Security Protocols Analysis

Slides:



Advertisements
Similar presentations
Universally Composable Symbolic Analysis of Cryptographic Protocols
Advertisements

Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
University of Twente The Netherlands Centre for Telematics and Information Technology Constraint Logic Programming for Verifying Security Protocols Sandro.
5 June Lecture 1 1 TU Dresden - Ws on Proof Theory and Computation Formal Methods for Security Protocols Catuscia Palamidessi Penn State University,
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Lecture 3Dr. Verma1 COSC 6397 – Information Assurance Module M2 – Protocol Specification and Verification University of Houston Rakesh Verma Lecture 3.
1 TOWARDS A HIERARCHY OF CRYPTOGRAPHIC PROTOCOL MODELS Catherine Meadows, NRL Joint work with Chris Lynch, Clarkson/NRL.
Luu Anh Tuan. Security protocol Intruder Intruder behaviors Overhead and intercept any messages being passed in the system Decrypt messages that are.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Deeper Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research – India.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Analysis of Security Protocols (I) John C. Mitchell Stanford University.
Analysis of Security Protocols (V) John C. Mitchell Stanford University.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Authentication John C. Mitchell Stanford University CS 99j.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Protocol Verification by the Inductive Method John Mitchell Stanford TECS Week2005.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
Model Checking for Security Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Security Analysis of Network Protocols TECS Week Reference: John Mitchell Stanford 2005.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Inductive Verification of Protocols Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Executable specification of cryptofraglets with Maude for security verification Fabio Martinelli and Marinella Petrocchi IIT-CNR, Pisa Italy presented.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Formal Analysis of Security Protocols Dr. Changyu Dong
A Survey of Authentication Protocol Literature: Version 1.0 Written by John Clark and Jeremy Jacob Presented by Brian Sierawski.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
© UCL Crypto group oct.-15 On the Perfect Encryption Assumption in the Study of Security Protocols O. Pereira and J.-J. Quisquater UCL Crypto Group
CSCE 813 Internet Security Cryptographic Protocol Analysis.
Correctness Proofs and Counter-model Generation with Authentication-Protocol Logic Koji Hasebe Mitsuhiro Okada Department of Philosophy, Keio University.
Network Protocols Network Systems Security Mort Anvari.
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Chapter eight: Authentication Protocols 2013 Term 2.
Model Checking for Security Protocols Will Marrero, Edmund Clarke, Shomesh Jha.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Message Authentication Code
Chapter 5 Network Security Protocols in Practice Part I
Reviews Rocky K. C. Chang 20 April 2007.
Formal Methods for Security Protocols
Security attacks.
Security Analysis of Network Protocols
Protocol Analysis.
CS259: Security Analysis of Network Protocols, Winter 2008
Security Analysis of Network Protocols
Cryptography.
Group theory exercise.
Analysis of Security Protocols
Analyzing Key Distribution and Authentication Protocols
The Inductive Approach to Verifying Cryptographic Protocols
Man in the Middle Attacks
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security through Encryption
Protocol Verification by the Inductive Method
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Security Analysis of Network Protocols
Efficient Short-Password Key Exchange (ESP-KE)
CSCE 715: Network Systems Security
CDK: Chapter 7 TvS: Chapter 9
Chapter 8.5 AUTHENTICATION AND KEY DISTRIBUTION
CSCE 715: Network Systems Security
Protocol Verification by the Inductive Method
Formal Methods for Security Protocols
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security Attacks, Mechanisms, and Services
AIT 682: Network and Systems Security
Presentation transcript:

Security Protocols Analysis

Internet Security - Farkas Reading This Class: Modelling and Analysis of Security Protocols: chapters 0.9-0.12 C. Meadows: Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends, http://citeseer.ist.psu.edu/meadows03formal.html Next class: Modelling and Analysis of Security Protocols: chapter 1 Internet Security - Farkas

What is Protocol Analysis Cryptographic Protocols Attackers’ capabilities Security? Hostile environment Vulnerabilities Weakness of cryptography Incorrect specifications Internet Security - Farkas

Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal Exchange secret keys Verify identity (authentication) Secure transaction processing Internet Security - Farkas

Emerging Properties of Protocols Greater interoperation Negotiation of policy Greater complexity Group-oriented protocols Emerging security threats Internet Security - Farkas

Attackers’ Capabilities Read traffic Modify traffic Delete traffic Perform cryptographic operations Control over network principals Internet Security - Farkas

Internet Security - Farkas Attacks Known attacks Can be picked up by careful inspection Nonintuitive attacks Not easily apparent May not depend on flaws or weaknesses of cryptographic algs. Use variety of methods, e.g., statistical analysis, subtle properties of crypto algs., etc. Internet Security - Farkas

Internet Security - Farkas Formal Methods Combination of a mathematical or logical model of a system and its requirements and Effective procedures for determining whether a proof that a system satisfies its requirements is correct. Can be automated! Internet Security - Farkas

Example: Needham-Schroeder Famous simple example (page 30-31) Protocol published and known for 10 years Gavin Lowe discovered unintended property while preparing formal analysis using FDR system Subsequently rediscovered by every analysis method From: J. Mitchell Internet Security - Farkas

Needham-Schroeder Crypto Nonces Fresh, Random numbers Public-key cryptography Every agent A has Public encryption key Ka Private decryption key Ka-1 Main properties Everyone can encrypt message to A Only A can decrypt these messages From: J. Mitchell Internet Security - Farkas

Needham-Schroeder Key Exchange { A, NonceA } { NonceA, NonceB } { NonceB} Kb A B Ka Kb On execution of the protocol, A and B are guaranteed mutual authentication and secrecy. From: J. Mitchell Internet Security - Farkas

Needham Schroeder properties Responder correctly authenticated When initiator A completes the protocol apparently with Honest responder B, it must be that B thinks he ran the protocol with A Initiator correctly authenticated When responder B completes the protocol apparently with Honest initiator A, it must be that A thinks she ran the protocol with B Initiator Nonce secrecy When honest initiator completes the protocol with honest peer, intruder does not know initiators nonce. Internet Security - Farkas From: J. Mitchell

Anomaly in Needham-Schroeder [Lowe] Anomaly in Needham-Schroeder { A, NA } Ke A E { NA, NB } Ka { NB } Ke { NA, NB } { A, NA } Evil agent E tricks honest A into revealing private key NB from B Ka Kb B Evil E can then fool B Internet Security - Farkas From: J. Mitchell

Requirements and Properties Authentication Authentication, Secrecy Trading Fairness Special applications (e.g., voting) Anonymity and Accountability Internet Security - Farkas

Internet Security - Farkas Security Analysis Understand system requirements Model System Attacker Evaluate security properties Under normal operation (no attacker) In the presence of attacker Security results: under given assumptions about system and about the capabilities of the attackers. Modeling decisions How powerful is the adversary? Simple replay of previous messages Block messages; Decompose, reassemble and resend Statistical analysis, partial info from network traffic Timing attacks How much detail in underlying data types? Plaintext, ciphertext and keys atomic data or bit sequences Encryption and hash functions “perfect” cryptography algebraic properties: encr(x*y) = encr(x) * encr(y) for RSA encrypt(k,msg) = msgk mod N Internet Security - Farkas

Explicit intruder model Informal Protocol Description Formal Protocol Intruder Model Analysis Tool Find error From: J. Mitchell Internet Security - Farkas

Protocol Analysis Spectrum Low High Sophistication of attacks Protocol complexity Murj  FDR NRL Athena Hand proofs Paulson Bolignano BAN logic Spi-calculus Poly-time calculus Model checking Symbolic methods (MSR) Protocol logic From: J. Mitchell Internet Security - Farkas

Analysis of Discrete Systems Properties of discrete systems Requirements Attackers Attack: sequence of finite set of operations Evaluate different paths an attacker may take State the environmental assumptions precisely Internet Security - Farkas

Internet Security - Farkas First Analysis Method Dolev-Yao Set of polynomial-time algorithms for deciding security of a restricted class of protocols First to develop formal model of environment in which Multiple executions of the protocol can be running concurrently Cryptographic algorithms considered as “black boxes” Includes intrudes model Tools based on Dolev-Yao NRL protocol analyzer Longley-Rigby tool Internet Security - Farkas

Internet Security - Farkas Model checking Two components Finite state system Specification of properties Exhaustive search the state space to determine security Internet Security - Farkas

Internet Security - Farkas Theorem Prover Theorems: properties of protocols Prove or check proofs automatically Could find flaws not detected by manual analysis Do not give counterexamples like the model checkers Internet Security - Farkas

Internet Security - Farkas Logic Burrows, Abadi, and Needham (BAN) logic Logic of belief Set of modal operators: describing the relationship of principal to data Set of possible beliefs Inference rules Seems to be promising but weaker than state exploration tools and theorem proving (higher level abstraction) Internet Security - Farkas

Next week CSP