Lecture 10: Mediated Authentication

Slides:



Advertisements
Similar presentations
Modelling and Analysing Security Protocol: Lecture 4 Attacks and Principles Tom Chothia CWI.
Advertisements

AUTHENTICATION AND KEY DISTRIBUTION
COEN 350 Kerberos.
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Chapter 10 Real world security protocols
Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
SCSC 455 Computer Security
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Akshat Sharma Samarth Shah
COS 461 Fall 1997 Todays Lecture u intro to security in networking –confidentiality –integrity –authentication –authorization u orientation for assignment.
CNS2010handout 12 :: crypto protocols1 ELEC5616 computer and network security matt barrie
CSC 474 Information Systems Security
Handshake Protocols COEN 350. Simple Protocol Alice: Hi, I am Alice. My password is “fiddlesticks”. Bob: Welcome, Alice.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
CS470, A.SelcukNeedham-Schroeder1 Needham-Schroeder Protocol Authentication & Key Establishment CS 470 Introduction to Applied Cryptography Instructor:
COEN 350 Kerberos. Provide authentication for a user that works on a workstation. Uses secret key technology Because public key technology still had patent.
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Slide 1 Vitaly Shmatikov CS 378 Key Establishment Pitfalls.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Key Distribution CS 470 Introduction to Applied Cryptography
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Lecture 11: Strong Passwords
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Digital Signatures, Message Digest and Authentication Week-9.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
Lecture 6.1: Protocols - Authentication and Key Exchange I CS 436/636/736 Spring 2012 Nitesh Saxena.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Chapter eight: Authentication Protocols 2013 Term 2.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Security Handshake Pitfalls. Client Server Hello (K)
CS480 Cryptography and Information Security
Handshake Protocols COEN 150.
Message Security, User Authentication, and Key Management
IT IS 6200/8200.
Lecture 6.1: Protocols - Authentication and Key Exchange I
Diffie/Hellman Key Exchange
AIT 682: Network and Systems Security
Presentation transcript:

Lecture 10: Mediated Authentication simple algorithm Needham-Schroeder simple expanded Otway-Rees nonce types

Establishing Session Key Alice, Bob KB{Alice, KAB} KDC KA{Bob, KAB} Alice Bob problem (besides others): Bob will not know how to decrypt a message from Alice if message from KDC is late establishing connection KDC <-> Bob is (somewhat) expensive

Establishing Session Key (variant) Alice, Bob KA{Bob, KAB}, ticketB where ticketB= KB{Alice, KAB} KDC Alice Bob Alice, ticketB Problems: no authentication between Alice and Bob no freshness guarantee for KAB (what if Alice reuses the ticket?)

Needham-Schroeder Protocol Outline N1, Alice, Bob KA{N1, Bob, KAB, ticketB} where ticketB= KB{KAB, Alice} KDC ticketB, KAB{N2} Alice Bob KAB{N2-1, N3} KAB{N3-1}

Needham-Schroeder Protocol Explained N1 is for KDC authentication to ensure freshness of KAB attack (without nonce): Trudy stole KAB from Bob and records old KDC’s reply to Alice; Trudy waits for a new request to KDC form Alice to talk to Bob and plays back old KDC’s reply impersonating KDC Reply from KDC strings “Bob” and “Alice” disallows Trudy tampering with messages and hijacking the conversation N2, N3: for key confirmation and mutual authentication (minor) issue: ticket is unnecessarily doubly encrypted in message from KDC

Needham-Schroeder: Reflection Attacks If message integrity is vulnerable (for example with ECB), reflection attack is possible replay ticketB, KAB{N2} KAB{N2-1, N3} Trudy can separate KAB{N2-1} and KAB {N3} Trudy Bob KAB{N3-1} ticketB, KAB{N3} BTW, why are N2 and N3 encrypted at all in N-S? otherwise reflection attack is even easier Trudy Bob KAB{N3-1, N4} BTW, why are N2 and N3 encrypted at all in N-S?

Expanded Needham-Schroeder in standard N-S, Bob doesn’t have freshness guarantee for KAB (i.e., can’t detect replays) to fix – get a nonce form Bob hello KB{NB} N1, Alice, Bob, KB{NB} KA{N1, Bob, KAB, ticketB} where ticketB= KB{KAB, Alice, NB} KDC Alice Bob ticketB, KAB{N2} KAB{N2-1, N3} KAB{N3-1}

Otway-Rees Protocol Outline NC, “Alice”, “Bob”, KA{NA, NC, “Alice”, “Bob”} KA{NA, NC, “Alice”, “Bob”} KB{NB, NC, “Alice”, “Bob”} KDC NC, KA{NA, KAB}, KB{NB, KAB} Alice Bob KA{NA, KAB} KAB{anything recognizable}

Otway-Rees Protocol Explained NA, NB: Provides freshness guarantee for A & B, as well as authentication of KDC. NC: To bind Alice, Bob, and the session. having separate NA and NC is not necessary for security, though it’s good for functional separation of nonces and uniformity of KDC messages.

Nonce Types nonce: a quantity which any given user of a protocol uses only once (a quantity which is guaranteed fresh) nonce types: sequence numbers need to keep state, what if Trudy can induce crashes (DoS attack?) timestamps need synchronized clocks random numbers freshness guarantee is only probabilistic but if number is large it is good enough unpredictable

Value of Unpredictability for Nonces I’m Alice KAB{R} Alice Bob R recall the one one-way authentication alg is there a problem if R is a sequence number? what if Alice sends the plaintext challenge first and Alice replies with encrypted challenge? what if timestamps are used for challenges? is there a problem if R is a sequence number? yes, Trudy can eavesdrop on previous session and predict R what if Bob sends encrypted challenge first? still a problem: Trudy can predict what the next challenge from Bob will be, request Alice to encrypt it and impersonate Alice to Bob what if timestamps are used for challenges? still a problem if timestamp granularity is low (seconds?) – trudy can attempt to guess a timestamp