HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

45
1 HANNAM UNIVERSITY Http://netwk.hannam.ac.kr Chapter 29 Internet Security

Transcript of HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

Page 1: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

1HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

Chapter 29

InternetSecurity

Page 2: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

2HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

CONTENTSCONTENTS• INTRODUCTION• PRIVACY• DIGITAL SIGNATURE• SECURITY IN THE INTERNET• APPLICATION LAYER SECURITY• TRANSPORT LAYER SECURITY: TLS• SECURITY AT THE IP LAYER: IPSEC• FIREWALLS

Page 3: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

3HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

INTRODUCTIONINTRODUCTION

29.129.1

Page 4: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

4HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.1 29.1 개요개요

보안에서 필요한 기능

Page 5: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

5HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

PRIVACYPRIVACY

29.229.2

Page 6: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

6HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

비밀키 암호화

Page 7: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

7HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

In secret-key encryption, In secret-key encryption, the same key is used by the sender the same key is used by the sender

(for encryption)(for encryption) and the receiver and the receiver (for decryption).(for decryption). The key is shared.The key is shared.

Page 8: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

8HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

Secret-key encryption is often called Secret-key encryption is often called symmetric encryption because symmetric encryption because

the same key can the same key can be used in both directions.be used in both directions.

Page 9: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

9HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

Secret-key encryption is Secret-key encryption is often used for long messages.often used for long messages.

Page 10: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

10HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

We discuss one secret-key We discuss one secret-key algorithm in Appendix E.algorithm in Appendix E.

Page 11: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

11HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

KDCKDC can solve the problem can solve the problem

of secret-key distribution.of secret-key distribution.

Page 12: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

12HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

공개키 암호화

Page 13: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

13HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

Public-key algorithms are more Public-key algorithms are more efficient for short messages.efficient for short messages.

Page 14: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

14HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

A A CACA

can certify the binding between can certify the binding between a public key and the owner.a public key and the owner.

Page 15: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

15HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

비밀키와 공개키의 결합

Page 16: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

16HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.2 29.2 기밀성기밀성

To have the advantages of both To have the advantages of both secret-key and public-key secret-key and public-key

encryption, we can encrypt the secret key encryption, we can encrypt the secret key using the public key and encrypt using the public key and encrypt the message using the secret key.the message using the secret key.

Page 17: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

17HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

DIGITAL SIGNATUREDIGITAL SIGNATURE

29.329.3

Page 18: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

18HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

전체 문서에 서명

Page 19: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

19HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

Digital signature cannot be Digital signature cannot be achieved using only secret keys. achieved using only secret keys.

Page 20: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

20HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

Digital signature does not Digital signature does not provide privacy. provide privacy.

If there is a need for privacy, If there is a need for privacy, another layer of another layer of

encryption/decryption encryption/decryption must be applied.must be applied.

Page 21: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

21HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

다이제스트에 서명

Page 22: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

22HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

송신자 측

Page 23: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

23HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.3 29.3 디지털 서명디지털 서명

수신자 측

Page 24: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

24HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

SECURITY IN THESECURITY IN THEINTERNETINTERNET

29.429.4

Page 25: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

25HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.4 29.4 인터넷 보안인터넷 보안

인터넷 보안 기능 제공응용 계층

Client 와 server 고려전송 계층

새로운 계층 추가IP 계층

OSPF, ICMP, IGMP 층과 같은 프로토콜을 위한 서비스

Page 26: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

26HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

APPLICTION LAYERAPPLICTION LAYERSECURITYSECURITY

29.529.5

Page 27: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

27HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

PGP(Pretty Good Privacy)Phill Zimmermann 에 의해 개발기밀성 , 무결성 , 인증 , 부인방지 서비스 제공무결성 , 인증 , 부인 방지를 위해 디지털 서명 사용기밀성을 위해 비밀키와 공개키 암호화 조합 이용

Page 28: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

28HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

송신측의 PGP

Page 29: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

29HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

수신측의 PGP

Page 30: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

30HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.5 29.5 응용계층 보안응용계층 보안

SSH(Secure Shell)보안을 제공하는 클라이언트 - 서버 프로그램인증 , 권한부여 , 기밀성 , 무결성 , 터널링 기능

제공

Page 31: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

31HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

TRANSPORT LAYERTRANSPORT LAYERSECURITYSECURITY

(TLS)(TLS)

29.629.6

Page 32: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

32HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.6 29.6 전송계층 보안전송계층 보안

TLS 의 위치

Page 33: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

33HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.6 29.6 전송계층 보안전송계층 보안

TLS(Transport Layer Security)전송계층 보안 제공넷스케이프사 개발 SSL(Secure Socket Layer)IETF 에 의해 설계된 SSL 의 공개 버전Handshake Protocol : 보안 협상 , 브라우저 / 서버간

인증Data Exchange Protocol : 무결성 , 기밀성 제공

Page 34: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

34HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.6 29.6 전송계층 보안전송계층 보안

핸드쉐이크 프로토콜

Page 35: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

35HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

SECURITY AT THESECURITY AT THEIP LAYERIP LAYER

(IPSec)(IPSec)

29.729.7

Page 36: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

36HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

인증

Page 37: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

37HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

헤더 형식

Page 38: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

38HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

ESP

Page 39: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

39HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.7 IP 29.7 IP 계층 보안 계층 보안 : IPSEC: IPSEC

ESP 형식

Page 40: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

40HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

FIREWALLSFIREWALLS

29.829.8

Page 41: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

41HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

Page 42: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

42HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

패킷 - 필터 방화벽

Page 43: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

43HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

A packet-filter firewall filters A packet-filter firewall filters at the network or transport layer.at the network or transport layer.

Page 44: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

44HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

프록시 방화벽

Page 45: HANNAM UNIVERSITY Http://netwk.hannam.ac.kr 1 Chapter 29 Internet Security.

45HANNAM UNIVERSITYHttp://netwk.hannam.ac.kr

29.8 29.8 방화벽방화벽

A proxy firewall A proxy firewall filters at the application layer.filters at the application layer.