�Security��Gullagong�Assoc. Prof.�PG Deptt. Of Comp. Sc. & IT
Security Threats, Policies, and Mechanisms
Types of security threats to consider:
Layering of Security Mechanisms (1)
The logical organization of a �distributed system into several layers.
Layering of Security Mechanisms (2)
Several sites connected through� a wide-area backbone service.
Distribution of Security Mechanisms
The principle of RISSC as �applied to secure distributed systems.
Cryptography (1)
Intruders and eavesdroppers in communication.
Cryptography (2)
Notation used in this chapter.
Symmetric Cryptosystems: DES (1)
(a) The principle of DES. �
Symmetric Cryptosystems: DES (2)
(b) Outline of
one encryption round.
Symmetric Cryptosystems: DES (3)
Details of per-round key generation in DES.
Public-Key Cryptosystems: RSA
Generating the private and public keys requires
four steps:
Hash Functions: MD5 (1)
The structure of MD5.
Hash Functions: MD5 (2)
The 16 iterations during the �first round in a phase in MD5.
Authentication Based on a Shared Secret Key (1)
Authentication based on a shared secret key.
Authentication Based on a Shared Secret Key (2)
Authentication based on a shared �secret key, but using three instead of five messages.
Authentication Based on a Shared Secret Key (3)
The reflection attack.
Authentication Using a �Key Distribution Center (1)
The principle of using a KDC.
Authentication Using a �Key Distribution Center (2)
Using a ticket and letting �Alice set up a connection to Bob.
Authentication Using a �Key Distribution Center (3)
The Needham-Schroeder authentication protocol.
Authentication Using a �Key Distribution Center (4)
Protection against malicious reuse of a previously generated session key in the Needham-Schroeder protocol.
Authentication Using a �Key Distribution Center (5)
Mutual authentication in a public-key cryptosystem.
Digital Signatures (1)
Digital signing a message �using public-key cryptography.
Digital Signatures (2)
Digitally signing a message using a message digest.
Secure Replicated Servers
Sharing a secret signature �in a group of replicated servers.
Firewalls
A common implementation of a firewall.
Protecting the Target (1)
The organization of a Java sandbox.
Protecting the Target (2)
(a) A sandbox. (b) A playground.
Protecting the Target (3)
The principle of using Java object �references as capabilities.
Protecting the Target (4)
The principle of stack introspection.
Key Establishment
The principle of Diffie-Hellman key exchange.
Key Distribution (1)
Secret-key distribution. �
Key Distribution (2)
Public-key distribution �
Secure Group Management
Securely admitting a new group member.