You are on page 1of 12

.....................................................................................................................................................................................

1. ....................................................................................................2

2. ....................................................................................................................................3

3. ........................................4

4. ...........................................................................................5

5. .......................................................................6

6. .......................................................................................................7

..........................................................................................................................................................................11

.......................................................................................................................................................................11


. ,

.

.
.


. ,
, .
.

,
.
.


,
, .

, , . ,
.

.

. ,
.

1
1.


( ,
, .),
, .


, , ,
.
. 1.
.
:

(engl. passive attacks),


(engl. active attacks).


.
.



.
,

.

.

.
.
,
.

2.


:
(engl. authentication),
(engl. data confidentiality),
(engl. nonrepudation),
(engl. data integrity),
(engl. access control),
(engl. resource availability).
.

.
: , , .

. .

, .
.
,
,
.
.

.

.
(. w).


.

(. ).
w y

(. ) .

3
3.

Kerberos
Kerberos .
(Massachusetts Institute of
Technology).
DES (Data Encryption Standard)
. .
.
(tickets)
.
, . ,
(key server).
.

X (Project MAX)

SecureWare, Sun Hewlett-Packard.
,
.
.
MaxSix (Multilevel Architecture
for X for Security Information Exchange). MaxSix UNIX

.
.
MaxSix
DNSix TSIG. DNSix DIA (Defense Intelligence Agency) TSIG
(Trusted Systems Interoperability Group)

.

SDNS (Secure Data Network System)



NSA (National Security Agency)
. AT&T, DEC (Digital Equipment
Corporation) IBM.
OSI .

Secure NFS

4
Sun Microsistems NFS (Network File System)
UNIX .
NFS ( )
. :
DES (Data Encryption Standard) ,
.

4.


.
.
sniffing.

. (engl.
packet header)
.
(engl. promiscuous mode).

,
.
(engl. sniffers)

.
, .
Unix SGI, SunOs, Solaris, Linux .
. Packetman, Interman, Etherman, Loadman, Snoop
Etherfind . DOS Gobbler,
Ethload. ,
Network General Microsoft's Net Monitor.
sniffer
, .
.
sniffer
.

Novell 3.11
(
) .
, (engl. packet signature).
.

,
. Unix
Kerberos
,
.

5

. (engl. Internet worm)
1988.
.


.
(engl. e-mail bombing),

.
SYN-flood
TCP/IP .
TCP (SYN) IP
.
.

SYN-ACK .
,
SYN-ACK .
.

5.


.
, 2:
(engl. end to end encryption),
(engl. link encryption).
, .
, .
,
.
,
.

2.
.
,
, ,
. (.
)

6
.
( )
.

.

,
.

6.

:
(private key systems),
(public key systems).


.
,
.
.


.



.
,

.

. ,
.

7

.
DES ("Federal Data Encryption Standard")
. 1977.
, DES
56
.
. IDEA
(International Data Encryption Algorithm) 128
DES .
James L. Masseya Xuejia Laia, 1990 . IDEA
,
IDEA DES .




(engl. public key systems).
.

,
.
.
.
.
. (. y)
,
.
.
.
.

. ,
,
,
. , .

.
RSA (Rivest-
Shamir-Adleman). PGP (Pretty
Good Privacy) Philipa Zimmermanna
(engl. e-mail) . PGP
, , ZIP
x 64 ASCII
. PGP :
(384 ), (512 ) (1024 ).
PGP IDEA 128
.
RSA . PGP
MD5
RSA .
RSA .



.
,
.
.
.
, .
.
"hash"
. "hash"

( 512 )
.

,
.
,
.
. ,
. , ,
.

.

. ,
.


. ,
,
, ,
.

,
-,
. ,
,
. ,
, IT .
PC
, , ,
. ,
, ,
.

,
, .
,
.
.
, .

.
TCP/IP ,
.

[1] Dejan Simi, Tehnike zatite u raunarskim mreama, Fakultet Organizacionih Nauka
Beograd, PPT Prezentacija, Beograd, Jun 2002.

[2] https://singipedia.singidunum.ac.rs/preuzmi/41283-zastita-racunarskih-mreza/1362

[3] https://sr.wikipedia.org/wiki/Za%C5%A1tita_ra%C4%8Dunarskih_mre%C5%BEa

[4] http://nasport.pmf.ni.ac.rs/materijali/2263/Zastita%20podataka.pdf

[5] http://pt.uninp.edu.rs/wp-content/uploads/2014/01/ZASTITA-PODATAKA-U-RACUNARSKIM-SISTEMIMA-
KORISCENJEM-KRIPTOGRAFSKIH-METODA.pdf

[6] http://www.tfzr.uns.ac.rs/Predmet/zastita-podataka-i-racunarskih-mreza

You might also like