Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols Tom Chothia CWI.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Internet Protocol Security (IP Sec)
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Cryptography and Network Security Chapter 16
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
1 CCSDS Security Architecture Key Management 13 th April 2005 Athens.
Chapter 1  Introduction 1 Chapter 1: Introduction.
CP3397 ECommerce.
Modelling and Analysing of Security Protocol: Lecture 11 Modelling Checking Tom Chothia CWI.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
Chapter 5 Network Security Protocols in Practice Part I
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Lecture 22 Internet Security Protocols and Standards
Modelling and Analysing of Security Protocol: Lecture 3 Protocol Goals Tom Chothia CWI.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
Alice and Bob’s Revenge? AliceBob Elvis. If there is a protocol If there is a protocol then there must be a shortest protocol 1.Alice  Bob : ??? 2.Bob.
Modelling and Analysing of Security Protocol: Lecture 5 BAN logic Tom Chothia CWI.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Internet Protocol Security (IPSec)
Computer Science Public Key Management Lecture 5.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Secure Socket Layer (SSL)
Internet Protocol Security. Introduction Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Network Security Essentials Chapter 5
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Karlstad University IP security Ge Zhang
Chapter 22 Internet Security Protocols and Standards.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Potential vulnerabilities of IPsec-based VPN
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Lecture 5.1: Message Authentication Codes, and Key Distribution
Chapter 14 Network Encryption
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Web Security CS-431.
Chapter 5 Network Security Protocols in Practice Part I
Cryptography and Network Security
Chapter 8 Network Security.
Message Security, User Authentication, and Key Management
Network Security (contd.)
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols Tom Chothia CWI

Today What you can’t do with protocol: global consensus Activities that require global consensus Global consensus using probability or Trusted Third Party. BREAK Some commonly used protocol Extracting a protocol from a RFC

Skills not Memorisation What you have learn on this course (hopefully) are skill to design and analyse all (including future) protocols. Not what protocols people are using at the moment...but here are some anyway

Common Encryption AES: –Symmetric encryption RSA: –Public key encryption scheme OpenPGP –Public key encryption package

Diffie-Hellman Cross between a protocol and Crypto method. Common base for many protocols

Common Protocols Kerberos –Which you should know well SSL/TLS –Secure web-browsing IPsec –Encrypted Internet packets (VPNs) SSH –Remote secure login PKI –Public Key Distribution without a central TTP

Real Life Protocols Real Life Protocols include a lot of implementation details: –Negotiation of encryption schemes. –Versions numbers. –Data format. –Header layout. –Transmission speed.

IPsec A “suite” of protocols for secure Internet traffic. –IKEv2 protocol used for key establishment. It assumes that both parties have the public key of the other. Mostly used for Virtual Private Networks (logging into work from your laptop)

RFCs RFC are Requests For Comments. They define the Internet. For engineers and hackers, not computer scientists. Extracting a protocol from an RFC is a skill.

IKEv2 Key establishment for IPsec, RFC A  B : (g a mod p, N a ) 2.B  A : (g b mod p, N b ) K = f(g ab mod p, N a, N b )

IKEv2 Key establishment for IPsec, RFC A  B : (g a mod p, N a ) 2.B  A : (g b mod p, N b ) K = f(g ab mod p, N a, N b ) 3. A  B : {Sign K (A,Sign A (M1,M2), g c mod p, N a2 ) } K

IKEv2 Key establishment for IPsec, RFC A  B : (g a mod p, N a ) 2.B  A : (g b mod p, N b ) K = f(g ab mod p, N a, N b ) 3. A  B : {Sign K (A,Sign A (M1,M2), g c mod p, N a2 ) } K

IKEv2 Key establishment for IPsec, RFC A  B : (g a mod p, N a ) 2.B  A : (g b mod p, N b ) K = f(g ab mod p, N a, N b ) 3. A  B : {Sign K (A,Sign A (M1,M2), g c mod p, N a2 ) } K

IKEv2 Key establishment for IPsec, RFC A  B : (g a mod p, N a ) 2.B  A : (g b mod p, N b ) K = f(g ab mod p, N a, N b ) 3. A  B : {Sign K (A,Sign A (M1,M2), g c mod p, N a2 ) } K

IKEv2 Key establishment for IPsec, RFC A  B : (g a mod p, N a ) 2.B  A : (g b mod p, N b ) K = f(g ab mod p, N a, N b ) 3. A  B : {Sign K (A,Sign A (M1,M2), g c mod p, N a2 ) } K

IKEv2 Key establishment for IPsec, RFC A  B : (g a mod p, N a ) 2.B  A : (g b mod p, N b ) K = f(g ab mod p, N a, N b ) 3. A  B : {Sign K (A,Sign A (M1,M2), g c mod p, N a2 ) } K 4. B  A : {Sign K (B,Sign B (M1,M2), g d mod p, N b2 ) } K First session key = f(g cd mod p, N a2, N b2 )

SSH Remote Secure Log in.

Course Summary The whole point of the course: –YOU don’t design a bad protocol –and YOU don’t use/accept a bad protocol

Course Summary The whole point of the course: –YOU don’t design a bad protocol –and YOU don’t use/accept a bad protocol Analysis of Protocols is a Science: –Attacker Model –Protocol Goals –Protocol Assumptions

Tools You have tools to help you analysis BAN logic: –Always think about the rules ProVerif: –If you designing a protocol use it (or something like it) Model Checking: –Very useful, not just for protocols.

Today What you can’t do with protocol: global consensus Activities that require global consensus Global consensus using probability or Trusted Third Party. BREAK Some commonly used protocol Extracting a protocol from a RFC

Presentations me ASAP.