CS 425 / ECE 428 Distributed Systems Fall 2014 Indranil Gupta (Indy) Lecture 24B: Security All slides © IG.

Slides:



Advertisements
Similar presentations
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Public Key Management and X.509 Certificates
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Computer Security Dept. of Computer Science CS 5200 Fall 2005 Dr. Scott Cannon.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Cryptographic Technologies
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
CS542: Topics in Distributed Systems Security. Why are Distributed Systems insecure?  Distributed component rely on messages sent and received from network.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Security Management.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Authentication 3: On The Internet. 2 Readings URL attacks
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Encryption CS110: Computer Science and the Internet.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
Computer Science 425 Distributed Systems Fall 2009 Lecture 26 Security in Distributed Systems Klara Nahrstedt.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Basics of Cryptography
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CS 425 / ECE 428 Distributed Systems Fall 2018 Indranil Gupta (Indy)
CDK: Chapter 7 TvS: Chapter 9
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Presentation transcript:

CS 425 / ECE 428 Distributed Systems Fall 2014 Indranil Gupta (Indy) Lecture 24B: Security All slides © IG

Leakage –Unauthorized access to service or data –E.g., Someone knows your bank balance Tampering –Unauthorized modification of service or data –E.g., Someone modifies your bank balance Vandalism –Interference with normal service, without direct gain to attacker –E.g., Denial of Service attacks Security Threats

Eavesdropping –Attacker taps into network Masquerading –Attacker pretends to be someone else, i.e., identity theft Message tampering –Attacker modifies messages Replay attack –Attacker replays old messages Denial of service: bombard a port Common Attacks

Confidentiality –Protection against disclosure to unauthorized individuals –Addresses Leakage threat Integrity –Protection against unauthorized alteration or corruption –Addresses Tampering threat Availability –Service/data is always readable/writable –Addresses Vandalism threat Addressing the Challenges: CIA Properties

Many scientists (e.g., Hansen) have argued for a separation of policy vs. mechanism A security policy indicates what a secure system accomplishes A security mechanism indicates how these goals are accomplished E.g., –Policy: in a file system, only authorized individuals allowed to access files (i.e., CIA properties) –Mechanism: Encryption, capabilities, etc. Policies vs. Mechanisms

Authentication –Is a user (communicating over the network) claiming to be Alice, really Alice? Authorization –Yes, the user is Alice, but is she allowed to perform her requested operation on this object? Auditing –How did Eve manage to attack the system and breach defenses? Usually done by continuously logging all operations. Mechanisms: Golden A’s

Don’t know how powerful attacker is When designing a security protocol need to 1. Specify Attacker Model: Capabilities of attacker (Attacker model should be tied to reality) 2. Design security mechanisms to satisfy policy under the attacker model 3. Prove that mechanisms satisfy policy under attacker model 4. Measure effect on overall performance (e.g., throughput) in the common case, i.e., no attacks Designing Secure Systems

Basic Cryptography Next

Principals: processes that carry out actions on behalf of users –Alice –Bob –Carol –Dave –Eve (typically evil) –Mallory (typically malicious) –Sara (typically server) Basic Security Terminology

Key = sequence of bytes assigned to a user –Can be used to “lock” a message, and only this key can be used to “unlock” that locked message Keys

Message (sequence of bytes) + Key  (Encryption)  Encoded message (sequence of bytes) Encoded Message (sequence of bytes) + Key  (Decryption)  Original message (sequence of bytes) No one can decode an encoded message without the key Encryption

I. Symmetric Key systems: –K A = Alice’s key; secret to Alice –K AB = Key shared only by Alice and Bob –Same key (K AB ) used to both encrypt and decrypt a message E.g., DES (Data Encryption Standard): 56 b key operates on 64 b blocks from the message Two Cryptography Systems

II. Public-Private Key systems: –K Apriv = Alice’s private key; known only to Alice –K Apub = Alice’s public key; known to everyone –Anything encrypted with K Apriv can be decrypted only with K Apub –Anything encrypted with K Apub can be decrypted only with K Apriv RSA and PGP fall into these category –RSA = Rivest Shamir Adleman –PGP = Pretty Good Privacy –Keys are several 100s or 1000s of b long –Longer keys => harder for attackers to break –Public keys maintained via PKI (Public Key Infrastructure) Two Cryptography Systems (2)

If Alice wants to send a secret message M that can be read only by Bob –Alice encrypts it with Bob’s public key –K Bpub ( M) –Bob only one able to decrypt it –K Bpriv ( K Bpub ( M) ) = M –Symmetric too, i.e., K Apub ( K Apriv ( M) ) = M Public-Private Key Cryptography

Shared keys reveal too much information –Hard to revoke permissions from principals –E.g., group of principals shares one key  want to remove one principal from group  need everyone in group to change key Public/private keys involve costly encryption or decryption –At least one of these 2 operations is costly Many systems use public/private key system to generate shared key, and use latter on messages Shared/Symmetric vs. Public/Private

How to use cryptography to implement I.Authentication II.Digital Signatures III.Digital Certificates Next

Two principals verify each others’ identities Two flavors –Direct authentication: directly between two parties –Indirect authentication: uses a trusted third- party server Called authentication server E.g., A Verisign server I. Authentication

Direct Authentication Using Shared Key Bob Time Alice Message Instruction or Step A R B = Nonce = random number K AB (R B ) R A = Nonce = random number Bob calculates K AB (R B ) and matches with reply. Alice is the only one who could have replied correctly. K AB (R A ) Alice knows Bob is Bob (has K AB )

Why Not Optimize Number of Messages? Bob Time Alice Message Instruction or Step A, R A R B, K AB (R A ) K AB (R B ) Bob calculates K AB (R B ) and matches with reply. Alice is the only one who could have replied correctly. Alice knows Bob is Bob

Unfortunately, This Subject to Replay Attack Bob Time Eve (Malicious) Message Instruction or Step A, R A R B, K AB (R A ) K AB (R B ) Bob calculates K AB (R B ) and matches with reply. Bob thinks Eve is Alice. A, R B R B2, K AB (R B ) Eve starts 2 nd sessionEve finishes 1 st sessionEve starts 1 st session

Indirect Authentication Using Authentication Server and Shared Keys Bob Time Alice Message Instruction or Step A, B K A,AS (K A,B ), K B,AS (K A,B ) = A Ticket A, K B,AS (K A,B ) AS Alice and Bob only ones who can decrypt portions of the ticket and obtain K A,B

Just like “real” signatures –Authentic, Unforgeable –Verifiable, Non-repudiable To sign a message M, Alice encrypts message with her own private key –Signed message: [M, K Apriv (M)] –Anyone can verify, using Alice’s public key, that Alice signed it To make it more efficient, use a one-way hash function, e.g., SHA-1, MD-5, etc. Signed message: [M, K Apriv (Hash(M))] Efficient since hash is fast and small; don’t need to encrypt/decrypt full message II. Digital Signatures

Just like “real” certificates Implemented using digital signatures Digital Certificates have –Standard format –Transitivity property, i.e., chains of certificates –Tracing chain backwards must end at trusted authority (at root) III. Digital Certificates

1.Certificate Type: Account 2.Name: Alice 3.Account number: Certifying Authority: Charlie’s Bank 5.Signature –K Cpriv (Hash(Name+Account number)) Example: Alice’s Bank Account Alice Charlie

1.Certificate Type: Public Key 2.Name: Charlie’s Bank 3.Public Key: K Cpub 4.Certifying Authority: Banker’s Federation 5.Signature –K Fpriv (Hash(Name+Public key)) Charlie’s Bank, in Turn has another Certificate Alice Charlie Banker’s Fed

1.Certificate Type: Public Key 2.Name: Banker’s Federation 3.Public Key: K Fpub 4.Certifying Authority: Verisign 5.Signature –K verisign priv (Hash(Name+Public key)) Banker’s Federation, Has Another Certificate From the Root Server Alice Charlie Banker’s Fed Verisign

Access Control Matrix –For every combination of (principal,object) say what mode of access is allowed –May be very large (1000s of principals, millions of objects) –May be sparse (most entries are “no access”) Access Control Lists (ACLs) = per object, list of allowed principals and access allowed to each Capability Lists = per principal, list of files allowed to access and type of access allowed –Could split it up into capabilities, each for a different (principal,file) IV. Authorization

Security Challenges Abound –Lots of threats and attacks CIA Properties are desirable policies Encryption and decryption Shared key vs Public/private key systems Implementing authentication, signatures, certificates Authorization Security: Summary