30.01.2015 Views

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Key Management<br />

• Why do we need Internet key management<br />

– AH and ESP require encryption and authentication<br />

keys<br />

• Process to negotiate and establish IPsec SAs<br />

between two entities<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 3<br />

<strong>Security</strong> Principles<br />

• Basic security principle for session keys<br />

– Compromise of a session key<br />

• Doesn’t permit reuse of the compromised session key.<br />

• Doesn’t compromise future session keys and long-term<br />

keys.<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!