G22.3250-001 Robert Grimm New York University Using Encryption for Authentication in Computer Networks.

Slides:



Advertisements
Similar presentations
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Advertisements

Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Luu Anh Tuan. Security protocol Intruder Intruder behaviors Overhead and intercept any messages being passed in the system Decrypt messages that are.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Chapter 5 Network Security Protocols in Practice Part I
Computer Security Key Management
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Online Security Tuesday April 8, 2003 Maxence Crossley.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Key Management/Distribution. Administrivia Snafu on books Probably best to buy it elsewhere Paper assignment and first homework Next week (9/24)
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Formal Analysis of Security Protocols Dr. Changyu Dong
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
IS511 Introduction to Information Security Lecture 4 Cryptography 2
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
EE515/IS523 Think Like an Adversary Lecture 3 Crypto Yongdae Kim 한국과학기술원.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Key Management Celia Li Computer Science and Engineering York University.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Network Security David Lazăr.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Computer and Network Security - Message Digests, Kerberos, PKI –
Key Management Network Systems Security Mort Anvari.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
KERBEROS SYSTEM Kumar Madugula.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security
Presentation transcript:

G Robert Grimm New York University Using Encryption for Authentication in Computer Networks

Altogether Now: The Three Questions  What is the problem?  What is new or different?  What are the contributions and limitations?

Needham/Schroeder  Early exploration (’78) of how to use encryption to provide authentication  Diffie/Hellman published their paper on public key cryptography only two years earlier  Basis for Kerberos network authentication protocol  Specifically, the symmetric key protocol  “Our protocols should be regarded as examples”  Rightly so, the protocols have known attacks!

Getting Our Concepts Right  Assumptions  Computers are secure  I.e., when a user encrypts a message, neither the plaintext nor the key is leaked outside the application  But the network is not  Attackers can arbitrarily read, insert, delete, or modify messages on the network  End-to-end encryption  Encryption must be performed by applications, not at the network level  E.g., key may not be known by the network interface

Getting Our Concepts Right (cont.)  Authentication servers (certificate authorities)  Trusted by all participating users  For symmetric-key crypto, user  key  For public-key crypto, user  public key  Not limited to a single server  Group of collaborating servers  Forest of servers (certification authority model)  No server: web of trust in PGP

Getting Our Concepts Right (cont.)  Nonces and timestamps  Ensure that messages are unique  Interactive protocols  random number  Offline protocols  timestamp  Prevent replay attacks  Tickets and certificates  Tickets establish a session key (shared secret)  Certificates attest a public key

Getting Our Concepts Right (cont.)  Characteristic functions  Now: Collision resistant hash functions  Three properties  h(M) is relatively easy to compute (and typically small)  Given h(M), it is hard to calculate M  It is hard to find two M 1 and M 2 so that h(M 1 )=h(M 2 )  Which one to use?  MD-4, MD-5, RIPEMD, RIPEMD-160, SHA-0, SHA-1, SHA-2

Let’s Mount an Attack [Lowe 95]

The Public Key Protocol  A  AS: A, B  AS  A: {PKB, B} SKAS  A  B: {N A, A} PKB  B  AS: B, A  AS  B: {PKA, A} SKAS  B  A: {N A, N B } PKA  A  B: {N B } PKB

There Really Are Two Protocols  A  AS: A, B  AS  A: {PKB, B} SKAS  A  B: {N A, A} PKB  B  AS: B, A  AS  B: {PKA, A} SKAS  B  A: {N A, N B } PKA  A  B: {N B } PKB  What is the short-coming of the key access protocol?  Let’s mount an attack on the authentication protocol! Obtain public keys Authenticate A and B

The Man-in-the-Middle Attack  A  I: {N A, A} PKI  I(A)  B: {N A, A} PKB  B  I(A): {N A, N B } PKA  I  A: {N A, N B } PKA  A  I: {N B } PKI  I(A)  B: {N B } PKB  How can we prevent this attack?

Let’s Improve Our Notation

The Four Primitives  Encrypt(PK, M)  CT  Decrypt(SK, CT)  M  Sign(SK, M)  σ  Verify(PK, M, σ)  {true, false}

What Did We Learn Today?