Class 13 Review CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security
Advertisements

Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Class 1 Background, Tools, and Trust CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Chapter 5 Cryptography Protecting principals communication in systems.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Computer Security CS 426 Lecture 3
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Class 13 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Class 20 Usability CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Class 19 Wrap-up and Review CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Class 2 Cryptography Refresher CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
CS 4/585: Cryptography Tom Shrimpton FAB
Class 5 Practical Considerations and Physical Security CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Class 7 Practical Considerations CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Class 4 Secure Channels and Practical Considerations CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Class 5 Channels and Preview CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Class 2 Cryptography Refresher CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Lecture 2: Introduction to Cryptography
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Class 6 Distributed Systems CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Class 3 Cryptography Refresher II CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Lecture 5.1: Message Authentication Codes, and Key Distribution
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Modeling security 1. Models - encryption r Alice and Bob have the same key k r Alice and Bob exchange encrypted messages r Eve wants to get the plaintext.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Reviews Rocky K. C. Chang 20 April 2007.
Symmetric Cryptography
Block Cipher Modes CS 465 Make a chart for the mode comparisons
Cryptography Basics and Symmetric Cryptography
Security through Encryption
Introduction to Symmetric-key and Public-key Cryptography
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Security Of Wireless Sensor Networks
Security of Wireless Sensor Networks
Cryptography Lecture 14.
Cryptography Lecture 13.
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Class 13 Review CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman

Administrative stuff TEVAL offered – please fill it out :) Even/especially if you thought this class was horrible! No class or office hours after May 3 rd Quiz this week Final exam on May 13 th (2:00 – 3:50) – Review document will be posted today – Come to front office on May 13 th at 2 PM 1

The most important slide of the class What are the take-away messages? – Think like an adversary – Kerckhoffs’ principle and Shannon’s maxim – Be able to search for solutions – Read papers – Reuse, reuse, reuse (correctly!) – State assumptions (be sure they hold) – Be able to admit “I don’t know” – not everyone can engineer every solution 2

I’m sure this is someone’s law… If a security system is too difficult to use, users will find a way to get around it – Corollary: Getting the job done is more important than security Has more immediate potentially bad outcomes 3

Things to remember I can be wrong; papers can be wrong; anyone can be wrong! If you don’t understand something, ask! What does “secure” mean? Who is the adversary, and why? There is such a thing as too much security If too hard to use, users will bypass security Attacks only get better 4

Some things to remember Theoretical to practical in ~10 years – Chosen ciphertext attack – HDMI – CBC chosen plaintext attack Attacks only get better – Look at history of MD5 – Look at history of SHA (e.g. SHA-0) Some things are a bad idea in the first place, e.g. “trusted” hardware 5

NEVER BUILD YOUR OWN WHEN SOLUTION EXISTS!!! NEVER COMPOSE YOUR OWN WHEN LIBRARY EXISTS!!!

Safety vs. security Think like an adversary! Random → malicious faults Engineering for security: “What’s the worst that can happen?” Assume it will… Always, always, ALWAYS state your assumptions! 7

Security: Fundamental differences Real world: physical, intuitive – Risk assessment People are not even good at this in the real world! – Trusted vs. trustworthy – Forensics, physical evidence Forgery – Fail “evident,” e.g. theft – Scale of failures 8

More basics Trusted vs. trustworthy – e.g. the recent SSL Certificate Authority fiasco Risk, hazard, vulnerability – Adversary, ROI, scale Assurance levels – “Rainbow” book series, Common Criteria Method of returning to secure states Fail-closed/secure or fail-open/insecure? 9

Basic cryptographic primitives Confidentiality (encryption) – Symmetric (e.g. AES) – Asymmetric (e.g. RSA) Hash functions (e.g. SHA1) Integrity and authentication – Symmetric (message authentication codes) – Asymmetric (signatures) Key agreement Random numbers 10

Block cipher modes of operation ECB, CBC, CTR, OFB, CFB, GCM, XEX, XTS Differences, i.e. why do we care? – Some are parallelizable (GCM) Also provides authentication! – Some are self-synchronizing (CFB) Trick question: Block ciphers vs. stream ciphers vs. pseudorandom number generators (PRNG)? 11

Security (strength) Key size * – Commonly for AES, for RSA – What is a [good] key? Underlying cryptosystem/primitives Composition e.g. MAC with broken underlying hash function may not itself be broken 12

Modes of operation (ECB) Images borrowed from Wikipedia :) 13

Modes of operation (CBC) Images borrowed from Wikipedia :) 14

Recall: MACs “Keyed hash” (MAC from a cryptographically-secure hash function) – Hash  Block cipher (CBC or CFB)  MAC Hybrid modes e.g. CBC-MAC – Secrecy plus authenticity (2-party) Remember to use different keys for MAC and encryption… why? 15

Modes of operation (CFB) Images borrowed from Wikipedia :) 16

Modes of operation (CTR) Images borrowed from Wikipedia :) VS. ECB 17

Giving, storing and wiping secrets Credentials Password security Storage security Input security – Ctrl-Alt-Del Forgetfulness security – Encryption? –

Access control Authentication → access No authentication → no access What are we protecting? Who is our adversary? – Threat model Who is trusted? Where does enforcement occur? 19

Implementation considerations Kerckhoffs’ principle and Shannon’s maxim – Especially tempting to violate in case of “dirty” code – I’ve been there! Watch your (unstated) assumptions – Example: Unsanitized (untrustworthy) input Adversaries Side-channels Performance 20

More considerations Correct tool for the job – Requirements (before, not after) – spend time on this Correct usage of the tool Documentation! Weakest links Pay attention to potential non-cryptographic issues such as side/covert channels – But you can never eliminate them: PROVABLE Think / test like an adversary 21

Current state of symmetric encryption DES is too weak (56-bit key) 3DES is weak (168-bit keys but only security – meet-in-the-middle attack) Recent weaknesses in AES: – AES-256 ( ) AES-192 ( ) AES-128 ( ) us/projects/cryptanalysis/aesbc.pdf 22

Current state of hash functions MD5 is broken – SHA-1 is known to be weak – (2 69 ) – (2 106, generalizable) – SHA-256 (variant) is even weaker SHA-3 currently in “development” (NIST) – We have a winner: all hail Keccak (SHA-3)! –

Problems: Side channels Side-channel attacks VERY damaging – Power – Timing – Error messages Different errors in SSH leak information (mismatch between implementation and specification of CBC block cipher mode): 24

Distributed systems: Security Eliminating a single point of failure – Denial of service protection (robustness) Eliminating a single point of trust – What if your boss is malicious? If we want to reap benefits of distributed system designs, we have to take care of the “maybes” How? 25

Distributed systems: Privacy Local system – local information Distributed system – more access to potentially private information Privacy vs. authentication Sometimes privacy is not a security requirement, sometimes it is Are there other potential security requirements related to privacy? 26

Source routing with capabilities B, data S3 S2 S1 B S3 S2 S1 A 27

eCash Broker WitnessClient Merchant 28

Chaum Mixes Bob Alice Output in lexographic order 29

Global Adversary vs. Mix Bob Alice 30

Tor ABC TCP over TCP (UGH!) 31

Tor hidden services ABCDEF 32

Global adversary vs. Tor Bob Alice Entire Tor network 33

Tor network positioning attack ABCM 34

Tor linkability attack ABC 35

Tor selective DoS attack ABC 36

Tor and bridges 37

Enumerating Freenet Run a Freenet node; wait for nodes to contact you Or just query random “locations” 38

ISP Anonymity ISP AS1 AS2 Anonymizing Network 39

ISP Censorship resistance ISP AS1 AS2 Anonymizing Network Membership Concealing Network 40

secret Covert auth. !! Hi? Hi! XX Hi? ?? !!?? 41

Steganographic embedding Linux 2.6 TCP SYN packet header with embedded MAC 42

Adeona 43

Novel Ideas in OTR Off-the-record – How is this different from what we’ve already discussed (e.g. signatures)? – Threat model Why OTR? Theoretical issues Practical considerations – More on this next week 44

Tools and Concepts Deniability – Symmetric authentication – Symmetric malleable encryption – Key exposure Long-term keys – Authentication Perfect forward secrecy 45

Final Exam Significantly longer than exams I and II (10)True/False (5)Multiple choice (8)Fill-in-the-blank (7)Short answer – But some include sub-questions – Different point values depending on difficulty and importance 46