CSC 774 -- Network Security - Dr. Peng Ning
CSC 774 -- Network Security - Dr. Peng Ning
CSC 774 -- Network Security - Dr. Peng Ning
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Key Management<br />
• Why do we need Internet key management<br />
– AH and ESP require encryption and authentication<br />
keys<br />
• Process to negotiate and establish IPsec SAs<br />
between two entities<br />
Computer Science<br />
<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 3<br />
<strong>Security</strong> Principles<br />
• Basic security principle for session keys<br />
– Compromise of a session key<br />
• Doesn’t permit reuse of the compromised session key.<br />
• Doesn’t compromise future session keys and long-term<br />
keys.<br />
Computer Science<br />
<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 4