Chapter 20: Network Security Business Data Communications, 4e.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Internet Protocol Security (IP Sec)
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
SCSC 455 Computer Security Virtual Private Network (VPN)
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to Cryptography
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Guide to Network Defense and Countermeasures Second Edition
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Chapter 18: Network Security Business Data Communications, 5e.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Cryptographic Technologies
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Chapter 8 Network Security 4/17/2017
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Network Security Sorina Persa Group 3250 Group 3250.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Linux Networking and Security Chapter 8 Making Data Secure.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
William Stallings Data and Computer Communications Chapter 18 Network Security.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
IP Security
CSCI 465 Data Communications and Networks Lecture 26
IPSec Detailed Description and VPN
IPSecurity.
Network Security.
Presentation transcript:

Chapter 20: Network Security Business Data Communications, 4e

2 Security Threats Passive attacks Eavesdropping on, or monitoring, transmissions Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored Active attacks Modification of transmitted data Attempts to gain unauthorized access to computer systems

3 資訊安全之重點 機密性 (Confidentiality) 真實性 (Authentication) 完整性 (Integrity) 不可否認性 (Non-repudiation) 存取控制 (Access control) 可用性 (Availability)

4 Encryption Methods The essential technology underlying virtually all automated network and computer security applications is cryptography Two fundamental approaches are in use: conventional encryption, also known as symmetric encryption public-key encryption, also known as asymmetric encryption

5 Conventional Encryption The only form of encryption prior to late 1970s Five components to the algorithm Plaintext: The original message or data Encryption algorithm: Performs various substitutions and transformations on the plaintext. Secret key: Input to the encryption algorithm. Substitutions and transformations performed depend on this key Ciphertext: Scrambled message produced as output. depends on the plaintext and the secret key Decryption algorithm: Encryption algorithm run in reverse. Uses ciphertext and the secret key to produce the original plaintext.

6 Conventional Encryption Operation

7 Conventional Encryption Requirements & Weaknesses Requirements A strong encryption algorithm Secure process for sender & receiver to obtain secret keys Methods of Attack Cryptanalysis Brute force

8 Data Encryption Standard (DES) Adopted in 1977, reaffirmed for 5 years in 1994, by NBS/NIST Plaintext is 64 bits (or blocks of 64 bits), key is 56 bits Plaintext goes through 16 iterations, each producing an intermediate value that is used in the next iteration. DES is now too easy to crack to be a useful encryption method

9 Triple DES - TDEA Alternative to DES, uses multiple encryption with DES and multiple keys With three distinct keys, TDEA has an effective key length of 168 bits, so is essentially immune to brute force attacks Principal drawback of TDEA is that the algorithm is relatively sluggish in software

10 Triple DES - TDEA

Key Size Matters! Centuries Decades Years Hours 40-bits 56-bits 168-bits * Triple-DES (recommended for commercial & corporate information) Information Lifetime 100’s 10K 1M 10M 100M Budget ($)

12 Average Time Required for Exhaustive Key Search

13 Public-Key Encryption Based on mathematical functions rather than on simple operations on bit patterns Asymmetric, involving the use of two separate keys Misconceptions about public key encryption it is more secure from cryptanalysis it is a general-purpose technique that has made conventional encryption obsolete

14 Public-Key Encryption Components Plaintext Encryption algorithm Public key Private key Ciphertext Decryption algorithm

15 Public-Key Encryption Operation

16 Public-Key Signature Operation

17 Characteristics of Public-Key Infeasible to determine the decryption key given knowledge of the cryptographic algorithm and the encryption key. Either of the two related keys can be used for encryption, with the other used for decryption. Slow, but provides tremendous flexibility to perform a number of security-related functions Most widely used algorithm is RSA

18 Symmetric Cipher (Conventional) Asymmetric (RSA/D-H) 40 Bits 274 Bits 56 Bits 384 Bits 64 Bits 512 Bits 80 Bits 1024 Bits 96 Bits 1536 Bits 112 Bits 2048 Bits 120 Bits 2560 Bits 128 Bits 3072 Bits 192 Bits Bits Performance 30~200 1 Key Length

19 Hybrid Encryption Technology: PGP (Pretty Good Privacy) Hybrid Encryption Technique First compresses the plaintext. Then creates a session key, which is a one-time-only secret key. Using the session key, apply a fast conventional encryption algorithm to encrypt the plaintext. The session key is then encrypted to the recipient ’ s public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient.

20 PGP Encryption

21 PGP Decryption The recipient uses its private key to recover the temporary session key Use the session key to decrypt the conventionally-encrypted ciphertext.

22 PGP Decryption

23 Location of Encryption Devices Link encryption Each vulnerable communications link is equipped on both ends with an encryption device. All traffic over all communications links is secured. Vulnerable at each switch End-to-end encryption the encryption process is carried out at the two end systems. Encrypted data are transmitted unaltered across the network to the destination, which shares a key with the source to decrypt the data Packet headers cannot be secured

24 Conventional Encryption Key Distribution Both parties must have the secret key Key is changed frequently Requires either manual delivery of keys, or a third-party encrypted channel Most effective method is a Key Distribution Center (e.g. Kerberos)

25 Secure Conventional Key Distribution Session Key

26 Public-Key Encryption Key Distribution Parties create a pair of keys; public key is broadly distributed, private key is not To reduce computational overhead, the following process is then used: 1. Prepare a message. 2. Encrypt that message using conventional encryption with a one-time conventional session key. 3. Encrypt the session key using public-key encryption with recipient ’ s public key. 4. Attach the encrypted session key to the message and send it. PGP

27 Digital Signatures Digital signatures enable the recipient of information to verify the authenticity of the information ’ s origin, and also verify that the information is intact. Public key digital signatures provide authentication authentication data integrity data integrity non-repudiation non-repudiation Technique: public key cryptography

28 Simple Digital Signatures Sender ’ s Private Key Sender ’ s Public Key

29 Digital Signature Process MD5 rfc1321

30 Public Key Certificates 1. A public key is generated by the user and submitted to Agency X for certification. 2. X determines by some procedure, such as a face-to-face meeting, that this is authentically the user ’ s public key. 3. X appends a timestamp to the public key, generates the hash code of the result, and encrypts that result with X ’ s private key forming the signature. 4. The signature is attached to the public key.

31 Web Vulnerabilities Unauthorized alteration of data at the Web site Unauthorized access to the underlying operating system at the Web server Eavesdropping on messages passed between a Web server and a Web browser Impersonation

32 Methods for Improving Web Security Securing the Web site itself install all operating system security patches install the Web server software with minimal system privileges use a more secure platform Securing the Web application

33 Web Application Security Secure HyperText Transfer Protocol (SHTTP) Secure Sockets Layer (SSL) Web server packages should incorporate both of these protocols

34 Virtual Private Networks (VPNs) The use of encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network, typically the Internet. Generally cheaper than real private networks using private lines but rely on having the same encryption and authentication system at both ends. The encryption may be performed by firewall software or possibly by routers.

35 VPN (Virtual Private Network)

36 VPN 技術 穿隧技術 (Tunneling) IPSec (IP Security) PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) 加解密技術 (Encryption/Decryption) Private/Public/Hybrid Key Encryption 密鑰管理 (Key Management) SKIP (Simple Key Management for IP) IKE (ISAKMP/Oakley) 使用者與設備身份認證技術 (Authentication) Username/Password + Token Number X.509 Certificate by Certificate Authority (CA)

37 IPSec Can secure communications across a LAN, WANs, and/or the Internet Examples of use: Secure branch office connectivity over the Internet Secure remote access over the Internet Establishing extranet and intranet connectivity with partners Enhancing electronic commerce security

38 Benefits of IPSec When implemented in a firewall or router, provides strong security for all traffic crossing the perimeter IPSec in a firewall is resistant to bypass Runs below the transport layer (TCP, UDP) and so is transparent to applications Can be transparent to end users Can provide security for individual users if needed

39 IPSec Functions IPSec provides three main facilities authentication-only function referred to as Authentication Header (AH) combined authentication/encryption function called Encapsulating Security Payload (ESP) a key exchange function For VPNs, both authentication and encryption are generally desired

40 ESP Encryption & Authentication

41 IPSec Key Management Manual System administrator manually configures each system with its own keys and with the keys of other communicating systems Practical for small, relatively static environments Automated Enables the on-demand creation of keys for SAs and facilitates the use of keys in a large distributed system Most flexible but requires more effort to configure and requires more software