CSC 774 Advanced Network Security

Slides:



Advertisements
Similar presentations
Client Puzzles A Cryptographic Defense Against Connection Depletion Attacks Ari Juels and John Brainard RSA Laboratories.
Advertisements

An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Client Puzzles A Cryptographic Defense Against Connection Depletion Attacks Most of slides come from Ari Juels and John Brainard RSA Laboratories.
CSE 1302 Lecture 23 Hashing and Hash Tables Richard Gesick.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 4.2 BiBa.
RRSIG:“I certify that this DNS record set is correct” Problem: how to certify a negative response, i.e. that a record doesn’t exist? NSEC:“I certify that.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Basic Number Theory.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
CSC 774 Advanced Network Security
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Digital Signatures and Hash Functions. Digital Signatures.
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Look-up problem IP address did we see the IP address before?
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
A New Two-Server Approach for Authentication with Short Secrets John Brainard, Ari Juels,Burt Kaliski and Michael Szydlo RSA Laboratories To appear in.
Chapter 9 Cryptographic Protocol Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
SSH Secure Login Connections over the Internet
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Protecting Web Servers from Content Request Floods Srikanth Kandula ▪ Shantanu Sinha ▪ Dina Katabi ▪ Matthias Jacob CSAIL –MIT.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Hashing Sections 10.2 – 10.3 CS 302 Dr. George Bebis.
ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced.
Attacks Overview Nguyen Cao Dat 1. BK TP.HCM Outline  Cryptographic Attacks ▫ Frequency analysis ▫ Brute force attack ▫ Meet-in-the-middle attack ▫ Birthday.
Mehmud Abliz, Taieb Znati, ACSAC (Dec., 2009). Outline Introduction Desired properties Basic scheme Improvements to the basic scheme Analysis Related.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Multi-user Broadcast Authentication in Wireless Sensor Networks Kui Ren, Wenjing Lou, Yanchao Zhang SECON2007 Manar Mahmoud Abou elwafa.
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 519/599 Applied Cryptography ADVANCED PRIMITIVES AND TOOLS Credits: Dr. Peng Ning.
Prepared by Dr. Lamiaa Elshenawy
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Stanford University Ari Juels, RSA Laboratories Alex Halderman, Princeton University.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Hash Functions.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Denial of Service Attacks and Countermeasures Analysis Dang Nguyen Duc School of Engineering ( )
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptographic hash functions
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CS/ECE 418 Introduction to Network Security
A Cryptographic Defense Against Connection Depletion Attacks
CS/ECE 478 Introduction to Network Security
A Cryptographic Defense Against Connection Depletion Attacks
Hash-based Primitives Credits: Dr. Peng Ning and Dr. Adrian Perrig
CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr
LAB 3: Digital Signature
Presentation transcript:

CSC 774 Advanced Network Security Topic 2.2 Hash-Based Primitives CSC 774 Dr. Peng Ning

Outline Primitives based on cryptographic hash functions Bloom filters One-way hash chain Merkle hash tree Client puzzles Bloom filters Based on a different type of hash functions CSC 774 Dr. Peng Ning

Ki=F(Ki+1), F: hash function One-Way Hash Chain Used for many network security applications Example: S/Key Good for authentication of the hash values commitment Ki=F(Ki+1), F: hash function K4 F K3 K2 K1 K0 Kn= R CSC 774 Dr. Peng Ning

Merkle Hash Tree A binary tree over data values For authentication purpose The root is the commitment of the Merkle tree Known to the verifier. Example To authenticate k2, send (m2, m3,m01,m47) Verify m07= h(h(m01||h(f(k2)||m3)||m47) CSC 774 Dr. Peng Ning

Bloom Filters It’s used to verify that some data is not in the database (mismatch) List of bad credit card numbers Useful when the data consumes a very small portion of search space A bloom filter is a bit string k hash functions that map the data into n bits in the bloom filter CSC 774 Dr. Peng Ning

A Simple Example Check for 22: Check for 51 Use a bloom filter of 16 bits H1(key) = key mod 16 H2(key) = key mod 14 + 2 Insert numbers 27, 18, 29 and 28 1 1 1 1 1 1 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Check for 22: H1(22) = 6, H2(22) = 10 (not in filter) Check for 51 H1(51) = 3, H2(51) = 11 (false positive) CSC 774 Dr. Peng Ning

Probability of False Positives Consider an m-bit Bloom filter with k hash functions After inserting n elements Exercise CSC 774 Dr. Peng Ning

Client Puzzles Juels and Brainard client puzzle construction Use pre-image of crypto hash functions See T02.2.x-ClientPuzzles.ppt Aura, Nikander, and Leiwo client puzzle construction Use special image of crypto hash functions CSC 774 Dr. Peng Ning

Client Puzzles w/ Special Images of Hash Functions C  S: Hello S  C: NS C  S: C, NS, NC, X S: verify h(C, NS, NC, X) has k leading zero’s CSC 774 Dr. Peng Ning

Client Puzzles w/ Special Images of Hash Functions (Cont’d) Exercise What’s the expected cost of finding a puzzle solution? Compare with the pre-image based puzzle construction. CSC 774 Dr. Peng Ning

New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten CSC 774 Dr. Peng Ning

Motivation Client puzzle mechanism can become the target of DoS attacks Servers have to validate solutions which require resources Puzzles must be solved online User time is more important than CPU time CSC 774 Dr. Peng Ning

Properties of the Proposed Solution The creation of puzzles is outsourced to a secure entity, the bastion Creates puzzle with no regard to which server is going to use them Verifying puzzle solutions is a table lookup Clients can solve puzzles offline ahead of time A puzzle solution gives access to a virtual channel for a short time period CSC 774 Dr. Peng Ning

Puzzle Properties Unique puzzle solutions Each puzzle has a unique solution Per-channel puzzle distribution Puzzles are unique per each (server, channel, time period) triplet Per-channel puzzle solution If a client has a solution for one channel, he can calculate a solution for another server with the same channel easily CSC 774 Dr. Peng Ning

G: A group of prime numbers with generator g. Pick rc,t  Zq ac,t  [rc,t, (rc,t + l) mod q] Let gc,t = gf’(a) , puzzle c,t = (gc,t, rc,t) Bastion c,t for all channels c,t Pub: Y1 Router Virtual Channels Priv: X1 Enumerate l values to solve ac,t Take the easy way Solution is c,t = Y1f’(a) c,t = gc,tX1 CSC 774 Dr. Peng Ning

Pub: Y1 Server 1 Pub: Y2 Priv: X1 Pub: Y3 c,t = gc,tX1 Server 2 Virtual Channels Pub: Y3 c,t = gc,tX1 Server 2 Server 1: c,t = Y1f’(a) Priv: X2 Virtual Channels Server 2: c,t = Y2f’(a) c,t = gc,tX2 Server 3: c,t = Y3f’(a) Server 3 Priv: X3 Virtual Channels c,t = gc,tX3 CSC 774 Dr. Peng Ning

System Description Solutions for puzzles are only valid for the time period t. (Order of minutes) Client: During Ti, download puzzles for Ti+1 and solve Check to see if server has a public key If so append puzzle solutions to messages Server: During Ti, download and solve all puzzles for Ti+1 If server is under attack only accept requests that have valid tokens Checking puzzle solution is a simple table lookup CSC 774 Dr. Peng Ning

Communication Client uses option field in TCP SYN to relay the token Only the first 48 bits of the solution is used The server determines the virtual channel Server limits new connection per channel Public key: Y Puzzle index: c Token: c,t Token: c,t+1 Virtual Channels c CSC 774 Dr. Peng Ning

Resilience Against Attacks 2.1 GHz Pentium can process 1024-bit DH key in 3.7ms. With 5% recourse it can populate tokens for 16,000 virtual channels. If s=2, every client can solve at least one puzzle and half of them can solve at least two If attacker has 50 zombie machines, it can create 2*50*2 = 200 puzzle solutions occupying 1.25% of the channels Probability of a benign user not getting a normal channel <.625% CSC 774 Dr. Peng Ning

Experiment Puzzle checking (table lookup) is implemented at kernel lvl After the routing and before the packet reaches higher level protocols like TCP Simulate conventional puzzles by replacing the lookup code with a SHA-1 hash computation Simulate syncookies by allowing Linux to send an ACK packet back CSC 774 Dr. Peng Ning

CSC 774 Dr. Peng Ning