Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.

Slides:



Advertisements
Similar presentations
Network Security Md. Kamrul Hasan Assistant Professor and Chairman
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography and Network Security
Secure Socket Layer.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Computer Networks with Internet Technology William Stallings Chapter 16 Network Security.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Sri Lanka Institute of Information Technology
Cryptography and Network Security
Cryptography and Network Security
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 22 Internet Security Protocols and Standards
Cryptography and Network Security Chapter 17
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Chapter 8 Web Security.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
Cryptography and Network Security Chapter 13
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Karlstad University IP security Ge Zhang
Chapter 22 Internet Security Protocols and Standards.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
William Stallings Data and Computer Communications Chapter 18 Network Security.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Cryptography CSS 329 Lecture 13:SSL.
Computer Networks with Internet Technology William Stallings Chapter 16 Network Security.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
William Stallings Data and Computer Communications 7th Edition
IPSecurity.
Cryptography and Network Security
Network Security.
Cryptography and Network Security
Cryptography and Network Security Chapter 16
Cryptography and Network Security
Presentation transcript:

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security

Network Security To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage prudence. Hence before strangers are allowed to enter a district, or at least before they are permitted to mingle freely with the inhabitants, certain ceremonies are often performed by the natives of the country for the purpose of disarming the strangers of their magical powers, or of disinfecting, so to speak, the tainted atmosphere by which they are supposed to be surrounded. —The Golden Bough, Sir James George Frazer

Security Requirements  confidentiality - protect data content/access  integrity - protect data accuracy  availability - ensure timely service  authenticity - protect data origin

Passive Attacks  eavesdropping on transmissions  to obtain information release of possibly sensitive/confidential message contents release of possibly sensitive/confidential message contents traffic analysis which monitors frequency and length of messages to get info on senders traffic analysis which monitors frequency and length of messages to get info on senders  difficult to detect  can be prevented using encryption

Active Attacks  masquerade pretending to be a different entity pretending to be a different entity  replay  modification of messages  denial of service  easy to detect detection may lead to deterrent detection may lead to deterrent  hard to prevent focus on detection and recovery focus on detection and recovery

Symmetric Encryption

Requirements for Security  strong encryption algorithm even known, unable to decrypt without key even known, unable to decrypt without key even if many plaintexts & ciphertexts available even if many plaintexts & ciphertexts available  sender and receiver must obtain secret key securely  once key is known, all communication using this key is readable

Attacking Encryption  cryptanalysis relay on nature of algorithm plus some knowledge of general characteristics of plaintext relay on nature of algorithm plus some knowledge of general characteristics of plaintext attempt to deduce plaintext or key attempt to deduce plaintext or key  brute force try every possible key until plaintext is recovered try every possible key until plaintext is recovered rapidly becomes infeasible as key size increases rapidly becomes infeasible as key size increases 56-bit key is not secure 56-bit key is not secure

Block Ciphers  most common symmetric algorithms  process plain text in fixed block sizes producing block of cipher text of equal size  most important current block ciphers: Data Encryption Standard (DES) Data Encryption Standard (DES) Advanced Encryption Standard Advanced Encryption Standard

Data Encryption Standard  US standard  64 bit plain text blocks  56 bit key  broken in 1998 by Electronic Frontier Foundation special purpose US$250,000 machine special purpose US$250,000 machine with detailed published description with detailed published description less than three days less than three days DES now worthless DES now worthless

Triple DEA  ANSI X9.17 (1985)  incorporated in DEA standard 1999  uses 2 or 3 keys  3 executions of DEA algorithm  effective key length 112 or 168 bit  slow  block size (64 bit) now too small

Advanced Encryption Standard  NIST issued call for proposals for an Advanced Encryption Standard (AES) in 1997 security strength equal to or better than 3DES security strength equal to or better than 3DES significantly improved efficiency significantly improved efficiency symmetric block cipher with block length 128 bits symmetric block cipher with block length 128 bits key lengths 128, 192, and 256 bits key lengths 128, 192, and 256 bits evaluation include security, computational efficiency, memory requirements, hardware and software suitability, and flexibility evaluation include security, computational efficiency, memory requirements, hardware and software suitability, and flexibility AES issued as FIPS 197 in 2001 AES issued as FIPS 197 in 2001

AES Description  assume key length 128 bits  input a 128-bit block (square matrix of bytes) copied into state array, modified at each stage copied into state array, modified at each stage after final stage, state copied to output after final stage, state copied to output  128-bit key (square matrix of bytes) expanded into array of bit key schedule words expanded into array of bit key schedule words  byte ordering by column 1st 4 bytes of 128-bit input occupy 1st column 1st 4 bytes of 128-bit input occupy 1st column 1st 4 bytes of expanded key occupy 1st column 1st 4 bytes of expanded key occupy 1st column

AES Encryption and Decryption

AES Encryption Round

Location of Encryption Devices

Link Encryption  each communication link equipped at both ends  all traffic secure  high level of security  requires lots of encryption devices  message must be decrypted at each switch to read address (virtual circuit number)  security vulnerable at switches particularly on public switched network particularly on public switched network

End to End Encryption  encryption done at ends of system  data in encrypted form crosses network unaltered  destination shares key with source to decrypt  host can only encrypt user data otherwise switching nodes could not read header or route packet otherwise switching nodes could not read header or route packet  hence traffic pattern not secure  solution is to use both link and end to end

Key Distribution  symmetric encryption needs key distribution protected for access by others protected for access by others changed frequently changed frequently  possibilities for key distribution 1. key selected by A and delivered to B 2. third party selects key and delivers to A and B 3. use old key to encrypt & transmit new key from A to B 4. use old key to transmit new key from third party to A and B

Automatic Key Distribution

Traffic Padding  addresses concern about traffic analysis though link encryption reduces opportunity though link encryption reduces opportunity attacker can still assess traffic volume attacker can still assess traffic volume  traffic padding produces ciphertext continuously  if no plaintext, sends random data  makes traffic analysis impossible

Message Authentication  protection against active attacks with falsification of data falsification of data falsification of source falsification of source  authentication allows receiver to verify that message is authentic has not been altered has not been altered is from claimed/authentic source is from claimed/authentic source timeliness timeliness

Authentication Using Symmetric Encryption  assume sender & receiver only know key  only sender could have encrypted message for other party  message must include one of: error detection code error detection code sequence number sequence number time stamp time stamp

Authentication Without Encryption  authentication tag generated and appended to each message  message not encrypted  useful when don’t want encryption because: messages broadcast to multiple destinations messages broadcast to multiple destinations have one destination responsible for authenticationhave one destination responsible for authentication one side heavily loaded one side heavily loaded encryption adds to workloadencryption adds to workload can authenticate random messagescan authenticate random messages programs authenticated without encryption can be executed without decoding programs authenticated without encryption can be executed without decoding

Message Authentication Code  generate authentication code based on shared key and message  common key shared between A and B  if only sender and receiver know key and code matches: receiver assured message has not altered receiver assured message has not altered receiver assured message is from alleged sender receiver assured message is from alleged sender if message has sequence number, receiver assured of proper sequence if message has sequence number, receiver assured of proper sequence  can use various algorithms, eg. DES

Message Authentication Code

One Way Hash Function  accepts variable size message and produces fixed size tag (message digest) but without use of a secret key but without use of a secret key  send digest with message  in manner that validates authenticity  advantages of authentication without encryption encryption is slow encryption is slow encryption hardware expensive encryption hardware expensive encryption hardware optimized for large data sets encryption hardware optimized for large data sets algorithms covered by patents algorithms covered by patents algorithms subject to export controls (from USA) algorithms subject to export controls (from USA)

Using One Way Hash Functions

Secure Hash Functions  produce a “fingerprint” of message/file  must have the following properties: can be applied to any size data block can be applied to any size data block produce fixed length output produce fixed length output easy to compute easy to compute not feasible to reverse not feasible to reverse not feasible to find two messages with the same hash not feasible to find two messages with the same hash  giving “weak” & “strong” hash functions  also used for data integrity

Secure Hash Algorithm  Secure Hash Algorithm (SHA) SHA defined in FIPS 180 (1993), 160-bit hash SHA defined in FIPS 180 (1993), 160-bit hash SHA-1 defined in FIPS (1995) SHA-1 defined in FIPS (1995) SHA-256, SHA-384, SHA-512 defined in FIPS (2002), 256/384/512-bit hashes SHA-256, SHA-384, SHA-512 defined in FIPS (2002), 256/384/512-bit hashes  SHA-1 being phased out, attack known  SHA-512 processes input message with total size less than bits with total size less than bits in 1024 bit blocks in 1024 bit blocks to produce a 512-bit digest to produce a 512-bit digest

SHA-512 Hash Function

Public Key Encryption

Public Key Encryption - Operation  public key is used for encryption  private key is used for decryption  infeasible to determine decryption key given encryption key and algorithm  steps: user generates pair of keys user generates pair of keys user places one key in public domain user places one key in public domain to send a message to user, encrypt using public key to send a message to user, encrypt using public key user decrypts using private key user decrypts using private key

Digital Signatures

 sender encrypts message with private key  receiver decrypts with senders public key  authenticates sender  does not give privacy of data must send both original and encrypted copies must send both original and encrypted copies  more efficient to sign authenticator a secure hash of message a secure hash of message send signed hash with message send signed hash with message

RSA Algorithm

RSA Example

RSA Security  brute force search of all keys given size of parameters is infeasible given size of parameters is infeasible but larger keys do slow calculations but larger keys do slow calculations  factor n to recover p & q a hard problem a hard problem well known 129 digit challenge broken in 1994 well known 129 digit challenge broken in 1994 key size of 1024-bits (300 digits) currently secure for most apps key size of 1024-bits (300 digits) currently secure for most apps

Public Key Certificates

Secure Sockets Layer / Transport Layer Security  Secure Sockets Layer (SSL) is a widely used set of general purpose security protocols use TCP to provide reliable end-to-end service use TCP to provide reliable end-to-end service  Transport Layer Security (TLS) in RFC 2246  two implementation options incorporated in underlying protocol suite incorporated in underlying protocol suite embedded in specific packages embedded in specific packages  minor differences between SSLv3 and TLS

SSL Architecture

SSL Connection and Session  SSL Connection a transport connection providing suitable service a transport connection providing suitable service are peer-to-peer, transient are peer-to-peer, transient associated with one session associated with one session multiple secure connections between parties possible multiple secure connections between parties possible  SSL session an association between client and server an association between client and server created by Handshake Protocol created by Handshake Protocol define set of cryptographic security parameters define set of cryptographic security parameters to avoid negotiation of new security parameters for each connection to avoid negotiation of new security parameters for each connection multiple simultaneous sessions between parties possible but not used in practice multiple simultaneous sessions between parties possible but not used in practice

SSL Record Protocol  provides confidentiality service used to encrypt SSL payload data used to encrypt SSL payload data  provides message integrity service used to form message authentication code (MAC) used to form message authentication code (MAC)  Handshake Protocol defines shared secret keys for each of above services

SSL Record Protocol Operation

Record Protocol Header  content type (8 bits) change_cipher_spec, alert, handshake, and application_data change_cipher_spec, alert, handshake, and application_data no distinction between applications (eg. HTTP) no distinction between applications (eg. HTTP) content of application data opaque to SSL content of application data opaque to SSL  major version (8 bits) – SSL v3 is 3  minor version (8 bits) - SSLv3 value is 0  compressed length (16 bits) maximum maximum

Change Cipher Spec Protocol  uses Record Protocol  single message single byte value 1 single byte value 1  cause pending state to be copied into current state updates cipher suite to be used on this connection updates cipher suite to be used on this connection

Alert Protocol  convey SSL-related alerts to peer entity  alert messages compressed and encrypted  two bytes first byte warning(1) or fatal(2) first byte warning(1) or fatal(2) if fatal, SSL immediately terminates connectionif fatal, SSL immediately terminates connection other connections on session may continueother connections on session may continue no new connections on sessionno new connections on session second byte indicates specific alert second byte indicates specific alert eg. fatal alert is an incorrect MACeg. fatal alert is an incorrect MAC eg. nonfatal alert is close_notify messageeg. nonfatal alert is close_notify message

Handshake Protocol  most complex protocol  allows parties to authenticate each other  and negotiate encryption and MAC algorithm and cryptographic keys  series of messages with four phases: phase 1 Initiate Connection phase 1 Initiate Connection phase 2 Certificate/Key Exchange phase 2 Certificate/Key Exchange phase 3 Client Verifies Certificate, Parameters phase 3 Client Verifies Certificate, Parameters phase 4 Complete Secure Connection Setup phase 4 Complete Secure Connection Setup

SSL Handshake Protocol

SSL Handshake Protocol Parameters  version  random  session ID  ciphersuite  compression method

IPv4 and IPv6 Security  IP Security extensions (IPSec) for IPv4/v6  developed in response to observed weaknesses  to stop unauthorized traffic monitoring, secure user traffic with authentication & encryption  example uses: secure branch office connectivity over Internet secure branch office connectivity over Internet secure remote access over Internet secure remote access over Internet extranet and intranet connectivity extranet and intranet connectivity enhanced electronic commerce security enhanced electronic commerce security  can encrypt / authenticate all traffic at IP level

IPSec Facilities  Authentication Header (AH) authentication only service authentication only service  Encapsulated Security Payload (ESP) combined authentication & encryption service combined authentication & encryption service generally used for virtual private networks generally used for virtual private networks  key exchange both manual and automated both manual and automated  in RFC’s 2401,2402,2406,2408 (1998)

Security Association (SA)  one-way sender-receiver relationship  for two-way, need two security associations  three SA identification parameters security parameter index (in AH/ESP header) security parameter index (in AH/ESP header) IP destination address (unicast only) IP destination address (unicast only) security protocol identifier (AH or ESP) security protocol identifier (AH or ESP)  SA uniquely identified by dest address in IPv4/6 header and SPI in AH/ESP header

SA Parameters  sequence number counter  sequence counter overflow  anti-reply windows  AH information  ESP information  lifetime of this association  IPSec protocol mode  path MTU

Authentication Header

Encapsulating Security Payload

WiFi Protected Access  WiFi Protected Access (WPA) extensions to address security issues based on current i standard based on current i standard addresses authentication, key management, data transfer privacy addresses authentication, key management, data transfer privacy  uses authentication server and a more robust protocol  encryption with AES or 104-bit RC4

WiFi Protected Access

802.11i Access Control

802.11i Privacy & Integrity  have Temporal Key Integrity Protocol (TKIP) or WPA-1 s/w only changes to existing equipment s/w only changes to existing equipment using same RC4 algorithm as older WEP using same RC4 algorithm as older WEP  and Counter Mode CBC MAC (CCMP) or WPA-2 using AES encryption  both add message integrity code (MIC) generated using Michael algorithm generated using Michael algorithm

Summary  security requirements and attacks  confidentiality using symmetric encryption  message authentication & hash functions  public-key encryption & digital signatures  secure socket layer (SSL)  IPSec  WiFi Protected Access