Computer Security Dept. of Computer Science CS 5200 Fall 2005 Dr. Scott Cannon.

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Advertisements

Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Digital Signatures and Hash Functions. Digital Signatures.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
CS 425 / ECE 428 Distributed Systems Fall 2014 Indranil Gupta (Indy) Lecture 24B: Security All slides © IG.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Key Management Network Systems Security Mort Anvari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security Celia Li Computer Science and Engineering York University.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Pooja programmer,cse department
Presentation transcript:

Computer Security Dept. of Computer Science CS 5200 Fall 2005 Dr. Scott Cannon

Why is security important? l Privacy, info. integrity, availability of services l Example need areas: 4 4 Financial transactions 4 Records and document access 4 Authentication of people l The Internet was not designed for security

Attacks… l Eavesdropping l Masquerading l Tampering l Denial of service l Replaying l Leakage Mischievous attacks are often as bad as malicious attacks.

Concepts… l Security Policy l Security Mechanism

Name conventions… Alice 1 st participant, usually the originator Bob 2 nd participant Carl 3 rd participant Evean eavesdropper Malfoy malicious person Saraa trusted server

Security Assumptions… l Interfaces are exposed l Networks are insecure l Secrets become less secure with age l Algorithms and program code are available to attackers l Attackers have access to large resources l Trusted bases should be minimized.

Situation… Consider a simple Internet purchase: 4 authentication of vendor 4 secure transmission of credit card info 4 secure delivery of electronic media 4 insuring non-repudiation All these must be achieved without previous contact between the buyer and seller

Cryptography l Encryption uses a key (or keys) in a algorithm such that the coded message cannot be decrypted without knowledge of the key l Notation 4 K A Alice’s secret key 4 K AB Alice and Bob’s shared secret key 4 K Apriv, K Apub Alice’s public and private keys 4 {m} K Message m encryped with key K 4 [m] K Message m signed using key K 4 E{m} K The encryption operation using key K 4 D{m} K The decryption operation using key K

Trivial example… 4 E{m} k = m ^ k = m’ => {m} k 4 D{m’} k = m’ ^ k = m => {m’} key

Secret Key Encryption l Shared secret key 4 Alice shares her secret key (K) with Bob;  Alice: {m} K = m’  Bob: {m’} K = m l Advantages: easy, fast, cheap l Problems : 4 How does Bob know that m’ is not a copy of an earlier encrypted message? 4 What if this is the first communication between Alice and Bob?

Authentication Service Alice would like to communicate with Bob such that Bob can verify: 4 the message does in fact come from Alice, 4 the message has not been tampered with, and 4 the message is not a replay. Authentication must be available even though Alice and Bob have never communicated before.

Authentication with a secret key l Alice sends a unencrypted request to Sara requesting access to Bob’s data. l Sara returns {{ticket}K B, K AB }K A l Alice decrypts the message with K A : {ticket}K B, K AB l Alice sends the encrypted ticket to Bob with her identity: {ticket}K B, Alice l The ticket is actually K AB, Alice l Bob decrypts the ticket to a) verify Alice’s identify and b) get the shared secret key K AB l Alice and Bob can now communicate with K AB

Problems with secret keys… l How do Alice and Bob send their secret keys to Sara? Sara must be a secured server with knowledge of everyone’s secret keys

Public key encryption l A public key encryption algorithm uses two keys: One key undoes the effects of the other. Only the pair to a key can decrypt a message encrypted by the other key l One key is held private, the other can be public! {m}K priv = m’ {m’}K pub = m l Given K pub, one cannot determine K priv within a reasonable amount of time.

Authentication using public keys Anyone can decrypt a message from Alice and verify that it came from her – since only Alice could produce {m}K Apriv = m’ (Alice has signed the message) Anyone can send a message to Alice that only Alice can read: {m}K Apub = m’

Public key messaging Alice: {{m}K Apriv }K Bpub = m’ Bob: {{m’}K Bpriv }K Apub = m l Only Alice can encrypt m’. Only Bob can decrypt m’ to produce m. l This is true even though Malfoy has both K Apub and K Bpub. l The message m’ has been signed by Alice

Hybred approaches… Alice to Bob: {{“Alice”}K Apriv, K AB } K Bpub = m’ Bob: {m’}K Bpriv => signature, K AB Bob to Alice: {X}K AB Alice to Bob: {Y}K AB …

Cryptography algorithms l Encryption / Decryption must not require extensive time or special hardware Time, cost Vs. Security l Given K pub, Malfoy should not be able to calculate K priv within a reasonable amount of time. l Cryptographic algorithms and programs should be considered public The above is the subject of U.S. ITAR export laws

Digital digest signatures l Since public-key encryption is costly, often only a digest of a document is signed. l To protect against replaying attacks, a digest will usually include a date. l If Malfoy knows the digest algorithm, he could possibly alter the document without changing the encrypted digest.

Other security issues… l Passwords l Taking over a service l Denial of service l Spoofing

Passwords and security l Most passwords are simple variation of one or more of the following; 4 a name (pet, family, famous person) 4 a date 4 a word associated with a hobby or personal interest. l Passwords are stored in public files (using one- way encryption). l A password cracker can try all possible 8-char passwords in a few days with a desktop PC.

IP addresses and ports l An internet message has a header that contains; 4 Source IP address 4 Destination IP address 4 destination port number 4 Routing history l The local OS keeps a table of ports vs. processes port #process 25smtp 80 http … l Taking over a computer is simply a matter of making a change in this table: bind()

Denial of Service l Denial-of-service attacks are usually just a matter of flooding the IP address and port of the service you wish to deny. l Prevention: Monitor the source IP address of incoming requests. l Problem: A message source IP address and its routing history is easily spoofed.

Spoofing Malfoy is relatively free to spoof the source IP address of any Internet message. l Internet transport protocols (TCP/IP, UDP/IP, A25, etc.) do not normally verify a source address. l Mail service (smtp) only makes a primitive verification that the FROM: field in an corresponds to the message source. l While TCP automatically inserts a source address, Malfoy can use RAW protocols or modify TCP at the source.

Security – the bottom line l The computer industry is very sensitive to security issues. l Security measures can only hamper Malfoy. l The only real security is a trustworthy software professional

Security and students… A software professional is similar to the guy responsible for shredding worn-out currency – the only real security is trust. A computer science student or employee caught or even suspected of attempting to bypass computer security is marked for the rest of his or her career. Consider: A bank clerk caught taking $5 from a till will never work in any bank again – ever.