ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.

Slides:



Advertisements
Similar presentations
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Chapter 5 Network Security Protocols in Practice Part I
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
IPsec – IKE CS 470 Introduction to Applied Cryptography
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
Homework #4 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Slide 1 Vitaly Shmatikov CS 378 Key Establishment Pitfalls.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Key Distribution CS 470 Introduction to Applied Cryptography
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
1 Network Security Lecture 8 IP Sec Waleed Ejaz
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Digital Signatures, Message Digest and Authentication Week-9.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Computer and Network Security - Message Digests, Kerberos, PKI –
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Key Management Network Systems Security Mort Anvari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Chapter 9 Simple Authentication Protocols Simple Security Protocol Authentication Protocols Authentication and TCP Chapter 9 Simple Authentication protocols.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
Chapter eight: Authentication Protocols 2013 Term 2.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Just Fast Keying (JFK) Protocol
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall

Real-Time Communication Security Network layers Session key establishment Perfect forward secrecy (PFS) Escrow-foilage Clogging protection Identifier hiding Live partner reassurance

Network Basics - Headers

An example

What Layer? Application layer security ◦ Client/Server (Kerberos) ◦ (PEM, PGP) ◦ Web access (SSL) Transport Layer ◦ SSL/TLS IP layer ◦ IPSec application TCP replace IP with IPsec lower layers OS insert SSL (TLS or SSH)

Real-time protocol Parties negotiate interactively ◦ (Mutual) Authentication ◦ Session key establishment Security association: the conversation protected by the session key ◦ Perfect forward secrecy ◦ Clogging protection ◦ Escrow-foilage ◦ Endpoint identity hiding IPsec, SSL/TLS, SSH

Session Key Establishment Issues message authentication with a session key establishment is needed against connection hijacking sequence numbers needed against packet replays (different from TCP seq.no.) session key reset before SN wrap around for freshness guarantee, both parties should contribute to the session key ◦ less likely to attacks when someone impersonate one party to the other ◦ good key even if only one party has access to random key generator

Perfect Forward Secrecy PFS ◦ An eavesdropper cannot decrypt a session after the session concludes, even if the eavesdropper records the entire encrypted session and subsequently obtains the two parties’ long-term secrets. How to achieve PFS ◦ Generate a temporary session key, not derivable from information stored at the node after the session concludes, and then forget it after the session. Check the following ◦ Kerberos ◦ Alice Chooses the session key, and sends it to Bob, encrypted with Bob’s public key.

PFS protocol

Escrow-Foilage Protection key escrow – communicating parties have to store their long-term keys with a third-party (authorities, etc.) escrow-foilage – key stored at the third party is used maliciously;

Escrow-Foilage Protection ( Cont’d ) Escrow-foilage protection: ◦ A third party (e.g., a trustworthy organization) may know Alice and Bob’s long-term keys. However, the conversation between Alice and Bob can still be made secret against a passive eavesdropper with prior knowledge of Alice and Bob’s long-term keys. Anything with PFS will also have escrow-foilage against a passive attacker. Active attackers – with the long-term keys, they can impersonate Alice or Bob.

Denial-of-Service Protection DoS attacks: the imposter launches DoS attacks with forged IP addresses. The purpose is to use up Bob’s resources so he cannot serve the legitimate users. ◦ TCP SYN attack

Denial of Service/Clogging Protection Cookies – server responds to a session request with a random number (cookie), initiator has to reply back with that cookie to continue ◦ attacker have to either reveal its address or, abort the attack ◦ stateless cookies: cookie is H(IP address, server’s secret); server doesn’t have to remember it Stateless Cookies ◦ Bob does not need to keep state ◦ The cookie is a function of the IP address and a secret known to Bob ◦ It is easy to forge a source IP address but it is difficult to receive the packet sent back to the forged address.

Stateless Cookie Protocol

Puzzle puzzles – to continue authentication server requires initiator to solve a puzzle: e.g. MD5(x) = …, x = ? ◦ solving is slow (depends on the size of x), verification fast ◦ can be made stateless, how? ◦ client’s computation power varies, not useful against coordinated distributed DoS attack

Endpoint Identifier Hiding some apps require identity protection against eavesdropper parties can use Diffie-Hellman anonymously and then use shared key to encrypt the rest of the session (including authentication) ◦ passive attacker will not know the identities ◦ active attacker may still learn one or both identities, because of man-in-the-middle attack

Endpoint Identifier Hiding (Cont’d) Which identity is more valuable to protect? two opinions ◦ initiator (Alice) – Bob’s identity is probably already known ◦ responder (Bob) – if Bob’s id is harder to impersonate (Alice initiates the conversation) in the protocol below, whose id is protected against active attack?

Alice Bob okay, g b mod p g ab mod p {“Alice”,[g a mod p] Alice } g ab mod p {“Bob”,[g b mod p] Bob } I want to talk, g a mod p

Homework 16.4 Referring to §16.6 Endpoint Identifier Hiding, modify Protocol 16-4 to hide the initiator's identity rather than the target's identity.16.6Protocol 16-4

Homework 16.5 As mentioned in §16.6 Endpoint Identifier Hiding, it is possible to design a protocol that will hide both identifiers from an active attacker, assuming that Alice (the initiator) already knows Bob's public key. Show such a protocol.16.6

Homework 16.6 Also as mentioned in §16.6 Endpoint Identifier Hiding, it is possible to hide both identities from active attackers if Alice and Bob share a secret key and there is a small set of entities that might initiate a connection to Bob. Show such a protocol.16.6

Endpoint Identifier Hiding (Cont’d) Hide the identifiers of the two communicating parties Hide both parties’ identifiers from a passive attacker. Hide one party’s identifier from an active attacker (man- in-the-middle) Hide both parties’ identifiers from both passive and active attackers ◦ The two parties need to know who they are talking to. ◦ Use some pre-established secret, such as pre-shared secret key, other party’s public key.

Live Partner Reassurance Bob is vulnerable to replays can use different D-H exponents for different sessions ◦ DH exponentiation is expensive: problem for servers, low-end clients ◦ solution: same DH exponents, different nonces  Incorporate nonces into the session key. E.g., K = H(g ab mod p, nonces)  how would these nonces be exchanged?

Live Partner Reassurance (Cont’d) Due to computation complexity, it might be nice to reuse some public key values, such as DH values.

Live Partner Reassurance (Cont’d)

[Kaufman] In the Protocol 16-6, explain why Bob knows that Alice is the real Alice, and not someone replaying Alice's messages. How does Alice know that it's the real Bob if she uses a different a each time? Modify the protocol to allow both Alice and Bob to reuse their a and b values, and yet have both sides be able to know they are talking to a live partner.Protocol 16-6

Answer:

Parallel Key Computation Computing D-H exponents is expensive. May do it in advance in the protocol below, why is Bob sending two messages in sequence rather than combining them? Alice Bob [g b mod p] Bob g ab mod p {Bob’s message} g ab mod p {Alice’s message} [g a mod p] Alice

Other Issues Session resumption: use previously established session keys to bypass public-key authentication ◦ one solution: share a key medium term (derive the session key from it) and request knowledge on resumption Deniability: leave a proof that Alice talked to Bob: ◦ ex: Bob’s name signed by Alice’s key, what does this message prove? ◦ solution: don’t use signatures for authentication, use shared secret or public encryption keys

Other Issues (Cont’d) Crypto negotiation: key exchange protocols negotiate the algorithms to be used as well (ex: key size, compression, prime (p) to use for D-H) ◦ problem: Trudy may force Alice and Bob to use weak crypto (if it is available as an option for both parties by tampering with messages and removing stronger options) ◦ solution?

Reading Assignment [Kaufman] Chapter 16