Chapters 8 Network Security Professor Rick Han University of Colorado at Boulder

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Chapters 8 Network Security Professor Rick Han University of Colorado at Boulder
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Chapter 8 Authentication, Data Integrity, Public Key Distribution, Firewalls Professor Rick Han University of Colorado at Boulder
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Chapters 8 Network Security
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Cryptography 101 Frank Hecker
CSCI 6962: Server-side Design and Programming
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Authentication, Data Integrity, Public Key Distribution, Firewalls Modified by Xiuzhen Cheng Originally provided by Professor Rick Han
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Computer and Network Security - Message Digests, Kerberos, PKI –
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Computer Science Lecture 23, page 1 CS677: Distributed OS Security: Focus of Control Three approaches for protection against security threats a)Protection.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Lecture 22 Network Security (cont) CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger slides are modified from Jim Kurose,
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Security Outline Encryption Algorithms Authentication Protocols
Computer Communication & Networks
Secure Sockets Layer (SSL)
Protocol ap1.0: Alice says “I am Alice”
Advanced Computer Networks
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Chapters 8 Network Security Professor Rick Han University of Colorado at Boulder

Prof. Rick Han, University of Colorado at Boulder Announcements HW #5 (short) due May 2 Programming Assignment #3 due May 2 HW #4 solutions on Web Final Exam May 7, 4:30-7:00 pm Comprehensive In this room In Chapter 8, read all sections. FCQ’s last 10 minutes. Next, Network Security

Prof. Rick Han, University of Colorado at Boulder Recap of Previous Lecture Principles of Confusion = substitution Diffusion = permutation Symmetric-Key Cryptography Keys are same on both sides Example: DES 16 stages combining confusion and diffusion Block cipher Cipher Block Chaining (CBC) mode Stream cipher Generate a pseudo-random stream of bits with key XOR pseudo-random stream with data stream

Prof. Rick Han, University of Colorado at Boulder Recap of Previous Lecture (2) Public-Key Cryptography Public key and a private key Example: RSA encryption One-way function: difficult to factor the product of two large prime numbers Exponentiate and modulo to encrypt, exponentiate again and modulo to decrypt Authentication Simple scenarios can’t provide authentication Using public-key cryptography and digital signatures…

Prof. Rick Han, University of Colorado at Boulder Authentication via Digital Signatures Similar conceptually to handwritten signatures Uses a property of public-key cryptography: m = c d mod n = (m e ) d mod n = (m d ) e mod n Thus, can swap the order: use private key for encryption and a public key for decryption Method I: Bob encrypts entire message with Bob’s private key. This is Bob’s digital signature. Bob send both the message and his digital signature

Prof. Rick Han, University of Colorado at Boulder Authentication via Digital Signatures (2) Alice decrypts Bob’s message using Bob’s public key If decrypted message matches the message, Alice knows that The signed message could only have come from Bob (assuming only Bob knows his private key)

Prof. Rick Han, University of Colorado at Boulder Authentication via Digital Signatures (3) In Method I, signing the entire document/message is computationally expensive Method II: Instead, compute a hash on the document/message The hash is much smaller than the document, resembles a CRC. Also called a message digest Hash function H generates the hash Use private key to encrypt only the message digest Encrypted digest commonly called a digital signature Computationally inexpensive

Prof. Rick Han, University of Colorado at Boulder Authentication via Digital Signatures (4) Send both the document and the digitally signed message digest At receiver hash the document = MD A decrypt the digital signature = MD B If MD A = MD B then receiver knows that: the identity of sender correctly matches the advertiser of the public key (Authentication) that the document hasn’t been tampered with (Data Integrity) Caveat: the hash function must be “one-way” to make these claims

Prof. Rick Han, University of Colorado at Boulder Digital signature = Signed message digest Bob sends digitally signed message: Alice verifies signature and integrity of digitally signed message:

Prof. Rick Han, University of Colorado at Boulder Data Integrity via One-Way Hash Functions The hash function H has the property that it is one-way: 1.Given a message digest value MD, it is computationally infeasible to find a message y such that H(y)=MD, 2.It is computationally infeasible to find any two messages x and y such that H(x)=H(y) Otherwise, could substitute a forged message y for original message without changing the hash/MD Violates Data Integrity – tampering must be detectable MD5 and SHA-1 are examples of one-way hashes

Prof. Rick Han, University of Colorado at Boulder Data Integrity via One-Way Hash Functions (2) Example: the TCP/IP checksum is a hash function that is not one-way One’s complement 16-bit sum 1.Example: Easy to forge the message x with y yet keep the checksum the same, H(x)=H(y) without detection flip two bits from different 16-bit blocks but with the same offset n within a 16-bit block: checksum unchanged 2.Example: Easy to forge the message x with y and modify the checksum H(x) to H(y) without detection Lack of one-way hash enables forgery

Prof. Rick Han, University of Colorado at Boulder Data Integrity via One-Way Hash Functions (3) Wireless b uses a security standard called the Wired Equivalent Privacy (WEP) protocol that has a hash-based security flaw Given a message m, compute a 32-bit checksum c(m), and form a packet RC4 stream cipher used to encrypt packet: Send ciphertext “RC4(key) XOR ” Attacker creates a delta packet: Attacker XOR’s delta packet with ciphertext: RC4(key) XOR XOR = RC4(key) XOR = RC4(key) XOR  checksum is linear, not 1-way = RC4(key) XOR  undetectable tampering of WEP

Prof. Rick Han, University of Colorado at Boulder Non-Repudiation via Digital Signatures Digital Signatures provide authentication, integrity, and non- repudiation At receiver, if MD A = MD B then receiver knows that: Only the sender’s private key could have created this signature (Non- repudiation & Authentication) Sender can’t deny sending message MD A MD B

Prof. Rick Han, University of Colorado at Boulder Authentication: Other Methods The method of authentication via digital signatures just described is classified in section 8.2 as “MD5 with RSA Signature” Textbook discusses 3 other useful techniques for authentication where one or both sides choose random #’s. You’re responsible for knowing these: 3-way handshake Trusted 3 rd party (Kerberos) Public-key authentication

Prof. Rick Han, University of Colorado at Boulder Key Distribution & Certification Public keys which are not securely certified can suffer from a man-in-the-middle attack: X wishes to send to Z, but Y transparently sits in the middle between X and Z XZY “Z: Please send me your public key” “Z: Please send me your public key” Z’s public key Y’s public key, Y says it’s Z’s X’s data encrypted with Y’s public key Y decrypts With Y’s Private key X’s data encrypted with Z’s public key X and Z never know that Y has seen their data

Prof. Rick Han, University of Colorado at Boulder Key Distribution & Certification (2) Another type of attack on non-certified public keys: Y pretends to be X. Y advertises a public key under the name of X. YXZ “Send a pizza to X”, Here’s X’s signature (provides Y’s signature) Key Database I am X, here is my public key (provides Y’s public key) Retrieve public key of “X” X’s signature Verified! Pizza sent to X What’s this?

Prof. Rick Han, University of Colorado at Boulder Key Distribution & Certification (3) Basic problem exploited by both attacks: The public key was not certified as belonging to an entity (a person, a router, a company, etc.) Use a trusted Certification Authority (CA) to bind a key to an entity Public key of CA is available at a well-known address that can’t be spoofed Or, public key of CA is pre-installed, e.g. Netscape browser has embedded public key of the Netscape CA Assume there exists an out-of-band procedure (perhaps non-electronic), where an entity registers its public key with a CA in a verifiable way Trust the CA to have verified all public keys and have removed the possibility of spoofing an identity

Prof. Rick Han, University of Colorado at Boulder Key Distribution & Certification (4) Use a trusted Certification Authority (CA) to bind a key to an entity (cont.) When host X wants to securely talk with host Y, host X first asks host Y (or CA) for host Y’s public key Host Y returns host Y’s public key, signed with the CA’s signature: “This is host Y’s public key, signed by the trusted CA” Constitutes a digital certificate (conforms to X.509 standard) Host X receives the CA’s digital certificate and uses CA’s public key to verify that the certificate was signed by the trusted CA Now, host X has the verified public key for host Y for secure communication

Prof. Rick Han, University of Colorado at Boulder SSL/TLS Secure Sockets Layer (SSL) and its follow-on Transport Layer Security (TLS) Phase 1: Handshake phase Negotiate an encryption algorithm (e.g. DES) Authenticate the server to the client Decide on keys Phase 2: Data transfer phase via a “record” protocol HTTPS SSL/TLS TCP IP

Prof. Rick Han, University of Colorado at Boulder SSL/TLS (2) Handshake protocol: public key, then common case is symmetric key Client (browser) sends a “Hello” to Server (Web), including client’s cryptographic preferences Server replies with Hello + server’s certificate Client uses CA’s public key to verify server’s certificate, extracts server’s public key – server is now authenticated Client generates a symmetric session key (actually a pre-master secret), encrypts it with the server’s public key, and sends it back to server Both sides now have symmetric session key and can use DES-like encryption/decryption. Some additional messaging to complete SSL handshake. Also, supports client authentication.

Prof. Rick Han, University of Colorado at Boulder SSL/TLS (3) Any application-layer protocol can use SSL, e.g. http, smtp, ftp, telnet, ssh, etc. HTTP over SSL is called HTTPS A secure URL is often preceded by Other technologies S-HTTP (or “Secure HTTP”) differs from HTTPS Message-based transactions (SSL is connection-based) Specific to HTTP (SSL works with all application layer protocols). URL is preceded by shttp:// Less popular than HTTPS SET (Secure Electronic Transactions) Public-key technology for secure financial payments by VISA. Technically, can work on top of SSL.