CMSC 414 Computer and Network Security Lecture 15

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Advertisements

Chapter 10 Real world security protocols
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 15 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Chapter 2. Network Security Protocols
Lecture 11: Strong Passwords
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Non-PKI Methods for Public Key Distribution
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
Tutorial on Creating Certificates SSH Kerberos
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Computer Communication & Networks
CS480 Cryptography and Information Security
Radius, LDAP, Radius used in Authenticating Users
Authentication Protocol
Tutorial on Creating Certificates SSH Kerberos
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Message Security, User Authentication, and Key Management
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
9.2 SECURE CHANNELS Medisetty Swathy.
Strong Password Protocols
CS/ECE 478 Introduction to Network Security
Cryptography Lecture 24.
Protocol ap1.0: Alice says “I am Alice”
Strong Password Protocols
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Key Management and Distribution
KERBEROS.
Hash-based Primitives Credits: Dr. Peng Ning and Dr. Adrian Perrig
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
COEN 351 Authentication.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Secure Diffie-Hellman Algorithm
Key Exchange, Man-in-the-Middle Attack
AIT 682: Network and Systems Security
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 15 Jonathan Katz

Announcement Anyone interested in a summer internship at NIST related to programming in support of quantum key distribution (no prior knowledge of QM required), please contact me

Basic authentication protocols… Server stores H(pw); user sends pw “Secure” against server compromise, but not eavesdropping (or replay attacks) Server stores pw, sends R; user sends Fpw(R) If pw is a high-entropy key, then this is secure against eavesdropping (but not server compromise) If pw is a password, then this is insecure against an off-line dictionary attack

A public-key protocol Server stores pk; user stores sk Server sends R; user signs R Using a secure signature scheme… Is this secure against eavesdropping/server compromise? What if we had used encryption instead? Can we achieve security against eavesdropping and server compromise without public-key crypto?

Lamport’s protocol Server stores Hn(pw), sends n; user sends Hn-1(pw) Server updates user’s entry… Can also add “salt” to hash Server sends salt to user as first flow Allows user to use same password on different sites Can use same password (but different salt) when password “expires” Protects against pre-computation Deployed as S/Key

Some drawbacks… Secret expires at some point and a new secret must be shared Security against active attacks? Can use “paper-and-pencil” method to prevent this… …but at that point, better solutions are also possible!

Session key establishment There are very few applications for which authentication alone is sufficient! Can you think of any? What do you do once you are authenticated? Generally, need to establish a session key to authenticate (and encrypt) subsequent communication Also efficiency advantages to using symmetric-key techniques if public-key authentication is used Advantages even if a symmetric key is already shared…

Session keys Reduces effectiveness of cryptanalysis If key compromised, only one session affected Prevents replay of messages from other sessions

Basic key exchange Public-key based… Diffie-Hellman key exchange Secure against passive eavesdropping… …but insecure against a man-in-the-middle attack

Adding key exchange Not sufficient to simply “add on” key establishment before/after authentication Splicing attack… Need “authenticated key exchange”

KDCs Key Distribution Centers Advantages of symmetric-key crypto, without O(n2) keys But requires a trusted intermediary Single point of failure/attack We will see an example (Kerberos) later

Multiple intermediaries Allows users in different domains to communicate securely Use multiple KDCs… Can have all pairs of KDCs share a key More likely, there will be a hierarchy of KDCs

Authentication Protocols (Chapter 11, KPS)

Overview Protocol design is subtle Small changes can make a protocol insecure! Historically, designed in an “ad-hoc” way, by checking protocol for known weaknesses Great example of where provable security helps!

Challenge-response Client and server share a key k Generically: server sends R; user sends f(k, R) For which f will this be secure? What if R is non-repeating, but predictable? Drawbacks No mutual authentication No key exchange Dictionary attack if k is low entropy Insecure against server compromise