Tài liệu miễn phí An ninh - Bảo mật

Download Tài liệu học tập miễn phí An ninh - Bảo mật

Hàm băm mật mã

Với mong muốn làm chủ mã nguồn, làm chủ chương trình, các tác giả đã cố gắng tìm hiểu và cài đặt hàm băm SHA-256 phục vụ cho đề tài Xây dựng hệ thống chữ ký số cho trường Đại học Thăng Long. Trong bài báo sẽ mô tả chi tiết về hàm băm này.

8/30/2018 5:28:00 AM +00:00

Hạ tầng cơ sở khóa công khai

Trong giải pháp chữ ký số, hạ tầng cơ sở khóa công khai (Public Key Infrastructure – PKI) là hệ thống vừa mang tính tiêu chuẩn, vừa mang tính công nghệ cho phép người dùng trong một mạng công cộng không bảo mật (như Internet), có thể trao đổi thông tin một cách an toàn thông qua việc sử dụng một cặp khóa bí mật và công khai được chứng nhận bởi một nhà cung cấp chứng nhận số CA được tín nhiệm. Mời các bạn tham khảo nội dung chi tiết.

8/30/2018 5:28:00 AM +00:00

Giới thiệu chung về bảo mật thông tin

Bài viết Giới thiệu chung về bảo mật thông tin mở đầu về bảo mật thông tin, nhu cầu an toàn thông tin, nguy cơ và hiểm họa đối với hệ thống thông tin, phân loại tấn công phá hoại an toàn, thân loại tấn công phá hoại an toàn và một số nội dung khác.

8/30/2018 5:26:06 AM +00:00

Bài giảng Mạng và an ninh thông tin lĩnh vực: Công nghệ thông tin

Bài giảng Mạng và an ninh thông tin lĩnh vực: Công nghệ thông tin nêu lên Quyết định 35/2010/QĐ-UBND ngày 05/10/2010 của UBND tỉnh Ban hành Quy chế quản lý, vận hành, khai thác và sử dụng mạng thông tin tỉnh Lào Cai.

8/30/2018 5:26:03 AM +00:00

Lecture notes on Computer and network security: Lecture 2 - Avinash Kak

Lecture 2: Classical encryption techniques. This chapter includes contents: Basic vocabulary of encryption and decryption, building blocks of classical encryption techniques, caesar cipher, the swahili angle, monoalphabetic ciphers, the all-fearsome statistical attack, multiple-character encryption to mask plaintext structure, another multi-letter cipher, polyalphabetic ciphers,...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 3 - Avinash Kak

Lecture 3: Block ciphers and the data encryption standard. This chapter include objectives: To introduce the notion of a block cipher in the modern context, to talk about the infeasibility of ideal block ciphers, to introduce the notion of the feistel cipher structure, to go over DES and the data encryption standard.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 4 - Avinash Kak

Lecture 4: Finite fields (Part 1: Groups, rings, and fields theoretical underpinnings of modern cryptography). This chapter includes contents: Why study finite fields? What does it take for a set of objects to? infinite groups and abelian groups, rings, integral domain, fields.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 5 - Avinash Kak

Lecture 5: Finite fields (Part 2: Modular arithmetic theoretical underpinnings of modern cryptography). This chapter include objectives: To review modular arithmetic, to present Euclid’s GCD algorithms, to present the prime finite field Zp, to show how Euclid’s GCD algorithm can be extended to find multiplicative inverses, Perl and Python implementations for calculating GCD and multiplicative inverses.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 6 - Avinash Kak

Lecture 6: Finite fields (Part 3: Polynomial arithmetic theoretical underpinnings of modern cryptography). The goals of this chapter are: To review polynomial arithmetic, polynomial arithmetic when the coefficients are drawn from a finite field, the concept of an irreducible polynomial, polynomials over the GF(2) finite field.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 7 - Avinash Kak

Lecture 7: Finite fields (Part 4: Finite fields of the form GF(2n ) - Theoretical underpinnings of modern cryptography). The goals of this chapter are: To review finite fields of the form GF(2n), to show how arithmetic operations can be carried out by directly operating on the bit patterns for the elements of GF(2n), Perl and Python implementations for arithmetic in a Galois Field using my BitVector modules.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 8 - Avinash Kak

Lecture 8 - AES: The advanced encryption standard. In this chapter you will learn: Salient features of AES, the encryption key and its expansion, the overall structure of AES, the four steps in each round of processing, the substitution bytes step: subbytes and invsubbytes, the shift rows step: shiftrows and invshiftrows, the mix columns step: mixcolumns and invmixcolumns, the key expansion algorithm.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 9 - Avinash Kak

Lecture 9: Using block and stream ciphers for secure wired and wifi communications. The goals of this chapter are: To present 2DES and its vulnerability to the meet-in-the-middle attack, to present two-key 3DES and three-key 3DES, to present the five different modes in which a block cipher can be used in practical systems for secure communications,...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 10 - Avinash Kak

Lecture 10: Key distribution for symmetric key cryptography and generating random numbers. The goals of this chapter are: Why might we need key distribution centers? Master key vs. session key, hierarchical and decentralized key distributions, generating pseudorandom numbers.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 11 - Avinash Kak

Lecture 11: Prime numbers and discrete logarithms. The goals of this chapter are: Primality testing, fermat’s little theorem, the totient of a number, the miller-rabin probabilistic algorithm for testing for primality, python and perl implementations for the miller-rabin primality test, the AKS deterministic algorithm for testing for primality, chinese remainder theorem for modular arithmetic with large composite moduli, discrete logarithms.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 12 - Avinash Kak

Lecture 12: Public-key cryptography and the RSA algorithm. In this chapter, the learning objectives are: To review public-key cryptography, to demonstrate that confidentiality and sender-authentication can be achieved simultaneously with public-key cryptography, to review the RSA algorithm for public-key cryptography,...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 13 - Avinash Kak

Lecture 13: Certificates, digital signatures, and the diffie-hellman key exchange algorithm. The goals of this chapter are: Authenticating users and their public keys with certificates signed by Certificate Authorities (CA), exchanging session keys with public-key cryptography, X.509 certificates, Perl and Python code for harvesting RSA moduli from X.509 certificates, the Diffie-Hellman algorithm for exchanging session keys.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 14 - Avinash Kak

Lecture 14: Elliptic curve cryptography and digital rights management. The goals of this chapter are: Introduction to elliptic curves, a group structure imposed on the points on an elliptic curve, geometric and algebraic interpretations of the group operator, elliptic curves on prime finite fields, Perl and Python implementations for elliptic curves on prime finite fields,...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 15 - Avinash Kak

Lecture 15: Hashing for message authentication. The goals of this chapter are: What is a hash function? Different ways to use hashing for message authentication, the one-way and collision-resistance properties of secure hash functions, the birthday paradox and the birthday attack, structure of cryptographically secure hash functions,...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 16 - Avinash Kak

Lecture 16 - TCP/IP vulnerabilities and DoS attacks: IP spoofing, SYN flooding, and the shrew DoS attack. The goals of this chapter are: To review the IP and TCP packet headers, controlling TCP traffic congestion and the shrew DoS attack, the TCP SYN flood attack for denial of service, IP source address spoofing attacks,...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 17 - Avinash Kak

Lecture 17: DNS and the DNS cache poisoning attack. After studying this chapter you will be able to understand: The domain name system, BIND, configuring BIND, running BIND on your Ubuntu laptop, light-weight nameservers (and how to install them), DNS cache poisoning attack, writing perl and python code for cache poisoning attacks.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 18 - Avinash Kak

Lecture 18: Packet filtering firewalls (Linux). The goals of this chapter are: Packet-filtering vs. proxy-server firewalls; the four iptables supported by the Linux kernel: filter, nat, mangle, and raw; creating and installing new firewall rules; structure of the filter table, connection tracking and extension modules, designing your own filtering firewall.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 19 - Avinash Kak

Lecture 19: Proxy-server based firewalls. After studying this chapter you will be able to understand: The SOCKS protocol for anonymizing proxy servers, socksifying application clients, the dante SOCKS server, Perl and Python scripts for accessing an internet server through a SOCKS proxy, squid for controlling access to web resources (and for web caching),...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 20 - Avinash Kak

Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols. After studying this chapter you will be able to understand: PGP: A case study in email security, key management issues in PGP, packet-level security with IPSec, transport Layer Security with SSL/TLS, heartbeat extension to the SSL/TLS protocol, the tor protocol for anonymized routing.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 21 - Avinash Kak

Lecture 21: Buffer overflow attack. After studying this chapter you will be able to understand: Services and ports; a case study on buffer overflow vulnerabilities: the telnet service; buffer overflow attack: understanding the call stack; overrunning the allocated memory in a call stack; demonstration of program misbehavior because of buffer overflow; using gdb to craft program inputs for exploiting buffer-overflow vulnerability.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 22 - Avinash Kak

Lecture 22 - Malware: Viruses and worms. After studying this chapter you will be able to understand: Attributes of a virus, educational examples of a virus in Perl and Python, attributes of a worm, educational examples of a worm in Perl and Python, some well-known worms of the past, the conficker and stuxnet worms, how afraid should we be of viruses and worms?

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 23 - Avinash Kak

Lecture 23: Port and vulnerability scanning, packet sniffing, intrusion detection, and penetration testing. After studying this chapter you will be able to understand: Port scanners, the nmap port scanner, vulnerability scanners, the nessus vulnerability scanner, packet sniffers, intrusion detection, the metasploit framework, the netcat utility.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 24 - Avinash Kak

Lecture 24: The dictionary attack and the rainbow-table attack on password protected systems. The goals of this chapter are: The dictionary attack, thwarting a dictionary attack with log scanning, cracking passwords with direct table lookup, cracking passwords with hash chains, cracking password with rainbow tables.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 25 - Avinash Kak

Lecture 25: Security issues in structured peer-to-peer networks. This topic will describe: What are peer-to-peer (P2P) overlay networks, distributed hash tables (DHT), the chord protocol, the pastry protocol, the kademlia protocol, the bittorrent file sharing protocol, security aspects of structured DHT-based P2P protocols.

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 26 - Avinash Kak

Lecture 26: Small-world peer-to-peer networks and their security issues. This chapter include objectives: differences between structured P2P and small-world P2P, freenet as originally envisioned by Ian Clarke, the small-world phenomenon, demonstration of the small-world phenomenon by computer simulation, decentralized routing in small-world networks,...

8/30/2018 5:23:09 AM +00:00

Lecture notes on Computer and network security: Lecture 27 - Avinash Kak

Lecture 27 - Web security: PHP exploits, SQL injection, and the slowloris attack. In this chapter, students will be able to understand: What do we mean by web security? PHP and its system program execution functions, an example of a PHP exploit that spews out third-party spam, MySQL with row-level security, SQL injection attack, the slowloris attack, protecting your web server with mod-security.

8/30/2018 5:23:09 AM +00:00