More about identity and authentication

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Lecture 23 Internet Authentication Applications
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Module 9: Fundamentals of Securing Network Communication.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Private key
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
More about identity and authentication Tuomas Aura T Network security Aalto University, autumn 2015.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Computer and Network Security
Key management issues in PGP
Date: April. 13, Monday Evening.
TOPIC: HTTPS (Security protocol)
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Web Applications Security Cryptography 1
Cryptography: an overview
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 6 Building a Home Network
IT443 – Network Security Administration Instructor: Bo Sheng
SSL Certificates for Secure Websites
Cryptography and Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Remote Access Lecture 2.
Secure Sockets Layer (SSL)
Computer Data Security & Privacy
Trusted Computing and the Trusted Platform Module
Anonymous Communication
Web Services Security.
COMP3220 Web Infrastructure COMP6218 Web Architecture
Tutorial on Creating Certificates SSH Kerberos
Final Revision Notes-Grade10
Using SSL – Secure Socket Layer
Nessus Vulnerability Scanning
Cryptography and Network Security
Message Digest Cryptographic checksum One-way function Relevance
Introduction to Local Area Networks
Goals Introduce the Windows Server 2003 family of operating systems
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Network Models, Hardware, Protocols and number systems
Anonymous Communication
Lecture 4 - Cryptography
Network Security 4/21/2019 Raj Rajarajan.
Unit 8 Network Security.
Advanced Computer Networks
Chapter 7 Network Applications
COEN 351 Authentication.
Cryptography and Network Security
Anonymous Communication
Lecture 36.
Lecture 36.
Presentation transcript:

More about identity and authentication Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 This lecture shows that authentication is much more diverse field than it first seems

What is hard about authentication in a network? Protocol design? Knowing how you want to talk to Initial knowledge and trust For authenticated key exchange, we usually need Identifiers Prior knowledge and trust in something Examples: SSL: DNS name and CA Kerberos: username, password and authentication center Cellular networks: IMSI and shared key on SIM

Identifiers

Network Security Part 1: The Internet July 2004, Shanghai Endpoint names Authentication and integrity depend on names (identifiers) Each protocol layer has its own way of naming endpoints: Ethernet (MAC) addresses in the link layer (e.g. 00-B0-D0-05-04-7E) NAI for network users IP address in the network layer (e.g. 157.58.56.101) TCP port number + IP address DNS or NetBIOS name in the higher layers (e.g. smtp.aalto.fi) URI in web pages and services (e.g. http://www.example.org/myservice) Email address for email users Tuomas Aura, Microsoft Research

Using identifiers How are names and other identifiers allocated? Authority, random allocation, ... What is the scope of the identifiers and are they unique? How does one find the owner of a name? Data delivery, routing Resolving name in one protocol layer to the name space of the layer below How to convince others that this is your name? Authentication, authorization, name ownership Secure naming is a difficult problem and often leads to vulnerabilities

Prior knowledge and trust

Typical starting points for authentication Prior knowledge of cryptographic secrets: Known public keys Shared master key Shared weak secret, e.g. password (much harder) Trusted third parties: Certification authority Online trusted third party, e.g. RADIUS or Kerberos server

What else could be trusted? Secure hardware Secure cryptoprocessor, e.g. smart card Trusted execution environment and attestation Secure channels Secure offline channel Independent channels Location-limited channels Human voice and video Attempts at avoiding trust and prior knowledge completely Opportunistic security Self-certifying identifiers

Secure hardware

Secure cryptoprocessor Secure hardware can store cryptographic keys  cannot be leaked by software Examples: SIM card Finnish identity card (eID) DESFire smart card, DESFire SAM IBM 4758 cryptographic coprocessor Trusted platform module (TPM)

Trusted execution environment Isolated computing environment, typically built into the main CPU Protects any computation from software attacks Intel TXT, ARM TrustZone, Global Platform Example uses: Mobile ticketing Storing cryptographic keys or login credentials DRM Remote attestation: can prove to a remote server that it is talking to an unmodified application Possible even anonymously

Secure channels

Two-channel authentication Authentication over two independent channels  attacker needs to compromise both Applications: Text messages to confirm online bank transactions Two-factor authentication by Google, Microsoft, Facebook etc. Two insecure channels is better than one – or are they?

Secure offline channel The channel may be authentic, secret, or both Traditional offline channels: User or system administrator configuring secret keys Armed courier, diplomatic mail etc. Offline channels in device pairing: Touching, magic wand User-verified key exchange User-transferred short secret or authentication code Synchronous user input Secret shared data from context sensing

Location-limited channel Some channels are relatively secure if the attacker is not in the room at the time of the key exchange Examples of location-limited channels: NFC, short-distance and directional radio, Bluetooth, camera, infrared, visible light, audio Caveats: Audio bugs and cameras get ever smaller Computers and phones can be used for spying Information may leak further than you think (e.g. radio signals, displays, keyboards)

Human voice or video authentication It is still difficult to spoof humans Remember the Turing test for artificial intelligence Examples: Personal meeting Cryptophone – human voice verification of the key exchange Caveats: Computers are getting better at processing live voice and video Meeting a person does not guarantee they are trustworthy

Authentication without trust and prior knowledge

Leap of faith In leap of faith, the first key exchange is unauthenticated Secure Shell (SSH) – first introduced LoF Opportunistic Ipsec HTTP strict transport security (HSTS) with self-signed certicates (not allowed in RFC 6797) Idea: attacker is unlikely to be always on the line – but is this assumption safe nowadays? Dangers: Leap of faith cannot be reused to recover from failure after the first authentication (e.g. changed SSH host key) Must be started by a human user, not triggered automatically by network traffic Resurrecting ducking model for device pairing Device associates to the first master it sees after reset

Self-certifying identifiers Public key or its hash as entity identifier Examples: Self-signed certificate Cryptographically generated IPv6 addresses (CGA) HIP host identity Hash of the data as object identifier Self-certifying file system BitTorrent and other P2P systems

Exercises Can you design a secure key exchange protocol for connecting home computers to each other based on: Trusted hub device e.g. in the network gateway User-verified key exchange Location-limited audio channel Leap of faith Self-certifying identifiers What are the weaknesses in each solution? Learn about the Bluetooth pairing protocols Learn about the authentication of location updates in Mobile IPv6