Analysis of Security Protocols (I).ppt
《Analysis of Security Protocols (I).ppt》由会员分享,可在线阅读,更多相关《Analysis of Security Protocols (I).ppt(23页珍藏版)》请在麦多课文档分享上搜索。
1、Analysis of Security Protocols (I),John C. Mitchell Stanford University,My Second Marktoberdorf School,Fun playing volleyball, swimming, hiking Review German vocabulary Alt, Pils, Dunkel, Weizen, Dunkel Weizen wegabschneider (trail-off-cutter) Seen some 96 students at conferences What else should I
2、remember?,Computer Security,Protect information Store user passwords in a form that prevents anyone from reading them Transmit information like credit card numbers in a way that prevents others from intercepting them Protect system integrity Keep others from deleting your files Keep downloaded code
3、(such as Java applets) from modifying important data Reject mail messages that contain viruses Maintain privacy,Correctness vs Security,Program or System Correctness Program satisfies specification For reasonable input, get reasonable output Program or System Security Program resists attack For unre
4、asonable input, output not completely disastrous Secure system might not be correct Main technical differences Active interference from environment Refinement techniques may fail,Outline of these lectures,Introduction to security protocols Issues in security, protocol examples and flaws Overview of
5、cryptography Formal presentation of protocols and intruder Automated finite-state analysis A probabilistic, poly-time framework,Tractable program analysis,Goal: tools and techniques to solve useful problems Caveat: need to be realistic,program complexity,complexity of property to verify,May be possi
6、ble,Intractable,Security Protocols,Transmit information across network Keep important information secret Communicate with those you know and trustTypical handshake protocols 3-7 steps 2-5 parties client, server, key distribution service, lead to shared secret key for data transfer,Example: Secure So
7、ckets Layer,Establishing Secure Communication,Parties use SSL protocol to Choose encryption scheme, e.g. 40-bit international encryption with 2 keys 120-bit domestic encryption with 2 keys choose among versions of specific scheme Agree on shared secret key Secret key more efficient than public key A
8、void known-plaintext attack Minimize reuse of hard-to-establish public key,40,120,Some security objectives,Secrecy Info not revealed Authentication Know identity of individual or site Data integrity Msg not altered Message Authentication Know source of msg,Receipt Know msg received Access control Re
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANALYSISOFSECURITYPROTOCOLSIPPT
