Chapter 31
Network Security
31.1
, 31-1 SECURITY SERVICES
Network security can provide five services. Four of these
services are related to the message exchanged using the
network. The fifth service provides entity authentication
or identification.
Topics discussed in this section:
Message Confidentiality
Message Integrity
Message Authentication
Message Nonrepudiation
Entity Authentication
31.2
, Figure 31.1 Security services related to the message or entity
31.3
, 31-2 MESSAGE CONFIDENTIALITY
The concept of how to achieve message confidentiality
or privacy has not changed for thousands of years.
The message must be encrypted at the sender site and
decrypted at the receiver site. This can be done using
either symmetric-key cryptography or asymmetric-key
cryptography.
Topics discussed in this section:
Confidentiality with Symmetric-Key Cryptography
Confidentiality with Asymmetric-Key Cryptography
31.4
Network Security
31.1
, 31-1 SECURITY SERVICES
Network security can provide five services. Four of these
services are related to the message exchanged using the
network. The fifth service provides entity authentication
or identification.
Topics discussed in this section:
Message Confidentiality
Message Integrity
Message Authentication
Message Nonrepudiation
Entity Authentication
31.2
, Figure 31.1 Security services related to the message or entity
31.3
, 31-2 MESSAGE CONFIDENTIALITY
The concept of how to achieve message confidentiality
or privacy has not changed for thousands of years.
The message must be encrypted at the sender site and
decrypted at the receiver site. This can be done using
either symmetric-key cryptography or asymmetric-key
cryptography.
Topics discussed in this section:
Confidentiality with Symmetric-Key Cryptography
Confidentiality with Asymmetric-Key Cryptography
31.4