1 / 14

8.7 Summary of Distributed Computer Security

8.7 Summary of Distributed Computer Security. Haidong Xue. Content. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work. Part One: Review of the Knowledge in Textbook. g oals Issues solutions.

clare
Télécharger la présentation

8.7 Summary of Distributed Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 8.7 Summary of Distributed Computer Security HaidongXue

  2. Content • Part One: Review of the Knowledge in Textbook goals, issues, solutions • Part Two: Current Application X509.V3 • Part Three: Future Work

  3. Part One: Review of the Knowledge in Textbook goals Issues solutions

  4. Review of the Knowledge in Textbook Goals: • Secrecy • Integrity • Availability • Reliability • Safety

  5. Review of the Knowledge in Textbook Issues: • Access authorization discretionary access control mandatory access control • Message Security cryptography • Mutual Authentication cryptography

  6. Review of the Knowledge in Textbook Cryptography: private key system public key system protocol: Kerberos, X.509

  7. Review of the Knowledge in Textbook DES RSA MD5

  8. Part Two: Current Application X.509 V3

  9. Part Two: Current Application • Certificate • Version • Serial Number • Signature Algorithm • Issuer • Validity Subject • Subject Public Key Info • Public Key Algorithm • Subject Public Key • Issuer Unique Identifier (Optional) • Subject Unique Identifier (Optional) • Extensions (Optional) • Certificate Signature Algorithm • Certificate Signature (http://en.wikipedia.org/wiki/X.509)

  10. Part Two: Current Application 1. A = RSA(Information, Kb-public) 2. B = RSA(A, Kc-private) 3. Send A,B Bank Kb-private Kc-public Customer Kc-private Kb-public

  11. Part Two: Current Application 1.Signature: (1). A = MD5(information) (2). B = RSA(A, Kc-private) 2. Encrypt: (1). Generate 128bits DES Key (2). C = DES(information, K-des) (3). D = RSA(K-des, Kb-public) 3. Send B, C, D Bank Kb-private Kc-public Customer Kc-private Kb-public

  12. Part Two: Current Application Certificate Authority: Kca-private Kb-public RSA( MD5(Kb-public), Kca-private) Bank Kb-private Kc-public Customer Kc-private Kb-public Kca-public

  13. Part Three: Future Work A new kind of private key

  14. Reference • Randy Chow, Theodore Johnson. Distributed Operating Systems& Algorithms. Addison Wesley, 1997 • X.509. http://en.wikipedia.org/wiki/X.509 • Public key certificate. http://en.wikipedia.org/wiki/Digital_Certificate • Introduction to the digital certificates. http://hi.baidu.com/chenxu321/blog/item/783d100834aa50d862d986ca.html • Principles of digital certificates. http://blog.csdn.net/liukeforever/archive/2009/07/31/4396521.aspx

More Related