Chapter 18: Network Security Business Data Communications, 5e.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Virtual Private Networks (VPNs)
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Cryptographic Technologies
Cryptography and Network Security
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Internet Protocol Security (IPSec)
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Network Security Sorina Persa Group 3250 Group 3250.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1-1 Network Security MET CS-625 Unit Objectives Discuss security tradeoffs Examine specific threats in an enterprise network Discuss development.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
IP Security: Security Across the Protocol Stack
Chapter 20: Network Security Business Data Communications, 4e.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Karlstad University IP security Ge Zhang
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
William Stallings Data and Computer Communications Chapter 18 Network Security.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
K. Salah1 Security Protocols in the Internet IPSec.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
CSCI 465 Data Communications and Networks Lecture 26
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Network Security.
Cryptography and Network Security
Cryptography and Network Security
Presentation transcript:

Chapter 18: Network Security Business Data Communications, 5e

2 Types of Security Information Security Computer Security Network Security

Business Data Communications, 5e3 Security Requirements Confidentiality Integrity Availability Authenticity

Business Data Communications, 5e4 Security Threats Passive attacks –Release of message contents –Traffic analysis –Difficult to detect because there is no data alteration –Emphasis on prevention through encryption Active attacks –Masquerae –Replay –Modification of messages –Denial of Service

Business Data Communications, 5e5 Symmetric Encryption The only form of encryption prior to late 1970s Five components to the algorithm –Plaintext –The original message or data –Encryption algorithm –Secret key –Ciphertext –Decryption algorithm Two requirements –Strong encryption algorithm –Secure exchange of keys

Business Data Communications, 5e6 Conventional Encryption Operation

Business Data Communications, 5e7 Symmetric Encryption Attacks Cryptanalysis –Exploits the algorithm to attempt to deduce a specific plaintext or key being used –If successful, future and past messages encrypted with that key are compromised Brute Force –Try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained –On average, half of all possible keys must be tried to achieve success

Business Data Communications, 5e8 Data Encryption Standard (DES) Dominant encryption algorithm after release in bit key made it too easy to crack by 1998 Life of DES extended by use of triple DES (3DES –Repeats basic DES algorithm three times, using either two or three unique keys –Key size of 112 or 168 bits –Drawbacks: Algorithm is sluggish in software, 64-bit block size is inefficient

Business Data Communications, 5e9 Advanced Encryption Standard

Business Data Communications, 5e10 Location of Encryption Devices Link encryption –Each vulnerable communications link is equipped on both ends with an encryption device. –All traffic over all communications links is secured. –Vulnerable at each switch End-to-end encryption –Encryption process carried out at two end systems –Encrypted data transmitted unaltered across network; destination shares key with source to decrypt data –Packet headers cannot be secured

Business Data Communications, 5e11 Symmetric Encryption Key Distribution Both parties must have the secret key Key is changed frequently Requires either manual delivery of keys, or a third-party encrypted channel Most effective method is a Key Distribution Center (e.g. Kerberos)

Business Data Communications, 5e12 End-to-End Encryption Two types of keys –Session keys –Permanent keys Required components –Key distribution center –Security service module (SSM)

Business Data Communications, 5e13 Automated Key Distribution

Business Data Communications, 5e14 Traffic Padding A function that produces ciphertext output continuously, even in the absence of plaintext Continuous random data stream is generated. When plaintext is available, it is encrypted and transmitted. When input plaintext is not present, the random data are encrypted and transmitted Makes it impossible for an attacker to distinguish between true data flow and noise and therefore impossible to deduce the amount of traffic

Business Data Communications, 5e15 Message Authentication Must verify that contents have not been altered and that source is authentic Approaches –Authentication using symmetric encryption –Authentication without message encryption –Message authentication code –One-way hash function

Business Data Communications, 5e16 Hash Function (H) Requirements Can be applied to a block of data of any size. Produces a fixed-length output. H(x) is relatively easy to compute for any given x For any given code h, it is computationally infeasible to find x such that H(x) = h. For any given block x, it is computationally infeasible to find y ≠ x with H(y) = H(x). It is computationally infeasible to find any pair (x, y) such that H(x) = H(y).

Business Data Communications, 5e17 Public-Key Encryption Based on mathematical functions rather than on simple operations on bit patterns Asymmetric, involving the use of two separate keys Misconceptions about public key encryption –it is more secure from cryptanalysis –it is a general-purpose technique that has made conventional encryption obsolete –it is less cumbersome than conventional encryption

Business Data Communications, 5e18 Public-Key Encryption Components Plaintext Encryption algorithm Public and private key Ciphertext Decryption algorithm

Business Data Communications, 5e19 Public-Key Encryption Operation

Business Data Communications, 5e20 Public-Key Signature Operation

Business Data Communications, 5e21 Characteristics of Public-Key Computationally infeasible to determine the decryption key given knowledge of the cryptographic algorithm and the encryption key Either of the two related keys can be used for encryption, with the other used for decryption

Business Data Communications, 5e22 Steps in Public Key Encryption Each user generates a pair of keys to be used for the encryption and decryption of messages. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private. If Bob wishes to send a private message to Alice, Bob encrypts the message using Alice's public key. When Alice receives the message, she decrypts it using her private key. No other recipient can decrypt the message because only Alice knows Alice's private key.

Business Data Communications, 5e23 Digital Signature Process

Business Data Communications, 5e24 RSA Encryption Algorithm Developed in 1977, first published in 1978 Widely accepted and implemented approach to public-key encryption For plaintext block M and ciphertext block C –C = M e mod n –M = C d mod n = (M e ) d mod n = M ed mod n Both sender and receiver must know values of n and e; only receiver knows value of d Public key of KU = {e, n} Private key of KR = {d, n}.

Business Data Communications, 5e25 RSA Requirements It is possible to find values of e, d, n such that M ed = M mod n for all M < n. It is relatively easy to calculate M e and C d for all values of M < n. It is infeasible to determine d given e and n. –This requirement can be met with large values of e and n

Business Data Communications, 5e26 Approaches to Defeating RSA Brute force approach: try all possible private keys. –The larger the number of bits in e and d, the more secure the algorithm. –However, the larger the size of the key, the slower the system will run. Cryptanalysis: factoring n into its two prime factors –A hard problem, but not as hard as it used to be –Currently, a 1024-bit key size is considered strong enough for virtually all applications

Business Data Communications, 5e27 Key Management Symmetric encryption requires both parties to share a secret key Secure distribution of keys is the most difficult problem for symmetric encryption Public key encryption solves this problem, but adds the issue of authenticity Public key certiciates address this issue

Business Data Communications, 5e28 Public Key Certificates

Business Data Communications, 5e29 Public Key Certificate Process 1. A public key is generated by the user and submitted to Agency X for certification. 2. X determines by some procedure, such as a face- to-face meeting, that this is authentically the user’s public key. 3. X appends a timestamp to the public key, generates the hash code of the result, and encrypts that result with X’s private key forming the signature. 4. The signature is attached to the public key.

Business Data Communications, 5e30 Virtual Private Networks (VPNs) Internet connectivity provides easier access for telecommuters and off-site employees Use of a public network exposes corporate traffic to eavesdropping and provides an entry point for unauthorized users A variety of encryption and authentication packages and products are available to secure and authenticate remote access Need for a standard that allows a variety of platforms to interconnect securely

Business Data Communications, 5e31 Applications of IPSec Secures communications across a LAN, WANs, and/or the Internet Can encrypt and/or authenticate all traffic at the IP level Examples of use: –Secure branch office connectivity over the Internet –Secure remote access over the Internet –Establishing extranet and intranet connectivity with partners –Enhancing electronic commerce security

Business Data Communications, 5e32 Benefits of IPSec When implemented in a firewall or router, provides strong security for all traffic crossing the perimeter IPSec in a firewall is resistant to bypass Runs below the transport layer (TCP, UDP) and so is transparent to applications Can be transparent to end users Can provide security for individual users if needed

Business Data Communications, 5e33 IPSec Functions IPSec provides three main facilities –authentication-only function referred to as Authentication Header (AH) –combined authentication/encryption function called Encapsulating Security Payload (ESP) –a key exchange function For VPNs, both authentication and encryption are generally desired

Business Data Communications, 5e34 ESP Transport and Tunneling Transport Mode –provides protection primarily for upper-layer protocols. –Typically used for end-to- end communication between two hosts –encrypts and optionally authenticates the IP payload but not the IP header –useful for relatively small networks; for a full-blown VPN, tunnel mode is far more efficient Tunnel Mode –Provides protection to the entire packet –Original packet is encapsulated in ESP fields, protecting contents from examination –Used when one or both ends is a security gateway –Multiple hosts on networks behind firewalls may engage in secure communications without implementing IPSec

Business Data Communications, 5e35 IPSec Key Management Manual –System administrator manually configures each system with its own keys and with the keys of other communicating systems –Practical for small, relatively static environments Automated –Enables the on-demand creation of keys for SAs and facilitates the use of keys in a large distributed system –Most flexible but requires more effort to configure and requires more software

Business Data Communications, 5e36 IPSec and VPNs Organizations need to isolate their networks and at the same time send and receive traffic over the Internet Authentication and privacy mechanisms of secure IP allow for security strategy IPSec can be implemented in routers or firewalls owned and operated by the organization, allowing the network manager complete control over security aspects of the VPN