hannam university http://netwk.hannam.ac.kr 1 chapter 29 internet security

45
1 HANNAM UNIVERSITY Http://netwk.hannam.ac.kr Chapter 29 Internet Security

Upload: doreen-warner

Post on 13-Dec-2015

228 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

1HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

Chapter 29

InternetSecurity

Page 2: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

2HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

CONTENTSCONTENTS• INTRODUCTION• PRIVACY• DIGITAL SIGNATURE• SECURITY IN THE INTERNET• APPLICATION LAYER SECURITY• TRANSPORT LAYER SECURITY: TLS• SECURITY AT THE IP LAYER: IPSEC• FIREWALLS

Page 3: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

3HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

INTRODUCTIONINTRODUCTION

29.129.1

Page 4: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

4HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.1 29.1 개요개요

보안에서 필요한 기능

Page 5: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

5HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

PRIVACYPRIVACY

29.229.2

Page 6: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

6HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

비밀키 암호화

Page 7: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

7HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

In secret-key encryption, In secret-key encryption, the same key is used by the sender the same key is used by the sender

(for encryption)(for encryption) and the receiver and the receiver (for decryption).(for decryption). The key is shared.The key is shared.

Page 8: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

8HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

Secret-key encryption is often called Secret-key encryption is often called symmetric encryption because symmetric encryption because

the same key can the same key can be used in both directions.be used in both directions.

Page 9: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

9HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

Secret-key encryption is Secret-key encryption is often used for long messages.often used for long messages.

Page 10: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

10HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

We discuss one secret-key We discuss one secret-key algorithm in Appendix E.algorithm in Appendix E.

Page 11: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

11HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

KDCKDC can solve the problem can solve the problem

of secret-key distribution.of secret-key distribution.

Page 12: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

12HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

공개키 암호화

Page 13: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

13HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

Public-key algorithms are more Public-key algorithms are more efficient for short messages.efficient for short messages.

Page 14: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

14HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

A A CACA

can certify the binding between can certify the binding between a public key and the owner.a public key and the owner.

Page 15: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

15HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

비밀키와 공개키의 결합

Page 16: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

16HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

To have the advantages of both To have the advantages of both secret-key and public-key secret-key and public-key

encryption, we can encrypt the secret key encryption, we can encrypt the secret key using the public key and encrypt using the public key and encrypt the message using the secret key.the message using the secret key.

Page 17: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

17HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

DIGITAL SIGNATUREDIGITAL SIGNATURE

29.329.3

Page 18: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

18HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

전체 문서에 서명

Page 19: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

19HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

Digital signature cannot be Digital signature cannot be achieved using only secret keys. achieved using only secret keys.

Page 20: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

20HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

Digital signature does not Digital signature does not provide privacy. provide privacy.

If there is a need for privacy, If there is a need for privacy, another layer of another layer of

encryption/decryption encryption/decryption must be applied.must be applied.

Page 21: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

21HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

다이제스트에 서명

Page 22: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

22HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

송신자 측

Page 23: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

23HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

수신자 측

Page 24: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

24HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

SECURITY IN THESECURITY IN THEINTERNETINTERNET

29.429.4

Page 25: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

25HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.4 29.4 인터넷 보안인터넷 보안

인터넷 보안 기능 제공응용 계층

Client 와 server 고려전송 계층

새로운 계층 추가IP 계층

OSPF, ICMP, IGMP 층과 같은 프로토콜을 위한 서비스

Page 26: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

26HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

APPLICTION LAYERAPPLICTION LAYERSECURITYSECURITY

29.529.5

Page 27: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

27HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

PGP(Pretty Good Privacy)Phill Zimmermann 에 의해 개발기밀성 , 무결성 , 인증 , 부인방지 서비스 제공무결성 , 인증 , 부인 방지를 위해 디지털 서명 사용기밀성을 위해 비밀키와 공개키 암호화 조합 이용

Page 28: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

28HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

송신측의 PGP

Page 29: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

29HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

수신측의 PGP

Page 30: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

30HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

SSH(Secure Shell)보안을 제공하는 클라이언트 - 서버 프로그램인증 , 권한부여 , 기밀성 , 무결성 , 터널링 기능

제공

Page 31: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

31HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

TRANSPORT LAYERTRANSPORT LAYERSECURITYSECURITY

(TLS)(TLS)

29.629.6

Page 32: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

32HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.6 29.6 전송계층 보안전송계층 보안

TLS 의 위치

Page 33: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

33HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.6 29.6 전송계층 보안전송계층 보안

TLS(Transport Layer Security)전송계층 보안 제공넷스케이프사 개발 SSL(Secure Socket Layer)IETF 에 의해 설계된 SSL 의 공개 버전Handshake Protocol : 보안 협상 , 브라우저 / 서버간

인증Data Exchange Protocol : 무결성 , 기밀성 제공

Page 34: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

34HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.6 29.6 전송계층 보안전송계층 보안

핸드쉐이크 프로토콜

Page 35: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

35HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

SECURITY AT THESECURITY AT THEIP LAYERIP LAYER

(IPSec)(IPSec)

29.729.7

Page 36: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

36HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

인증

Page 37: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

37HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

헤더 형식

Page 38: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

38HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

ESP

Page 39: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

39HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

ESP 형식

Page 40: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

40HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

FIREWALLSFIREWALLS

29.829.8

Page 41: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

41HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

Page 42: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

42HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

패킷 - 필터 방화벽

Page 43: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

43HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

A packet-filter firewall filters A packet-filter firewall filters at the network or transport layer.at the network or transport layer.

Page 44: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

44HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

프록시 방화벽

Page 45: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security

45HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

A proxy firewall A proxy firewall filters at the application layer.filters at the application layer.