COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?

Slides:



Advertisements
Similar presentations
SSL/TLS Protocol Network Security Gene Itkis. Basic paradigmatic application: on-line purchase Client contacts Server (possibly for the first time) Spontaneity.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
SMUCSE 5349/49 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Cryptography and Network Security Chapter 17
Cryptography Basic (cont)
0 SSL3.0 / TLS1.0 Secure Communication over Insecure Line.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Chapter 8 Web Security.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cryptography 101 Frank Hecker
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
CSCI 6962: Server-side Design and Programming
Chapter 31 Network Security
11 Secure Sockets Layer (SSL) Protocol (SSL) Protocol Saturday, University of Palestine Applied and Urban Engineering College Information Security.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
December 2008Prof. Reuven Aviv, SSL1 Web Security with SSL Network Security Prof. Reuven Aviv King Mongkut’s University of Technology Faculty of information.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Authentication 3: On The Internet. 2 Readings URL attacks
SSL (TLS) Part 2 Generating the Premaster and Master Secrets + Encryption.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Washington System Center © 2005 IBM Corporation August 25, 2005 RDS Training Secure Socket Layer (SSL) Overview z/Series Security (Mary Sweat, Greg Boyd)
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Secure Sockets Layer (SSL) Protocol by Steven Giovenco.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
8-1 CSE 4707/5850 Network Security (2) SSL/TLS. 8-2 Think about Google or YouTube  Desired properties  Indeed the other side is Google or YouTube server.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Secure Sockets Layer (SSL)
CSCE 715: Network Systems Security
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

COMP043-Cryptology Week 4 – Certs and Sigs

Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work? –You can make a signature using a public key cipher and a hash function –Some signature schemes use a special Signature Algorithm that is like a public key hash algorithm –Although we don't call them that

Digital Signatures Original document MD5 checksum ad cf 9c 83 7e 1c a7 a4 95 be c9 9f 84 7f 32 hex characters x 4 = 128 bits

Digital Signatures Notice that encryption uses private key

Digital Signatures

Digital Signatures - Checking Your system does this And checks against this

Integrity, Authenticity and Non-repudiation Integrity –Digest matches so message has not been tampered with Authenticity –Digest was encrypted with sender's private key, so digest wasn't tampered with –Message must be authentic message from key owner Non-repudiation –No one else has your private key

Signature Schemes, RSA RSA refers to a public key cypher Also refers to a digital signature scheme using the cipher Stronger if used to sign a hash, not the message –Related messages produce related signatures –Signing a hash removes relationship between related messages

ElGamal Signature Produces two signature components using complex math Verification combines the two Stronger than RSA

DSS, DSA Digital Signature Standard –Adopted by NIST in 1993 as FIPS 186 –Updated 1996, now FIPS DSA is the Digital Signature Algorithm used by DSS Based on ElGamal scheme Uses a pre-generated key plus a one time random number r Creates two sigs, one based only on r, one based on message digest and r Two are combined for verification Faster than RSA, smaller sigs than ElGamal

ECDSA Elliptic Curve DSA Based on different math Achieves same crypto strength as DSA using much smaller keys –So faster generation of same strength signature

Public Key Authenticity When we use a public key how do we know it is the right key? Someone (Eve) creates a phony key with the name and user ID of someone else (Alice) Bob uses this key to encrypt message for Alice Eve intercepts and is able to decrypt message It is essential to trust the authenticity of the key

Key Distribution In a public key environment, it is vital that you are assured that the public key with which you are encrypting data, or verifying a signature, is in fact the public key of the intended recipient, or sender, and not a forgery. You could simply trust only with those keys which have been physically handed to you. But suppose you need to exchange with people you have never met; how can you tell that you have the correct key?

Digital Certificates Are an attempt to simplify the task of establishing whether a public key truly belongs to the purported owner. A digital certificate consists of three things: –A public key. –Certificate information. ("Identity" information about the user, such as name, user ID, and so on.) –One or more digital signatures. If you trust the key that signed the certificate, then you trust the key that's in the certificate.

Digital Certificates Process Apply for a digital certificate from a Certificate Authority (CA) The CA issues a signed digital certificate containing your Public Key and other identification information. The CA makes its own public key readily available –In a certificate on your computer, or from a server Senders attach their certificate to signed message along with signature The recipient of the message uses the CA's public key to verify the attached digital certificate as issued by the CA Obtains sender's public key from the certificate. Use public key to verify message signature

Digital Certificate * Certificate o Version o Serial Number o Algorithm ID o Issuer o Validity + Not Before + Not After o Subject o Subject Public Key Info + Public Key Algorithm + Subject Public Key o Issuer Unique Identifier (Optional) o Subject Unique Identifier (Optional) o Extensions (Optional) +... * Certificate Signature Algorithm * Certificate Signature

Certificate Management Small groups of people who wish to communicate securely can manually exchange each owner's public key. –Manual public key distribution Certificate Servers –Storage-only repositories of keys or keys and certificates Public Key Infrastructures (PKIs). –More structured systems that provide additional key management features –Such as revocation

PKI Operations Issuing Dissemination Revocation Expiration Trust Transfer Infrastructure has to support these operations

Examples

Problems? Trust starts with the CA certs loaded into browser by supplier (MS, Mozilla, Google etc) No one wants a browser that can't visit some sites so suppliers want to include everyone Too many CA's some not very good Turk Trust fiasco led to MITM attacks on SSL protected sessions turktrust-fiasco.htmlhttp://erratasec.blogspot.ca/2013/01/notes-on- turktrust-fiasco.html

SSL / TLS

SSL Basics Client/Server Client requests TLS session –Port number (443 for HTTPS) –Protocol specific STARTTLS for mail and newsgroups

SSL Basics Four protocols Handshake protocol  Uses public-key cryptography to establish a shared secret key between the client and the server Record protocol –Uses the secret key established in the handshake protocol to protect communication between the client and the server ChangeCypherSpec protocol Alert protocol

Handshake Protocol Client sends list of supported cipher suites –Cyphers and hash algorithms Server selects strongest it can support, tells client Server sends certificate Server may send cert request if client to be authenticated. Client may send cert Client verifies certificate, uses public key to encrypt random number Sends result to server as basis for symmetric encryption key Client may send signature over previous messages for auth.

Handshake Messages ClientHello ServerHello CertificateRequest –From server if client to be authenticated Certificate ServerHelloDone ClientKeyExchange –With the random number CertificateVerify –With client signature ChangeCipherSpec –Both sides send when finished handshake Finished –Encrypted with new cypher

Other Key Exchange Methods Previous slides assume RSA key exchange –Random number encrypted with key from cert Can also use Diffie-Hellman –Three different versions –Some protect against MITM –By encrypting parameters with key from cert –Or supplying some in the cert –Considered slower so not often used

Record Protocol Other three operate over record protocol Once cypher agreed on, record protocol is encrypted And signed via MAC Application protocol (HTTP) encapsulated in record protocol

SSL/TLS Record Protection Use symmetric keys established in handshake protocol

Key Generation Key exchange establishes one pre-master key Need 6 keys –Symmetric key for encryption –Symmetric key for HMAC (hashing) –IV for CBC Key generation uses pre-master key and random number from client and server with hash functions to generate master key Then keys generated from master key in similar manner

Sessions and Connections Session can consist of many connections Session state includes session ID from server –Plus cypher suite, certs, master key Connection state includes key generation data –Random numbers and six keys –Plus sequence number Session can be resumed by establishing new connection –Easier than new session

TLS Dropped some old cyphers, added some new More complicated key generation More alert types Some messages use simpler hashes

Some sample test questions Which of the following is not a candidate integrity algorithm for SSH? –HMAC-SHA1 –HMAC-MD5 –DES-CBC –HMAC-sha1-96

more In SSH host authentication: –Host encrypts random number with private key and sends to client –Host decrypts random number sent by client –Host signs part of the DH exchange –Host verifies signature sent by client

more The six keys used in SSH transport layer include: –Integrity key, host IV and client public key –Host signature, client IV and DH parameters –Host IV, client encryption key, host public key –Host encryption key, client IV, host integrity key

Lab This Week Creating X.509 certificates and Certificate Authority