SlideShare a Scribd company logo
INTERNET SECURITY
Layers Security
 Network Layer (h/w + s/w)
 Transport Layer
 Application Layer s/w
Network Layer
 IP Security (IPSec) is a collection of protocols
designed by the Internet Engineering Task
Force (IETF) to provide security for a packet at
the network layer
 IPSec helps create authenticated and
confidential packets for the IP layer.
TCP/IP Protocol Suite
4
Topics Discussed in the Section
 Two Modes
 Two Security Protocols
 Services Provided by IPSec
 Security Association
 Internet Key Exchange (IKE)
 Virtual Private Network (VPN)
TCP/IP Protocol Suite
5
Figure 30.1 IPSec in transport mode
TCP/IP Protocol Suite
6
IPSec in transport mode does not protect
the IP header;
it only protects the information coming from
the transport layer.
Note
TCP/IP Protocol Suite
7
Figure 30.2 Transport mode in Action
TCP/IP Protocol Suite
8
Figure 30.3 IPSec in tunnel mode
TCP/IP Protocol Suite
9
Figure 30.4 Tunnel-mode in action
Tunnel
TCP/IP Protocol Suite
10
IPSec in tunnel mode protects the original
IP header.
Note
TCP/IP Protocol Suite
11
Figure 30.5 Transport mode versus tunnel mode
 Two Security Protocols
 IPSec defines two protocols the Authentication
Header (AH) Protocol and the Encapsulating
Security Payload (ESP) Protocol
to provide authentication and/or encryption for
packets at the IP level
Authentication Header (AH)
 The Authentication Header (AH) Protocol is
designed to authenticate the source host and to
ensure the integrity of the payload carried in the IP
packet
 The protocol uses a hash function and a symmetric
(secret) key to create a message digest; the digest
is inserted in the authentication header
 The AH is then placed in the appropriate location,
based on the mode (transport or tunnel)
14
The AH protocol provides source
authentication and data integrity,
but not privacy.
Note
Encapsulating Security
Payload (ESP)
 Encapsulating Security Payload(ESP), that
provides source authentication, integrity, and
confidentiality
 ESP adds a header and trailer
TCP/IP Protocol Suite
16
Security Association
 IPSec requires a logical relationship, called a
Security Association (SA), between two hosts.
 there are two Security Associations (SAs)
between Alice and Bob; one outbound SA and
one inbound SA. Each of them stores the
value of the key in a variable and the name of
the encryption/decryption algorithm in another
 A Security Association is a contract between
two parties; it creates a secure channel
between them
Figure 30.8 Simple SA
Internet Key Exchange (IKE)
 The Internet Key Exchange (IKE) is a protocol
designed to create both inbound and outbound
Security Associations
Virtual private network
From
R1 to R2
From
R1 to R2
From
100 to 200
From
100 to 200
Domain of interpretation
contains keys details
TRANSPORT LAYER SECURITY
Two protocols are dominant today for providing security
at the transport layer: the Secure Sockets Layer (SSL)
protocol and the Transport Layer Security (TLS)
protocol. The latter is actually an IETF version of the
former. We discuss SSL in this section; TLS is very
similar. Figure shows the position of SSL and TLS in the
Internet model.
Figure 30.15 Location of SSL and TSL in the Internet mode
TCP/IP Protocol Suite
24
Figure 30.19 Four SSL protocols
 The Record Protocol is the carrier. It carries
messages from three other protocols as well as
the data coming from the application layer.
Messages from the Record Protocol are payloads
to the transport layer, normally TCP.
 The Handshake Protocol provides security
parameters for the Record Protocol. It establishes
a cipher set and provides keys and security
parameters. It also authenticates the server to the
client and the client to the server if needed.
 The ChangeCipherSpec Protocol is used for
signaling the readiness of cryptographic secrets.
 The Alert Protocol is used to report abnormal
conditions
Web Security
 Web now widely used by business,
government, individuals
 but Internet & Web are vulnerable
 have a variety of threats
 integrity
 confidentiality
 denial of service
 authentication
 need added security mechanisms
SSL (Secure Socket Layer)
 transport layer security service
 originally developed by Netscape
 version 3 designed with public input
 subsequently became Internet standard known
as TLS (Transport Layer Security)
 uses TCP to provide a reliable end-to-end
service
 SSL has two layers of protocols
SSL Architecture
SSL Architecture
 SSL connection
 a transient, peer-to-peer, communications link
 associated with 1 SSL session
 SSL session
 an association between client & server
 created by the Handshake Protocol
 define a set of cryptographic parameters
 may be shared by multiple SSL connections
SSL Record Protocol Services
 message integrity
 using a MAC with shared secret key
 similar to HMAC but with different padding
 confidentiality
 using symmetric encryption with a shared secret
key defined by Handshake Protocol
 AES, IDEA, RC2-40, DES-40, DES, 3DES,
Fortezza, RC4-40, RC4-128
 message is compressed before encryption
SSL Record Protocol Operation
SSL Change Cipher Spec Protocol
 one of 3 SSL specific protocols which use the
SSL Record protocol
 a single message
 causes pending state to become current
 hence updating the cipher suite in use
SSL Alert Protocol
 conveys SSL-related alerts to peer entity
 severity
 warning or fatal
 specific alert
 fatal: unexpected message, bad record mac,
decompression failure, handshake failure, illegal
parameter
 warning: close notify, no certificate, bad certificate,
unsupported certificate, certificate revoked, certificate
expired, certificate unknown
 compressed & encrypted like all SSL data
SSL Handshake Protocol
 allows server & client to:
 authenticate each other
 to negotiate encryption & MAC algorithms
 to negotiate cryptographic keys to be used
 comprises a series of messages in phases
1. Establish Security Capabilities
2. Server Authentication and Key Exchange
3. Client Authentication and Key Exchange
4. Finish
SSL Handshake Protocol
TLS (Transport Layer Security)
 IETF standard RFC 2246 similar to SSLv3
 with minor differences
 in record format version number
 uses HMAC for MAC
 a pseudo-random function expands secrets
 has additional alert codes
 some changes in supported ciphers
 changes in certificate types & negotiations
 changes in crypto computations & padding
Secure Electronic Transactions
(SET)
 open encryption & security specification
 to protect Internet credit card transactions
 developed in 1996 by Mastercard, Visa etc
 not a payment system
 rather a set of security protocols & formats
 secure communications amongst parties
 trust from use of X.509v3 certificates
 privacy by restricted info to those who need it
SET Components
SET Transaction
1. customer opens account
2. customer receives a certificate
3. merchants have their own certificates
4. customer places an order
5. merchant is verified
6. order and payment are sent
7. merchant requests payment authorization
8. merchant confirms order
9. merchant provides goods or service
10. merchant requests payment
Dual Signature
 customer creates dual messages
 order information (OI) for merchant
 payment information (PI) for bank
 neither party needs details of other
 but must know they are linked
 use a dual signature for this
 signed concatenated hashes of OI & PI
DS=E(PRc, [H(H(PI)||H(OI))])
SET Purchase Request
 SET purchase request exchange consists of
four messages
1. Initiate Request - get certificates
2. Initiate Response - signed response
3. Purchase Request - of OI & PI
4. Purchase Response - ack order
Purchase Request – Customer
Purchase Request – Merchant
1. verifies cardholder certificates using CA sigs
2. verifies dual signature using customer's public
signature key to ensure order has not been
tampered with in transit & that it was signed
using cardholder's private signature key
3. processes order and forwards the payment
information to the payment gateway for
authorization (described later)
4. sends a purchase response to cardholder
Purchase Request – Merchant
Payment Gateway Authorization
1. verifies all certificates
2. decrypts digital envelope of authorization block to
obtain symmetric key & then decrypts authorization
block
3. verifies merchant's signature on authorization block
4. decrypts digital envelope of payment block to obtain
symmetric key & then decrypts payment block
5. verifies dual signature on payment block
6. verifies that transaction ID received from merchant
matches that in PI received (indirectly) from customer
7. requests & receives an authorization from issuer
8. sends authorization response back to merchant
Payment Capture
 merchant sends payment gateway a payment
capture request
 gateway checks request
 then causes funds to be transferred to
merchants account
 notifies merchant using capture response
47
APPLICATION LAYER SECURITY
Usually we have two protocols providing security
services for e-mails: Pretty Good Privacy (PGP) and
Secure/Multipurpose Internet Mail Extension (S/MIME).
https://www.youtube.com/watch?v=CEADq-B8KtI
In e-mail security, the sender of the
message needs to include the name
or identifiers of the algorithms
used in the message.
Note
In e-mail security, the encryption/decryption
is done using a symmetric-key algorithm,
but the secret key to decrypt the message
is
encrypted with the public key of the
receiver and is sent with the message.
Note
PGP at the sender site
PGP at the receiver site
52
30-4 FIREWALLS
All previous security measures cannot prevent Eve from
sending a harmful message to a system. To control
access to a system we need firewalls. A firewall is a
device (usually a router or a computer) installed
between the internal network of an organization and the
rest of the Internet. It is designed to forward some
packets and filter (not forward) others. Figure 30.32
shows a firewall.
53
Figure 30.32 Firewall
54
Figure 30.33 Packet-filter firewall
55
Figure 30.34 Proxy firewall
All HTTP
packets
Errors
Accepted
packets
56
A proxy firewall filters at the
application layer.
Note

More Related Content

Similar to 1643129870-internet-security.pptx

Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
Mousmi Pawar
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
SonukumarRawat
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Unit 6
Unit 6Unit 6
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
koolkampus
 
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)
BGSBU Rajouri
 
Ip Sec
Ip SecIp Sec
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
csandit
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
cscpconf
 
IS Unit 9_Web Security
IS Unit 9_Web SecurityIS Unit 9_Web Security
IS Unit 9_Web Security
Sarthak Patel
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
AmnaNadeem27
 
Unit -- 5.ppt
Unit -- 5.pptUnit -- 5.ppt
Unit -- 5.ppt
DHANABALSUBRAMANIAN
 
Ip Sec
Ip SecIp Sec
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
Websecurity
Websecurity Websecurity
Websecurity
Merve Bilgen
 
ssl
sslssl

Similar to 1643129870-internet-security.pptx (20)

Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Web Security
Web SecurityWeb Security
Web Security
 
Unit 6
Unit 6Unit 6
Unit 6
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
IS Unit 9_Web Security
IS Unit 9_Web SecurityIS Unit 9_Web Security
IS Unit 9_Web Security
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
 
Unit -- 5.ppt
Unit -- 5.pptUnit -- 5.ppt
Unit -- 5.ppt
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
Websecurity
Websecurity Websecurity
Websecurity
 
ssl
sslssl
ssl
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 

Recently uploaded (16)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 

1643129870-internet-security.pptx

  • 2. Layers Security  Network Layer (h/w + s/w)  Transport Layer  Application Layer s/w
  • 3. Network Layer  IP Security (IPSec) is a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network layer  IPSec helps create authenticated and confidential packets for the IP layer.
  • 4. TCP/IP Protocol Suite 4 Topics Discussed in the Section  Two Modes  Two Security Protocols  Services Provided by IPSec  Security Association  Internet Key Exchange (IKE)  Virtual Private Network (VPN)
  • 5. TCP/IP Protocol Suite 5 Figure 30.1 IPSec in transport mode
  • 6. TCP/IP Protocol Suite 6 IPSec in transport mode does not protect the IP header; it only protects the information coming from the transport layer. Note
  • 7. TCP/IP Protocol Suite 7 Figure 30.2 Transport mode in Action
  • 8. TCP/IP Protocol Suite 8 Figure 30.3 IPSec in tunnel mode
  • 9. TCP/IP Protocol Suite 9 Figure 30.4 Tunnel-mode in action Tunnel
  • 10. TCP/IP Protocol Suite 10 IPSec in tunnel mode protects the original IP header. Note
  • 11. TCP/IP Protocol Suite 11 Figure 30.5 Transport mode versus tunnel mode
  • 12.  Two Security Protocols  IPSec defines two protocols the Authentication Header (AH) Protocol and the Encapsulating Security Payload (ESP) Protocol to provide authentication and/or encryption for packets at the IP level
  • 13. Authentication Header (AH)  The Authentication Header (AH) Protocol is designed to authenticate the source host and to ensure the integrity of the payload carried in the IP packet  The protocol uses a hash function and a symmetric (secret) key to create a message digest; the digest is inserted in the authentication header  The AH is then placed in the appropriate location, based on the mode (transport or tunnel)
  • 14. 14 The AH protocol provides source authentication and data integrity, but not privacy. Note
  • 15. Encapsulating Security Payload (ESP)  Encapsulating Security Payload(ESP), that provides source authentication, integrity, and confidentiality  ESP adds a header and trailer
  • 17. Security Association  IPSec requires a logical relationship, called a Security Association (SA), between two hosts.  there are two Security Associations (SAs) between Alice and Bob; one outbound SA and one inbound SA. Each of them stores the value of the key in a variable and the name of the encryption/decryption algorithm in another  A Security Association is a contract between two parties; it creates a secure channel between them
  • 19. Internet Key Exchange (IKE)  The Internet Key Exchange (IKE) is a protocol designed to create both inbound and outbound Security Associations
  • 20. Virtual private network From R1 to R2 From R1 to R2 From 100 to 200 From 100 to 200
  • 22. TRANSPORT LAYER SECURITY Two protocols are dominant today for providing security at the transport layer: the Secure Sockets Layer (SSL) protocol and the Transport Layer Security (TLS) protocol. The latter is actually an IETF version of the former. We discuss SSL in this section; TLS is very similar. Figure shows the position of SSL and TLS in the Internet model.
  • 23. Figure 30.15 Location of SSL and TSL in the Internet mode
  • 24. TCP/IP Protocol Suite 24 Figure 30.19 Four SSL protocols
  • 25.  The Record Protocol is the carrier. It carries messages from three other protocols as well as the data coming from the application layer. Messages from the Record Protocol are payloads to the transport layer, normally TCP.  The Handshake Protocol provides security parameters for the Record Protocol. It establishes a cipher set and provides keys and security parameters. It also authenticates the server to the client and the client to the server if needed.  The ChangeCipherSpec Protocol is used for signaling the readiness of cryptographic secrets.  The Alert Protocol is used to report abnormal conditions
  • 26. Web Security  Web now widely used by business, government, individuals  but Internet & Web are vulnerable  have a variety of threats  integrity  confidentiality  denial of service  authentication  need added security mechanisms
  • 27. SSL (Secure Socket Layer)  transport layer security service  originally developed by Netscape  version 3 designed with public input  subsequently became Internet standard known as TLS (Transport Layer Security)  uses TCP to provide a reliable end-to-end service  SSL has two layers of protocols
  • 29. SSL Architecture  SSL connection  a transient, peer-to-peer, communications link  associated with 1 SSL session  SSL session  an association between client & server  created by the Handshake Protocol  define a set of cryptographic parameters  may be shared by multiple SSL connections
  • 30. SSL Record Protocol Services  message integrity  using a MAC with shared secret key  similar to HMAC but with different padding  confidentiality  using symmetric encryption with a shared secret key defined by Handshake Protocol  AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128  message is compressed before encryption
  • 31. SSL Record Protocol Operation
  • 32. SSL Change Cipher Spec Protocol  one of 3 SSL specific protocols which use the SSL Record protocol  a single message  causes pending state to become current  hence updating the cipher suite in use
  • 33. SSL Alert Protocol  conveys SSL-related alerts to peer entity  severity  warning or fatal  specific alert  fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter  warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown  compressed & encrypted like all SSL data
  • 34. SSL Handshake Protocol  allows server & client to:  authenticate each other  to negotiate encryption & MAC algorithms  to negotiate cryptographic keys to be used  comprises a series of messages in phases 1. Establish Security Capabilities 2. Server Authentication and Key Exchange 3. Client Authentication and Key Exchange 4. Finish
  • 36. TLS (Transport Layer Security)  IETF standard RFC 2246 similar to SSLv3  with minor differences  in record format version number  uses HMAC for MAC  a pseudo-random function expands secrets  has additional alert codes  some changes in supported ciphers  changes in certificate types & negotiations  changes in crypto computations & padding
  • 37. Secure Electronic Transactions (SET)  open encryption & security specification  to protect Internet credit card transactions  developed in 1996 by Mastercard, Visa etc  not a payment system  rather a set of security protocols & formats  secure communications amongst parties  trust from use of X.509v3 certificates  privacy by restricted info to those who need it
  • 39. SET Transaction 1. customer opens account 2. customer receives a certificate 3. merchants have their own certificates 4. customer places an order 5. merchant is verified 6. order and payment are sent 7. merchant requests payment authorization 8. merchant confirms order 9. merchant provides goods or service 10. merchant requests payment
  • 40. Dual Signature  customer creates dual messages  order information (OI) for merchant  payment information (PI) for bank  neither party needs details of other  but must know they are linked  use a dual signature for this  signed concatenated hashes of OI & PI DS=E(PRc, [H(H(PI)||H(OI))])
  • 41. SET Purchase Request  SET purchase request exchange consists of four messages 1. Initiate Request - get certificates 2. Initiate Response - signed response 3. Purchase Request - of OI & PI 4. Purchase Response - ack order
  • 43. Purchase Request – Merchant 1. verifies cardholder certificates using CA sigs 2. verifies dual signature using customer's public signature key to ensure order has not been tampered with in transit & that it was signed using cardholder's private signature key 3. processes order and forwards the payment information to the payment gateway for authorization (described later) 4. sends a purchase response to cardholder
  • 45. Payment Gateway Authorization 1. verifies all certificates 2. decrypts digital envelope of authorization block to obtain symmetric key & then decrypts authorization block 3. verifies merchant's signature on authorization block 4. decrypts digital envelope of payment block to obtain symmetric key & then decrypts payment block 5. verifies dual signature on payment block 6. verifies that transaction ID received from merchant matches that in PI received (indirectly) from customer 7. requests & receives an authorization from issuer 8. sends authorization response back to merchant
  • 46. Payment Capture  merchant sends payment gateway a payment capture request  gateway checks request  then causes funds to be transferred to merchants account  notifies merchant using capture response
  • 47. 47 APPLICATION LAYER SECURITY Usually we have two protocols providing security services for e-mails: Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extension (S/MIME). https://www.youtube.com/watch?v=CEADq-B8KtI
  • 48. In e-mail security, the sender of the message needs to include the name or identifiers of the algorithms used in the message. Note
  • 49. In e-mail security, the encryption/decryption is done using a symmetric-key algorithm, but the secret key to decrypt the message is encrypted with the public key of the receiver and is sent with the message. Note
  • 50. PGP at the sender site
  • 51. PGP at the receiver site
  • 52. 52 30-4 FIREWALLS All previous security measures cannot prevent Eve from sending a harmful message to a system. To control access to a system we need firewalls. A firewall is a device (usually a router or a computer) installed between the internal network of an organization and the rest of the Internet. It is designed to forward some packets and filter (not forward) others. Figure 30.32 shows a firewall.
  • 55. 55 Figure 30.34 Proxy firewall All HTTP packets Errors Accepted packets
  • 56. 56 A proxy firewall filters at the application layer. Note