EFS: Encrypted File system An Introduction & Final Project For CSE785: Computer Security Syracuse University Spring 2005.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
E NHANCING F ILE D ATA S ECURITY IN L INUX O PERATING S YSTEM BY I NTEGRATING S ECURE F ILE S YSTEM PTD By, Ravikumar Madam Rajesh Kumar Pal, Indranil.
Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
6/3/2015topic1 Web Security Qiang Yang Simon Fraser University Thanks: Francis Lau (HKU)
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Cryptographic Technologies
Encrypted File System (EFS) Sankara Narayanan. CSE 785 Computer Security, Syracuse University, NY Spring 2003 – 2004.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Secure File Storage Nathanael Paul CRyptography Applications Bistro March 25, 2004.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
EFS: encrypted File system Project by: Andrew Grossman Gaurav Gupta CMSC 691X-Summer 2002 University of Maryland Baltimore County.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Linux Networking and Security Chapter 8 Making Data Secure.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 8: Scrambling Through Cryptography Security+ Guide to Network Security Fundamentals Second Edition.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
NETWORK SECURITY.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Lecture 18 Windows – NT File System (NTFS)
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Encryption Name : Maryam Mohammed Alshami ID:H
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Real time Stock quotes by web Service and Securing XML for Web Services security. Bismita Srichandan
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 40 Internet Security.
Key management issues in PGP
Chapter 17 Risks, Security and Disaster Recovery
Security at the Application Layer: PGP and S/MIME
AES (Advance Encryption Standard)
O.S. Security.
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

EFS: Encrypted File system An Introduction & Final Project For CSE785: Computer Security Syracuse University Spring 2005

Overview:  EFS: What? Why?  Related Work  Project Introduction Background:  Encryption/Decryption algorithms  Mounting file system  Minix System Call Project Requirement  Some design & implementation ideas  My help session topics  Conclusion

EFS: what is it?  Encrypted File System (EFS) provides the core file encryption technology used to store encrypted files on the File System.  Corporate world is very competitive, so any code, system specifications, often needs to be controlled.  We have to share data among many users or groups, the potential risk for a computer security from a users perspective.  Password Security – Does nothing to preventing a disk being mounted on a different system and reading the contents.

EFS: why do we need it?  Security—First and Foremost Secures Data from being accessed by any malicious user / hacker.  Privacy Ensure that private data is not accessed by other users ( may not be malicious).  Reliability – An integral component Only responsible people are provided access to important data  Resource Sharing Many users can use the same system and still can work independently.

EFS: benefits  The Disk Encryption reduce risk of data exposure in a specific, if uncommon, scenario.  To avoid system risks such as: Computer is bodily stolen. Someone inside the company is trying to compromise information. The system is cracked while attached to a network or with some malicious software.  The primary benefit of the encrypted disk system is defense against device theft, and making your system a more secured one. Though, the risks are partially mitigated.

EFS: a definition from whatis.com  The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. EFS is especially useful for mobile computer users, whose computer (and files) are subject to physical theft, and for storing highly sensitive data. EFS simply makes encryption an attribute of any file or folder. To store and retrieve a file or folder, a user must request a key from a program that is built into Windows  Although an encrypting file system has existed in or been an add-on to other operating systems, its inclusion in Windows 2000 is expected to bring the idea to a larger audience.

Related work  StegFS: A Steganographic File System for Linux, University of Cambridge.  CFS: Cryptographic File System, Temple University.  SFS: Secure File system, University of Minnesota and StorageTek.  TCFS :Transparent Cryptographic File System) University of Salerno (Italy).

Project Introduction In this project, we would like you to  Design a scheme to add security features to the existing file system and  Devise ways to encrypt / decrypt files using the encryption algorithms

Background Knowledge Encryption/Decryption Algorithms Two types of Encryption/Decryption Schemes  Symmetric Key (Secret-key) Scheme DES: Data Encryption Standard AES: Advanced Encryption Standard  Asymmetric Key (public-key) Scheme RSA: reinvented by Rivest, Shamir, and Adleman ECC: Elliptic Curve Cryptography

Symmetric Key Algorithms  A symmetric-key algorithm is an algorithm for cryptography that uses the same cryptographic key to encrypt and decrypt the message. (Actually, it is sufficient for it to be easy to compute the decryption key from the encryption key and vice versa.)  Other terms for symmetric-key encryption are single-key and private-key encryption

AES Algorithm  Advanced Encryption Standard, a symmetric 128- bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. AES works at multiple network layers simultaneously. The U.S government adopted the algorithm as its encryption technique in October 2000, replacing the DES encryption it used. The National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce selected the algorithm, called Rijndael, out of a group of five algorithms under consideration, including one called MARS from a large research team at IBM.IBM

Asymmetric Key Algorithms  An encryption method that uses a two- part key: a public key and a private key. To send an encrypted message to someone, you use the recipient's public key, which can be sent to you via regular or made available on any public Web site or venue. To decrypt the message, the recipient uses the private key, which he or she keeps secret. Contrast with "secret key cryptography," which uses the same key to encrypt and decrypt  Usually we call it Public Key algorithms

Background Knowledge Mounting File System  All files accessible in a Unix system are arranged in one big tree, the file hierarchy, rooted at /. These files can be spread out over several devices. The mount command serves to attach the file system found on some device to the big file tree. Conversely, the umount command will detach it again.

Background Knowledge System Call Implementation  We expect the implementation in kernel level, so you should make use of system calls  On how to implement system calls, please refer to materials in help session 3: system call creation & implementation

Project Requirements We expect you to design and implement a working encrypted file system for the Minix operating system, which includes: Individual users should have their keys for encrypting and decrypting files Key management in the system File management Authenticate the user trying to login to the system

General Kernel Architecture. open(), read(), write(), etc User Process System Call Interface VFS Ext2fs Minix FS Buffer Cache Device Driver Kernel Disk Controller Hardware

Design and Implementation Ideas..  Many of the Implementation that we have seen here, has a kernel level implementation of the file system.  Certain implementations have also user level daemons running that call the kernel level programs ( e.g.: NFS)  I am just describing one system architecture, each of the project team has to come up with their own creative designs.

Example -- General System Architecture KeyID Each Blocks max Data size Block Size This blocks data size Encrypted Data Area User Accessible Memory read() write() Key DB Key Encryption and Decryption Process

Design Issues..areas to be looked on...  The file pointer issues.  Buffer overflow problems – how are you going to deal with this.  Key Management – An area worth thinking about how you will manage your keys.  What effect does the process like read and write have on the files?  How are you going to define your system policy?  Problems related with revocation, change ownership etc.

Refer to some other EFS systems  As mentioned in the related work slide StegFS: A Steganographic File System for Linux, University of Cambridge. StegFS: A Steganographic File System for Linux CFS: Cryptographic File System, Temple University. CFS: Cryptographic File System SFS: Secure File system, University of Minnesota and StorageTek. SFS: Secure File system TCFS :Transparent Cryptographic File System University of Salerno (Italy). TCFS :Transparent Cryptographic File System

Sample EFS demo sites  You can run and see how the EFS works, I am listing some sample sites: tml tml

My help session topics  Temporarily, I have the following schedule for the help session before project due: Location: Star Lab in CST Time: The following afternoons 1:00~4:00pm Schedule*:  04/14: AES algorithms  04/21: Mounting your file system  04/28: File system management  05/05: Last minute rush * May change according to your feedback

Thank you & Good luck!