11 Authentication Algorithm Trade Study CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA +1-410-872-1515 September.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Bob can sign a message using a digital signature generation algorithm
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) October.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Security WG: Report of the Winter 2007 Meeting Colorado Springs, CO USA January 20, 2007 Howard Weiss NASA/JPL/SPARTA
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Digital Signatures: Mathematics Zdeněk Říha. Data authentication Data integrity + data origin Digital signature Asymmetric cryptography public and private.
1 Security Policy Framework & CCSDS Common Criteria Use CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Crypto Bro Rigby. History
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
James Higdon, Sameer Sherwani
Security WG: Report of the Fall 2005 Meeting Atlanta GA September 16, 2004 Howard Weiss NASA/JPL/SPARTA.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) April.
Chapter 21 Public-Key Cryptography and Message Authentication.
1 SecWG New Business Discussions CCSDS St-Hubert (Montreal) Canada Howard Weiss NASA/JPL/SPARTA May 2004.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Authentication Algorithm Document Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee,
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Security WG: Report of the Spring 2005 Meeting April 14, 2004 Howard Weiss.
1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA November 2004.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Potential vulnerabilities of IPsec-based VPN
1 Information Security Planning Guide CCSDS Security WG Spring 2005 Athens, GR Howard Weiss NASA/JPL/SPARTA April 2005.
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
Security WG: Report of the Fall 2004 Meeting November 19, 2004 Howard Weiss.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
11 Identity Management Spacecraft ID Security CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA September.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Security WG: Report of the Fall 2005 Meeting
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Introduction Used for communication to verify
NET 311 Information Security
Presentation transcript:

11 Authentication Algorithm Trade Study CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA September 2005

22 Agenda 14 September 2005 – : Welcome, opening remarks, logistics, agenda bashing, : Review results of Spring 2005 SecWG meeting in Athens Mtg Notes Mtg Notes – : RASDS Review wrt Security Architecture (Kenny) – : coffee break – : Security Architecture Document Discussions (Kenny) – : Lunch – :Review CNES Mission Security Req Development using EDIOS (Pechmalbec/Belbus) – : Encryption Algorithm Trade Study (Weiss) – : coffee break – : Authentication/Integrity Algorithm Trade Study (Weiss) 15 September 2005 – : Key management discussion (Kenny) – : Coffee break – : Identity Management, Spacecraft IDs (Weiss) – : CNES Interconnection Rules (Pechmalbec/Belbus) – : Lunch – : CNES Security Development Process (Pechmalbec/Belbus) – : Security Policy Document/Common Criteria (Weiss)

33 Discussion Topics Standard Authentication/Integrity Algorithm adoption by CCSDS – Previous proposal submitted (Montreal, Toulouse, Athens) to adopt Digital Signature Standard (FIPS PUB 186-2). – Athens resulted in creating an action item to perform an authentication algorithm trade study.

44 Background Discussions As previously discussed, CCSDS does not have standards for: – Encryption – Authentication – Integrity – (or much of anything security-wise) Previous discussions in the (old) P1A (link layer) panel to create such “link-layer” standards (Spring 2002 mtg in Darmstadt) – Good discussion which didn’t lead to anything (P1A Security Briefing)P1A Security Briefing Created a “draft” P1A Security White Book to address some “strawman” proposals

55 Previous Encryption Algorithm Proposal: Propose FIPS PUB – Digital Signature Standard (DSS) algorithm standard. Consensus??? Agreement??? NO AGREEMENT – perform Trade Study

66 Trade Study Background Proposal in Montreal was pre-mature – Digital signature is one way to provide authentication » But NOT the only way – Two other kinds of Message Authentication Codes (MAC) in use: » Hash-based MACs » Encryption-based MACs

77 Digital Signature Background Digital Signature – Based on public/private key (asymmetric) cryptography – Hash/CRC performed over data, check-word encrypted using sender’s private key – Receiver re-calculates check-word, verifies transmitted check-word by decrypting with sender’s public key. – Requires generation of public/private key pairs – Requires “Certificate Authority” signing of generated public keys to guarantee their authenticity – Requires a means to distribute/populate public keys for every sender at every receiver. » Public Key Infrastructure (PKI) » Pre-loaded public keys or public key certificates requiring a potentially large on-board cache

88 Hash-based Message Authentication Code Background Based on the concept of a keyed hash – Shared secret key Hash calculated over data and the shared secret key to create a check-word, for example: – H { Mary had a little lamb} » where “ ” is the shared secret Keyed hash is authenticated by the receiver (who possesses the shared secret) by re-calculating the check-word and comparing it with the one transmitted with the data.

99 Encryption Based Message Authentication Code Background A hash is calculated over the raw data to create a check-word. The check-word is encrypted using a symmetric algorithm using a shared secret key. The encrypted check-word is authenticated by the receiver by recalculating the check-word, then decrypting the transmitted check-word using the symmetric algorithm and the shared secret key, and then comparing the two check-words.

10 Candidate Algorithms Digital Signature candidates: – Digital Signature Algorithm (DSA) – RSA – Elliptic Curve Digital Signature (ECDSA) Hash-based MAC – HMAC-SHA1-96 – HMAC-MD5-96 » Hashing algorithms SHA (1,256,384,512) MD5 UMAC RIPEMD-160 TIGER Encryption-based MAC – DES-CBC-MAC – CMAC – CCM

11 Digital Signature Algorithms NameTypeCharacteristicsMin. Key Size Digital Signature Standard (DSS) FIPS digital signature Digital signature based on SHA1 hash, un-encumbered (no patents, no licenses) 1024 bits RSA Digital Signature RSA digital signature (FIPS approved) Previously patented digital signature (expired 2000) 1024 bits Elliptic Curve Digital Signature (ECDSA) Elliptic curve digital signature Digital signature based on elliptic curve key technology which uses smaller keys than other public key technologies but may be encumbered by various Cirticom intellectual property, licenses, and patents. Apparently, ECDSA is not covered by any Certicom patents and there are open source ECC libraries, but Certicom does have over 300 patents on various aspects of ECC including “efficient implementations of ECC in hardware and software,” key agreements, etc. 160 bits

12 Hash Based MACs NameTypeCharacteristicsOutput Hash Size Secure Hash Algorithm 1 (SHA1) Hash algorithmFIPS approved – other versions (SHA256, SHA384, SHA512) provide longer outputs 160 bits Message Digest 5 (MD5)Hash algorithmPotential weaknesses – can be used as a keyed hash 128 bits Universal Message Authentication Code (UMAC) Hash AlgorithmDesigned to be the fastest hash algorithm ever 32, 64, or 96 bits (64 bits recommended) RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160) Hash AlgorithmDeveloped as part of the EC’s Research and Development in Advanced Communications Technologies in Europe (RACE) 160 bits TIGERHash AlgorithmDesigned for efficient operation on 64-bit platforms 192 bits HMAC-SHA1-96Hash-based MAC Uses SHA-1 for hash96 bits – truncates SHA1 160 bit output HMAC-MD5-96Hash-based MAC Uses MD5 for hash96 bits – truncates MD5 128 bit output

13 Encryption Based MACs NameTypeCharacteristicsKey Size DES-CBC- MAC Cryptographic MAC DES-based (FIPS PUB 113 dated 30 May bits CMACCryptographic MAC Encrypted-based MAC using any symmetric key block cipher algorithm 64, 128, 192, 256 (depending on block cipher algorithm used) CCMCryptographic MAC Uses cipher-block-chaining (CBC) with counter mode encryption to provide both authentication and confidentiality using a block cipher algorithm with 128- bit key or greater) 128, 192, 256

14 Conclusions and Recommendations Digital signature authentication might not be the universal, fit-all-missions solution – PKI and/or distribution, public/private key generation, key size, CPU intensive Shared secret key technology might be more suitable – Small(er) key size, less CPU intensive, shared secret used many times requiring less caching and less lookups Adopt dual standards: – DSA (FIPS PUB 186) – HMAC w/SHA1 (FIPS PUB 198)

15 Discussion Is digital signature the only right answer? Should there be multiple “right answers” because of mission constraints? – For example, shared symmetric keys will be smaller, and may be easier to deal with than public keys. Should CCSDS adopt both a digital signature AND a symmetric technology authentication algorithm?