Chapter 8: Network Security# It is true greatness to have in one the frailty of a man and the security of a god. —Seneca Problem: Security Attacks 8.1 Trust and Threats 8.2 Cryptographic Building Blocks 8.2.1 Principles of Ciphers 8.2.2 Secret-Key Ciphers 8.2.3 Public-Key Ciphers 8.2.4 Authenticators 8.3 Key Predistribution 8.3.1 Predistribution of Public Keys 8.3.2 Predistribution of Secret Keys 8.3.3 Diffie-Hellman Key Exchange 8.4 Authentication Protocols 8.4.1 Originality and Timeliness Techniques 8.4.2 Public-Key Authentication Protocols 8.4.3 Secret-Key Authentication Protocols 8.5 Example Systems 8.5.1 Pretty Good Privacy (PGP) 8.5.2 Secure Shell (SSH) 8.5.3 Transport Layer Security (TLS, SSL, HTTPS) 8.5.4 IP Security (IPsec) 8.5.5 Wireless Security (802.11i) 8.5.6 Firewalls Perspective: Is Security Getting Worse or Better?