Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Security at the Network Layer: IPSec
Chapter 5 Network Security Protocols in Practice Part I
SCSC 455 Computer Security Virtual Private Network (VPN)
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Introduction to Cryptography
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Guide to Network Defense and Countermeasures Second Edition
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Network Security: Firewalls and VPNs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
Chapter 5 Network Security Protocols in Practice Part I
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Unit 8 Network Security.
Advanced Computer Networks
Presentation transcript:

Encryption and Firewalls Chapter 7

Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work and why they are important security tools Analyze the workings of SSL, PGP, and other popular encryption schemes Enable Internet Protocol Security (IPSec) and identify its protocols and modes

Encryption Process of encoding and decoding information to: Preserve its integrity Maintain privacy Ensure identity of users participating in the encrypted data session

Why Firewalls Need to Use Encryption Hackers take advantage of a lack of encryption Encryption: Preserves data integrity Increases confidentiality Is relied upon by user authentication Plays a fundamental role in enabling VPNs

Hackers Take Advantage of a Lack of Encryption

The Cost of Encryption CPU resources and time Bastion host that hosts the firewall should be robust enough to manage encryption and other security functions Encrypted packets may need to be padded to uniform length to ensure that some algorithms work effectively Can result in slowdowns Monitoring can burden system administrator

Preserving Data Integrity Even encrypted sessions can go wrong as a result of man-in-the-middle attacks Encryption can perform nonrepudiation using a digital signature

Maintaining Confidentiality Encryption conceals information to render it unreadable to all but intended recipients

Authenticating Network Clients Firewalls need to trust that the person’s claimed identity is genuine Firewalls that handle encryption can be used to identify individuals who have “digital ID cards” that include encrypted codes Digital signatures Public keys Private keys

Enabling VPNs As an integral part of VPNs, encryption: Enables the firewall to determine whether the user who wants to connect to the VPN is actually authorized to do so Encodes payload of information to maintain privacy

Digital Certificates and Public and Private Keys Digital certificate Electronic document that contains a digital signature (encrypted series of numerals and characters), which authenticates identity of person sending certificate Keys Basis of digital certificates and signatures Enable holders of digital certificates to encrypt communications (using their private key) or decrypt communications (using sender’s public key)

Digital Certificates Transport encrypted codes (public and private keys) through the firewall from one host to another Help ensure identity of the individual who owns the digital certificate Provide another layer of security in firewall architecture

Aspects of Digital Certificates Establishment of an infrastructure for exchanging public and private keys Need to review and verify someone’s digital certificate Difference between client- and server-based digital certificates

The Private Key Infrastructure Lightweight Directory Access Protocol (LDAP) Publicly available database that holds names of users and digital certificates Public-Key Infrastructure (PKI) Enables distribution of digital certificates and public and private keys Underlies many popular and trusted security schemes (eg, PGP and SSL)

Viewing a Digital Certificate

Types of Digital Certificates a Firewall Will Encounter Client-based digital certificates Obtained by users from a Certification Authority (CA), which issues them and vouches for owner’s identity Server-based digital certificates Issued by a CA to a company that issues them to individuals

Keys Value generated by an algorithm that can also be processed by an algorithm to encrypt or decrypt text Length of the key determines how secure the level of encryption is

Aspects of Keys That Pertain to Firewall-Based Encryption Public and private keys Need to generate public keys Need to securely manage private keys Need to use a key server either on network or Internet Differences between private and public key servers

Public and Private Keys Private key Secret code generated by an algorithm Never shared with anyone Public key Encoded information generated when private key is processed by the same algorithm Can be exchanged freely with anyone online

A Public Key Generated by PGP

An Encrypted Communication Session

Choosing the Size of Keys

Generating Keys

Managing Keys Manual distribution Use of a CA Use of a Key Distribution Center (KDC)

Using a Key Server That Is on Your Network

Using an Online Key Server

Analyzing Popular Encryption Schemes Symmetric key encryption Asymmetric key encryption Pretty Good Privacy (PGP) Secure Sockets Layer (SSL)

Symmetric Encryption Use of only one key to encrypt information, rather than a public-private key system Same key is used to encrypt/decrypt a message Both sender and recipient must have same key Not scalable

Symmetric Key Encryption

Asymmetric Encryption Uses only one user’s public key and private key to generate unique session keys that are exchanged by users during a particular session Only the private key must be kept secret Scales better than symmetric encryption Disadvantages Slower Only a few public key algorithms are available (eg, RSA and EIGamal) that are secure and easy to use for both encryption and key exchange

Asymmetric Key Encryption

PGP Hybrid system that combines advantages of asymmetric (scalability) and symmetric (speed) encryption systems

PGP Process File/message is encrypted Session key is encrypted using public key half of asymmetric public-private key pair Recipient of encrypted message uses his/her private key to decode the session key Session key is used to decode message/file Encryption schemes used to generate public and private key pairs Rivest-Shamir-Adleman (RSA) encryption Diffie-Hellman encryption

Using PGP

X.509 Standard set of specifications for assembling and formatting digital certificates and encrypting data within them A commonly used type of PKI Widely used and well trusted

X.509 and PGP Compared X.509 Perception of trust PGP Does not make use of the CA concept Gives users ability to wipe files from hard disk (and delete permanently) Available both in freeware and commercial versions

X.509 and PGP Compared

SSL Secure way to transmit data Uses both symmetric and asymmetric keys Asymmetric keys start an SSL session Symmetric keys are dynamically generated for the bulk of the transfer

Using Internet Protocol Security (IPSec) Encryption Creates a secure IP connection between two computers Operates under the Application layer Transparent to users

Understanding IPSec Set of standards and software tools that encrypt IP connections between computers Allows a packet to specify a mechanism for authenticating its origin, ensuring data integrity, and ensuring privacy

Modes of IPSec Transport mode Tunnel mode Choice depends on type of network and whether it uses NAT

Transport Mode IPSec authenticates two computers that establish a connection Can optionally encrypt packets Does not use a tunnel

Tunnel Mode IPSec encapsulates IP packets and can optionally encrypt them Encrypts packet headers rather than the data payload Incompatible with NAT

IPSec Protocols Authentication Header (AH) Encapsulation Security Payload (ESP)

Authentication Header (AH) Adds a digital signature to packets to protect against repeat attacks, spoofing, or other tampering Verifies that parts of packet headers have not been altered between client and IPSec- enabled host Incompatible with NAT

AH

Encapsulation Security Payload (ESP) More robust than AH; encrypts data part of packets as well as the headers Provides confidentiality and message integrity Can cause problems with firewalls that use NAT

Components of IPSec Two modes: transport and tunnel Two protocols: AH and ESP IPSec driver Internet Key Exchange (IKE) Internet Security Association Key Management Protocol (ISAKMP) Oakley IPSec Policy Agent

Choosing the Best IPSec Mode for Your Organization

ESP plus tunnel mode provides best level of protection ESP conceals IP header information Tunnel mode can both encapsulate and encrypt packets

Enabling IPSec Select group policy security setting for computers that need to communicate with enhanced security Define at group policy level in Windows 2000 Define at local policy level if not in Windows 2000 Predefined IPSec policy levels in Windows 2000 or XP: Client (Respond only) Server (Request Security) Secure Server (Require Security)

Defining IPSec Policy at Local Policy Level

Limitations of IPSec If machine that runs IPSec-compliant software has been compromised, communications from that machine cannot be trusted Encrypts IP connection between two machines— not the body of messages or content of other communications Not an end-to-end security method Authenticates machines, not users Doesn’t prevent hackers from intercepting encrypted packets

Chapter Summary How and why encryption is used in a network How to use encryption to complement the firewall’s activities Encryption applications PGP SSL IPSec Schemes that can form part of a firewall architecture