110 likes | 293 Views
PEER-TO-PEER SECURITY. PRESENTED BY SHRUTI PARIHAR. SECURITY ISSUES IN P2P. STEGANOGRAPHY DENIAL OF SERVICE ATTACK IMPERSONATION ENCRYPTION CRACKING NON-ENCRYPTED IM EAVESDROPPING TROJANS, VIRUSES, BUGS. SECURITY ISSUES IN P2P. P2P SECURITY PROTOCOL. CONCEPTS PEER GROUPS
E N D
PEER-TO-PEER SECURITY PRESENTED BY SHRUTI PARIHAR
SECURITY ISSUES IN P2P STEGANOGRAPHY DENIAL OF SERVICE ATTACK IMPERSONATION ENCRYPTION CRACKING NON-ENCRYPTED IM EAVESDROPPING TROJANS, VIRUSES, BUGS
P2P SECURITY PROTOCOL • CONCEPTS • PEER GROUPS • GROUP AUTHORITY • ACL MANAGEMENT • GROUP MEMBERSHIP K-1GA(G, EXP, gRa mod p) signed by GA
P2P SECURITY PROTOCOL(contd.) • TWO-PHASES • LOGIN PROTOCOL • USER LOGIN • AUTHORITY LOGIN • MUTUAL AUTHENTICATION PROTOCOL
P2P SECURITY PROTOCOL(contd.) LOGIN PROTOCOL OVERVIEW • PASSWORD, PASSWORD-ID, ACL’s • DIFFIE-HELMAN KEY EXCHANGE gRtu mod p, gRta mod p, K = gRtuRta mod p • CHALLENGE RESPONSE • RSA ENCRYPTED CERTIFICATES
P2P SECURITY PROTOCOL(contd.) • LOGIN PROTOCOL U->A: H, G, PID, P(gRtu mod p), D Krand = gRtuRta mod p A->U: H, P(gRta mod p), Krand(CA), D U->A: Krand(H, REQUEST, CA, CU, D) A->U: Krand(H, CU, RESPONSE, D)
P2P SECURITY PROTOCOL(contd.) MUTUAL AUTHENTICATION PROTOCOL OVERVIEW • DIGITAL CERTIFICATES • DIFFIE-HELMAN KEY EXCHANGE gRtu mod p, gRta mod p, K = gRtuRta mod p • CHALLENGE RESPONSE
P2P SECURITY PROTOCOL(contd.) • MUTUAL AUTHENTICATION U1->U2: H, G, GMU1, D K= gRu1Ru2 mod p U2->U1: H, GMU2, K(CU2), D U1->U2: K(H, CU1, CU2, D) U2->U1: K(H, CU1, D) Krand = gRu1Ru2Cu1Cu2 mod p