COMPSCI210 Recitation 5 Oct 2012 Vamsi Thummala

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
D u k e S y s t e m s CPS 210 Security in Networked Systems Always Use Protection Jeff Chase Duke University
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Celia Li Computer Science and Engineering York University.
Cryptography: an overview
Cryptography: an overview
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Unit 3 Section 6.4: Internet Security
Public-Key Cryptography and Message Authentication
Grid Security.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Secure Sockets Layer (SSL)
Cryptographic Hash Function
CSCE 715: Network Systems Security
Encryption
Basic Network Encryption
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Introduction to Symmetric-key and Public-key Cryptography
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Cryptography: an overview
Protocol ap1.0: Alice says “I am Alice”
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Lecture 10: Network Security.
CDK: Chapter 7 TvS: Chapter 9
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Introduction to Cryptography (1)
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Security: Integrity, Authentication, Non-repudiation
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 8 roadmap 8.1 What is network security?
LAB 3: Digital Signature
Presentation transcript:

COMPSCI210 Recitation 5 Oct 2012 Vamsi Thummala Midterm Exam Review COMPSCI210 Recitation 5 Oct 2012 Vamsi Thummala

My biased view A bit challenging Thought provoking Tests your reading comprehension skills under time pressure Thought provoking Not a brain dump test Opportunity for learning Just an another class Tests your confidence Not difficult to score but easy to get lost

Terminology so far .. Entity Component Context Connector Channel Principal, Identity, Attribute, Label Component Context Connector Channel Trusted computing base Authentication Authorization Reference monitor Subject, Object, Guard Process Thread Kernel Address space Files Pipes Sockets Binder Event

Systems/Abstractions Traditional single node Unix Linux Mobile Android/Linux Web Chromium/Linux Network basics Client/Server

Security, an overview We reduce it to three intertwined issues: 1. What program am I running? Can this program be trusted? Who says? Can I be sure that the program has not been tampered? 2 . Who am I talking to? Can this entity be trusted? Can I be sure the communication has not been tampered? 3. Should I approve this request? R(op, subject, object) Who is the requester? (subject) What program is speaking for the requester? Does the subject have the required permissions?

Elements of security Isolation/protection Integrity Authentication Sandboxes and boundaries prevent unchecked access. Integrity Fingerprint data to detect tampering. Encrypt data to prevent access or tampering. Authentication Identify a peer by proof that it possesses a secret. Identity and attributes Identities have credentials: names, tags, roles... Authorization == access control Guard checks credentials against an access policy.

Access Control Triplet {op, subject, object} Components run within contexts (isolated sandboxes). Each component/context is associated with an identity with some attributes (subject). Components use system calls to interact across context boundaries, or access shared objects. Each object has some access attributes. Principle of least privilege limits the damage a component can do if it “goes rogue”.

Crypto primitives Encrypt/Decrypt Signing Secure hashing Use a shared secret key (symmetric) or use a keypair one public, one private (asymmetric) Signing Secure hashing useful for fingerprinting data

Cryptography for Busy People Standard crypto functions parameterized by keys. Fixed-width “random” value (length matters, e.g., 256-bit) Symmetric (DES: fast, requires shared key K1 = K2) Asymmetric (RSA: slow, uses two keys) “Believed to be computationally infeasible” to break M Encrypt E K1 D Decrypt M K2 [Image: Landon Cox]

Two Flavors of “Signature” A digest encrypted with a private asymmetric key is called a digital signature “Proves” that a particular identity sent the message. “Proves” the message has not been tampered. “Unforgeable” The sender cannot deny sending the message. “non-repudiable” Can be legally binding in the United States A digest encrypted with a shared symmetric key is called a message authentication code (MAC). faster, but…

Nonce Verifies the freshness of a message Eavesdropping Tampering serverNonce Tampering clientNonce