1 SecWG New Business Discussions CCSDS St-Hubert (Montreal) Canada Howard Weiss NASA/JPL/SPARTA +1-410-872-1515 May 2004.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
11 Authentication Algorithm Trade Study CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA September.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Applied Cryptography for Network Security
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) October.
Security WG: Report of the Winter 2007 Meeting Colorado Springs, CO USA January 20, 2007 Howard Weiss NASA/JPL/SPARTA
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Security Policy Framework & CCSDS Common Criteria Use CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Security WG: Report of the Fall 2005 Meeting Atlanta GA September 16, 2004 Howard Weiss NASA/JPL/SPARTA.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) April.
1 CCSDS Security Working Group Fall 2010 Meeting October 2010 British Standards Institute London, UK Howard Weiss NASA/JPL.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Authentication Algorithm Document Discussions CCSDS Security Working Group Fall 2007 Meeting 3-5 October 2007 ESA/ESOC, Darmstadt Germany (Hotel am Bruchsee,
Ajh January 2007 CCSDS “Books” Adrian J. Hooke CMC Meeting, Colorado Springs 26 January 2007.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Security WG: Report of the Fall 2008 Meeting DIN, Berlin Germany October 17, 2008 Howard Weiss NASA/JPL/SPARTA
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/PARSONS November 2014 BSI, London.
1 CCSDS Threat Document Discussion CCSDS Security Working Group Fall 2004 Meeting CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security WG: Report of the Spring 2005 Meeting April 14, 2004 Howard Weiss.
1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA November 2004.
CCSDS march 2008 meeting – Crystal City 1 TC/TM space links security SEA / SLS cross area meeting.
1 Information Security Planning Guide CCSDS Security WG Spring 2005 Athens, GR Howard Weiss NASA/JPL/SPARTA April 2005.
CCSDS Security Working Group Program Space IT Security Standards Products Howard Weiss SPARTA, Inc. (a Parsons Company)
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Security WG: Report of the Spring 2008 Meeting Marriott Courtyard Crystal City, VA March 14, 2008 Howard Weiss NASA/JPL/SPARTA
Security WG: Report of the Spring 2012 Meeting European Space Operations Centre Darmstadt, Germany 19 April, 2012 Howard Weiss NASA/JPL/SPARTA
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Security Problems related to Transition Date Submitted: January.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
1 CCSDS Security Working Group Spring 2011 Meeting May 2011 Deutsches Institut für Normung (DIN) Berlin, Germany Howard Weiss NASA/JPL.
Security WG: Report of the Fall 2004 Meeting November 19, 2004 Howard Weiss.
1 CCSDS Security Working Group Fall 2011 Meeting 1-2 November 2011 University of Colorado Boulder, Colorado USA Howard Weiss NASA/JPL.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
SDLS Protocol Green Book initiation Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
11 Identity Management Spacecraft ID Security CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA September.
K. Salah1 Security Protocols in the Internet IPSec.
Security WG: Report of the Fall 2003 Meeting October 28, 2003 Howard Weiss, NASA/JPL/SPARTA.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/Cobham (Parsons) October 2011.
Security WG: Report of the Spring 2004 Meeting May 13, 2004 Howard Weiss, NASA/JPL/SPARTA.
The CCSDS Security WG is chartered to:
Web Applications Security Cryptography 1
CCSDS Systems Engineering Area: Security Working Group
Secure Sockets Layer (SSL)
Homework #5 Solutions Brian A. LaMacchia
Presentation transcript:

1 SecWG New Business Discussions CCSDS St-Hubert (Montreal) Canada Howard Weiss NASA/JPL/SPARTA May 2004

2 Discussion Topics CCSDS documents mandatory security section Future Standards: – Encryption – Authentication – Integrity – Key Management Future Documents as discussed at last meeting (Fall 2003) Others?

3 Mandatory Security Section Background: – follow the lead of the Internet Engineering Task Force (IETF) to mandate a serious “security considerations” section in all CCSDS documents

4 Rejected Text Required in every CCSDS Recommendation, Best Current Practice, and Experimental Specification is a "Security Considerations" section. This section should describe any known vulnerabilities of the specification, possible threats, and mechanisms or strategies to address them. This section should not be taken lightly -- in particular, this section should not say, "here is the specification technology and it has no security implications." This is inadequate because it doesn't answer the question of how security affects the technology. Authors MUST describe: which attacks are out of scope (and why), which attacks are in-scope, what the specification technology is susceptible to, what the specification technology protects against. At least the following forms of attack MUST be considered: eavesdropping; replay; message insertion, deletion, modification; and man-in-the-middle. Potential denial of service attacks MUST be identified as well. The threat environment addressed by the Security Considerations section MUST, at a minimum, include deployment across multiple administrative boundaries without assuming that other security measures are in place, even if only to provide justification for why such consideration is out of scope.

5 Reasons for Rejection CESG rejected statement because: – They didn’t know what they were signing up for – What standards did they have to adhere to (e.g., encryption)? » If there were an encryption standard, for example, then they could understand better what would have to be in such a security statement

6 What Was Really Desired Ensure that ALL CCSDS WGs pay attention to security Ensure that they pay “serious” attention to security – Not with just a lip-service statement a la, “security plays no part of this specification.” – Provide rationale and explanation as to why or why not security plays a role in the specification (or Green or Yellow book) Not necessarily a security “compliance” statement – Does not have to state compliance with security standards as such (although that would be nice too) – Does need to show that thought and effort has gone into the specification/document preparation process

7 Re-Wording Exercise Propose to include a security section template for all CCSDS documents with headings and explanatory text to help authors fill in the blanks. Outline of security section: – Provide rationale and explanation as to why or why not security plays a role in this CCSDS document. – Template headings: » 1.0 Security Background/Introduction » 2.0 Statements of security concerns with respect to the CCSDS document: data privacy data integrity authentication of communicating entities control of access to resources availability of resources auditing of resource usage » 3.0 Potential threats and attack scenarios (how could someone break the technology and why) » 4.0 Consequences of not applying security to the technology (e.g., loss of life, loss of mission).

8 Future Standards Discussions Currently CCSDS does not have standards for: – Encryption – Authentication – Integrity – (or much of anything security-wise) Previous discussions in the (old) P1A (link layer) panel to create such “link-layer” standards (Spring 2002 mtg in Darmstadt) – Good discussion which didn’t lead to anything (P1A Security Briefing)P1A Security Briefing Created a “draft” P1A Security White Book to address some “strawman” proposals

9 Authentication Existing 1992 ESA standard: 5- byte signature w/4-byte counter for replay protection Proposed adoption of “modern” digital signature standard such as Digital Signature Standard (DSS) using SHA-1 hash algorithm. – Propose FIPS (DSS) as CCSDS standard – Certificate standard as well: » X.509 profile to state which certificate fields are required and which are optional.

10 Integrity Existing 1992 ESA standard: 5- byte signature w/4-byte counter for replay protection Again propose adoption of a modern standard such as DSS – Propose FIPS as CCSDS Standard

11 Encryption Several Security Green Book solutions to pick from depending on existing link layer chip sets versus entirely new design. – Several algorithms should be supported for civilian missions such as AES and 3DES – Propose FIPS 197 – AES with 128-bit key as minimum CCSDS encryption algorithm standard.

12 Key Management Always a problem child – – Symmetric keys (the good ol’ standby) » Burned into spacecraft or need for secure distribution channels – Public key agreement (e.g., Diffie-Hellman) » Removes the need for burned in keys or secure distribution channel, but…. » Lots of bits exchanged over the link » Can be problematic over narrow links or with short passes – Public key encryption » Use public/private key pairs to encrypt “content encryption keys” (a la PGP) » Certificates containing public keys have to be “magically” distributed or obtained from a key server Internet Key Exchange (IKE) holds promise – Currently being revised by IETF (v1 too complicated w/too much overhead) – Use key updating to minimize the number of round-trips necessary to agree on a key

13 Discussion What do we want to propose??

14 Future Documents Some of the documents we talked about producing previously: – Do we still think they are relevant? – What about ground systems? – Are we ready to get started? – Volunteers? Information Security Guide for Mission Planners to include threat/risk analysis, security planning, and contingency and disaster recovery Security policy framework for developing trust agreements, rules for operational engagement, ensuring security compliance of legacy systems, and standard, secure interfaces between systems and across security domains Use of Common Criteria for Information Technology Security Evaluation (ISO 15408) “Protection Profiles” to describe security requirements for use cases

15 Ground Systems SecWG has been (for the most part) concerned with security for space missions – aka, the spacecraft. Meeting in March at JPL turned my head around: – Spacecraft is, of course, a concern and an issue – But….. We can’t ignore the ground systems that also have many, many security problems. – Many of the ground system security issues are not unique to space systems » Mission (closed) networks vs. Internet/public network interconnectivity » Connectivity between agencies with varying security policies » Etc.

16 Discussion