tailieunhanh - DISTRIBUTED SYSTEMS principles and paradigms Second Edition phần 7

số lần. Bằng cách sử dụng một khóa phiên duy nhất mỗi lần một kênh an toàn được thiết lập, các bên giao tiếp ít nhất là bảo vệ chống lại phát lại toàn bộ một phiên. Để bảo vệ phát lại các tin nhắn cá nhân từ một phiên trước đó, các biện pháp bổ sung nói chung là cần thiết chẳng hạn như bao gồm timestamps hoặc số thứ tự như là một phần của nội dung tin nhắn. | 408 SECURITY CHAP. 9 number of times. By using a unique session key each time a secure channel is set up the communicating parties are at least protected against replaying an entire session. To protect replaying individual messages from a previous session addi- tional measures are generally needed such as including timestamps or sequence numbers as part of the message content. Suppose that message integrity and confidentiality were achieved by using the same key used for session establishment. In that case whenever the key is compromised an intruder may be able to decrypt messages transferred during an old _ conversation clearly not a desirable feature. Instead it is much safer to use persession keys because if such a key is compromised at worst only a single session is affected. Messages sent during other sessions stay confidential. Related to this last point is that Alice may want to exchange some confidential data with Bob but she does not trust him so much that she would give him information in the form of data that have been encrypted with long-lasting keys. She may want to reserve such keys for highly-confidential messages that she exchanges with parties she really trusts. In such cases using a relatively cheap ses- _ sion key to talk to Bob is sufficient. By and large authentication keys are often established in such a way that replacing them is relatively expensive. Therefore the combination of such long- lasting keys with the much cheaper and more temporary session keys is often a good choice for implementing secure channels for exchanging data. Secure Group Communication So far we have concentrated on setting up a secure communication channel between two parties. In distributed systems however it is often necessary to enable secure communication between more than just two parties. A typical example is that of a replicated server for which all communication between the rep- _ licas should be protected against modification fabrication and interception

TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
9    219    0    19-04-2024
46    185    0    19-04-2024
15    183    0    19-04-2024
37    154    0    19-04-2024
40    96    0    19-04-2024
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.