صفحه 1:
4 اذالاصدالاان
منيت وب
مبتنى بر فصل ۱۴ از کتاب
Network Security, Principles and
-Practice,2nd Ed
ویرایش شده توسط: حمید رضا شهرباری
http://www. fata.ir
http://mehrsharif edu/~shahriari 1
صفحه 2:
صفحه 3:
صفحه 4:
Countermeasures
Cryptographic checksums
Encryption, web proxies
Difficult to prevent
Cryptographic techniques
Consequences
+Loss of information
Compromise of machine
Vulnerabilty to all other
threats
Loss of information
ان ماه privacy
Disruptive
ترس
|
‘work done
/*Misrepresentation of user
/*Belief that false information is
valid
"Modification of user dat
Trojan horse browser
mm of message
Eavesdropping on the Net
“Theft of info from server
Theft of data from client
Info about network
configuration.
Killing of user threads
*Floodinng machine with bogus
requests
Filing up disk or memory
Isolating machine by DNS
attacks
Impersonation of legitimate
users
Data forgery
Confidentiality
Authentication
صفحه 5:
صفحه 6:
(a) Network Level (b) Transport Level (©) Application Level
5 050000000002
صفحه 7:
881 Prolacol Versions
) Enable Sat version 2 Tai Caer
©) Enable Sat version a
مسق
SSL Wamngs
Netscape can alet you ta the securty slats ofthe seb page you are
viewing Set Netscape fo shaw a warring and ask petissian hese
© Looting 3 paze thst supports eneryion
Losaing @ page mt uses low prane encnyston
Leaving page het augpent enerygon
G Senaing tom date nom a7 unenerypteo paye to an unencrypted page
‘viewing @ page wt an enexypressunencrypted mb
haf Detuork Genwty Cooter
۳
Languages
Helper Applica,
Snat Browsing
nica Search
Tabbed Browsing
Downloads
> Composer
a & Newgroupe
> inctant Messenger
pica
lePiwacy & Secuity
دی
Images
Popup Window
Farms
Passwords
Master Passwords
و
ماود
Aavancoa
mine & Dick Space
صفحه 8:
صفحه 9:
صفحه 10:
صفحه 11:
صفحه 12:
صفحه 13:
صفحه 14:
= SSL? Ciphareutes|
را هارمه معا و
ره موه نع و
9 ۲۳۵۵ 055 اوه موه key
DES encryption vt a Seta Hoy
ACA enerypscn yh 940-0n key
ACE enerypicn yh 940-tn key
S5SL3/1.5 ciphersutes
اه راومه سر و MAD MAC
ans SHAT Mac: ره هه ما ای ۳50۱ و
عقا او ها رو اوه مرا اوه 25 ۲۳۳0 و
enowypion ۵0 20۱ MAC 25 تسس 14۵۱ و۳
(OES snctypon وید رماع ۵ فاد a SHAT MAC
anda HAA MAAC برا القع و اب وی ات
DES anciypion ۱ 636 و اج موه and 2 SHA-1 MAC
{C4 enerypion wih برعا الضف د end an MS MAC
{C2 encryption wih 240i hey and an MDS MAC
Do encryption with an M05 MAC
صفحه 15:
Revord Prowovl Operciiva
Application Data
Fragment
Compress
Add MAC
Enerypt
Append SSL.
Record Header
© ©
صفحه 16:
صفحه 17:
GGL Revord Porcat
a
صفحه 18:
صفحه 19:
I byte 1 byte
صفحه 20:
صفحه 21:
صفحه 22:
Phase |
Establish security capabilities, ineluding
protovol version, session ID, cipher suite
compression method, and initial random
numbers.
Phase 2
Server may send cettificate, key exchange
and request certificate, Server
of bello message phase
gnals end
صفحه 23:
Phase 3
Client sends certificate if requested. Client
sends key exchange. Client may send
centificate verifies
Time
Phase 4
Change cipher suite and finish
handshake protocol
Note: Shaded transfers are
on-dlependent
optional or situal
messages thit are not always sent
صفحه 24:
صفحه 25:
صفحه 26:
صفحه 27:
ee Wrndshoke Puptood on Pppes
I byte 3 bytes O bytes
‘Type Length Content
ameters ری
Tiello_request null
client_hello version, random, session id, cipher suite, compression method
server_hello version, random, session id, cipher suite, compression method
certificate chain of X.509v3 certificates
server_key_exchang parameters, signature
certificate_request ype. authorities
null
server_don
certificate_verify
client_key_exchange
finished
صفحه 28:
صفحه 29:
صفحه 30:
4 ا الامن والالان
SET: Secure Electronic
Transactions
30 مرکز امنبت شبکه شریف
صفحه 31:
صفحه 32:
صفحه 33:
صفحه 34:
| GET Cowpoueus
© Merchant
=i. Internet
Cattifieate
Authority
Cardholder
Issuer
Payment =
Network
صفحه 35:
صفحه 36:
صفحه 37:
صفحه 38:
صفحه 39:
صفحه 40:
صفحه 41:
Corcstructiva oP Dut م6
۹ POMD
I} ۸ 7ب
6
PIMD = Pl message digest
OIMD = OF message digest
1) POMD = Payment Order me
E = Enciyption (RSA)
KR, = Customer's private signature key
digest
haf Detuork Genwty Coster eq
PIMD
«1۱ ۳-022
0
| 2۵
c= } 4H
5-
PL = Payment information
1 = Order Information
H_ = Hash function (SHA.
صفحه 42:
صفحه 43:
صفحه 44:
صفحه 45:
(Purckhuse Request — Oustower
Payment Information
Order Information
PI message dizest
Ol message digest
Encryption (RSA for asymmetric
DES for symmetric)
Temporary symmetric key
Bank's public key-exchange key
66
PI
0
اجام
OID.
Request Message
kof Dework Growty Cro
PL
Dita
۳
رح
صفحه 46:
(Purckhuse Request — Merchant
Order Information
Ol message diz
Payment Order message digest
Decryption (RSA)
Hash funetion (SIA-1)
Customer's public signature key
POMD
Com
POMD
on
amp
D
0
KUe
Request Message:
Ba vetope| سواه
+
rp
م را iia
۳
Lf |
2
و« ی ا“
la
KU,
eo
kof Dework Growty Cro
صفحه 47:
صفحه 48:
صفحه 49:
صفحه 50:
صفحه 51:
4 اذالاصدالاان
51 مرکز امنبت شبکه شریف
