Intro To Secure Comm. Exercise 2. Problem  You wish for your users to access a remote server via user and password.  All of the users have modems and.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

1 Security in Wireless Protocols Bluetooth, , ZigBee.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Intro To Secure Comm. Exercise 3. Problem The following scenario is suggested for establishing session keys  Alice and Bob share a secret (key phrase/password)
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Computer Security Set of slides 5 Dr Alexei Vernitski.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Cryptanalysis-tolerant CPA crypt. ● Suppose E, E’ are two encryption schemes which on of them is CPA - secure  E.g., a standard and a proprietary, a.
Digital Signatures and Hash Functions. Digital Signatures.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
1 Intro To Encryption Exercise Problem Alice and Bob wish to play the game Paper, Rock and Scissors. What may be the problems with the game? The.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
1 Intro To Encryption Exercise Analyze the following scenario: Sender:  Cipher1= Encrypt message with symmetric key algorithm  RSA_Encrypt (SHA1(message)
1 Intro To Encryption Exercise 4. 2 Defining Pseudo-Random Permutation Let A be alg. with oracle to a function from {0,1} k to {0,1} k Notation: let A.
Intro To Encryption Exercise 1. Monoalphabetic Ciphers Examples:  Caesar Cipher  At Bash  PigPen (Will be demonstrated)  …
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
1 Intro To Encryption Exercise 8. 2 Simple MAC Functions MAC k (x)=int(x||k mod 2 32 )  For any k>2 32 any x is a forgery  K is exposed so we can calculate.
1 Intro To Encryption Exercise 6. 2 Problem Is every (weak) CRHF also a OWF.
1 Intro To Encryption Exercise 7. 2 Problem Show a OWHF and distribution of passwords s.t. both unix and S/Key fail.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Strong Password Protocols
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
EMBEDDED SECURITY EEN 417 Fall /6/13, Dr. Eric Rozier, V1.0, ECE Thanks to Edward Lee and Sanjit Seshia of UC Berkeley.
Lecture 11: Strong Passwords
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Based on Bruce Schneier Chapter 8: Key Management Dulal C Kar.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Digital Signatures, Message Digest and Authentication Week-9.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Cryptographic Hash Functions and Protocol Analysis
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
PPP Configuration.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
King Mongkut’s University of Technology Network Security 8. Password Authentication Methods Prof. Reuven Aviv, Jan Password Authentication1.
Private key
Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster Presented: Jesus F. Morales.
CSCE 201 Identification and Authentication Fall 2015.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Cryptographic Hash Function
Presented by: Dr. Munam Ali Shah
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
پروتكلهاي احرازاصالت Authentication protocols
Computer Security Protection in general purpose Operating Systems
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Intro To Secure Comm. Exercise 2

Problem  You wish for your users to access a remote server via user and password.  All of the users have modems and you trust the phone company to have secured phone lines (no eaves dropping on the line).  All the users must use “good” passwords. 1.What is a “good” password? 2.What is the problem with “good” passwords? 3.How can you build a device that can help the user? Hint: the device may generate the passwords

Solution  A good password is one that is immune to common dictionary- attacks, and is pseudo random  Good passwords are hard to remember so users tend to write them down  The device may be PRF K (USER|DATE|TIME) MD5(K|USER|DATE|TIME)

Problem  You wish your users to login to a remote computer  You wish that ADV getting hold of that computer won’t be able to retrieve the stored passwords easily  What method would you use to store the passwords?

Solution  The simplest solution would be to store a hash of the passwords.

Problem  What hash attributes do we require for this scheme?

Solution  We would like OWF So that ADV can’t efficiently find a pre image for our passwords  We would like CRHF So that ADV can’t efficiently find a collision to our password

Problem  Authentication possibilities Something You know Something You have Something You are  Give examples for the above  What may be the problems?

Solution – Something you know  Password/secrets are things you suppose to know and no other  The cost is minimal, however we usually choose intuitive things to know.  When secrets are not intuitive we tend to forget them/write them down so we don’t forget them.

Solution – Something you have  Usually smart cards are things we have and no one else.  Problems are higher cost  We tend to forget the devices if they are small  We tend not to use them if they are big  They may be stolen, and then what?

Solution – Something you are  Biometrics is a common way to identify a person (eye, finger print …)  Costs a lot (smart devices, training time)  May not have high precision, i.e. long retries, forgeries

Suggested solution  Hybrid approach  A small device which incorporates a PIN or a password to operate  Something like a SecureID device, Portable phone with a key…

Problem  Devise a simple secure way to prove the knowledge of the secret (password) without ADV being able to know the password

Solution  Send h(password) to server  Against what types of ADV is it secure?  What may be the problem with the following protocol in case of an eavesdropper/spoofer ADV?

Solution 2  ADV may not have to know the password in order to login, he just has to listen to it and send it to the server.

Problem  Find a way to simply defend against an eavesdropper/spoofer ADV

Solution  Use S/KEY password scheme Each user has n successful login attempts. At startup, the server receives h(x) n Each login the server receives h(x) n-i The server validates h(h(x) n-i )=h(x) n-(i-1)  Against what type of attack is this protocol not immune to? What are its weaknesses?

Solution  The protocol is not immune against a spoofer/eavesdropper which spoofs the server  When establishing a new chain of hashes, the spoofer can intercept the transmission and send it as it was his own (or send h(x) n+1 ).

Problem  Common antivirus programs have the feature of “immune”\”sign” a file.  In case the file is changed the software knows it immediately.  Common method is using a hash function to create a digest for the file.  What are the requirements from the hash function?

Solution  The hash function must be at least WCRHF.  This is because the file may already be known to the virus and the virus will need to find a collision in order to fool the antivirus program.  What other methods would you use to ensure that the file wasn’t tempered with?

Problem  The following scenario is suggested for establishing session keys Alice and Bob share a secret (key phrase/password) Alice generates Session key K and send E P (K) to Bob Bob receives E P (K), deciphers and uses K as the new session key.  What are the threats to the model?  Is this solution secure against an eavesdropper?

Solution  The solution is problematic when a password is used.  Passwords are susceptible to dictionary attack.  The eavesdropper may discover p and thus the session key k (and may discover any other session keys)  Suggest a better protocol

Solution  Alice Generates pub A and priv A.  Alice sends E P (pub A ) to Bob  Bob deciphers and sends to Alice Pub A (k)  Alice sends to Bob E k (challengeA)  Bob responds E k (challengeA||challengeB)  Alice responds (challengeB)  What cryptographic method is E?

Solution  The cryptographic method is a MAC  Why not simply use an encryption method?

Problem  Some designs attempt to provide message authentication by sending the encryption of the message concatenated with its hash (or simply with an error detection code).  Namely, they send Encrypt(Message||Hash(Message)), and hope that in so doing, they achieve encryption and authentication together.  Show that this design is insecure (an attacker can modify a message and it would still be considered authentic).  Hint: this is easy to show, when using one-time-pad or OFB mode encryption.

Solution  Assuming OTP is used and ADV knows some information about the message.  ADV knows the algorithm, so knows which hash function is used.  Knowing so, he can figure out the key encrypting the message (known plain text).  Since he knows the message and hash of the message, he can figure out the key encrypting the hash.  ADV can now calculate new message and new hash for the message and replace them.

Solution  ADV’s playout: k m =mc m (revealing the key of m) k h(m) =h(m) c h(m) Forge: m’k m ||h(m’)k h(m)  This is a poor MAC because it isn’t even immune to KMA.