DOC PREVIEW
SJSU CS 265 - PEER-TO-PEER SECURITY

This preview shows page 1-2-3 out of 10 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PEER-TO-PEER SECURITYSECURITY ISSUES IN P2PP2P SECURITY PROTOCOLP2P SECURITY PROTOCOL (contd.)Slide 6Slide 7Slide 8Slide 9QUESTIONS ?PEER-TO-PEER SECURITYPEER-TO-PEER SECURITYPRESENTEDPRESENTEDBYBYSHRUTI PARIHARSHRUTI PARIHARSTEGANOGRAPHYSTEGANOGRAPHYDENIAL OF SERVICE ATTACKDENIAL OF SERVICE ATTACKIMPERSONATIONIMPERSONATIONENCRYPTION CRACKINGENCRYPTION CRACKINGNON-ENCRYPTED IMNON-ENCRYPTED IMEAVESDROPPINGEAVESDROPPINGTROJANS, VIRUSES, BUGSTROJANS, VIRUSES, BUGSSECURITY ISSUES IN P2PSECURITY ISSUES IN P2PSECURITY ISSUES IN P2PP2P SECURITY PROTOCOLP2P SECURITY PROTOCOLCONCEPTSCONCEPTS PEER GROUPSPEER GROUPS GROUP AUTHORITYGROUP AUTHORITY ACL MANAGEMENTACL MANAGEMENT GROUP MEMBERSHIPGROUP MEMBERSHIP KK-1-1GAGA(G, EXP, g(G, EXP, gRaRa mod p) signed by GA mod p) signed by GAP2P SECURITY PROTOCOLP2P SECURITY PROTOCOL(contd.)(contd.)TWO-PHASESTWO-PHASES LOGIN PROTOCOLLOGIN PROTOCOL USER LOGINUSER LOGIN AUTHORITY LOGINAUTHORITY LOGIN MUTUAL AUTHENTICATIONMUTUAL AUTHENTICATION PROTOCOLPROTOCOLP2P SECURITY PROTOCOLP2P SECURITY PROTOCOL(contd.)(contd.)LOGIN PROTOCOL OVERVIEWLOGIN PROTOCOL OVERVIEW PASSWORD, PASSWORD-ID, ACL’s PASSWORD, PASSWORD-ID, ACL’s  DIFFIE-HELMAN KEY EXCHANGEDIFFIE-HELMAN KEY EXCHANGE ggRtuRtu mod p, g mod p, gRtaRta mod p, K = g mod p, K = gRtuRtaRtuRta mod p mod p CHALLENGE RESPONSE CHALLENGE RESPONSE  RSA ENCRYPTED CERTIFICATESRSA ENCRYPTED CERTIFICATESP2P SECURITY PROTOCOLP2P SECURITY PROTOCOL(contd.)(contd.)LOGIN PROTOCOLLOGIN PROTOCOLU->A: H, G, PID, P(gU->A: H, G, PID, P(gRtuRtu mod p), D mod p), DKKrand rand = g= gRtuRtaRtuRta mod p mod pA->U: H, P(gA->U: H, P(gRtaRta mod p), K mod p), Krandrand(C(CAA), D), DU->A: KU->A: Krandrand(H, REQUEST, C(H, REQUEST, CAA, C, CUU, D), D)A->U: KA->U: Krandrand(H, C(H, CUU, RESPONSE, D), RESPONSE, D)P2P SECURITY PROTOCOLP2P SECURITY PROTOCOL(contd.)(contd.)MUTUAL AUTHENTICATION MUTUAL AUTHENTICATION PROTOCOL OVERVIEWPROTOCOL OVERVIEW DIGITAL CERTIFICATES DIGITAL CERTIFICATES  DIFFIE-HELMAN KEY EXCHANGEDIFFIE-HELMAN KEY EXCHANGE ggRtuRtu mod p, g mod p, gRtaRta mod p, K = g mod p, K = gRtuRtaRtuRta mod p mod p CHALLENGE RESPONSE CHALLENGE RESPONSEP2P SECURITY PROTOCOLP2P SECURITY PROTOCOL(contd.)(contd.)MUTUAL AUTHENTICATIONMUTUAL AUTHENTICATIONU1->U2: H, G, GMU1->U2: H, G, GMU1U1, D, DK= gK= gRu1Ru2Ru1Ru2 mod p mod pU2->U1: H, GMU2->U1: H, GMU2U2, K(C, K(CU2U2), D), DU1->U2: K(H, CU1->U2: K(H, CU1U1, C, CU2U2, D), D)U2->U1: K(H, CU2->U1: K(H, CU1U1, D), D)KKrandrand = g = gRu1Ru2Cu1Cu2Ru1Ru2Cu1Cu2 mod p mod pQUESTIONS ?QUESTIONS


View Full Document

SJSU CS 265 - PEER-TO-PEER SECURITY

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download PEER-TO-PEER SECURITY
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view PEER-TO-PEER SECURITY and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view PEER-TO-PEER SECURITY 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?