+ All Categories
Home > Documents > Cisco Securit y

Cisco Securit y

Date post: 02-Feb-2016
Category:
Upload: saki
View: 32 times
Download: 0 times
Share this document with a friend
Description:
Cisco Securit y. An Example. => How to transport the letter safely ? => Worry somebody intercept the letter ? => Worry somebody falsify the letter ? => Worry writter or transporter negative the letter ?. Security Meaning. => Ensure the source - PowerPoint PPT Presentation
15
© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1 Cisco Security
Transcript
Page 1: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1

Cisco Security

Page 2: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

An Example

=> How to transport the letter safely ?

=> Worry somebody intercept the letter ?

=> Worry somebody falsify the letter ?

=> Worry writter or transporter negative the letter ?

Page 3: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Security Meaning

=> Ensure the source

=> Ensure the message could not be falsify or intercept

while transportion

=> Ensure the message could not be cracked

=> No negation

Page 4: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Basics of Encryption

There are two types of encryption keys:

=> Symmetric

=> Asymmetric

Page 5: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

Symmetric

With symmetric key encryption, each peer uses the same

key to encrypt and decrypt the data.

Page 6: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Symmetric Encryption

Page 7: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

Maybe Perfect

Page 8: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

An Obvious Problerm

=> How to send the "key" ?

=> QQ ? MSN ? E-mail ? Telephone ?

=> Bike ? Bus ? Train ? Airplane ?

Page 9: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Asymmetric

With asymmetric key encryption, the local end uses one

key to encrypt,and the remote end uses another key to

decrypt the traffic.

Page 10: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Asymmetric Encryption

Page 11: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Maybe Perfect

Page 12: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

An Obvious Problem

=> Cracker will exchange the letter . How to solve this

problerm ?

Page 13: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

A perfect Encryption

Page 14: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

A Perfect Decryption

Page 15: Cisco Securit y

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15


Recommended