cisco securit y

15
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1 Cisco Security

Upload: saki

Post on 02-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Cisco Securit y. An Example. => How to transport the letter safely ? => Worry somebody intercept the letter ? => Worry somebody falsify the letter ? => Worry writter or transporter negative the letter ?. Security Meaning. => Ensure the source - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1

Cisco Security

Page 2: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

An Example

=> How to transport the letter safely ?

=> Worry somebody intercept the letter ?

=> Worry somebody falsify the letter ?

=> Worry writter or transporter negative the letter ?

Page 3: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Security Meaning

=> Ensure the source

=> Ensure the message could not be falsify or intercept

while transportion

=> Ensure the message could not be cracked

=> No negation

Page 4: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Basics of Encryption

There are two types of encryption keys:

=> Symmetric

=> Asymmetric

Page 5: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

Symmetric

With symmetric key encryption, each peer uses the same

key to encrypt and decrypt the data.

Page 6: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Symmetric Encryption

Page 7: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

Maybe Perfect

Page 8: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

An Obvious Problerm

=> How to send the "key" ?

=> QQ ? MSN ? E-mail ? Telephone ?

=> Bike ? Bus ? Train ? Airplane ?

Page 9: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Asymmetric

With asymmetric key encryption, the local end uses one

key to encrypt,and the remote end uses another key to

decrypt the traffic.

Page 10: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Asymmetric Encryption

Page 11: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Maybe Perfect

Page 12: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

An Obvious Problem

=> Cracker will exchange the letter . How to solve this

problerm ?

Page 13: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

A perfect Encryption

Page 14: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

A Perfect Decryption

Page 15: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15