Network Security and TLS - Course Notes
Network Security#
- confidentiality: unable to read (encrytion)
- integrity: no injection
- availability: shouldn't prevent communication access (DoS/DDoS)
network security exists at top layers mostly(because imagine lower layer like wire, should be hard to be attacked. and communication security should be crucial for wireless medium, I assumed)
Access control:
- something you have like DUO app
- something you know like password
- something you are like fingerprints
trends: multi-factor authentication
Encryption Basics:
- symmetric: same key for encoding and decoding(AES)
- asymmetric: different key for encoding and decoding(RSA) Integrity: Hash function -> secure hash algorithm(SHA)
Attacks:
- eavesdropping: intercept messages
- insertion
- hijacking
Public key Cryptography: public key, private key
TLS: widely deployed on the web(actually a application layer protocol)
- Alice send message to Bob
- Bob use private key to generate message(digital signature)
- Alice received and use public key(certificate authorities) to verify it is Bob's signature
- Bob and Alice exchange a symmetric session key Ks, Alice use public key to encrypt and only Bob have the private key to decrypt the key
- then use symmetric key crpytography(AES) to encrypt messages RSA is much slower than AES, the computational expense.