Professional Documents
Culture Documents
1. ....................................................................................................2
2. ....................................................................................................................................3
3. ........................................4
4. ...........................................................................................5
5. .......................................................................6
6. .......................................................................................................7
..........................................................................................................................................................................11
.......................................................................................................................................................................11
. ,
.
.
.
. ,
, .
.
,
.
.
,
, .
, , . ,
.
.
. ,
.
1
1.
( ,
, .),
, .
, , ,
.
. 1.
.
:
.
.
.
,
.
.
.
.
,
.
2.
:
(engl. authentication),
(engl. data confidentiality),
(engl. nonrepudation),
(engl. data integrity),
(engl. access control),
(engl. resource availability).
.
.
: , , .
. .
, .
.
,
,
.
.
.
.
(. w).
.
(. ).
w y
(. ) .
3
3.
Kerberos
Kerberos .
(Massachusetts Institute of
Technology).
DES (Data Encryption Standard)
. .
.
(tickets)
.
, . ,
(key server).
.
X (Project MAX)
SecureWare, Sun Hewlett-Packard.
,
.
.
MaxSix (Multilevel Architecture
for X for Security Information Exchange). MaxSix UNIX
.
.
MaxSix
DNSix TSIG. DNSix DIA (Defense Intelligence Agency) TSIG
(Trusted Systems Interoperability Group)
.
Secure NFS
4
Sun Microsistems NFS (Network File System)
UNIX .
NFS ( )
. :
DES (Data Encryption Standard) ,
.
4.
.
.
sniffing.
. (engl.
packet header)
.
(engl. promiscuous mode).
,
.
(engl. sniffers)
.
, .
Unix SGI, SunOs, Solaris, Linux .
. Packetman, Interman, Etherman, Loadman, Snoop
Etherfind . DOS Gobbler,
Ethload. ,
Network General Microsoft's Net Monitor.
sniffer
, .
.
sniffer
.
Novell 3.11
(
) .
, (engl. packet signature).
.
,
. Unix
Kerberos
,
.
5
. (engl. Internet worm)
1988.
.
.
(engl. e-mail bombing),
.
SYN-flood
TCP/IP .
TCP (SYN) IP
.
.
SYN-ACK .
,
SYN-ACK .
.
5.
.
, 2:
(engl. end to end encryption),
(engl. link encryption).
, .
, .
,
.
,
.
2.
.
,
, ,
. (.
)
6
.
( )
.
.
,
.
6.
:
(private key systems),
(public key systems).
.
,
.
.
.
.
,
.
. ,
.
7
.
DES ("Federal Data Encryption Standard")
. 1977.
, DES
56
.
. IDEA
(International Data Encryption Algorithm) 128
DES .
James L. Masseya Xuejia Laia, 1990 . IDEA
,
IDEA DES .
(engl. public key systems).
.
,
.
.
.
.
. (. y)
,
.
.
.
.
. ,
,
,
. , .
.
RSA (Rivest-
Shamir-Adleman). PGP (Pretty
Good Privacy) Philipa Zimmermanna
(engl. e-mail) . PGP
, , ZIP
x 64 ASCII
. PGP :
(384 ), (512 ) (1024 ).
PGP IDEA 128
.
RSA . PGP
MD5
RSA .
RSA .
.
,
.
.
.
, .
.
"hash"
. "hash"
( 512 )
.
,
.
,
.
. ,
. , ,
.
.
. ,
.
. ,
,
, ,
.
,
-,
. ,
,
. ,
, IT .
PC
, , ,
. ,
, ,
.
,
, .
,
.
.
, .
.
TCP/IP ,
.
[1] Dejan Simi, Tehnike zatite u raunarskim mreama, Fakultet Organizacionih Nauka
Beograd, PPT Prezentacija, Beograd, Jun 2002.
[2] https://singipedia.singidunum.ac.rs/preuzmi/41283-zastita-racunarskih-mreza/1362
[3] https://sr.wikipedia.org/wiki/Za%C5%A1tita_ra%C4%8Dunarskih_mre%C5%BEa
[4] http://nasport.pmf.ni.ac.rs/materijali/2263/Zastita%20podataka.pdf
[5] http://pt.uninp.edu.rs/wp-content/uploads/2014/01/ZASTITA-PODATAKA-U-RACUNARSKIM-SISTEMIMA-
KORISCENJEM-KRIPTOGRAFSKIH-METODA.pdf
[6] http://www.tfzr.uns.ac.rs/Predmet/zastita-podataka-i-racunarskih-mreza