1 / 27

Chapter 11 Security Protocols

Chapter 11 Security Protocols. Chapter Figures. replay. Request. Server. Client. Response. Server. Client Imposter. Server. Attacker. Figure 11.1 – part 1. Server Imposter. Client. Man in the middle. Client. Server. Figure 11.1 – part 2. Encryption. Decryption. C=E. (P).

Download Presentation

Chapter 11 Security Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 11Security Protocols Chapter Figures

  2. replay Request Server Client Response Server Client Imposter Server Attacker Communication Networks Figure 11.1 – part 1

  3. Server Imposter Client Man in the middle Client Server Communication Networks Figure 11.1 – part 2

  4. Encryption Decryption C=E (P) Ciphertext Plaintext P P K DK(.) EK(.) Key K Key K Communication Networks Figure 11.2

  5. John to Jane, “let’s talk” Receiver Sender r Ek(r) r´ Ek(r´) Communication Networks Figure 11.3

  6. Encryption Decryption C = EK1(P) P Ciphertext Plaintext P DK2(.) EK2(.) Private key K2 Public key K1 Communication Networks Figure 11.4

  7. Receiver Sender John to Jane, “let’s talk” EK1(r) r Communication Networks Figure 11.5

  8. B A KDC D C Communication Networks Figure 11.6

  9. T = gx Receiver Transmitter R = gy K = Tymod p = gxymod p K = Rxmod p = gxymod p Communication Networks Figure 11.7

  10. T T' Man in the middle Receiver Transmitter R R' K1 = R´x = gxy´ K1 = T y´ = gxy´ K2 = R x´ K2 = T´y = gx´ y = gx´ y Communication Networks Figure 11.8

  11. (a) Internet (b) Internet (c) Internet Communication Networks Figure 11.9

  12. (a) Packet header Authentication header Packet payload Authenticated except for changeable fields (b) Authentication header New header Original header Packet payload In tunnel mode Authenticated except for changeable fields in new header Communication Networks Figure 11.10

  13. Internet Tunnel Communication Networks Figure 11.11

  14. (a) Packet header Encryption header Packet + pad payload Encrypted (b) Encryption header New header Authentication header Packet + pad payload Encrypted (c) New header Original header Packet payload Encryption header In tunnel mode Encrypted Communication Networks Figure 11.12

  15. Initiator Host Responder Host HDR, SA Cookie Request HDR, SA Cookie Response HDR, KE, Ni Key Request HDR, KE, Nr Key Response HDR, IDi, Sigi Signature Request HDR, IDr, Sigr Signature Request Communication Networks Figure 11.13

  16. IPv4 Header AH Upper Layer (e.g., TCP or UDP) Communication Networks Figure 11.14

  17. 0 8 16 31 Next Header Length Reserved Security Parameters Index Sequence Number Authentication Data Communication Networks Figure 11.15

  18. 0 16 24 31 Security Parameters Index Sequence Number Payload Data Padding Pad Length Next Header Authentication Data Communication Networks Figure 11.16

  19. Handshake Protocol HTTP Protocol Alert Protocol Change cipher spec Protocol TLS Record Protocol TCP IP Communication Networks Figure 11.17

  20. Client Server ClientHello ServerHello Certificate* ServerKeyExchange* CertificateRequest* ServerHelloDone Certificate* ClientKeyExchange CertificateVerify* [ChangeCipherSpec] Finished [ChangeCipherSpec] Finished Application Data Application Data Communication Networks Figure 11.18

  21. Communication Networks Figure 11.19

  22. Communication Networks Figure 11.20

  23. Communication Networks Figure 11.21

  24. Frame CRC XOR KEY 802.11 header IV Cyphertext Communication Networks Figure 11.22

  25. 64-bit plaintext 56-bit key Generate 16 per-iteration keys Initial permutation 48-bit Key 1 Iteration 1 48-bit Key 2 Iteration 2 48-bit Key 16 Iteration 16 32-bit swap Inverse permutation 64-bit ciphertext Communication Networks Figure 11.23

  26. Ri-1 Li-1 Li-1 f(Ri-1, K) Ri L1 Communication Networks Figure 11.24

  27. (a) Encryption P1 P2 P3 IV … Encrypt Encrypt Encrypt C1 C2 C3 (b) Decryption C3 C1 C2 … Decrypt Decrypt Decrypt IV P3 P1 P2 Communication Networks Figure 11.25

More Related