Professional Documents
Culture Documents
Lec01 Intro
Lec01 Intro
Lec01 Intro
Network Security
Theory and Practice
Thank You
wish you health & safety
01
Network Security
Theory and Practice
Network Security?
Theory and Practice
Network Security?
Theory and Practice
Network of computers
Theory and Practice
Network of computers
Theory and Practice
share resources
Network of computers
Theory and Practice
share resources via
communication
Network of computers
Theory and Practice
share resources via
communication
(data transmission)
Network of computers
Theory and Practice
share resources via
communication:
wired
wireless
what channel?
Network of computers
Theory and Practice
share resources via
communication:
single-hop
multi-hop
how far?
Network of computers
Theory and Practice
share resources via
communication:
single-path
multi-path
who to reach?
Network of computers
Theory and Practice
share resources via
communication:
data transmission
what data?
Network of computers
Theory and Practice
share resources via
communication:
services
what data?
Network of computers
Theory and Practice
share resources via
communication:
services
search
Network of computers
Theory and Practice
share resources via
communication:
services
streaming
Network of computers
Theory and Practice
share resources via
communication:
services
messaging
Network of computers
Theory and Practice
share resources via
communication:
services
email
Network of computers
Theory and Practice
share resources via
communication:
services
storage
Network of computers
Theory and Practice
share resources via
communication:
services
payment
Network of computers
Theory and Practice
share resources via
communication:
services
messaging
what if overheard?
Network of computers
Theory and Practice
share resources via
communication:
services
storage
what if leaked?
Network of computers
Theory and Practice
share resources via
communication:
services
payment
what if stolen?
Network Security
Theory and Practice
protect
communication
Network Security
Theory and Practice
protect
communication:
confidentiality
integrity
availability
• Book
Security Engineering, Ross Anderson
Agenda
• Cryptography
• Cryptanalysis
• Blockchain
• Secure Connection
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Agenda
• Cryptography security
• Cryptanalysis fundamental:
• Blockchain Is a protocol
secure?
• Secure Connection
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Agenda
• Cryptography
Is a security
• Cryptanalysis protocol secure
• Blockchain enough?
• Secure Connection
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Agenda
• Cryptography a super hot
• Cryptanalysis application of
• Blockchain network
security
• Secure Connection
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Agenda
• Cryptography upon which can
• Cryptanalysis a secure
• Blockchain application be
built
• Secure Connection
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Agenda
• Cryptography upon which can
• Cryptanalysis a private
• Blockchain application be
built
• Secure Connection
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Agenda
evolve from
• Cryptography
wired to
• Cryptanalysis wireless comm,
• Blockchain so does
• Secure Connection security
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Agenda
• Cryptography
trust security
• Cryptanalysis even when it is
• Blockchain trustless
• Secure Connection
• Secure Routing and Forwarding
• Anonymous Communication
• Wi-Fi Security
• Zero-Knowledge Proof
Cryptography
secure communication against adversaries
zzs
zjs txy
hello, txh
Cryptography
secure communication against adversaries
shared secret key
zzs
zjs txy
hello, txh
Cryptography
secure communication against adversaries
zzs ???
zjs txy
asdfghjkl
enc dec
Cryptography
secure communication against adversaries
=enc(plaintext, key) dec(ciphertext, key)=
=ciphertext plaintext=
zzs ???
zjs txy
plaintext plaintext
hello, txh hello, txh
asdfghjkl
enc ciphertext dec
Cryptography
secure communication against adversaries
=enc(plaintext, key) dec(ciphertext, key)=
=ciphertext plaintext=
zzs ???
zjs txy
plaintext plaintext
hello, txh hello, txh
asdfghjkl
enc ciphertext dec
Cryptography
secure communication against adversaries
symmetric cryptography
zzs ???
zjs txy
plaintext plaintext
hello, txh hello, txh
asdfghjkl
enc ciphertext dec
Cryptography
secure communication against adversaries
symmetric cryptography
txa
txx
zzs
zjs txb txy
txc
too many keys!
Cryptography
secure communication against adversaries
asymmetric cryptography
txa
txx
zzs
zjs txb txy
txc
public key + private key
Cryptography
secure communication against adversaries
asymmetric cryptography
encrypted-data analysis
on cloud
Cryptography
secure communication against adversaries
how secure?
Cryptanalysis
secure communication against adversaries
hack to secure
zzs ???
zjs txy
asdfghjkl
Cryptanalysis
secure communication against adversaries
hack to secure
asdfghjkl
Cryptanalysis
secure communication against adversaries
hack to secure
zzs:Replay Attack
as
zjs df txy
g hj
kl
meet at lab
Cryptanalysis
secure communication against adversaries
how to secure?
zzs:Replay Attack
as
zjs df txy
g hj
kl
meet at lab
Blockchain
centralized decentralized
trust: trust:
Authority Blockchain
Blockchain
1 BTC
1 BTC
decentralized
trust:
Blockchain
Secure Connection
How to establish a secure channel that
uses crypto to secure communication?
Secure Connection
How to establish a secure channel for
key exchange
secure communication
Secure Connection
How to establish a secure channel for
key exchange
secure communication
Secure Connection
How to establish a secure channel for
key exchange
SSL:
Secure Sockets Layer
Secure Connection
How to establish a secure channel for
key exchange
SSL:
Secure Sockets Layer
TLS:
Transport Layer Security
Secure Connection
How to establish a secure channel for
key exchange
SSL:
Secure Sockets Layer
TLS:
Transport Layer Security
Applications:
HTTPS, FTPS, SMTPS, etc.
Secure Connection
Secure Connection ?
Secure Connection
Routing
find a path/route for traffic
Forwarding
transit traffic along a certain path
Secure Connection
Attack Routing
BGP Hijacking
Secure Connection
Attack Routing
lead to unreasonable paths
Attack Forwarding
reroute traffic from specified paths
e.g., downgrade service quality for source
bypass security check for destination
Secure Routing & Forwarding
Secure Routing
find paths satisfying routing policy
A routing-advertisement authentication
Secure Forwarding
transit traffic via specified paths
packet-carried proofs
Routing
find paths satisfying routing policy
A routing-advertisement authentication
Forwarding
nested encryption
Wi-Fi Security
Wi-Fi Security
one more
Zero-Knowledge Proof
• Trivial
prove that one possesses knowledge
of certain information by simply
revealing it
• Challenging
prove information possession without
revealing the information itself and
any additional information
Zero-Knowledge Proof
Zero-Knowledge Proof
http://list.zju.edu.cn/kaibu
Teaching Components
• Lecture
• Group Project
• Assignment & Exam
Schedule
Week Dates Topics
Week 01 2020.02.24/2020.02.25 Lecture 01: Course Introduction
Lecture 02: Cryptography
Week 02 2020.03.02/2020.03.03 Lecture 03: Cryptanalysis
Week 03 2020.03.09/2020.03.10 Lecture 04: Blockchain
Week 04 2020.03.16/2020.03.17 Lecture 05: Secure Connection
Week 05 2020.03.23/2020.03.24 Lecture 06: Secure Routing & Forwarding
Week 06 2020.03.30/2020.03.31 Lecture 07: Anonymous Communication
Week 07 2020.04.06/2020.04.07 Lecture 08: Wi-Fi Security
Week 08 2020.04.13/2020.04.14 Lecture 09: Zero-Knowledge Proof
Lecture 10: Course Overview
Interest
Interest
Interaction
Interaction
Interaction
English
English
English
Study Group
Ding Talk QQ
network security, computer architecture
• Others: by appointment
?
Reading
• The Security Mindset by Bruce Schneier
[video] [text1] [text2]
• The Internet: Cybersecurity & Crime
by Parisa Tabriz and Jenny Martin
Who’s Who
Ready?
#The 3 Secrets of Highly Successful Graduates