haidong xue. part one: review of the knowledge in textbook goals, issues, solutions part two:...
TRANSCRIPT
![Page 1: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/1.jpg)
8.7 Summary of Distributed Computer
SecurityHaidong Xue
![Page 2: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/2.jpg)
Part One: Review of the Knowledge in Textbook goals, issues, solutions
Part Two: Current Application X509.V3
Part Three: Future Work
Content
![Page 3: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/3.jpg)
Part One: Review of the Knowledge in
TextbookgoalsIssuessolutions
![Page 4: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/4.jpg)
Goals: Secrecy Integrity Availability Reliability Safety
Review of the Knowledge in Textbook
![Page 5: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/5.jpg)
Issues: Access authorization discretionary access control mandatory access control Message Security cryptography Mutual Authentication cryptography
Review of the Knowledge in Textbook
![Page 6: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/6.jpg)
Cryptography: private key system public key system protocol: Kerberos, X.509
Review of the Knowledge in Textbook
![Page 7: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/7.jpg)
DESRSAMD5
Review of the Knowledge in Textbook
![Page 8: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/8.jpg)
Part Two: Current Application
X.509 V3
![Page 9: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/9.jpg)
Certificate ◦ Version ◦ Serial Number ◦ Signature Algorithm◦ Issuer ◦ Validity Subject ◦ Subject Public Key Info
Public Key Algorithm Subject Public Key
◦ Issuer Unique Identifier (Optional) ◦ Subject Unique Identifier (Optional) ◦ Extensions (Optional)
Certificate Signature Algorithm Certificate Signature
(http://en.wikipedia.org/wiki/X.509)
Part Two: Current Application
![Page 10: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/10.jpg)
Part Two: Current Application
CustomerKc-privateKb-public
BankKb-privateKc-public
1. A = RSA(Information, Kb-public)2. B = RSA(A, Kc-private)3. Send A,B
![Page 11: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/11.jpg)
Part Two: Current Application
CustomerKc-privateKb-public
BankKb-privateKc-public
1.Signature:(1). A = MD5(information)(2). B = RSA(A, Kc-private)
2. Encrypt:(1). Generate 128bits DES Key(2). C = DES(information, K-des)(3). D = RSA(K-des, Kb-public)
3. Send B, C, D
![Page 12: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/12.jpg)
Part Two: Current Application
CustomerKc-privateKb-publicKca-public
BankKb-privateKc-public
Certificate Authority:Kca-private
Kb-publicRSA( MD5(Kb-public), Kca-private)
![Page 13: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/13.jpg)
Part Three: Future Work
A new kind of private key
![Page 14: Haidong Xue. Part One: Review of the Knowledge in Textbook goals, issues, solutions Part Two: Current Application X509.V3 Part Three: Future Work](https://reader035.vdocuments.us/reader035/viewer/2022072005/56649cc95503460f949913ee/html5/thumbnails/14.jpg)
Randy Chow, Theodore Johnson. Distributed Operating Systems& Algorithms. Addison Wesley, 1997
X.509. http://en.wikipedia.org/wiki/X.509 Public key certificate. http://
en.wikipedia.org/wiki/Digital_Certificate Introduction to the digital certificates. http://
hi.baidu.com/chenxu321/blog/item/783d100834aa50d862d986ca.html
Principles of digital certificates. http://blog.csdn.net/liukeforever/archive/2009/07/31/4396521.aspx
Reference