Tài liệu miễn phí An ninh - Bảo mật
Download Tài liệu học tập miễn phí An ninh - Bảo mật
Với mong muốn làm chủ mã nguồn, làm chủ chương trình, các tác giả đã cố gắng tìm hiểu và cài đặt hàm băm SHA-256 phục vụ cho đề tài Xây dựng hệ thống chữ ký số cho trường Đại học Thăng Long. Trong bài báo sẽ mô tả chi tiết về hàm băm này.
8/30/2018 5:28:00 AM +00:00
Trong giải pháp chữ ký số, hạ tầng cơ sở khóa công khai (Public Key Infrastructure – PKI) là hệ thống vừa mang tính tiêu chuẩn, vừa mang tính công nghệ cho phép người dùng trong một mạng công cộng không bảo mật (như Internet), có thể trao đổi thông tin một cách an toàn thông qua việc sử dụng một cặp khóa bí mật và công khai được chứng nhận bởi một nhà cung cấp chứng nhận số CA được tín nhiệm. Mời các bạn tham khảo nội dung chi tiết.
8/30/2018 5:28:00 AM +00:00
Bài viết Giới thiệu chung về bảo mật thông tin mở đầu về bảo mật thông tin, nhu cầu an toàn thông tin, nguy cơ và hiểm họa đối với hệ thống thông tin, phân loại tấn công phá hoại an toàn, thân loại tấn công phá hoại an toàn và một số nội dung khác.
8/30/2018 5:26:06 AM +00:00
Bài giảng Mạng và an ninh thông tin lĩnh vực: Công nghệ thông tin nêu lên Quyết định 35/2010/QĐ-UBND ngày 05/10/2010 của UBND tỉnh Ban hành Quy chế quản lý, vận hành, khai thác và sử dụng mạng thông tin tỉnh Lào Cai.
8/30/2018 5:26:03 AM +00:00
Lecture 2: Classical encryption techniques. This chapter includes contents: Basic vocabulary of encryption and decryption, building blocks of classical encryption techniques, caesar cipher, the swahili angle, monoalphabetic ciphers, the all-fearsome statistical attack, multiple-character encryption to mask plaintext structure, another multi-letter cipher, polyalphabetic ciphers,...
8/30/2018 5:23:09 AM +00:00
Lecture 3: Block ciphers and the data encryption standard. This chapter include objectives: To introduce the notion of a block cipher in the modern context, to talk about the infeasibility of ideal block ciphers, to introduce the notion of the feistel cipher structure, to go over DES and the data encryption standard.
8/30/2018 5:23:09 AM +00:00
Lecture 4: Finite fields (Part 1: Groups, rings, and fields theoretical underpinnings of modern cryptography). This chapter includes contents: Why study finite fields? What does it take for a set of objects to? infinite groups and abelian groups, rings, integral domain, fields.
8/30/2018 5:23:09 AM +00:00
Lecture 5: Finite fields (Part 2: Modular arithmetic theoretical underpinnings of modern cryptography). This chapter include objectives: To review modular arithmetic, to present Euclid’s GCD algorithms, to present the prime finite field Zp, to show how Euclid’s GCD algorithm can be extended to find multiplicative inverses, Perl and Python implementations for calculating GCD and multiplicative inverses.
8/30/2018 5:23:09 AM +00:00
Lecture 6: Finite fields (Part 3: Polynomial arithmetic theoretical underpinnings of modern cryptography). The goals of this chapter are: To review polynomial arithmetic, polynomial arithmetic when the coefficients are drawn from a finite field, the concept of an irreducible polynomial, polynomials over the GF(2) finite field.
8/30/2018 5:23:09 AM +00:00
Lecture 7: Finite fields (Part 4: Finite fields of the form GF(2n ) - Theoretical underpinnings of modern cryptography). The goals of this chapter are: To review finite fields of the form GF(2n), to show how arithmetic operations can be carried out by directly operating on the bit patterns for the elements of GF(2n), Perl and Python implementations for arithmetic in a Galois Field using my BitVector modules.
8/30/2018 5:23:09 AM +00:00
Lecture 8 - AES: The advanced encryption standard. In this chapter you will learn: Salient features of AES, the encryption key and its expansion, the overall structure of AES, the four steps in each round of processing, the substitution bytes step: subbytes and invsubbytes, the shift rows step: shiftrows and invshiftrows, the mix columns step: mixcolumns and invmixcolumns, the key expansion algorithm.
8/30/2018 5:23:09 AM +00:00
Lecture 9: Using block and stream ciphers for secure wired and wifi communications. The goals of this chapter are: To present 2DES and its vulnerability to the meet-in-the-middle attack, to present two-key 3DES and three-key 3DES, to present the five different modes in which a block cipher can be used in practical systems for secure communications,...
8/30/2018 5:23:09 AM +00:00
Lecture 10: Key distribution for symmetric key cryptography and generating random numbers. The goals of this chapter are: Why might we need key distribution centers? Master key vs. session key, hierarchical and decentralized key distributions, generating pseudorandom numbers.
8/30/2018 5:23:09 AM +00:00
Lecture 11: Prime numbers and discrete logarithms. The goals of this chapter are: Primality testing, fermat’s little theorem, the totient of a number, the miller-rabin probabilistic algorithm for testing for primality, python and perl implementations for the miller-rabin primality test, the AKS deterministic algorithm for testing for primality, chinese remainder theorem for modular arithmetic with large composite moduli, discrete logarithms.
8/30/2018 5:23:09 AM +00:00
Lecture 12: Public-key cryptography and the RSA algorithm. In this chapter, the learning objectives are: To review public-key cryptography, to demonstrate that confidentiality and sender-authentication can be achieved simultaneously with public-key cryptography, to review the RSA algorithm for public-key cryptography,...
8/30/2018 5:23:09 AM +00:00
Lecture 13: Certificates, digital signatures, and the diffie-hellman key exchange algorithm. The goals of this chapter are: Authenticating users and their public keys with certificates signed by Certificate Authorities (CA), exchanging session keys with public-key cryptography, X.509 certificates, Perl and Python code for harvesting RSA moduli from X.509 certificates, the Diffie-Hellman algorithm for exchanging session keys.
8/30/2018 5:23:09 AM +00:00
Lecture 14: Elliptic curve cryptography and digital rights management. The goals of this chapter are: Introduction to elliptic curves, a group structure imposed on the points on an elliptic curve, geometric and algebraic interpretations of the group operator, elliptic curves on prime finite fields, Perl and Python implementations for elliptic curves on prime finite fields,...
8/30/2018 5:23:09 AM +00:00
Lecture 15: Hashing for message authentication. The goals of this chapter are: What is a hash function? Different ways to use hashing for message authentication, the one-way and collision-resistance properties of secure hash functions, the birthday paradox and the birthday attack, structure of cryptographically secure hash functions,...
8/30/2018 5:23:09 AM +00:00
Lecture 16 - TCP/IP vulnerabilities and DoS attacks: IP spoofing, SYN flooding, and the shrew DoS attack. The goals of this chapter are: To review the IP and TCP packet headers, controlling TCP traffic congestion and the shrew DoS attack, the TCP SYN flood attack for denial of service, IP source address spoofing attacks,...
8/30/2018 5:23:09 AM +00:00
Lecture 17: DNS and the DNS cache poisoning attack. After studying this chapter you will be able to understand: The domain name system, BIND, configuring BIND, running BIND on your Ubuntu laptop, light-weight nameservers (and how to install them), DNS cache poisoning attack, writing perl and python code for cache poisoning attacks.
8/30/2018 5:23:09 AM +00:00
Lecture 18: Packet filtering firewalls (Linux). The goals of this chapter are: Packet-filtering vs. proxy-server firewalls; the four iptables supported by the Linux kernel: filter, nat, mangle, and raw; creating and installing new firewall rules; structure of the filter table, connection tracking and extension modules, designing your own filtering firewall.
8/30/2018 5:23:09 AM +00:00
Lecture 19: Proxy-server based firewalls. After studying this chapter you will be able to understand: The SOCKS protocol for anonymizing proxy servers, socksifying application clients, the dante SOCKS server, Perl and Python scripts for accessing an internet server through a SOCKS proxy, squid for controlling access to web resources (and for web caching),...
8/30/2018 5:23:09 AM +00:00
Lecture 20: PGP, IPSec, SSL/TLS, and Tor Protocols. After studying this chapter you will be able to understand: PGP: A case study in email security, key management issues in PGP, packet-level security with IPSec, transport Layer Security with SSL/TLS, heartbeat extension to the SSL/TLS protocol, the tor protocol for anonymized routing.
8/30/2018 5:23:09 AM +00:00
Lecture 21: Buffer overflow attack. After studying this chapter you will be able to understand: Services and ports; a case study on buffer overflow vulnerabilities: the telnet service; buffer overflow attack: understanding the call stack; overrunning the allocated memory in a call stack; demonstration of program misbehavior because of buffer overflow; using gdb to craft program inputs for exploiting buffer-overflow vulnerability.
8/30/2018 5:23:09 AM +00:00
Lecture 22 - Malware: Viruses and worms. After studying this chapter you will be able to understand: Attributes of a virus, educational examples of a virus in Perl and Python, attributes of a worm, educational examples of a worm in Perl and Python, some well-known worms of the past, the conficker and stuxnet worms, how afraid should we be of viruses and worms?
8/30/2018 5:23:09 AM +00:00
Lecture 23: Port and vulnerability scanning, packet sniffing, intrusion detection, and penetration testing. After studying this chapter you will be able to understand: Port scanners, the nmap port scanner, vulnerability scanners, the nessus vulnerability scanner, packet sniffers, intrusion detection, the metasploit framework, the netcat utility.
8/30/2018 5:23:09 AM +00:00
Lecture 24: The dictionary attack and the rainbow-table attack on password protected systems. The goals of this chapter are: The dictionary attack, thwarting a dictionary attack with log scanning, cracking passwords with direct table lookup, cracking passwords with hash chains, cracking password with rainbow tables.
8/30/2018 5:23:09 AM +00:00
Lecture 25: Security issues in structured peer-to-peer networks. This topic will describe: What are peer-to-peer (P2P) overlay networks, distributed hash tables (DHT), the chord protocol, the pastry protocol, the kademlia protocol, the bittorrent file sharing protocol, security aspects of structured DHT-based P2P protocols.
8/30/2018 5:23:09 AM +00:00
Lecture 26: Small-world peer-to-peer networks and their security issues. This chapter include objectives: differences between structured P2P and small-world P2P, freenet as originally envisioned by Ian Clarke, the small-world phenomenon, demonstration of the small-world phenomenon by computer simulation, decentralized routing in small-world networks,...
8/30/2018 5:23:09 AM +00:00
Lecture 27 - Web security: PHP exploits, SQL injection, and the slowloris attack. In this chapter, students will be able to understand: What do we mean by web security? PHP and its system program execution functions, an example of a PHP exploit that spews out third-party spam, MySQL with row-level security, SQL injection attack, the slowloris attack, protecting your web server with mod-security.
8/30/2018 5:23:09 AM +00:00