Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Business data communications: Chapter 14 - Behrouz A. Forouzan

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Chapter 14 - Network security: Firewalls and VPNs. In this chapter, we look at four issues of security: privacy, authentication, integrity, and nonrepudiation. We show how the first can be achieved through secret-key or private-key encryption. We discuss a concept called digital signature that satisfies the three other conditions. We talk about how security is implemented in the Internet. | Chapter 14 Network Security: Firewalls and VPNs List and distinguish between the four conditions of security. Understand how privacy can be achieved through encryption/ decryption. Understand the digital signature concept and how it can be used to provide authentication, integrity, and nonrepudiation. Understanding firewalls and their use in isolating an organization from intruders. After reading this chapter, the reader should be able to: OBJECTIVES OBJECTIVES (continued) Understand the different access control methods. Be familiar with VPN technology and how it provides privacy. INTRODUCTION 14.1 Figure 14-1 Aspects of security PRIVACY 14.2 Figure 14-2 Secret-key encryption In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note: Business Focus: DES One common method of secret-key encryption is the data encryption standard (DES). DES was designed by IBM and adopted by the U.S. government as the . | Chapter 14 Network Security: Firewalls and VPNs List and distinguish between the four conditions of security. Understand how privacy can be achieved through encryption/ decryption. Understand the digital signature concept and how it can be used to provide authentication, integrity, and nonrepudiation. Understanding firewalls and their use in isolating an organization from intruders. After reading this chapter, the reader should be able to: OBJECTIVES OBJECTIVES (continued) Understand the different access control methods. Be familiar with VPN technology and how it provides privacy. INTRODUCTION 14.1 Figure 14-1 Aspects of security PRIVACY 14.2 Figure 14-2 Secret-key encryption In secret-key encryption, the same key is used by the sender (for encryption) and the receiver (for decryption). The key is shared. Note: Business Focus: DES One common method of secret-key encryption is the data encryption standard (DES). DES was designed by IBM and adopted by the U.S. government as the standard encryption method for nonmilitary and nonclassified use. The algorithm manipulates a 64-bit plaintext with a 56-bit key. The text is put through 19 different and very complex procedures to create a 64-bit ciphertext. Figure 14-3 Public-key encryption Technical Focus: RSA One popular public-key encryption technique is called RSA . The technique uses number theory and the fact that it is easy to create two large numbers and multiply them, but difficult to find the original numbers when the product is given. The public key is made of two large numbers (n and e). The private key is made of two numbers (n and d). The encryption algorithm is C = P e mod n The receiver uses the same procedure but with the private key numbers as shown: C = P d mod n DIGITAL SIGNATURE 14.3 Figure 14-4 Signing the whole document Digital signature cannot be achieved using secret-key encryption. Note: Digital signature does not provide privacy. If there is a need for privacy, another layer of .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.