密碼編碼學與網(wǎng)絡安全原理與實踐-ch01 預覽_第1頁
密碼編碼學與網(wǎng)絡安全原理與實踐-ch01 預覽_第2頁
密碼編碼學與網(wǎng)絡安全原理與實踐-ch01 預覽_第3頁
密碼編碼學與網(wǎng)絡安全原理與實踐-ch01 預覽_第4頁
密碼編碼學與網(wǎng)絡安全原理與實踐-ch01 預覽_第5頁
已閱讀5頁,還剩20頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

Lecture

slides

by

Lawrie

Brown

for

“Cryptographyand

Network

Security”,

5/e,

by

William

Stallings,

brieflyreviewing

the

text

outline

from

Ch

0,and

then

presenting

the

content

from

Chapter

1

“Introduction”.Cryptography

andNetwork

SecurityOverview

&

Chapter

1Fifth

Edition

by

William

StallingsLecture

slides

by

Lawrie

BrownThis

quote

from

the

start

of

Ch0

”Reader’s

Guide”

sets

the

scene

for

why

we

want

to

study

these

issues.Chapter

0

Reader’s

GuideThe

art

of

war

teaches

us

to

rely

not

on

thelikelihood

of

the

enemy"s

not

coming,

buton

our

own

readiness

to

receive

him;

noton

the

chance

of

his

not

attacking,

butrather

on

the

fact

that

we

have

made

ourposition

unassailable.—The

Art

ofWar,

Sun

TzuThe

material

in

this

book

is

organized

into

four

broad

categories:?

Cryptographic

algorithms:

This

is

the

study

of

techniques

for

ensuring

the

secrecy

and/or

authenticity

ofinformation.

The

three

main

areas

ofstudy

in

this

category

are:

1.

symmetric

encryption,

2.

asymmetric

encryption,

and

3.

cryptographic

hashfunctions,

withthe

related

topics

ofmessage

authentication

codes

and

digital

signatures.?

Mutual

trust:

This

is

the

study

of

techniques

and

algorithms

for

providingmutual

trust

in

two

main

areas.

First,

key

management

anddistributiondeals

with

establishing

trust

inthe

encryption

keys

used

betweentwo

communicatingentities.

Second,

user

authentication

deals

withestablish

trust

in

the

identity

of

a

communicating

partner.?

Network

security:

This

area

covers

the

use

of

cryptographic

algorithms

in

network

protocols

and

network

applications.?

Computersecurity:

In

this

book,

we

use

this

term

to

refer

to

the

security

of

computers

against

intruders

(e.g.,

hackers)

and

malicious

software(e.g.,

viruses).

Typically,

the

computer

to

be

secured

is

attached

to

anetwork

and

the

bulk

of

the

threats

arise

from

the

network.RoadmapCryptographic

algorithms symmetric

ciphers asymmetric

encryption hash

functionsMutual

TrustNetwork

SecurityComputer

SecurityThroughout

this

book,

we

describe

the

most

important

standards

in

use

or

being

developed

for

various

aspects

of

cryptography

andnetwork

security.

Various

organizations

have

been

involved

in

the

development

or

promotionof

these

standards

including:?

NIST

isa

U.S.

federal

agency

that

deals

withmeasurement

science,

standards,

and

technologyrelated

to

U.S.

government

useand

to

the

promotion

of

U.S.

private-sector

innovation.

Despite

its

national

scope,

NIST

Federal

Information

Processing

Standards

(FIPS)

andSpecial

Publications

(SP)

have

a

worldwide

impact.?

ISOC

is

a

professional

membership

society

with

worldwide

organizational

and

individual

membership.

It

provides

leadership

in

addressingissues

that

confront

the

future

of

the

Internet

and

is

the

organizationhome

for

the

groups

responsible

for

Internet

infrastructure

standards,

includingthe

Internet

Engineering

Task

Force

(IETF)

and

the

Internet

Architecture

Board

(IAB).

These

organizations

develop

Internet

standards

and

related

specifications,

all

of

which

are

published

as

Requests

for

Comments

(RFCs).?

ITUis

aninternational

organization

within

the

United

Nations

Systemin

which

governments

and

the

private

sector

coordinate

global

telecomnetworks

and

services

The

ITU

Telecommunication

Standardization

Sector

(ITU-T)

is

one

of

the

three

sectors

of

the

ITU.

ITU-T"s

mission

is

theproduction

of

standards

covering

all

fields

of

telecommunications.

ITU-T

standards

are

referred

to

as

Recommendations.?

ISO

is

a

worldwide

federation

of

national

standards

bodies

frommore

than

140

countries,

one

fromeach

country.

ISO

isanongovernmentalorganizationthat

promotes

the

development

of

standardization

and

related

activities

with

a

view

to

facilitating

the

international

exchange

of

goodsand

services,

and

to

developingcooperation

in

the

spheres

of

intellectual,

scientific,

technological,

and

economic

activity.

ISO"s

work

results

ininternationalagreements

that

are

published

as

International

Standards.Standards

OrganizationsNational

Institute

of

Standards

&Technology

(NIST)Internet

Society

(ISOC)International

Telecommunication

UnionTelecommunication

StandardizationSector

(ITU-T)International

Organization

forStandardization

(ISO)This

quote

from

the

start

of

Ch

1

reflects

afundamental

principle

that

we

must

understand

the

strength

of

the

algorithms

we

use

in

order

to

have

asuitable

level

of

security.Chapter

1

IntroductionThe

combination

of

space,

time,

andstrength

that

must

be

considered

as

thebasic

elements

of

this

theory

of

defensemakes

this

a

fairly

complicated

matter.Consequently,

it

is

not

easy

to

find

a

fixedpoint

of

departure..—On

War,

Carl

Von

ClausewitzThe

NIST

Computer

Security

Handbook

[NIST95]

defines

the

term

computer

security

as

shown

on

this

slide.

This

definitionintroduces

threekey

objectives

that

are

at

the

heart

of

computer

security

as

we

see

on

the

next

slide.Computer

Securitythe

protection

afforded

to

an

automatedinformation

system

in

order

to

attain

theapplicable

objectives

of

preserving

theintegrity,

availability

and

confidentialityinformation

system

resources

(includeshardware,

software,

firmware,information/data,

and

telecommunications)These

three

concepts

formwhat

is

often

referred

to

as

the

CIA

triad

(Figure

1.1).

The

three

concepts

embody

the

fundamental

securityobjectives

for

both

data

and

for

information

and

computing

services.

FIPS

PUB

199

provides

a

useful

characterization

of

these

three

objectives

intermsof

requirements

and

the

definition

of

a

loss

of

security

in

each

category:?

Confidentiality

(covers

both

data

confidentialityand

privacy):

preserving

authorized

restrictions

on

information

access

and

disclosure,

includingmeans

for

protecting

personal

privacy

and

proprietary

information.

Aloss

of

confidentiality

is

the

unauthorized

disclosure

of

information.?

Integrity

(covers

both

data

and

system

integrity):

Guarding

against

improper

information

modification

or

destruction,

and

includes

ensuringinformation

non-repudiation

and

authenticity.

Aloss

of

integrity

is

the

unauthorized

modification

or

destruction

of

information.?

Availability:

Ensuring

timely

and

reliable

access

to

and

use

of

information.

A

loss

of

availabilityis

the

disruption

of

access

to

or

use

ofinformation

or

an

information

system.Although

the

use

of

the

CIA

triad

to

define

security

objectives

is

well

established,

some

in

the

security

field

feel

that

additional

concepts

areneeded

to

present

a

complete

picture.

Two

of

the

most

commonly

mentioned

are:?

Authenticity:

The

property

of

being

genuine

and

being

able

to

be

verified

and

trusted;

confidence

in

the

validityof

a

transmission,

a

message,or

message

originator.?

Accountability:

The

security

goal

that

generates

the

requirement

for

actions

of

an

entity

to

be

traced

uniquely

to

that

entity.Key

Security

ConceptsWe

can

define

three

levels

of

impact

onorganizations

or

individuals

should

there

be

a

breach

of

security

(i.e.,

a

loss

of

confidentiality,

integrity,

oravailability).

These

levels

are

defined

in

FIPS

PUB

199:?

Low:

The

loss

could

be

expected

to

have

a

limited

adverse

effect

onorganizational

operations,

organizational

assets,

or

individuals.

A

limitedadverse

effect

means

that,

for

example,

the

loss

of

confidentiality,

integrity,

or

availabilitymight

(i)

cause

a

degradation

in

mission

capability

to

anextent

and

duration

that

the

organizationis

able

to

perform

its

primaryfunctions,

but

the

effectiveness

of

the

functions

is

noticeably

reduced;

(ii)result

in

minor

damage

to

organizational

assets;

(iii)

result

in

minor

financial

loss;

or

(iv)

result

in

minor

harmto

individuals.?

Moderate:

The

loss

could

be

expected

to

have

a

serious

adverse

effect

onorganizational

operations,

organizational

assets,

or

individuals.

Aserious

adverse

effect

means

that,

for

example,

the

loss

might

(i)

cause

a

significant

degradation

in

mission

capability

to

an

extent

and

duration

thatthe

organization

is

able

to

perform

its

primaryfunctions,

but

the

effectiveness

of

the

functions

is

significantly

reduced;

(ii)

result

in

significantdamage

to

organizational

assets;

(iii)

result

in

significant

financial

loss;

or

(iv)

result

in

significant

harmto

individuals

that

does

not

involve

loss

of

lifeor

serious,

life-threatening

injuries.?

High:

The

loss

could

be

expected

to

have

a

severe

or

catastrophic

adverse

effect

onorganizational

operations,

organizational

assets,orindividuals.

A

severe

or

catastrophic

adverse

effect

means

that,

for

example,

the

loss

might

(i)

causea

severe

degradation

in

or

lossof

missioncapability

to

an

extent

and

duration

that

the

organizationis

not

able

to

performone

or

more

of

its

primary

functions;

(ii)

result

in

major

damage

toorganizational

assets;

(iii)

result

inmajor

financial

loss;

or

(iv)

result

in

severe

or

catastrophic

harmto

individuals

involving

loss

oflife

or

serious

lifethreatening

injuries.Levels

of

Impactcan

define

3

levels

of

impact

from

asecurity

breachLowModerateHighWe

now

provide

some

examples

of

applications

that

illustrate

the

requirements

just

enumerated.?

Confidentiality-

Student

grade

information

is

an

asset

whose

confidentialityis

considered

to

be

highly

important

by

students.

Grade

informationshould

onlybe

available

to

students,

their

parents,

and

employees

that

require

the

information

to

do

their

job.

Student

enrollment

information

mayhaveamoderate

confidentiality

rating.

While

still

coveredby

FERPA,

this

information

is

seen

by

more

people

on

a

daily

basis,

is

less

likely

to

betargeted

than

grade

information,

and

results

in

less

damage

if

disclosed.

Directory

information,

such

as

lists

of

students

or

facultyor

departmentallists,

may

be

assigned

a

low

confidentialityrating

or

indeed

no

rating.

This

information

is

typicallyfreelyavailable

to

the

public

and

published

on

aschool"s

Web

site.?

Integrity

Considera

hospital

patient"s

allergy

information

stored

in

a

database.

The

doctor

should

be

able

to

trust

that

the

information

is

correct

and

current.

Now

suppose

that

an

employee

(e.g.,

a

nurse)

who

is

authorized

to

view

and

update

this

information

deliberately

falsifies

thedata

to

cause

harmto

the

hospital.

The

database

needs

to

be

restored

to

atrusted

basis

quickly,

and

it

should

be

possible

to

trace

the

error

backto

the

person

responsible.

Patient

allergyinformation

is

an

example

of

an

asset

with

a

high

requirement

for

integrity.

Inaccurate

information

couldresult

in

serious

harmor

death

to

a

patient

and

expose

the

hospital

to

massive

liability.?

Availability-

The

more

critical

a

component

orservice,

the

higher

is

the

level

of

availability

required.

Consider

a

system

that

providesauthenticationservices

for

critical

systems,

applications,

and

devices.

Aninterruption

of

service

results

in

the

inability

for

customers

to

accesscomputing

resources

and

staff

to

access

the

resources

they

need

to

performcritical

tasks.

The

loss

of

the

service

translates

into

a

large

financialloss

in

lost

employee

productivity

and

potential

customer

loss.Examples

of

SecurityRequirementsconfidentiality

student

gradesintegrity

patient

informationavailability

authentication

serviceComputer

security

is

both

fascinatingand

complex.

Some

of

the

reasons

follow:1.

Computer

security

is

not

as

simple

as

it

might

first

appear

to

the

novice.

The

requirements

seemto

be

straightforward,

but

the

mechanisms

usedto

meet

those

requirements

can

be

quite

complex

and

subtle.2.

In

developing

a

particular

securitymechanismor

algorithm,

one

must

always

consider

potential

attacks

(often

unexpected)

on

those

securityfeatures.3.

Hence

procedures

used

to

provide

particular

services

are

often

counterintuitive.4.

Having

designed

various

security

mechanisms,

it

is

necessary

to

decide

where

to

use

them.5.

Security

mechanisms

typically

involve

more

than

a

particular

algorithm

or

protocol,

but

also

require

participants

to

have

secret

information,leading

to

issues

of

creation,

distribution,

and

protection

of

that

secret

information.6.

Computer

security

is

essentially

abattle

of

wits

between

aperpetrator

who

tries

to

find

holes

and

the

designer

or

administrator

who

tries

toclose

them.7.

There

isa

natural

tendency

on

the

part

of

users

and

systemmanagers

to

perceive

little

benefit

fromsecurity

investment

until

a

security

failureoccurs.8.

Security

requires

regular

monitoring,

difficult

intoday"s

short-term

environment.9.

Security

is

still

too

often

an

afterthought

-

incorporated

after

the

design

is

complete.10.

Many

users

/

securityadministrators

viewstrong

security

as

an

impediment

to

efficient

and

user-friendly

operation

of

an

information

systemoruse

of

information.Computer

Security

Challengesnot

simplemust

consider

potential

attacksprocedures

used

counter-intuitiveinvolve

algorithms

and

secret

infomust

decide

where

to

deploy

mechanismsbattle

of

wits

between

attacker

/

adminnot

perceived

on

benefit

until

failsrequires

regular

monitoringtoo

often

an

after-thoughtregarded

as

impediment

to

using

systemTo

assess

effectively

the

security

needs

of

an

organization

and

to

evaluate

and

choose

various

security

products

and

policies,

the

managerresponsible

for

security

needs

some

systematic

wayof

defining

the

requirements

for

security

and

characterizingthe

approaches

to

satisfyingthoserequirements.

This

is

difficult

enough

in

a

centralized

data

processing

environment;

withthe

use

of

local

and

wide

area

networks

the

problems

arecompounded.

ITU-T

Recommendation

X.800,

Security

Architecture

forOSI,

defines

such

a

systematic

approach.

The

OSI

securityarchitecture

is

useful

to

managers

asaway

of

organizing

the

task

of

providingsecurity.OSI

Security

ArchitectureITU-T

X.800

“Security

Architecture

forOSI”defines

a

systematic

way

of

defining

andproviding

security

requirementsfor

us

it

provides

a

useful,

if

abstract,overview

of

concepts

we

will

studyThe

OSI

security

architecture

focuses

on

security

attacks,

mechanisms,

and

services.

These

can

be

defined

brieflyas

follows:?

Security

attack:

Any

action

that

compromises

the

security

of

information

owned

by

an

organization.?

Security

mechanism:

A

process

(or

a

device

incorporating

such

aprocess)

that

is

designed

to

detect,

prevent,

or

recover

froma

securityattack.?

Security

service:

Aprocessing

or

communication

service

that

enhances

the

security

of

the

data

processingsystems

and

the

informationtransfers

of

anorganization.

The

services

are

intended

to

counter

security

attacks,

and

they

make

use

of

one

or

more

security

mechanisms

toprovide

the

service.In

the

literature,

the

terms

threat

and

attack

are

commonly

used

to

meanmore

orless

the

same

thing.

Table

1.1

provides

definitions

taken

fromRFC

2828,

Internet

Security

Glossary.Threat

-

A

potential

for

violationof

security,

which

exists

when

there

isa

circumstance,

capability,

action,

or

event

that

could

breach

security

andcause

harm.

That

is,

a

threat

is

a

possible

danger

that

might

exploit

a

vulnerability.Attack-

Anassault

on

systemsecurity

that

derives

froman

intelligent

threat;

that

is,

an

intelligent

act

that

is

a

deliberate

attempt

(especially

in

thesense

of

a

method

or

technique)

to

evade

security

services

and

violate

the

security

policy

of

a

system.Aspects

of

Securityconsider

3

aspects

of

information

security:security

attacksecurity

mechanismsecurity

servicenote

termsthreat

a

potential

for

violation

of

securityattack

an

assault

on

system

security,

adeliberate

attempt

to

evade

security

servicesA

useful

means

of

classifyingsecurity

attacks,

used

both

in

X.800

and

RFC

2828,

is

in

terms

of

passive

attacks

and

active

attacks.

A

passiveattack

attempts

to

learn

or

make

use

of

information

from

the

systembut

does

not

affect

system

resources.Passive

attacks

are

in

the

nature

of

eavesdropping

on,

or

monitoring

of,

transmissions.

The

goal

of

the

opponent

is

to

obtain

information

that

isbeing

transmitted.

Two

types

of

passive

attacks

are:+

release

of

message

contents

-

as

shown

above

in

Stallings

Figure

1.2a

here+

traffic

analysis

-

monitor

traffic

flow

to

determine

location

and

identity

of

communicating

hosts

and

could

observe

the

frequency

and

lengthofmessages

beingexchangedThese

attacks

are

difficult

to

detect

because

they

do

not

involve

any

alteration

of

the

data.Passive

AttacksActive

attacks

involve

some

modification

of

the

data

streamor

the

creation

of

a

false

streamand

can

be

subdivided

into

four

categories:masquerade,

replay,

modification

of

messages,

and

denial

of

service:masquerade

of

one

entity

as

some

otherreplay

previous

messages

(as

shown

above

in

Stallings

Figure

1.3b)modify/alter

(part

of)

messages

in

transit

to

produce

an

unauthorized

effectdenial

of

service

-

prevents

or

inhibits

the

normal

use

or

managementof

communications

facilitiesActive

attacks

present

the

opposite

characteristics

of

passive

attacks.

Whereas

passive

attacks

are

difficult

to

detect,

measures

are

available

toprevent

their

success.

On

the

other

hand,

it

is

quite

difficult

to

prevent

active

attacks

absolutely,

because

of

the

wide

variety

of

potential

physical,software,

and

network

vulnerabilities.

Instead,

the

goal

is

to

detect

active

attacks

and

to

recover

fromany

disruption

or

delays

caused

by

them.Active

AttacksConsider

the

role

of

a

security

service,

and

what

may

be

required.Note

both

similarities

and

differences

withtraditional

paper

documents,

which

for

example:have

signatures

&

dates;need

protection

fromdisclosure,

tampering,

or

destruction;maybe

notarized

or

witnessed;maybe

recorded

or

licensedSecurity

Serviceenhance

security

of

data

processing

systemsand

information

transfers

of

an

organizationintended

to

counter

security

attacksusing

one

or

more

security

mechanismsoften

replicates

functions

normally

associatedwith

physical

documents

which,

for

example,

have

signatures,

dates;

needprotection

from

disclosure,

tampering,

ordestruction;

be

notarized

or

witnessed;

berecorded

or

licensedState

here

a

couple

of

definitions

of

“security

services”

fromrelevant

standards.

X.800

defines

a

security

service

asa

service

provided

by

aprotocol

layer

of

communicating

open

systems,

which

ensures

adequate

security

of

the

systems

or

of

data

transfers.

Perhaps

a

clearerdefinition

is

found

in

RFC

2828,

which

provides

the

following

definition:

a

processing

or

communication

service

thatis

provided

by

a

system

to

give

a

specific

kind

of

protection

to

system

resources;

security

services

implement

security

policies

and

are

implemented

by

security

mechanisms.Security

ServicesX.800:“a

service

provided

by

a

protocol

layer

ofcommunicating

open

systems,

which

ensuresadequate

security

of

the

systems

or

of

datatransfers”RFC

2828:“a

processing

or

communication

serviceprovided

by

a

system

to

give

a

specific

kind

ofprotection

to

system

resources”This

list

is

taken

from

Stallings

Table

1.2

which

provides

details

of

the

5

Security

Service

categories

and

the

14

specific

services

given

in

X.800.This

list

includes

the

various

"classic"

security

services

which

are

traditionally

discussed.

Note

there

is

a

degree

ofambiguity

as

to

the

meaning

ofthese

terms,

and

overlap

in

their

use.

The

broad

service

categories

are:authentication

is

concerned

with

assuring

that

a

communication

is

authentic.

Two

specific

authentication

services

are

defined

in

X.800:

Peerentity

authentication:

provides

corroboration

of

the

identity

of

a

peer

entity

inan

association;

and

Data

originauthentication:

providescorroboration

of

the

source

of

a

data

unit.access

control

is

the

ability

to

limit

and

control

the

access

to

host

systems

and

applications

via

communications

links.confidentiality

is

the

protection

of

transmitted

data

frompassive

attacks,

and

the

protection

of

traffic

flow

fromanalysis.integrity

assures

that

messages

are

received

as

sent,

with

no

duplication,

insertion,

modification,

reordering,

replay,

or

loss.availability

is

the

property

of

a

system

/

resource

being

accessible

and

usable

upon

demand

by

anauthorized

systementity,

according

toperformance

specifications

for

the

system.Security

Services

(X.800)

Authentication

-

assurance

that

communicatingentity

is

the

one

claimedhave

both

peer-entity

&

data

origin

authentication

Access

Control

-

prevention

of

theunauthorized

use

of

a

resource

Data

Confidentiality

–protection

of

data

fromunauthorized

disclosure

Data

Integrity

-

assurance

that

data

received

isas

sent

by

an

authorized

entity

Non-Repudiation

-

protection

against

denial

byone

of

the

parties

in

a

communicationAvailability

resource

accessible/usableNow

introduce

“Security

Mechanism”

which

are

the

specific

means

of

implementing

one

or

more

security

services.

Note

these

mechanisms

spana

wide

range

of

technical

components,

but

one

aspect

seen

in

many

is

the

use

of

cryptographic

techniques.Security

Mechanismfeature

designed

to

detect,

prevent,

orrecover

from

a

security

attackno

single

mechanism

that

will

support

allservices

requiredhowever

one

particular

element

underliesmany

of

the

security

mechanisms

in

use:cryptographic

techniqueshence

our

focus

on

this

topicSome

examples

of

mechanisms

from

X.800.

Note

that

the

“specif

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論