1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.

Slides:



Advertisements
Similar presentations
AUTHENTICATION AND KEY DISTRIBUTION
Advertisements

CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Lecture 10: Mediated Authentication
Chapter 10 Real world security protocols
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
CSC 474 Information Systems Security
Handshake Protocols COEN 350. Simple Protocol Alice: Hi, I am Alice. My password is “fiddlesticks”. Bob: Welcome, Alice.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CS470, A.SelcukNeedham-Schroeder1 Needham-Schroeder Protocol Authentication & Key Establishment CS 470 Introduction to Applied Cryptography Instructor:
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Computer Security Key Management
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Key Management CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 1, 2004.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Slide 1 Vitaly Shmatikov CS 378 Key Establishment Pitfalls.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Authentication System
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Strong Password Protocols
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Lecture 11: Strong Passwords
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
Authentication (ch 9~12) IT443 – Network Security Administration 1.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Digital Signatures and Authentication Protocols Chapter 13.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Digital Signatures, Message Digest and Authentication Week-9.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Lecture 6.1: Protocols - Authentication and Key Exchange I CS 436/636/736 Spring 2012 Nitesh Saxena.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
Chapter 9 Simple Authentication Protocols Simple Security Protocol Authentication Protocols Authentication and TCP Chapter 9 Simple Authentication protocols.
Chapter 3 Basic Protocols. 3.1 Key Exchange n Session Key - Why? n Key Exchange with Symmetric Cryp. KDC request E KA (K AB ), E KB (K AB ) E KB (K AB.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Chapter eight: Authentication Protocols 2013 Term 2.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
@Yuan Xue Authentication Protocol and System Yuan Xue.
Security Handshake Pitfalls. Client Server Hello (K)
Handshake Protocols COEN 150.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
KERBEROS.
AIT 682: Network and Systems Security
Presentation transcript:

1 Security Handshake Pitfalls

2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate each other –Establish sessions keys –This process may involve many flaws

3 Login with shared secret Approaches –Using K Alice-Bob as a secret key to encrypt R: K Alice-Bob {R} –Hashing R and K Alice-Bob: h(K Alice-Bob, R) –Different time uses different R Discussions –Authentication is not mutual: Trudy can convince Alice that she is Bob –Off-line password guessing attack – assuming K Alice-Bob is derived from a password –Trudy can compromise the database at Bob and later impersonate Alice

4 All the previous weakness remains Minor security difference –Alice has to be able to reverse what Bob has done to R –If K Alice-Bob is derived from a password, it is vulnerable to a dictionary attack Login with shared secret cont’d

5 Alice and Bob have reasonably synchronized clocks more efficient Impersonate Alice within the acceptable clock skew If Trudy can set Bob’s clock back – reuse overheard timestamps

6 Authentication with One-Way Public Key Advantage –Database at Bob need not be protected from unauthorized disclosure Weakness –Trudy can trick Alice into signing/decrypting: Trudy can forge Alice’s signature on some quantity

7 Mutual Authentication Inefficient

8 Mutual Authentication Reflection Attack

9 General Principle –Do not have Alice and Bob do exactly the same thing Different Keys: have the key used to authenticate Alice be different from the key used to authenticate Bob Different Challenges: the challenge from the initiator (Alice) looks different from the challenge from the responder

10 Mutual Authentication Password Guessing without eavesdropping: send a message to Bob,… How to fix?

11 Mutual Authentication Public Keys –Assume Alice and Bob know each other’s public keys

12 Mutual Authentication Timestamps –Require synchronized clocks –Alice and Bob have to encrypt different timestamps

13 Integrity/Encryption for Data In order to provide integrity and/or encryption protection of the data following the authentication exchange, it is necessary for Alice and Bob to encrypt and/or add integrity –Require a session key established during mutual authentication

14 Establishment of Session Keys Shared Secret based authentication –After the authentication.. –Use K Alice-Bob {R} as the session key? Has been used as the third message in the authentication handshake –Use (K Alice-Bob +1){R} as the session key –Use K Alice-Bob {R+1} as the session key? Trudy impersonates Bob :

15 Nonce Types Timestamps –Require reasonably synchronized clocks Large random numbers –Tend to make the best nonce –Cannot be guessed/predicted Sequence number

16 Nonce Types R has to be unpredictable: suppose Eve impersonates Alice

Nonce Types R has to be unpredictable: Eve first impersonates Bob, then impersonates Alice 17

Nonce Types 18

19 Privacy and Integrity Replay attack –Use long sequence numbers Sequence number space rollover –Key rollover: changing keys in the middle of a conversation

20 Mediated Authentication Trudy may claim to be Alice and send “I am Alice” –Will not do Trudy any good It is possible that Alice’s messages get to Bob first, so Bob does not know how to decrypt it –Using a Ticket Must be followed by a mutual authentication exchange – confirm that Alice and Bob have the same key

21 Needham-Schroeder Protocol Classic protocol for authentication with KDC –Many others have been modeled after it (e.g. Kerberos)

22 Needham-Schroeder Protocol Nonce: a number that is used only once –A sequence number or a large random number –Deal with replay attacks Reflection Attack –Bob -> Alice: K AB {N 2 -1, N 3 } –Assume N i multiple of encryption blocksize –ECB: Message splicing: put together own plus revealed –With CBC, no need to decrement N 2, N 3 A Vulnerability –When Trudy gets a previous key used by Alice, Trudy may reuse a previous ticket issued to Bob for Alice –Essential Reason Ticket to Bob stays valid even if Alice changes her key

23 Expanded Needham-Schroeder The additional two messages assure Bob that the initiator has talked to KDC since Bob generates N B

24 Kerberos V4 Based on Needham-Schroeder, but with timestamps Save exchange of nonce