刘振 上海交通大学 计算机科学与工程系 电信群楼3-509

Slides:



Advertisements
Similar presentations
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Advertisements

Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
IPsec – IKE CS 470 Introduction to Applied Cryptography
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Anish Arora CSE651 Introduction to Network Security
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Protocols Part 3  Protocols 1.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Computer and Network Security - Message Digests, Kerberos, PKI –
Computer Science Lecture 23, page 1 CS677: Distributed OS Security: Focus of Control Three approaches for protection against security threats a)Protection.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
Chapter 9 Simple Authentication Protocols Simple Security Protocol Authentication Protocols Authentication and TCP Chapter 9 Simple Authentication protocols.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
Chapter eight: Authentication Protocols 2013 Term 2.
Network Security and It’s Issues
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
17- 1 Last time ● Internet Application Security and Privacy ● Link-layer security: WEP, WPA, WPA2 ● Network-layer security: VPN, IPSec.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Chapter 5 Network Security Protocols in Practice Part I
Reviews Rocky K. C. Chang 20 April 2007.
Encryption and Network Security
Cryptography and Network Security
Chapter 18 IP Security  IP Security (IPSec)
CSE 4905 IPsec II.
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Secure Sockets Layer (SSL)
CS480 Cryptography and Information Security
IPSec VPN Chapter 13 of Malik.
CSE 4095 Transport Layer Security TLS
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Slides have been taken from:
0x1A Great Papers in Computer Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Strong Password Protocols
Cryptographic Protocols
Protocol ap1.0: Alice says “I am Alice”
Computer and Information Security
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Diffie/Hellman Key Exchange
Unit 8 Network Security.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Guevara Noubir CSG254: Network Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography and Network Security
Integrated Security System
Network Security Standards
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Chapter 8 roadmap 8.1 What is network security?
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Part III: Protocols Part 3  Protocols 1.
AIT 682: Network and Systems Security
Key Exchange With Public Key Cryptography
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

刘振 上海交通大学 计算机科学与工程系 电信群楼3-509 liuzhen@sjtu.edu.cn 网络安全技术 刘振 上海交通大学 计算机科学与工程系 电信群楼3-509 liuzhen@sjtu.edu.cn

Secure Socket Layer SSL and IPSec 2

Socket layer “Socket layer” lives between application and transport layers SSL usually lies between HTTP and TCP application transport network link physical User Socket “layer” OS NIC SSL and IPSec 3

What is SSL? SSL is the protocol used for most secure transactions over the Internet For example, if you want to buy a book at amazon.com… You want to be sure that you are dealing with Amazon (one-way authentication) Your credit card information must be protected in transit (data confidentiality) As long as you have money, Amazon doesn’t care who you are (authentication need not to be mutual) SSL and IPSec 4

Simple SSL-like Protocol I’d like to talk to you securely CertB {KAB}Bob encrypted HTTP using KAB Bob Alice Is Alice sure she’s talking to Bob? Achieve Data Confentiality? SSL and IPSec 5

Simplified SSL Protocol RA CertB, RB {S}B, E(K, h(msgs || K)) h(msgs || K) Data encrypted under K Bob Alice S is randomly chosen by Alice K = h(S,RA,RB) msgs = all previous messages SSL and IPSec 6

SSL Sessions vs Connections SSL designed for use with HTTP 1.0 HTTP 1.0 usually opens multiple simultaneous (parallel) connections SSL session establishment is costly Due to public key operations SSL has an efficient protocol for opening new connections given an existing session SSL and IPSec 7

SSL Connection RA RB, h(msgs || K) h(msgs || K) Data encrypted under K Bob Alice Assuming SSL session exists So S is already known to Alice and Bob Again, K = h(S,RA,RB) No public key operations! (relies on known S) SSL and IPSec 8

IPSec SSL and IPSec 9

IPSec and SSL IPSec lives at the network layer IPSec is transparent to applications application transport network link physical User SSL OS IPSec NIC SSL and IPSec 10

IKE and ESP/AH In SSL, it also has these two parts Two parts to discuss Establish a session key – IKE How a secure channel works – ESP or AH In SSL, it also has these two parts We have only discussed the first part – establishing a session key We didn’t discuss how the secure channel works SSL and IPSec 11

IKE IKE has 2 phases Phase 1 is comparable to SSL session Phase 1  master session key setup Phase 2  ESP and/or AH key setup Phase 1 is comparable to SSL session Phase 2 is comparable to SSL connection In this course, we don’t cover Phase 2 SSL and IPSec 12

IKE Phase 1 Three ways to run phase 1 Public key encryption based Signature based Symmetric key based For each of these, there are two different “modes” to choose from Main mode Aggressive mode There are 6 variants of IKE Phase 1! Evidence that IPSec is over-engineered? SSL and IPSec 13

IKE Phase 1 According to the IKE specification, Main mode MUST be implemented Aggressive mode SHOULD be implemented In other words, if aggressive mode is not implemented, “you should feel guilty about it” SSL and IPSec 14

IKE Phase 1: Signature Based (Main Mode) CP CS ga mod p, RA gb mod p, RB E(K, “Alice” || proofA) Alice Bob E(K, “Bob” || proofB) CP = crypto proposed, CS = crypto selected K = h(gab mod p, RA, RB) SKEYID = h(RA, RB, gab mod p) proofA = [h(SKEYID, ga mod p, gb mod p, CP, “Alice”)]Alice SSL and IPSec 15

IKE Phase 1: Signature Based (Aggressive Mode) “Alice”, ga mod p, RA, CP “Bob”, RB, gb mod p, CS, proofB proofA Alice Bob Main difference from main mode Not trying to protect identities Cannot negotiate g or p SSL and IPSec 16

IKE Phase 1: Symmetric Key Based (Main Mode) CP CS ga mod p, RA gb mod p, RB E(K, “Alice” || proofA) Alice Bob E(K, “Bob” || proofB) KAB = symmetric key shared in advance K = h(gab mod p, RA, RB, KAB) SKEYID = h(K, gab mod p) proofA = h(SKEYID,ga mod p, gb mod p, CP,“Alice”) SSL and IPSec 17

Problems with Symmetric Key Based (Main Mode) Catch Alice sends her ID in message 5 Alice’s ID encrypted with K To find K Bob must know KAB To get KAB Bob must know he’s talking to Alice! Result: Alice’s ID must be IP address! SSL and IPSec 18

IKE Phase 1: Symmetric Key Based (Aggressive Mode) “Alice”, ga mod p, RA, CP “Bob”, RB, gb mod p, CS, proofB proofA Alice Bob Same format as digital signature aggressive mode Not trying to hide identities… As a result, does not have problems of main mode SSL and IPSec 19

IKE Phase 1: Public Key Encryption Based (Main Mode) CP CS ga mod p, {RA}Bob, {“Alice”}Bob gb mod p, {RB}Alice, {“Bob”}Alice E(K, proofA) Alice Bob E(K, proofB) K = h(gab mod p, RA, RB) SKEYID = h(RA, RB, gab mod p) proofA = h(SKEYID, ga mod p, gb mod p, CP,“Alice”) SSL and IPSec 20

IKE Phase 1: Public Key Encryption Based (Aggressive Mode) CP, ga mod p, {“Alice”}Bob, {RA}Bob CS, gb mod p, {“Bob”}Alice, {RB}Alice, proofB proofA Bob Alice K, proofA, proofB computed as in main mode Note that identities are hidden The only aggressive mode to hide identities Then why have main mode? SSL and IPSec 21

Public Key Encryption Issue? Public key encryption, aggressive mode Suppose Trudy generates Exponents a and b Nonces RA and RB Trudy can compute “valid” keys and proofs: gab mod p, K, SKEYID, proofA and proofB Also true of main mode SSL and IPSec 22

Public Key Encryption Issue? CP, ga mod p, {“Alice”}Bob, {RA}Bob CS, gb mod p, {“Bob”}Alice, {RB}Alice, proofB Trudy as Alice proofA Trudy as Bob Trudy can create exchange that appears to be between Alice and Bob Appears valid to any observer, including Alice and Bob! SSL and IPSec 23

Plausible Deniability A security failure? In this mode of IPSec, it is a feature! Plausible deniability: Alice and Bob can deny that any conversation has taken place! In some cases it might be a security failure If Alice makes a purchase from Bob, she could later repudiate it (unless she had signed) SSL and IPSec 24

Summary SSL IPSec