Anjum Reyaz-Ahmed.  Part I : Authentication Protocols  Kerberos Protocol  Needham-Schroder Protocol  Part II: Current Literary Review  “Elliptical.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

AUTHENTICATION AND KEY DISTRIBUTION
COEN 350 Kerberos.
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Lecture 10: Mediated Authentication
Chapter 10 Real world security protocols
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Handshake Protocols COEN 350. Simple Protocol Alice: Hi, I am Alice. My password is “fiddlesticks”. Bob: Welcome, Alice.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
COEN 350 Kerberos. Provide authentication for a user that works on a workstation. Uses secret key technology Because public key technology still had patent.
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
Authentication & Kerberos
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Application of Elliptic Curves to Cryptography
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Chapter 21 Public-Key Cryptography and Message Authentication.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Cryptography in the Real World Diffie-Hellman Key Exchange RSA Analysis RSA Performance SSH Protocol Page 1.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
KERBEROS SYSTEM Kumar Madugula.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Message Security, User Authentication, and Key Management
Presentation transcript:

Anjum Reyaz-Ahmed

 Part I : Authentication Protocols  Kerberos Protocol  Needham-Schroder Protocol  Part II: Current Literary Review  “Elliptical Curve Cryptography How it Works " Sun Microsystems Laboratory 2005  “Security Challenges in Seamless Mobility – How to Handover The Keys”, WICON 2008  Part III: Future Research Initiatives

Kerberos Provide authentication for a user that works on a workstation. Uses secret key technology Because public key technology still had patent projection. Implements authentication by Needham & Schroeder. On the market in versions 4 and 5. [Chow and Johnson 1997]

Kerberos Kerberos consists of Key Distribution Center (KDC) Runs on a physically secure node Library of Subroutines Modifies known UNIX libraries such as telnet, rlogin, … [Chow and Johnson 1997]

Key Distribution Center KDC: Database of keys for all users Invents and hands out keys for each transaction between clients. Alice KDC Bob Alice wants Bob K Alice { K AB for Bob }K Bob {K AB for Alice} [Chow and Johnson 1997]

Key Distribution Center Message from KDC to Bob has some problems. Timing problem: Alice needs to wait to make sure that Bob got the key. Change the protocol so that Alice receives a ticket to talk to Bob. [Chow and Johnson 1997]

Key Distribution Center Alice KDC Bob Alice wants Bob K Alice {Use K AB for Bob} Ticket for Bob := K Bob {Use K AB for Alice} I’m Alice, my ticket is K Bob {Use K AB for Alice} [Chow and Johnson 1997]

Key Distribution Center Needham Schroeder: Combines KDC operation with authentication. Uses nonces instead of timestamps to prevent replay attacks. A (sequential / random) number used only once. [Chow and Johnson 1997]

Needham Schroeder AliceKDC BobN 1, Alice, Bob K Alice {N 1, Bob, K AB, ticket to Bob} K AB {N 2 -1, N 3 } K AB {N 3 -1} Ticket, K AB {N 2 } Ticket = K Bob {K AB, Alice} [Chow and Johnson 1997]

Trudy waits until Alice makes a request to the KDC.Trudy now incorporates Bob. Needham Schroeder AliceKDC Bob Alice, Bob Purpose of the nonce is the following scenario: Assume that Trudy has stolen an old key of Bob’s and stolen the message where Alice previously has requested a key. Bob has in the meantime changed his key. Trudy (KDC) K alice { Bob, K AB, ticket to Bob} Trudy as Bob Ticket = K Bob {K AB, Alice}, … Trudy impersonates the KDC and replays the old captured message, which looks like a normal message. Trudy can now successfully authenticate herself to Alice as Bob. But the nonces make all messages unique! [Chow and Johnson 1997]

Message 2: K Alice {N 1, Bob, K AB, ticket} with ticket = K Bob {K AB,Alice} N 1 prevents replay attacks. “Bob” to prevent Trudy from trying to play Bob. Ticket does not have to be sent encrypted with Alice’s key. Needham Schroeder [Chow and Johnson 1997]

Message 3: ticket, K AB {N 2 } Alice presents a challenge together with her ticket. Bob decodes ticket to find K AB. He decodes the latter part of the message to find the challenge. Needham Schroeder [Chow and Johnson 1997]

Message 4: K AB {N 2 -1,N 3 } Bob solves Alice’s challenge. Bob sends Alice his own challenge. Your turn: What is the vulnerability if message 4 were to read: K AB {N 2 -1}, K AB {N 3 } ? Needham Schroeder Answer on next two slides.

Needham Schroeder Answer: Trudy eavesdrops on an exchange and then splices her own messages to Bob: [Chow and Johnson 1997]

Needham Schroeder Alice Bob Ticket, K AB {N 2 } K AB {N 2 -1}, K AB {N 3 } Trudy (later) Replays Ticket, K AB {N 2 }K AB {N 2 -1} K AB {N 4 } Trudy (second connection) Ticket, K AB {N 4 } K AB {N 4 -1} K AB {N 5 } Trudy now resumes her first connection: K AB {N 4 -1} and is authenticated [Chow and Johnson 1997]

Needham Schroeder Expanded Needham Schroeder Prevents replay attacks after Alice’s master key was stolen and Alice changed her master key. [Chow and Johnson 1997]

Needham Schroeder Vulnerability Scenario Alice has a previous key J Alice that Trudy captured. Alice has changed her key to K Alice. Trudy has captured a previous login request from Alice to KDC: KDC sent J Alice {N 1,Bob,J AB,K Bob {J AB,Alice}} [Chow and Johnson 1997]

Needham Schroeder Vulnerability Scenario Trudy has J Alice {N 1,Bob,J AB,K Bob {J AB,Alice}} Trudy calculates J AB and K Bob {J AB,Alice} with J Alice. Trudy now impersonates Alice to Bob. She sends her round 3 message to Bob: N 2, K Bob {J AB,Alice} She can complete the Needham Schroeder protocol with Bob. Since the KDC no longer participates, informing the KDC of the change does not prevent Trudy from succeeding impersonating Alice to Bob. [Chow and Johnson 1997]

Needham Schroeder Vulnerability Scenario Trudy has J Alice {N 1,Bob,J AB,K Bob {J AB,Alice}}, J AB. K Bob {J AB,Alice}. Trudy to Bob: J AB {N 2 }, K Bob {J AB,Alice} Bob to Trudy: J AB {N 2 –1, N 3 } Trudy to Bob: J AB {N 3 –1} Trudy and Bob are mutually authenticated! [Chow and Johnson 1997]

Needham Schroeder Solution: Prevent replays after long duration: Clock and date. Certificate from Bob. Extended Needham Schroeder picks the latter. [Chow and Johnson 1997]

Extended Needham Schroeder Alice to Bob: I want to talk to you. Bob to Alice: K Bob {N B } Alice to KDC: N 1, “Alice wants Bob”, K Bob {N B } KDC to Alice: K Alice {N 1,“Bob”,K AB, K Bob {K AB, “Alice”, N B }} Alice to Bob: K Bob {K AB, “Alice”, N B }, K AB {N 2 } Bob to Alice: K AB {N 2 -1,N 3 } Alice to Bob:K AB {N 3 -1}. N B prevents the previous attack. Bob can determine whether Alice is using the key that the KDC has. [Chow and Johnson 1997]

Extended Needham Schroeder Alice now needs to receive a certificate from Bob before starting standard Needham Schroeder. [Chow and Johnson 1997]

Otway Rees Replaces extended Needham Schroeder Uses only 5 messages Speed-up results from the “suspicious party” (Bob) going to the KDC. [Chow and Johnson 1997]

Otway Rees Alice to Bob:N C, Alice Bob K Alice {N A, N C, Alice, Bob} Bob to KDC:K Alice {N A,N C, Alice, Bob}, K Bob {N B, N C, Alice, Bob} KDC to BobN C, K Alice {N A,K AB }, K Bob {N B,K AB } Bob to Alice:K Alice {N A, K AB } Alice to Bob:K AB {N C } [Chow and Johnson 1997]

Kerberos Based on Needham Schroeder, but uses time instead of nonces. Approximate time is easy in distributed systems. [Chow and Johnson 1997]

Kerberos Kerberos Authentication Service: Alice to KDCN 1 “Alice wants Bob” KDC to AliceK Alice {N 1, “Bob”, K AB, K Bob {K AB, Alice, expir. Time}} Alice to BobK Bob {K AB, “Alice”, expir. Time}, K AB {cur. Time} Bob to AliceK AB {cur. Time +1} [Chow and Johnson 1997]

Kerberos Kerberos Setup Master key shared by KDC with each principal. When Alice logs into her machine, her station asks the KDC for a session key for Alice. The KDC also gives her a Ticket Granting Ticket. (TGT) Alice’s workstation retains only the session key and the TGT. Alice’s workstation uses the TGT to receive other tickets from the Ticket Granting Service (TGS). [Chow and Johnson 1997]

Kerberos Two entities: Key distribution center. Authentication Server (AS) Ticket granting server (TGS). Both need the same database, so they are usually on the same machine. [Chow and Johnson 1997]

Summary:  Elliptical curve cryptosystem (ECC) operates over points on an elliptical curve  The best known algorithm to attack ECC runs more slowly than best known algorithm to other cryptosystems  ECC can offer equivalent security with subsequently smaller size keys. [Chang & et al. 2005]

 Public-key cryptosystem offering the highest security strength per bit. Uses smaller keys for equivalent security.  Results in faster computations and savings in memory, power and bandwidth (especially important in constrained environments).  Performance advantage increases as security needs increase over time  Endorsed/standardized by NIST, ANSI, IEEE, IETF. [Chang & et al. 2005]

How it works [Chang & et al. 2005]  Parameters: Elliptic curve, base point G  Scalar point multiplication: Q = kP, e.g. 9P = 2(2(2P)) + P  Hard problem: Given kP (public-key) & P, find k (private- key). EC Discrete Logarithm Problem – no known subexponential solutions.

Large keys are a big problem for small devices AlgorithmTime(s)Data BytesCode Bytes ECC secp160r RSA 1024(priv) RSA 1024 (pub) ECC secp224r RSA-2048 (priv) RSA-2048 (pub**) [Chang & et al. 2005]

The Internet today is...  a global marketplace for goods and services  enabled by security mechanisms that ensure authentication, confidentiality and integrity  predominantly secured by the SSL protocol using a combination of symmetric- and public-key cryptography but...  many new devices connecting to the Internet have limited capabilities (e.g. sensors, appliances)  new applications (e.g. patient monitoring, building automation) will increase the number of transactions requiring security  the future will demand higher levels of security (e.g. 128-bit AES, 2048-bit RSA) [Chang & et al. 2005]

The security of ECC relies on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP), i.e. finding k, given P and Q = kP. The problem is computationally intractable for large values of k. Public- Key SystemMathematical Problem Best Known method for solving Integer factorization e.g. RSA Given a number n find its prime factors Number field Sieve: (Sub-exponential) Discrete logarithm e.g. DH, DSA Given a prime n and number g and h find x such that h = g x mod n Number field sieve (Sub-exponential) Elliptic curve Discrete logarithm e.g. ECDH, ECDSA Given an elliptic curve and points P and Q find k such that Q = kP Pollard-rho algorithm sqrt(n) (Fully exponential)

Key Exchange Each node has a CPU and communication controller running independently Time Triggered Communication Protocol

 ECC can offer equivalent security with substantially smaller key sizes.  For example, a 160-bit ECC key provides the same level of security as a 1024-bit RSA key and 224-bit ECC is equivalent to 2048-bit RSA.  Smaller keys result in faster computations, lower power consumption, as well as memory and bandwidth savings.  While these characteristics make ECC especially appealing for small embedded devices, they can also alleviate the computational burden on secure web servers. [Chang & et al. 2005]

Synopsis Key management challenges for seamless handover across heterogeneous wireless networks. [Hoeper et al. 2008]

Handovers

Key Distributor The authentication server of the serving network the lowest common key holder in serving and target network the lowest key holder in the serving network with access to target network via a short cut

 Discussion on various security aspects of key management and seamless mobility in heterogeneous networks.  Show that Handover security and performance depends on the  method used to derive the HO key hierarchy  the network position of the entity acting as key distributor  the protocol used to distribute HO keys  Present three HO key distribution protocols: a push protocol and two variant of pull protocols.

Passwords are the weakest link in any system We need new methods of authenticating users Password 2.0?

 If your mobile phone is your future authenticator, how do you authenticate to your mobile phone?  One possibility is based on MIT’s “beeper-based” signature concept (R. Rivest, A. Lysyanskaya)  “Beeper” that you wear — maybe a belly button ring? — sends low-power signal to your phone  Fresh signal required for phone to generate digital signatures — otherwise phone won’t sign  Beeper can authenticate you to your phone, and/or you and your phone to the network

 Users will authenticate based on what they know — and what they’re able to do — in new and sophisticated ways  Life questions” are quite common already for password reset, as well as account enrollment  Human-computer interfaces offer new possibilities for authentication, e.g., Passface TM

References: 1. Randy Chow & Theodore Johnson. “Distributed Operating Systems & Algorithms”. pp Addison-Wesley Sheueling Chang, Hans Eberle, Vipul Gupta & Nils Gura. “Elliptical Curve Cryptography- How it works”. Sun Microsystem Katrin Hoeper, Lidong Chen, Antonio Izquierdo & Nada Golmie. “Security Challenges in Seamless Mobility – How to Handover the Keys”. WICON IEEE, 2008

Thank you!!