implementation of this scheme is described in : N. Haller, C. Metz, P. Nesser, M. Straw. A One-Time Password System. RFC 2289.February 1998.
  2. In the example above, hash(VVBG)=ZROK
  3. To avoid this Problem, Alice must remember the last value of n used by each server with whom she is communicating and should be warned when the server requests a different value of n that the previous value.
  4. The public-private key pair can be a RSA key-pair for example.
  5. In this slide and the subsequent ones,S(Yes,PrivBob) is a signed message that contains “Yes” and is signed by using the ,PrivBob private key . The validity of this signature can be checked by using ,PubBob
  6. A Man in the Middle or Woman in the Middle attack is possible in this case as Terrence can easily intercept the messages sent by Alice and replace them with fake messages that contain her public key and signature.
  7. In the example above, we use S(PubBob , PrivC) to indicate a certificate for Bob's key issued by Charles. Charles usually checks the identity of Bob offline and then creates the certificate. Charles is sometimes referred to as a Trusted Third Party (TTP).
  8. Replay attacks are common threats to security protocols.
  9. The nonce is a random number. Note that to be secure, this nonce should be truly random. In practice, generating random numbers is not easy, For a detailed discussion, see : RFC1750 Randomness Recommendations for Security. D. Eastlake, S. Crocker, J. Schiller. December 1994.
  10. The biggest DDoS attack to date took place in September of 2017. The attack targeted Google services and reached a size of 2.54 Tbps. Google Cloud disclosed the attack in October 2020. The attackers sent spoofed packets to 180,000 web servers, which in turn sent responses to Google. The attack was not an isolated incident: the attackers had directed multiple DDoS attacks at Google's infrastructure over the previous six months.