SlideShare a Scribd company logo
Network Security
Chapter 8
DNS – The Domain Name System
• The DNS Name Space
• Resource Records
• Name Servers
The DNS Name Space
A portion of the Internet domain name space.
Resource Records
The principal DNS resource records types.
Resource Records (2)
A portion of a possible DNS database for cs.vu.nl.
Name Servers
Part of the DNS name space showing the division into zones.
Name Servers (2)
How a resolver looks up a remote name in eight steps.
Electronic Mail
• Architecture and Services
• The User Agent
• Message Formats
• Message Transfer
• Final Delivery
Electronic Mail (2)
Some smileys. They will not be on the final exam :-).
Architecture and Services
Basic functions
• Composition
• Transfer
• Reporting
• Displaying
• Disposition
The User Agent
Envelopes and messages. (a) Paper mail. (b) Electronic mail.
Reading E-mail
An example display of the contents of a mailbox.
Message Formats – RFC 822
RFC 822 header fields related to message transport.
Message Formats – RFC 822 (2)
Some fields used in the RFC 822 message header.
MIME – Multipurpose Internet Mail
Extensions
Problems with international languages:
• Languages with accents
(French, German).
• Languages in non-Latin alphabets
(Hebrew, Russian).
• Languages without alphabets
(Chinese, Japanese).
• Messages not containing text at all
(audio or images).
MIME (2)
RFC 822 headers added by MIME.
MIME (3)
The MIME types and subtypes defined in RFC 2045.
MIME (4)
A multipart message containing enriched and audio alternatives.
Message Transfer
Transferring a message
from elinore@abc.com
to carolyn@xyz.com.
Final Delivery
(a) Sending and reading mail when the receiver has a permanent
Internet connection and the user agent runs on the same machine as
the message transfer agent. (b) Reading e-mail when the receiver has
a dial-up connection to an ISP.
POP3
Using POP3 to fetch three messages.
IMAP
A comparison of POP3 and IMAP.
The World Wide Web
• Architectural Overview
• Static Web Documents
• Dynamic Web Documents
• HTTP – The HyperText Transfer Protocol
• Performance Ehnancements
• The Wireless Web
Architectural
Overview
(a) A Web page (b) The page reached by clicking on
Department of Animal Psychology.
Architectural Overview (2)
The parts of the Web model.
The Client Side
(a) A browser plug-in. (b) A helper application.
The Server Side
A multithreaded Web server with a front end and processing modules.
The Server Side (2)
A server farm.
The Server Side (3)
(a) Normal request-reply message sequence.
(b) Sequence when TCP handoff is used.
URLs – Uniform Resource Locaters
Some common URLs.
Statelessness and Cookies
Some examples of cookies.
HTML – HyperText Markup Language
(a) The HTML for a sample Web page. (b) The formatted page.
(b)
HTML (2)
A selection of common HTML tags.
some can have additional parameters.
Forms
(a) An HTML table.
(b) A possible rendition of this
table.
Forms (2)
(a) The HTML for an
order form.
(b) The formatted page.
(b)
Forms (3)
A possible response from the browser to the server with information
filled in by the user.
XML and XSL
A simple Web page
in XML.
XML and XSL (2)
A style sheet in
XSL.
Dynamic Web Documents
Steps in processing the information from an HTML form.
Cryptography
• Introduction to Cryptography
• Substitution Ciphers
• Transposition Ciphers
• One-Time Pads
• Two Fundamental Cryptographic Principles
Need for Security
Some people who cause security problems and why.
An Introduction to Cryptography
The encryption model (for a symmetric-key cipher).
Transposition Ciphers
A transposition cipher.
One-Time Pads
The use of a one-time pad for encryption and the
possibility of getting any possible plaintext from
the ciphertext by the use of some other pad.
Quantum Cryptography
An example of quantum cryptography.
Symmetric-Key Algorithms
• DES – The Data Encryption Standard
• AES – The Advanced Encryption Standard
• Cipher Modes
• Other Ciphers
• Cryptanalysis
Product Ciphers
Basic elements of product ciphers. (a) P-box. (b) S-box. (c) Product.
Data Encryption Standard
The data encryption standard. (a) General outline.
(b) Detail of one iteration. The circled + means exclusive OR.
Triple DES
(a) Triple encryption using DES. (b) Decryption.
AES – The Advanced Encryption Standard
Rules for AES proposals
1. The algorithm must be a symmetric block cipher.
2. The full design must be public.
3. Key lengths of 128, 192, and 256 bits supported.
4. Both software and hardware implementations required
5. The algorithm must be public or licensed on
nondiscriminatory terms.
AES (2)
An outline of
Rijndael.
AES (3)
Creating of the state and rk arrays.
Electronic Code Book Mode
The plaintext of a file encrypted as 16 DES blocks.
Cipher Block Chaining Mode
Cipher block chaining. (a) Encryption. (b) Decryption.
Cipher Feedback Mode
(a) Encryption. (c) Decryption.
Stream Cipher Mode
A stream cipher. (a) Encryption. (b) Decryption.
Counter Mode
Encryption using counter mode.
Cryptanalysis
Some common symmetric-key cryptographic algorithms.
Public-Key Algorithms
• RSA
• Other Public-Key Algorithms
RSA
An example of the RSA algorithm.
Digital Signatures
• Symmetric-Key Signatures
• Public-Key Signatures
• Message Digests
• The Birthday Attack
Symmetric-Key Signatures
Digital signatures with Big Brother.
Public-Key Signatures
Digital signatures using public-key cryptography.
Message Digests
Digital signatures using message digests.
SHA-1
Use of SHA-1 and RSA for signing nonsecret messages.
SHA-1 (2)
(a) A message padded out to a multiple of 512 bits.
(b) The output variables. (c) The word array.
Management of Public Keys
• Certificates
• X.509
• Public Key Infrastructures
Problems with Public-Key Encryption
A way for Trudy to subvert public-key encryption.
Certificates
A possible certificate and its signed hash.
X.509
The basic fields of an X.509 certificate.
Public-Key Infrastructures
(a) A hierarchical PKI. (b) A chain of certificates.
Communication Security
• IPsec
• Firewalls
• Virtual Private Networks
• Wireless Security
IPsec
The IPsec authentication header in transport mode for IPv4.
IPsec (2)
(a) ESP in transport mode. (b) ESP in tunnel mode.
Firewalls
A firewall consisting of two packet filters and an application gateway.
Virtual Private Networks
(a) A leased-line private network. (b) A virtual private network.
802.11 Security
Packet encryption using WEP.
Authentication Protocols
• Authentication Based on a Shared Secret Key
• Establishing a Shared Key: Diffie-Hellman
• Authentication Using a Key Distribution Center
• Authentication Using Kerberos
• Authentication Using Public-Key Cryptography
Authentication Based on a Shared Secret Key
Two-way authentication using a challenge-response protocol.
Authentication Based on a Shared Secret Key (2)
A shortened two-way authentication protocol.
Authentication Based on a Shared Secret Key (3)
The reflection attack.
Authentication Based on a Shared Secret Key (4)
A reflection attack on the protocol of Fig. 8-32.
Authentication Based on a Shared Secret Key (5)
Authentication using HMACs.
Establishing a Shared Key:
The Diffie-Hellman Key Exchange
The Diffie-Hellman key exchange.
Establishing a Shared Key:
The Diffie-Hellman Key Exchange
The bucket brigade or man-in-the-middle attack.
Authentication Using a Key Distribution Center
A first attempt at an authentication protocol using a KDC.
Authentication Using a Key Distribution Center (2)
The Needham-Schroeder authentication protocol.
Authentication Using a Key Distribution Center (3)
The Otway-Rees authentication protocol (slightly simplified).
Authentication Using Kerberos
The operation of Kerberos V4.
Authentication Using Public-Key Cryptography
Mutual authentication using public-key cryptography.
E-Mail Security
• PGP – Pretty Good Privacy
• PEM – Privacy Enhanced Mail
• S/MIME
PGP – Pretty Good Privacy
PGP in operation for sending a message.
PGP – Pretty Good Privacy (2)
A PGP message.
Web Security
• Threats
• Secure Naming
• SSL – The Secure Sockets Layer
• Mobile Code Security
Secure Naming
(a) Normal situation. (b) An attack based on breaking
into DNS and modifying Bob's record.
Secure Naming (2)
How Trudy spoofs Alice's ISP.
Secure DNS
An example RRSet for bob.com. The KEY record is Bob's
public key. The SIG record is the top-level com server's
signed has of the A and KEY records to verify their
authenticity.
Self-Certifying Names
A self-certifying URL containing a hash of server's
name and public key.
SSL—The Secure Sockets Layer
Layers (and protocols) for a home user browsing with SSL.
SSL (2)
A simplified version of the SSL connection establishment subprotocol.
SSL (3)
Data transmission using SSL.
Java Applet Security
Applets inserted into a Java Virtual Machine
interpreter inside the browser.
Social Issues
• Privacy
• Freedom of Speech
• Copyright
Anonymous Remailers
Users who wish anonymity chain requests through
multiple anonymous remailers.
Freedom of Speech
Possibly banned material:
1. Material inappropriate for children or teenagers.
2. Hate aimed at various ethnic, religious, sexual, or other
groups.
3. Information about democracy and democratic values.
4. Accounts of historical events contradicting the
government's version.
5. Manuals for picking locks, building weapons, encrypting
messages, etc.
Steganography
(a) Three zebras and a tree. (b) Three zebras, a tree, and the
complete text of five plays by William Shakespeare.

More Related Content

PPTX
Part 5 : Sharing resources, security principles and protocols
PPT
5 sharing-app
PPT
Distributed System by Pratik Tambekar
PPT
Top schools in ghaziabad
PDF
Dns security
PPT
Top schools in delhi ncr
PDF
(130316) #fitalk bit torrent protocol
PPT
Distributed System by Pratik Tambekar
Part 5 : Sharing resources, security principles and protocols
5 sharing-app
Distributed System by Pratik Tambekar
Top schools in ghaziabad
Dns security
Top schools in delhi ncr
(130316) #fitalk bit torrent protocol
Distributed System by Pratik Tambekar

What's hot (20)

PPTX
6421 b Module-04
PDF
Lab 04
PDF
Computer network (4)
PPTX
06 coms 525 tcpip - dhcp and dns
PDF
Lets talk dns
PPTX
keti companion classifier
PPT
Lightweight Deposit using SWORD
PPT
Network (IP)
PPTX
The History of DNS
PPT
Distributed System by Pratik Tambekar
PPT
Network (FE)
PPSX
My Seminar on DNS
PDF
DNS/DNSSEC by Nurul Islam
PPT
Building a Linux IPv6 DNS Server Project review PPT v3.0 First review
PDF
Covert Timing Channels using HTTP Cache Headers
PDF
Covert Timing Channels using HTTP Cache Headers
PDF
IPv6 Addressing and Deployment Considerations
PPT
Security (FE)
6421 b Module-04
Lab 04
Computer network (4)
06 coms 525 tcpip - dhcp and dns
Lets talk dns
keti companion classifier
Lightweight Deposit using SWORD
Network (IP)
The History of DNS
Distributed System by Pratik Tambekar
Network (FE)
My Seminar on DNS
DNS/DNSSEC by Nurul Islam
Building a Linux IPv6 DNS Server Project review PPT v3.0 First review
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache Headers
IPv6 Addressing and Deployment Considerations
Security (FE)
Ad

Similar to Chapter 9 security (20)

PPT
Network security
PPT
security
PPT
Hardware Network Trojans for neural Networks
PPT
Cryptography and DNS-Computer network.ppt
PPT
Chapter 08
PDF
unit4_securitypractice(oncase study).ppt
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
PDF
Pki Training V1.5
PDF
Ericas-Security-Plus-Study-Guide
PPT
Chap8_Network Security.ppt
PPT
network security knowledge.ppt
PPT
Chp8.ppt
PPT
PPT
Chapter8 27 nov_2010
PPT
Network Security Presentation Stallings.
PPT
CS553 ST7 Ch21 Network Security chapter 21
PPT
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
PPT
PPT
1329 n 9460
Network security
security
Hardware Network Trojans for neural Networks
Cryptography and DNS-Computer network.ppt
Chapter 08
unit4_securitypractice(oncase study).ppt
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Pki Training V1.5
Ericas-Security-Plus-Study-Guide
Chap8_Network Security.ppt
network security knowledge.ppt
Chp8.ppt
Chapter8 27 nov_2010
Network Security Presentation Stallings.
CS553 ST7 Ch21 Network Security chapter 21
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
1329 n 9460
Ad

More from Naiyan Noor (20)

PDF
Society Ethics and Technology(HUM3115)-part2.pdf
PDF
Society Ethics and Technology(HUM3115)-part1.pdf
PDF
CAD101EN: Introduction to Web Development with HTML5, CSS3, and JavaScript
PDF
CS50x: CS50's Introduction to Computer Science.pdf
PDF
Diploma in Computer Science and ICT.pdf
PDF
Advanced Learning Algorithms.pdf
PDF
HTML and CSS in depth.pdf
PDF
Skills Development for Mobile Game and Application Project..Naiyan noor
PDF
English for Career Development Naiyan Noor.pdf
PDF
Data Visualization with Python.....Naiyan Noor.pdf
PDF
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
PDF
Data Science Methodology...Naiyan Noor.pdf
PDF
Tools for Data Science ...Naiyan Noor.pdf
PDF
What is Data Science? ... Naiyan Noor.pdf
PDF
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
PDF
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
PDF
Introduction to Data Science Naiyan Noor.pdf
PDF
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
PDF
Social Media Marketing powered by HP....Naiyan Noor.pdf
PDF
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf
Society Ethics and Technology(HUM3115)-part2.pdf
Society Ethics and Technology(HUM3115)-part1.pdf
CAD101EN: Introduction to Web Development with HTML5, CSS3, and JavaScript
CS50x: CS50's Introduction to Computer Science.pdf
Diploma in Computer Science and ICT.pdf
Advanced Learning Algorithms.pdf
HTML and CSS in depth.pdf
Skills Development for Mobile Game and Application Project..Naiyan noor
English for Career Development Naiyan Noor.pdf
Data Visualization with Python.....Naiyan Noor.pdf
Databases and SQL for Data Science with Python...Naiyan Noor.pdf
Data Science Methodology...Naiyan Noor.pdf
Tools for Data Science ...Naiyan Noor.pdf
What is Data Science? ... Naiyan Noor.pdf
Programming for Everybody (Getting Started with Python)...Naiyan Noor.pdf
HTML, CSS, and Javascript for Web Developers ...Naiyan Noor.pdf
Introduction to Data Science Naiyan Noor.pdf
Coursera Programming Foundations with JavaScript, HTML and CSS ....Naiyan Noo...
Social Media Marketing powered by HP....Naiyan Noor.pdf
Motor Driving Training with Basic Maintenance. SEIP ..Naiyan Noor.pdf

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Geodesy 1.pptx...............................................
PPT
Project quality management in manufacturing
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Well-logging-methods_new................
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
Geodesy 1.pptx...............................................
Project quality management in manufacturing
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Embodied AI: Ushering in the Next Era of Intelligent Systems
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Foundation to blockchain - A guide to Blockchain Tech
Structs to JSON How Go Powers REST APIs.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Well-logging-methods_new................
Lesson 3_Tessellation.pptx finite Mathematics
CYBER-CRIMES AND SECURITY A guide to understanding
CH1 Production IntroductoryConcepts.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Arduino robotics embedded978-1-4302-3184-4.pdf

Chapter 9 security