Mobile Security and Payment Nour El Kadri University Of Ottawa.

Slides:



Advertisements
Similar presentations
CP3397 ECommerce.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Chapter 11: Cryptography
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to Cryptography
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
A Survey of WAP Security Architecture Neil Daswani
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Cryptography Basic (cont)
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cryptography 101 Frank Hecker
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Secure Socket Layer (SSL)
PKI interoperability and policy in the wireless world.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Public-key Cryptography
Public Key Infrastructure
Public-Key, Digital Signatures, Management, Security
Electronic Payment Security Technologies
Presentation transcript:

Mobile Security and Payment Nour El Kadri University Of Ottawa

Security Keep in mind: Security requires an overall approach A system is as secure as its weakest component –Securing network transmission is only part of the equation The sad part is that people often prove to be the weakest link in the chain –Employee who hacks company’s billing database –Careless user who writes his/her PIN on the back of their handset and forget in on the bus

The Role of Cryptography SIM Module and Authentication centers in GSM Architecture WAP Gateway security gaps and their solution in the new WAP protocol stack for built-in IP How does cryptography complement such solutions? What are the business implications?

Network Transmission Security Requirements Authentication Confidentiality Integrity Non-repudiation Cryptography plays a central role in satisfying these requirements Other techniques include: Packet acknowledgements Checksums

Cryptography Sender: plaintext  cipher text …. Using encryption algorithms Receiver cipher text  plaintext …. Using a matching decryption algorithm

Secret-Key or Symmetric Cryptography Alice and Bob agree on an encryption method and a shared key. Alice uses the key and the encryption method to encrypt (or encipher) a message and sends it to Bob. Bob uses the same key and the related decryption method to decrypt (or decipher) the message.

Advantages of Symmetric Cryptography There are some very fast classical encryption (and decryption) algorithms Since the speed of a method varies with the length of the key, faster algorithms allow one to use longer key values. Larger key values make it harder to guess the key value -- and break the code -- by brute force.

Disadvantages of Symmetric Cryptography Requires secure transmission of key value Requires a separate key for each group of people that wishes to exchange encrypted messages (readable by any group member) –For example, to have a separate key for each pair of people, 100 people would need about 5000 different keys.

Public-Key Cryptography AKA Asymmetric Cryptography Alice generates a key value (usually a number or pair of related numbers) which she makes public. Alice uses her public key (and some additional information) to determine a second key (her private key). Alice keeps her private key (and the additional information she used to construct it) secret.

PK Cryptography – cont’d Bob (or Carol, or anyone else) can use Alice’s public key to encrypt a message for Alice. Alice can use her private key to decrypt this message. No-one without access to Alice’s private key (or the information used to construct it) can easily decrypt the message.

Public Key Cryptography Source: N. Sadeh

Man-in-the-Middle Attack Solution: Certificate Authorities Keys are certified, that means a third person/institution confirms (with its digital signature) the affiliation of the public key to a person

Certificate Authorities Three types of organizations for certification systems (PKIs?): Central certification authority (CA) –A single CA, keys often integrated in checking software –Example: older versions of Netscape (CA = Verisign) Hierarchical certification system –CAs which in turn are certified by “higher” CA –Examples: PEM, Teletrust, infrastructure according to Signature Law Web of Trust –Each owner of a key may serve as a CA –Users have to assess certificates on their own –Example: PGP (but with hierarchical overlay system)

Hybrid Encryption Systems All known public key encryption algorithms are much slower than the fastest secret- key algorithms. In a hybrid system, Alice uses Bob’s public key to send him a secret shared session key. Alice and Bob use the session key to exchange information.

Digital Signatures A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document

Digital Signatures Source: N. Sadeh

Elliptic Curve Cryptography ECC was introduced by Victor Miller and Neal Koblitz in For DSA, RSA we need larger key length. ECC requires significantly smaller key size with same level of security. Benefits of having smaller key sizes : faster computations, need less storage space. ECC ideal for constrained environments: Pagers ; PDAs ; Cellular Phones ; Smart Cards

Key player Certicom is a key player. Acquired by Research in Motion (two days ago. Verisign was bidding on the company too This will set new research ahead in the wireless security arena

Smart card: –A card that contains a processor, memory, and an interface to the outside world. –Vary based on the capabilities of the processor and size of the memory –A smart card needs a reader –Not very common in north America, but it is widespread in other places. –Problems: Lack of standard interfaces Smart Cards

GSM’s SIM-Based Authentication

Message Authentication Codes Checksums –used mostly to verify the integrity of messages Use a hybrid approach Recipient can verify both the authenticity and the integrity of the message MACs are also referred to as “Message Integrity Codes”

Security: The Combinations are Many IPSec protocol has been adopted by GPRS –Negotiation of security parameters between sender and recipient –Negotiation carried out using Internet Key Exchange Flexibility in adapting security parameters to mobile environments is very important –Keys might be stored on SIM or WIM modules –Limited memory and processing power –Low bandwidth and high latency

Wired Equivalent Privacy Aka “WEP” Represents Wi-Fi first attempt at security Works at data link layer (Layer 2) Uses static 40 or 104 bit keys for authentication and encryption. Based on RC4 symmetric stream cipher. Key stream generated from initial key, used to encrypt and decrypt data

WAP Security: WTLS Keys generally placed in normal phone storage. New standards emerging (WAP Identity Module [WIM]) for usage of tamper-resistent devices. Aside from crypto problems: –User interface attacks likely (remember SSL problems) –WTLS terminates at WAP gateway; MITM attacks possible.

WAP Transaction layer WTP Three classes of transactions: –Class 0: unreliable –Class 1: reliable without result –Class 2: reliable with result Does the minimum a protocol must do to create reliability. No security elements at this layer. Protocol not resistant to malicious attacks.

WAP Session Layer WSP Meant to mimic the HTTP protocol. No mention of security in spec except for WTLS. Distinguishes a connected and connectionless mode. Connected mode is based on a SessionID given by the server.

Wireless Identity Module Can be used to hold private and secret keys required by WTLS TLS and non-WAP applications Computes crypto operations –“unwrapping master secret” –client signature in WTLS Handshake –key exchange (ECC WTLS Handshake) It can also store certificates and generate keys WIM does not necessarily need to be issued by the mobile operator It can be implemented on the SIM card

WMLScript SignText Allows developers to write applications where users are prompted with a text that they reject or accept Acceptance requires the user to punch his/her WIM PIN code and that results in the generation of a digital signature DS is transmitted back to the content server

WAP Security Models Operator Hosts Gateway –Without PKI –With PKI Content Provider Hosts Gateway –Static Gateway Connection –Dynamic Gateway Connection

Operator Hosts Gateway

Without PKI: –Advantages No extra work for Content Provider No extra work for user System only requires one logical gateway –Disadvantages Content Provider must trust Operator (NDA) Operator can control home deck Operator can introduce advertising

Operator Hosts Gateway With PKI: –Advantages Content providers does not need to trust Operator. –Disadvantages PKI Infrastructure must be in place.

Content Provider Hosts Gateway Static Gateway Connection –Advantages Content Provider does not need to trust Operator Content Provider can control home deck OTA can be used to configure mobile terminal –Disadvantages Mobile terminal may have limited number of gateway config sets (i.e., Nokia 7110 has 10) Mobile Terminal needs to be configured. –OTA via WAP Push / SMS may not work with gateway / mobile terminal combination –Content Provider may have to pre-configure mobile terminals

Content Provider Hosts Gateway Internet WAP Gateway WTLS Class 2SSL Operator Web Server SSL Content Provider WAP Gateway

Content Provider Hosts Gateway Dynamic Gateway Connection –Advantages Content Provider does not need to trust Operator. Content Provider does not need to worry about mobile terminal configuration –Disadvantages Operator needs to trust Content Provider. Deployment very slow.