1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like e-mail)

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Chapter 5 Network Security Protocols in Practice Part I
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
IPsec – IKE CS 470 Introduction to Applied Cryptography
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Internet Key Exchange. IPSec – Reminder SPI SA1 2 3 …… SAD.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Just Fast Keying (JFK) Protocol 18739A: Foundations of Security and Privacy Anupam Datta CMU Fall
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Key Distribution CS 470 Introduction to Applied Cryptography
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
1 Network Security Lecture 8 IP Sec Waleed Ejaz
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
Chapter eight: Authentication Protocols 2013 Term 2.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Chapter 5 Network Security Protocols in Practice Part I
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like ) security features mutual authentication session key establishment for subsequent conversation –security association – conversation protected with a session key perfect forward secrecy escrow-foilage protection clogging protection endpoint ID hiding security systems: IPsec, SSL/TLS, SSH

2 Networking Review the Internet (TCP/IP) is a packet-switched network data to be transmitted is divided into “packets” each packet is forwarded by “routers” towards the destination networking functions standardized into hierarchical layers of protocols, so that each layer uses the services of the lower layer and provides services to the upper the first three layers are implemented in the OS kernel the last layer is implemented in user space... Application Layer (HTTP, FTP, SMTP, etc.) Transport Layer (TCP, UDP) Network Layer (IP) Data Link Layer (PPP, Ethernet, etc.) Physical Layer OS

3 Approaches to Securing Network Communication above the OS (at level 4) – add a security wrapper around TCP interface (sockets) OS does not need to be modified minimum modification at applications TCP is below crypto – no cooperation between SSL and TCP – DoS attack possible: whole TCP session can be forced to reset by inserting a single bogus packet within the OS (at level 3) – replace IP with secure implementation (IPsec) no modifications at applications security of IPsec is underutilized – can only supply what IP does, even though can do authentication, etc. application TCP replace IP with IPsec lower layers OS insert SSL (TLS or SSH)

4 Session Key Establishment Issues message authentication with a session key establishment is needed against connection hijacking sequence numbers needed against packet replays (different from TCP seq.no.) session key reset before SN wrap around for freshness guarantee, both parties should contribute to the session key –less likely to attacks when someone impersonate one party to the other –good key even if only one party has access to random key generator

5 Perfect Forward Secrecy and Escrow-Foilage Protection what is PFS again? what’s an example of a system with PFS? non-PFS examples: –Kerberos (why?) –session key transport with RSA encryption (why?) key escrow – communicating parties have to store their long- term keys with a third-party (authorities, law-enforcement, etc.) escrow-foilage – key stored at the third party is used maliciously escrow-foilage protection – conversation between Alice and Bob is secret to passive eavesdropper – Trudy in possession of Alice’s and Bob’s long-term keys –if a system is PFS it is also protected against escrow-foilage. why?

6 Denial-of-Service Protection denial-of-service authentication attack – exhaust all server’s resources by initiating numerous authentication sessions (possibly with faked IP packets) solutions cookies – server responds to a session request with a random number (cookie), initiator has to reply back with that cookie to continue –attacker have to either reveal its address or, abort the attack –stateless cookies: cookie is H(IP address, server’s secret); server doesn’t have to remember it puzzles – to continue authentication server requires initiator to solve a puzzle: e.g. MD5(x) = …, x = ? –solving is slow (depends on the size of x), verification fast –can be made stateless, how? –client’s computation power varies, not useful against coordinated distributed DoS attack

7 Identity Hiding some apps require identity protection against eavesdropper parties can use Diffie-Hellman anonymously and then use shared key to encrypt the rest of the session (including authentication) –passive attacker will not know the identities –active attacker may still learn one or both identities, how? which identity is more valuable to protect? two opinions –initiator (Alice) – Bob’s identity is probably already known –responder (Bob) – if Bob’s id is harder to impersonate (Alice initiates the conversation) in the protocol below, whose id is protected against active attack? Alice Bob okay, g b mod p g a mod p {“Alice”,[g a mod p] Alice } g b mod p {“Bob”,[g b mod p] Bob } I want to talk, g a mod p

8 Live Partner Reassurance Bob is vulnerable to replays can use different D-H exponents for different sessions –DH exponentiation is expensive: problem for servers, low-end clients –solution: same DH exponents, different nonces Incorporate nonces into the session key. E.g., K = H(g ab mod p, nonces) how would these nonces be exchanged?

9 Parallel Key Computation Computing D-H exponents is expensive. May do it in advance in the protocol below, why is Bob sending two messages in sequence rather than combining them? Alice Bob [g b mod p] Bob g ab mod p {Bob’s message} g ab mod p {Alice’s message} [g a mod p] Alice

10 Other Issues session resumption: use previously established session keys to bypass public-key authentication –one solution: share a key medium term (derive the session key from it) and request knowledge on resumption deniability: possibly need not to leave a proof that Alice talked to Bob: –ex: Bob’s name signed by Alice’s key, what does this message prove? –solution: don’t use signatures for authentication. use encryption with public keys crypto negotiation: key exchange protocols negotiate the algorithms to be used as well (ex: key size, compression, prime (p) to use for D-H) –problem: Trudy may force Alice and Bob to use weak crypto (if it is available as an option for both parties by tampering with messages and removing stronger options –solution?