TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate...

33
TCP/IP Protocol Suite 1 Chapter 28 Chapter 28 Upon completion you will be able to: Security Security Differentiate between two categories of cryptography schemes Understand four aspects of security Know how and where IPSec, TLS, and PGP provide security Firewall Objectives
  • date post

    21-Dec-2015
  • Category

    Documents

  • view

    217
  • download

    2

Transcript of TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate...

Page 1: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 1

Chapter 28Chapter 28

Upon completion you will be able to:

SecuritySecurity

• Differentiate between two categories of cryptography schemes • Understand four aspects of security• Know how and where IPSec, TLS, and PGP provide security•Firewall

Objectives

Page 2: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 2

28.1 CRYPTOGRAPHY

The word cryptography in Greek means “secret writing.” The term today The word cryptography in Greek means “secret writing.” The term today refers to the science and art of transforming messages to make them refers to the science and art of transforming messages to make them secure and immune to attacks.secure and immune to attacks.

The topics discussed in this section include:The topics discussed in this section include:

Symmetric-Key Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Asymmetric-Key Cryptography Comparison Comparison

Page 3: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 3

Figure 28.1 Cryptography components

Page 4: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 4

In cryptography, the encryption/decryption algorithms are

public; the keys are secret.

Note:Note:

Page 5: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 5

In symmetric-key cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared.

Note:Note:

Page 6: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 6

Figure 28.2 Symmetric-key cryptography

Page 7: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 7

In symmetric-key cryptography, the same key is used in both directions.

Note:Note:

Page 8: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 8

Figure 28.3 Caesar cipher

Page 9: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 9

Figure 28.4 Transpositional cipher

Page 10: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 10

Figure 28.5 Data Encryption Standard (DES)

Page 11: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 11

Figure 28.6 Iteration block

Page 12: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 12

Figure 28.7 Triple DES

Page 13: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 13

The DES cipher uses the same concept as the Caesar cipher, but the

encryption/ decryption algorithm is much more complex.

Note:Note:

Page 14: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 14

Figure 28.8 Public-key cryptography

Page 15: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 15

Figure 28.9 RSA

Page 16: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 16

Symmetric-key cryptography is often used for long messages.

Note:Note:

Page 17: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 17

Asymmetric-key algorithms are more efficient for short messages.

Note:Note:

Page 18: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 18

28.6 SECURITY IN THE INTERNET

IP Level Security: IPSec IP Level Security: IPSec Transport Layer Security Transport Layer Security Application Layer Security: PGP Application Layer Security: PGP

Page 19: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 19

Figure 28.27 Transport mode

Page 20: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 20

Figure 28.28 Tunnel mode

Page 21: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 21

Figure 28.29 Authentication Header (AH)

Page 22: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 22

The AH protocol provides message authentication and integrity,

but not privacy.

Note:Note:

Page 23: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 23

Figure 28.30 Encapsulating Security Payload (ESP)

Page 24: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 24

ESP provides message authentication, integrity, and privacy.

Note:Note:

Page 25: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 25

Figure 28.31 Position of TLS

Page 26: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 26

Figure 28.35 PGP at the sender site

Page 27: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 27

Figure 28.36 PGP at the receiver site

Page 28: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 28

28.7 FIREWALLS

A firewall is a device (usually a router or a computer) installed between A firewall is a device (usually a router or a computer) installed between the internal network of an organization and the rest of the Internet. It is the internal network of an organization and the rest of the Internet. It is designed to forward some packets and filter (not forward) others.designed to forward some packets and filter (not forward) others.

The topics discussed in this section include:The topics discussed in this section include:

Packet-Filter Firewall Packet-Filter Firewall Proxy Firewall Proxy Firewall

Page 29: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 29

Figure 28.37 Firewall

Page 30: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 30

Figure 28.38 Packet-filter firewall

Page 31: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 31

A packet-filter firewall filters at the network or transport layer.

Note:Note:

Page 32: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 32

Figure 28.39 Proxy firewall

Page 33: TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.

TCP/IP Protocol Suite 33

A proxy firewall filters at the application layer.

Note:Note: