DNSSEC Cryptography Review DNSSEC Tutorial February 21, 2011 Hong Kong Will.i.am Hervey Allen.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Services and Security through Cryptography ccTLD Workshop November 27, 2007 Amman, Jordan Hervey Allen.
Security through Cryptography PacNOG 6 Hervey Allen.
Copyright Justin Klein Keane InfoSec Training Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
CSCI 6962: Server-side Design and Programming
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Cryptographic methods: Recommended reading: Applied Cryptography, Bruce Schneier PacNOG I Workshop Presented by Hervey Allen Materials originally by Brian.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Network Security Celia Li Computer Science and Engineering York University.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Hervey Allen Phil Regnauld 15 June 2009 Papeete, French Polynesia DNSSEC Tutorial: Public / Private.
Security through Cryptography SA-E Workshop May 13, 2009 Cairo, Egypt Hervey Allen.
Web Applications Security Cryptography 1
Lecture 4 - Cryptography
Presentation transcript:

DNSSEC Cryptography Review DNSSEC Tutorial February 21, 2011 Hong Kong Will.i.am Hervey Allen

Hong Kong DNSSEC and Cryptography Key Concepts Public / Private keys Hashes Digital signatures Chain of trust HSMs (Hardware Security Module) Are at the core of DNSSEC. If these do not make sense, then DNSSEC will not make sense.

Hong Kong Ciphers ==> ciphertext We start with plaintext. Something you can read. We apply a mathematical algorithm to the plaintext. The algorithm is the cipher. The plaintext is turned in to ciphertext. Almost all ciphers were secret until recently. Creating a secure cipher is HARD.

Hong Kong What it Looks Like

Hong Kong Keys To create ciphertext and turn it back to plaintext we apply a key to the cipher. The security of the ciphertext rests with the key. This is a critical point. If someone gets your key, your data is compromised. This type of key is called a private key. This type of cipher system is efficient for large amounts of data. This is a symmetric cipher.

Hong Kong Symmetric Cipher Private Key/Symmetric Ciphers clear text clear text cipher text KK The same key is used to encrypt the document before sending and to decrypt it once it is received

Hong Kong Features of Symmetric Ciphers Fast to encrypt and decrypt, suitable for large volumes of data A well-designed cipher is “only” subject to brute- force attack; the strength is therefore directly related to the key length. Current recommendation is a key length of around 128 bits, for data protection around 20 years.* Problem - how do you distribute the keys? *See for a good and fun discussion.

Hong Kong Examples of Symmetric Ciphers DES - 56 bit key length, designed by US security service 3DES - effective key length 112 bits AES (Advanced Encryption Standard) to 256 bit key length Blowfish bits, optimized for fast operation on 32-bit microprocessors IDEA bits, patented (requires a license for commercial use)

Hong Kong Public/Private Keys We generate a cipher key pair. One key is the private key, the other is the public key. The private key remains secret and should be protected. The public key is freely distributable. It is related mathematically to the private key, but you cannot (easily) reverse engineer the private key from the public key. Use the public key to encrypt data. Only someone with the private key can decrypt.

Hong Kong Example (Public/Private Key pair): clear text clear text k 1 (public key) k 2 (private key) cipher text One key is used to encrypt the document, a different key is used to decrypt it. This is a big deal!

Hong Kong Less Efficient & Attackable Symmetric ciphers (one private key) are much more efficient. About 1000x more efficient than public key algorithms for data transmission! Attack on the public key is possible via chosen-plaintext attack. Thus, the public/private key pair need to be large (2048 bits). Remember, symmetric cipher attack is to steal the private key...

Hong Kong One-Way Hashing Functions A mathematical function that generates a fixed length result regardless of the amount of data you pass through it. Generally very fast. You cannot generate the original data from the fixed-length result. Hopefully you cannot find two sets of data that produce the same fixed-length result. If you do this is called a collision.

Hong Kong Hashing Function Examples Unix crypt() function, based on DES, 56 bits (not secure) MD5 (Message Digest 5) bit hash (deprecated) SHA1 (Secure Hash Algorithm) bits Until August 2004, no two documents had been discovered which had the same MD5 digest. No collisions have yet been found in SHA-1, but it is now known to be compromised and will likely be phased out in the next few years. See for details. Still no feasible method to create any document which has a given MD5 digest Currently SHA2* in use to be replaced by “SHA3” soon.

Hong Kong Hashing One-Way Encryption clear text Munging the document gives a short message digest (hash). Not possible to go back from the digest to the original document. Fixed length hash or message digest hashing function

Hong Kong Hashing one-way encryption: another example Note the significant change in the hash sum for minor changes in the input. Note that the hash sum is the same length for varying input sizes. This is extremely useful. *Image courtesy Wikipedia.org.

Hong Kong One-Way Hashing Functions cont. Applying a hashing function to plaintext is called munging the document. The fixed-length result is referred to as a checksum, fingerprint, message digest, signature, digest, hash, hash sum…

Hong Kong What use is this? You can run many megabytes of data through a hashing function, but only have to check 160* bits of information. A compact and unique document signature.* You can generate a passphrase for your data – such as your private key. If someone gets your private key, they still must know your passphrase to decrypt anything using your private key. This is how Unix, Linux and Windows protect user passwords (but not effectively). * May increase after 2012 if a new SHA-3 algorithm is approved for use.

Hong Kong Protecting the Private Key k 2 (encrypted on disk) Passphrase entered by user k 2 ready for use hash symmetric cipher key K2K2 = private key *Such as SHA-1 or SHA-2

Hong Kong Digital Signatures Let's reverse the role of public and private keys. To create a digital signature on a document do:  Munge a document.  Encrypt the hash with your private key.  Send the document plus the encrypted hash.  On the other end munge the document and decrypt the encrypted message digest with the person's public key.  If they match, the document is authenticated.

Hong Kong Digital Signatures cont. Take a hash of the document and encrypt only that. An encrypted hash is called a "digital signature" k2k2 k1k1 digital signature COMPARE hash (public) (private)

Hong Kong Uses for Digital Signatures E-commerce. An instruction to your bank to transfer money can be authenticated with a digital signature. A trusted third party can issue declarations such as "the holder of this key is a person who is legally known as Alice Hacker" Like a passport binds your identity to your face Such a declaration is called a "certificate” Trusted third party is referred to as a CA, or Certificate Authority. And… we sign records in the DNS to prove they are authentic, unchanged and come from a trusted source.

Hong Kong Chain of Trust – Securing the DNS 1.Data authenticity and integrity by signing DNS data with a private key. 2.Publish the Public Key 3.Parent signs child’s DNS data (hash of data) 4.Child signs DNS data with their private key and publish the Public key. 5.Repeat 1 to 4 down the DNS hierarch. Root zone’s Public key and signed DNS data act as CA for the DNS.

Hong Kong Chain of Trust – Securing the DNS

Hong Kong HSMs:Hardware Security Modules A hardware device that provides: A protected keystore: -Tamper-proof memory -Detection of tampering or key destruction Cryptographic processing in hardware -Accelerate asymmetric and symmetric processing -Support for AES, RSA, 3DES, AES ciphers An API for key extraction -Hashing may be done on the host

Hong Kong Why use an HSM? Protect the private keys (move to HSM) Separate Keystore from signing software Implements standards compliant security -Verifiable security such as FIPS Requires features that show evidence of tampering, including tamper-evident coatings or seals that must be broken to attain physical access to the plaintext cryptographic keys and critical security parameters (CSPs) within the module, or pick-resistant locks on covers or doors to protect against unauthorized physical access.

Hong Kong What’s an HSM look like? Sun Crypto Accelerator 6000 Supports: Solaris, RHEL, SUSE PCI interface Inexpensive (USD $1,400) AEP Keyper 9720 Supports: Solaris, Linux, Windows Ethernet interface to PC Expensive (USD $20,000+) Software HSM Supports: UNIX Software interface to PC Free

Hong Kong Attacking the Cipher… Reality…?

Hong Kong Summary Public / Private keys Give out public key. Encrypt with this. Decrypt with private key. Hashes Create a unique, fixed-length signature (hash) of a data set. Digital signatures Munge document, encrypt hash with private key. Decrypt with public key. Chain of trust Verify parent zone signature (RRSIG) with public key of parent. HSMs (Hardware Security Module) Store private key in hardware implementing security standards.