Computer Networks with Internet Technology William Stallings Network Security.

Slides:



Advertisements
Similar presentations
Network Security Md. Kamrul Hasan Assistant Professor and Chairman
Advertisements

Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Chapter 10 Network Security. 2 Security Requirements zConfidentiality zIntegrity zAvailability.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Computer Networks with Internet Technology William Stallings Chapter 16 Network Security.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Sri Lanka Institute of Information Technology
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 18: Network Security Business Data Communications, 5e.
Information Security and Management 11
Cryptographic Technologies
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Lecture 3: Cryptographic Tools
Network Security Sorina Persa Group 3250 Group 3250.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 2 “Cryptographic Tools”.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
William Stallings Data and Computer Communications Chapter 18 Network Security.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
By: Nasoor Bagheri In the name of god Network Security By: Nasoor Bagheri
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptography CSS 329 Lecture 13:SSL.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Computer Networks with Internet Technology William Stallings Chapter 16 Network Security.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
William Stallings Data and Computer Communications 7th Edition
The Secure Sockets Layer (SSL) Protocol
Network Security.
Secure Sockets Layer (SSL)
The Secure Sockets Layer (SSL) Protocol
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Presentation transcript:

Computer Networks with Internet Technology William Stallings Network Security

2 Security Requirements Confidentiality Integrity Availability Authenticity

3 Passive Attacks Eavesdropping on transmissions To obtain information Release of message contents —Outsider learns content of transmission Traffic analysis —By monitoring frequency and length of messages, even encrypted, nature of communication may be guessed Difficult to detect Can be prevented

4 Active Attacks Masquerade —Pretending to be a different entity Replay Modification of messages Denial of service Easy to detect —Detection may lead to deterrent Hard to prevent

5 Figure 16.1 Simplified Model of Symmetric Encryption

6 Ingredients Plain text Encryption algorithm Secret key Cipher text Decryption algorithm

7 Requirements for Security Strong encryption algorithm —Even if known, should not be able to decrypt or work out key —Even if a number of cipher texts are available together with plain texts of them Sender and receiver must obtain secret key securely Once key is known, all communication using this key is readable

8 Attacking Encryption Crypt analysis —Relay on nature of algorithm plus some knowledge of general characteristics of plain text —Attempt to deduce plain text or key Brute force —Try every possible key until plain text is achieved

9 Encryption Algorithms Block cipher —Process plain text in fixed block sizes producing block of cipher text of equal size —Data encryption standard (DES) —Triple DES (TDES) —Advanced Encryption Standard

10 Data Encryption Standard US standard 64 bit plain text blocks 56 bit key Broken in 1998 by Electronic Frontier Foundation —Special purpose machine —Less than three days —DES now worthless

11 Triple DEA ANSI X9.17 (1985) Incorporated in DEA standard 1999 Uses 3 keys and 3 executions of DEA algorithm Effective key length 112 or 168 bit Slow Block size (64 bit) too small

12 Advanced Encryption Standard National Institute of Standards and Technology (NIST) in 1997 issued call for Advanced Encryption Standard (AES) —Security strength equal to or better than 3DES —Improved efficiency —Symmetric block cipher —Block length 128 bits —Key lengths 128, 192, and 256 bits —Evaluation include security, computational efficiency, memory requirements, hardware and software suitability, and flexibility —2001, AES issued as federal information processing standard (FIPS 197)

13 AES Description Assume key length 128 bits Input is single 128-bit block —Depicted as square matrix of bytes —Block copied into State array Modified at each stage —After final stage, State copied to output matrix 128-bit key depicted as square matrix of bytes —Expanded into array of key schedule words —Each four bytes —Total key schedule 44 words for 128-bit key Byte ordering by column —First four bytes of 128-bit plaintext input occupy first column of in matrix —First four bytes of expanded key occupy first column of w matrix

14 Figure 16.2 AES Encryption and Decryption

15 Figure 16.3 AES Encryption Round

16 Link Encryption Each communication link equipped at both ends All traffic secure High level of security Requires lots of encryption devices Message must be decrypted at each switch to read address (virtual circuit number) Security vulnerable at switches —Particularly on public switched network

17 End to End Encryption Encryption done at ends of system Data in encrypted form crosses network unaltered Destination shares key with source to decrypt Host can only encrypt user data —Otherwise switching nodes could not read header or route packet Traffic pattern not secure Use both link and end to end

18 Key Distribution Key selected by A and delivered to B Third party selects key and delivers to A and B Use old key to encrypt and transmit new key from A to B Use old key to transmit new key from third party to A and B

19 Figure 16.5 Automatic Key Distribution for Connection-Oriented Protocols

20 Automatic Key Distribution Session Key —Used for duration of one logical connection —Destroyed at end of session —Used for user data Permanent key —Used for distribution of keys Key distribution center —Determines which systems may communicate —Provides one session key for that connection Security service module (SSM) —Performs end to end encryption —Obtains keys for host

21 Message Authentication Protection against active attacks —Falsification of data —Eavesdropping Message is authentic if it is genuine and comes from the alleged source Authentication allows receiver to verify that message is authentic —Message has not altered —Message is from authentic source —Message timeline

22 Authentication Using Encryption Assumes sender and receiver are only entities that know key Message includes: —error detection code —sequence number —time stamp

23 Authentication Without Encryption Authentication tag generated and appended to each message Message not encrypted Useful for: —Messages broadcast to multiple destinations Have one destination responsible for authentication —One side heavily loaded Encryption adds to workload Can authenticate random messages —Programs authenticated without encryption can be executed without decoding

24 Message Authentication Code Generate authentication code based on shared key and message Common key shared between A and B If only sender and receiver know key and code matches: —Receiver assured message has not altered —Receiver assured message is from alleged sender —If message has sequence number, receiver assured of proper sequence

25 Figure 16.6 Message Authentication Using a Message Authentication Code

26 One Way Hash Function Accepts variable size message and produces fixed size tag (message digest) Advantages of authentication without encryption —Encryption is slow —Encryption hardware expensive —Encryption hardware optimized to large data —Algorithms covered by patents —Algorithms subject to export controls (from USA)

27 Figure 16.7 Message Authentication Using a One-Way Hash Function

28 Secure Hash Functions Hash function must have following properties: —Can be applied to any size data block —Produce fixed length output —Easy to compute —Not feasible to reverse —Not feasible to find two message that give the same hash

29 SHA-1 Secure Hash Algorithm 1 Input message less than 2 64 bits —Processed in 512 bit blocks Output 160 bit digest

30 Figure 16.8 Message Digest Generation Using SHA-1

31 Public Key Encryption Based on mathematical algorithms Asymmetric —Use two separate keys Ingredients —Plain text —Encryption algorithm —Public and private key —Cipher text —Decryption algorithm

32 Figure 16.9 Public-Key Cryptography

33 Public Key Encryption - Operation One key made public —Used for encryption Other kept private —Used for decryption Infeasible to determine decryption key given encryption key and algorithm Either key can be used for encryption, the other for decryption

34 Steps User generates pair of keys User places one key in public domain To send a message to user, encrypt using public key User decrypts using private key

35 Digital Signature Sender encrypts message with their private key Receiver can decrypt using senders public key This authenticates sender, who is only person who has the matching key Does not give privacy of data —Decrypt key is public

36 Figure Example of RSA Algorithm

37 Figure Public-Key Certificate Use

38 Secure Sockets Layer Transport Layer Security Security services Transport Layer Security defined in RFC 2246 SSL general-purpose service —Set of protocols that rely on TCP Two implementation options —Part of underlying protocol suite Transparent to applications —Embedded in specific packages E.g. Netscape and Microsoft Explorer and most Web servers Minor differences between SSLv3 and TLS

39 SSL Architecture SSL uses TCP to provide reliable end-to-end secure service SSL two layers of protocols Record Protocol provides basic security services to various higher-layer protocols —In particular, HTTP can operate on top of SSL Three higher-layer protocols —Handshake Protocol —Change Cipher Spec Protocol —Alert Protocol —Used in management of SSL exchanges (see later)

40 Figure SSL Protocol Stack