Outline Designing secure protocols Key exchange protocols

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
CSE331: Introduction to Networks and Security Lecture 22 Fall 2002.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Homework #4 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Week 4 - Wednesday.  What did we talk about last time?  RSA algorithm.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Fall 2006CS 395: Computer Security1 Key Management.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Outline The basic authentication problem
Outline Basic concepts in computer security
Key Management Session and Interchange Key Key Exchange
Protocol Analysis.
Topics In a confidential communication the authenticity needs to be carefully established for:
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Outline Basics of network security Definitions Sample attacks
CS480 Cryptography and Information Security
Authenticated Key Exchange
Public Key Encryption and the RSA Algorithm
Private Key Algorithms Key Exchange Protocols SSL
Outline Designing secure protocols Basic protocols Key exchange
Handshake Protocols COEN 150.
Security Protocols Computer Security Peter Reiher April 14, 2016
Man in the Middle Attacks
OTR AKE Protocol.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
پروتكلهاي احرازاصالت Authentication protocols
Public Key Infrastructure (PKI)
Assignment #4 – Solutions
IT IS 6200/8200.
CS Introduction to Operating Systems
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CS 465 Terminology Slides by Kent Seamons Last Updated: Sep 7, 2017.
CS2911 Week 9, Class 1 Today Discussion on RSA Video Eavesdropping
Homework #4 Solutions Brian A. LaMacchia
Cryptography Reference: Network Security
Key Management and Distribution
KERBEROS.
CDK: Chapter 7 TvS: Chapter 9
Lecture 6.1: Protocols - Authentication and Key Exchange I
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Diffie/Hellman Key Exchange
Public – Private Key Cryptography
Asymmetric Cryptographic Algorithms
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security: Integrity, Authentication, Non-repudiation
Security: Public Key Cryptography
Outline Basics of network security Definitions Sample attacks
Outline Designing secure protocols Basic protocols Key exchange
Secure Diffie-Hellman Algorithm
Key Exchange, Man-in-the-Middle Attack
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
AIT 682: Network and Systems Security
Key Exchange With Public Key Cryptography
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Security Protocols CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

Outline Designing secure protocols Key exchange protocols Common security problems in protocols

Basics of Security Protocols Assume (usually) that your encryption is sufficiently strong Given that, how do you design a message exchange to achieve a given result securely? Not nearly as easy as you probably think Many of the concepts are important in many areas of computer/network security

Security Protocols A series of steps involving two or more parties designed to accomplish a task with suitable security Sequence is important Cryptographic protocols use cryptography Different protocols assume different levels of trust between participants

Types of Security Protocols Arbitrated protocols Involving a trusted third party Adjudicated protocols Trusted third party, after the fact Self-enforcing protocols No trusted third party

Participants in Security Protocols Alice Bob

And the Bad Guys Eve Mallory And sometimes Alice or Bob might cheat Who only listens passively Who is actively malicious

Trusted Arbitrator Trent A disinterested third party trusted by all legitimate participants Arbitrators often simplify protocols, but add overhead and may limit applicability

Goals of Security Protocols Each protocol is intended to achieve some very particular goal Like setting up a key between two parties Protocols may only be suitable for that particular purpose Important secondary goal is minimalism Fewest possible messages Least possible data Least possible encryption

Key Exchange Protocols Often we want a different encryption key for each communication session How do we get those keys to the participants? Securely Quickly Even if they’ve never communicated before

Key Exchange With Symmetric Encryption and an Arbitrator Alice and Bob want to talk securely with a new key They both trust Trent Assume Alice & Bob each share a key with Trent How do Alice and Bob get a shared key?

Who knows what at this point? Step One KA KB Alice Bob Alice Requests Session Key for Bob Who knows what at this point? Trent

Who knows what at this point? Step Two KA KB Alice Bob EKA(KS), EKB(KS) Who knows what at this point? EKA(KS), EKB(KS) Trent KS

Who knows what at this point? Step Three KS KS EKB(KS) KA KB Alice Bob EKA(KS), EKB(KS) Who knows what at this point? Trent KS

What Has the Protocol Achieved? Alice and Bob both have a new session key The session key was transmitted using keys known only to Alice and Bob Both Alice and Bob know that Trent participated But there are vulnerabilities

Problems With the Protocol What if the initial request was grabbed by Mallory? Could he do something bad that ends up causing us problems? Yes!

The Man-in-the-Middle Attack A class of attacks where an active attacker interposes himself secretly in a protocol Allowing alteration of the effects of the protocol Without necessarily attacking the encryption

Applying the Man-in-the-Middle Attack KA Mallory KB KM Alice Bob Alice Requests Session Key for Mallory More precisely, what do they think they know? Alice Requests Session Key for Bob Who knows what at this point? Trent

Trent Does His Job KA Mallory KB KM Alice Bob EKA(KS), EKM(KS) Trent

Alice Gets Ready to Talk to Bob EKM(KS) KS KA Mallory KB KM Alice Bob KS EKM(KS) Mallory can now masquerade as Bob EKM(KS) Trent

Really Getting in the Middle KA Mallory KB KM Alice KS1 Bob KS EKM(KS1), EKB(KS1) KS EKB(KS1) KS1 Mallory can also ask Trent for a key to talk to Bob Trent

Mallory Plays Man-in-the-Middle Alice KS1 Bob KS KS KS1 Alice’s big secret EKS(Alice’s big secret) Bob’s big secret Alice’s big secret EKS1(Alice’s big secret) EKS(Alice’s big secret) EKS1(Bob’s big secret) EKS1(Bob’s big secret) EKS(Bob’s big secret) EKS(Bob’s big secret) Alice’s big secret Bob’s big secret Bob’s big secret

Defeating the Man In the Middle Problems: 1). Trent doesn’t really know what he’s supposed to do 2). Alice doesn’t verify he did the right thing Minor changes can fix that 1). Encrypt request with KA 2). Include identity of other participant in response - EKA(KS, Bob)

Applying the First Fix KB KA KM Alice Bob Mallory Mallory can’t read the request EKA(Alice Requests Session Key for Bob) And Mallory can’t forge or alter Alice’s request Trent KB

But There’s Another Problem A replay attack Replay attacks occur when Mallory copies down a bunch of protocol messages And then plays them again In some cases, this can wreak havoc Why does it here?

Step One KA KB Alice Mallory Bob EKA(Alice Requests Session Key for Trent

Step Two KA KB Alice Mallory Bob EKA(KS), EKB(KS) Trent KS EKA(Alice Requests Session Key for Bob) Bob EKA(KS), EKB(KS) EKA(KS), EKB(KS) Trent KS

What can Mallory do with his saved messages? Step Three KS KS EKB(KS) KA KB Alice Mallory EKA(Alice Requests Session Key for Bob) Bob EKA(KS), EKB(KS) EKA(KS), EKB(KS) EKB(KS) What can Mallory do with his saved messages? Trent KS

Mallory Waits for His Opportunity EKA(KS), EKB(KS) KA KB Mallory EKA(Alice Requests Session Key for Bob) EKA(KS), EKB(KS) EKA(Alice Requests Session Key for Bob) EKB(KS)

What Will Happen Next? KS KS EKB(KS) KA KB Mallory KS EKA(Alice Requests Session Key for Bob) KS EKA(KS), EKB(KS) What’s so bad about that? EKB(KS) What if Mallory has cracked KS?