Академический Документы
Профессиональный Документы
Культура Документы
Balaji Shanmugam
2
Balaji.S
Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service provides entity authentication or identification.
MESSAGE CONFIDENTIALITY
The concept of how to achieve message confidentiality or privacy has not changed for thousands of years. The message must be encrypted at the sender site and decrypted at the receiver site. This can be done using either symmetric-key cryptography or asymmetric-key cryptography.
MESSAGE INTEGRITY
Encryption and decryption provide secrecy, or confidentiality, but not integrity. However, on occasion we may not even need secrecy, but instead must have integrity.
Document and Fingerprint Message and Message Digest Creating and Checking the Digest Hash Function Criteria
31.6
Checking integrity
PGP
PGP
One of the protocols to provide security at the application layer is Pretty Good Privacy (PGP). PGP is designed to create authenticated and confidential e-mails.
Note In PGP, the sender of the message needs to include the identifiers of the algorithms used in the message as well as the values of the keys.
32.12
SSH Operation
(Secure Shell )
The Swiss Army Knife of encryption tools
SSH Features
Command line terminal connection tool Replacement for rsh, rcp, telnet, and others All traffic encrypted Both ends authenticate themselves to the other end Ability to carry and encrypt non-terminal traffic
SSH Features
Command line terminal connection tool Replacement for rsh, rcp, telnet, and others All traffic encrypted Both ends authenticate themselves to the other end Ability to carry and encrypt non-terminal traffic
All web traffic to my firewall should be redirected to the web server running on port 8000 on my machine instead:
ssh R 80:MyMachine:8000 firewall
END