Lecture #31
- Announce
- Continue Reading Chapter 11, Security
Computer Communications
- TCP/IP Continued: The Layers
- The Physical Layer
- Hardware (e.g. Ethernet)
- The Ethernet Packet
- The IP (Internet Protocol) Layer
- The IP Packet
- Hardware Independence
- The TCP (Task Control Protocol) Layer
- The Application Layer
- Packets Within Packets
- Reliability
- Addressing (Layers Again!)
- Hardware Address (Ethernet Address)
- unique 6 octet (8 bit -- byte) number
- usually 6 groups of two hex digits: b3 fe 13 21 a5 41
- centrally administered
- IP Address
- 4 octet number: e.g. 152.3.140.221 on my desktop
- usually 4 decimal number separated by periods
- network part ;host part
- Centrally Administered
- Domain Name
- hierarchical system
- root: edu, com, mil, net, country
- hostname; suborg; organization
- e.g. arapaho.cs.duke.edu
- person on host is e.g. ramm@arapaho.cs.duke.edu
- Applications
- email
- news
- talk
- ftp
- anonymous
- archives
- free software
- weather servers
- forecasts
- weather maps
- finger
- telephone
- telnet
- rlogin
- irc
- information services
- Client/Server
- Print Server
- File Server
- Name Server
- WWW
- Computer Security / Confidentiality
- Basic Ideas
- Passwords
- Encryption
- Whole New Chapter on these Topics
Computer Security
- Important Topic
- Good Passwords and Cracking
- Brief Case Combination Locks
- Briefcase combination lock
- Analysis
- number of wheels
- number of positions
- time per trial
- alternatives
- Password on a Computer
- More possibilities per "wheel" or position
- Faster Cracking
- Dictionary Attacks
- Picking a good UNIX password
- Encryption
- Military History
- From Caesar to Poe
- Polyalphabetic Substitution
- The Vignere Cypher
- Cypher Reuse
- One Time Pads
- Can be Absolutely Secure
- Computers and Random Number Generators