The Secure Channel Ramki Thurimella. 2 Secure Channel Properties Roles Alice—Bob (Server—Client) Direction of flow Eve Delete, Insert, or modify data.

Slides:



Advertisements
Similar presentations
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Secure Socket Layer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Block Ciphers 1 Block Ciphers Block Ciphers 2 Block Ciphers  Modern version of a codebook cipher  In effect, a block cipher algorithm yields a huge.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Web Security : Secure Socket Layer Secure Electronic Transaction.
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Network Security David Lazăr.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
CS426Fall 2010/Lecture 61 Computer Security CS 426 Lecture 6 Cryptography: Message Authentication Code.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Pretty Good Privacy (PGP) Security for Electronic .
Cryptographic Hash Functions and Protocol Analysis
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections ) You may skip proofs, but are.
Chapter - 3 PUBLIC-KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Part 1  Cryptography 1 Integrity Part 1  Cryptography 2 Data Integrity  Integrity  detect unauthorized writing (i.e., modification of data)  Example:
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
CS480 Cryptography and Information Security
Message Authentication Code
Encryption and Integrity
Computer Communication & Networks
Secure Sockets Layer (SSL)
Cryptographic Hash Function
A Wireless LAN Security Protocol
Visit for more Learning Resources
Chapter 8 Network Security.
Encryption
Cryptography.
CSE 4095 Transport Layer Security TLS, Part II
NET 311 Information Security
Topic 11: Authenticated Encryption + CCA-Security
MAC: Message Authentication Code
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 8 Network Security.
Security through Encryption
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Introduction to Symmetric-key and Public-key Cryptography
Cryptography: Basics (2)
The Secure Sockets Layer (SSL) Protocol
Lecture 5: Transport layer (TLS / SSL) and Security ( PGP )
Lecture 10: Network Security.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security: Integrity, Authentication, Non-repudiation
Chapter 8 roadmap 8.1 What is network security?
Counter With Cipher Block Chaining-MAC
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
Presentation transcript:

The Secure Channel Ramki Thurimella

2 Secure Channel Properties Roles Alice—Bob (Server—Client) Direction of flow Eve Delete, Insert, or modify data in transit Can be created for storage Think of it as transmitting it into the future Both Alice & Bob the same person who knows the key

3 Key Only Alice and Bob know the key K Every time the secure channel is created, a session key is created Session key creation is discussed later K is 256 bits long

4 Messages or Streams Messages Because streams can be broken down into messages, transmitted, and reassembled by the receiver Assume unreliable communication But lost messages to be dealt by the underlying transport layer

5 Security Requirements Messages are kept confidential from Eve Eve can drop some messages while in transit (That is, Bob receives a subsequence) Eve can see the following about messages that are being exchanged by Alice and Bob How many Size When Eve can do traffic analysis with this data (For some applications this compromises privacy)

6 Order of Authentication & Encryption Encrypt-then-authenticate Authenticate-then-encrypt (recommended by the authors) Encrypt-and-authenticate

7 Encrypt-Then-Authenticate 1. Compute E(P) 2. Compute MAC(E(P)) 3. Send E(P) and MAC(E(P)) Receiver 1. Compute MAC(E(P)) 2. If doesn’t match the MAC that was received Discard E(P) 3. Else Decrypt E(P)

8 Encrypt-Then- Authenticate(cont.) Advantages 1. Inverting MAC, only gives E(P) and NOT the message P itself 2. Efficient: Bob doesn’t have to decrypt, if MACs don’t agree

9 Encrypt-And-Authenticate 1. Compute E(P) and (possibly simultaneously) MAC(P) 2. Send E(P), MAC(P) Receiver 1. Decrypt E(P) and compute MAC(P) (possibly simultaneously) Advantage: Possible parallelism Disadvantage: Eve has access to MAC(P) and could potentially find out P

10 Authenticate-Then-Encrypt (recommended method) 1. Compute MAC(P) 2. Compute E(P,MAC(P)) 3. Send E(P,MAC(P)) Receiver 1. Decrypt E(P,MAC(P)), and unpack P and MAC(P) 2. Compute MAC(P) 3. If what was computed doesn’t match the MAC that was received Discard the message

11 Authenticate-Then-Encrypt (cont.) Advantages: Eve has no access to MAC(P) Follows Horton Principle (Authenticate what you mean, not what you say) whereas Encrypt-Then- Authenticate violates this principle because it attempts to compute MAC of ciphertext

12 Secure Channel Design Message Numbers: Exchanging N messages puts the communication channel in N+1 distinct states 0 messages sent 1 message sent 2 messages sent … N messages sent Using 32-bits, 2 32 states can be recorded, i.e. N+1 = 2 32 Equivalently N = 2 32 – 1 1 ≤ Message number i ≤ 2 32 – 1

13 HMAC-SHA-256 H(·) be a cryptographic hash function (in this case SHA-256) K be a secret key padded to the right with extra zeros to the input block size of the hash function, or the hash of the original key if it's longer than that block size m be the message to be authenticated || denote concatenationconcatenation ⊕ denote exclusive or (XOR)exclusive or a be the outer padding (0x5c5c5c…5c5c, one-block- long hexadecimal constant)hexadecimal b be the inner padding (0x363636…3636, one-block- long hexadecimal constant)hexadecimal Then HMAC(K,m) is mathematically defined by HMAC(K,m) = H((K ⊕ a ) || H((K ⊕ b ) || m)).

14 Secure Channel Design (cont.) Authentication HMAC-SHA-256 a i = MAC ( i || l(x i ) || x i || m i ) l(.) length of a string in bytes x is contextual data Protocol identification Protocol version Negotiated field sizes m i message i

15 Secure Channel Design (cont.) Encryption AES in CTR mode. Recall that this is K i = E( K, Nonce || i ) for i = 1,2,…, k C i = P i ⊕ K i Length of each message ≤ Each message is broken down into blocks, and each block is numbered Each block is 128 bits long With 32-bit counter for block numbers, messages up to 2 36 can be accommodated