The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.2 Course and Project Overview.

Slides:



Advertisements
Similar presentations
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Advertisements

Aurélien Francillon, Boris Danev, Srdjan Čapkun
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Sri Lanka Institute of Information Technology
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Car Hacking Patrick, James, Penny.
Comprehensive Experimental Analyses of Automotive Attack Surfaces Authors: Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham,
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Cryptography and Network Security Chapter 12
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
KIANOOSH MOKHTARIAN SCHOOL OF COMPUTING SCIENCE SIMON FRASER UNIVERSITY 3/24/2008 Secure Multimedia Streaming.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Comprehensive Experimental Analyses of Automotive Attack Surfaces
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
1 Telematics/Networkengineering Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Message Authentication Code July Message Authentication Problem  Message Authentication is concerned with:  protecting the integrity of a message.
Chapter 21 Public-Key Cryptography and Message Authentication.
WEP Protocol Weaknesses and Vulnerabilities
Hash and MAC Functions CS427 – Computer Security
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Chapter 4 Message Authentication MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
Azam Supervisor : Prof. Raj Jain
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
1 Chapter 12: Hash and MAC Algorithms Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal, U of Kentucky)
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security Celia Li Computer Science and Engineering York University.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.0 Big Picture, Vision.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Comprehensive Experimental Analyses of Automotive Attack Surfaces
CSCE 715: Network Systems Security
Security through Encryption
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Outline Using cryptography in networks IPSec SSL and TLS.
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
HMAC and its Design Objectives
Presentation transcript:

The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.2 Course and Project Overview (2) Advanced Network Security Dr. Attila Altay Yavuz1Fall 2014

OSU EECS  Growing complexity of the in-car software, 3 rd party SW integration  Attackers are becoming more professional, using more advanced methods  Tuning protection and avoidance of unjustified guarantee claims are a strong driver 2 escar A Hardware Security Module for ECUs Intra-car Communication Security HMI Internet ECU CE-Device Tester Attack surface is growing –Car networks get connected to the internet –CE-Devices are connected to the car networks –Network access hard- and software is now cheap (e.g. bluetooth – CAN)

OSU EECS Real Attacks on Modern Automobile Systems: Comprehensive Experimental Analyses of Automotive Attack Surfaces Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. USENIX Security, August 10–12, 2011.Comprehensive Experimental Analyses of Automotive Attack Surfaces –Not only internal access, but CD players, Bluetooth, multi-media systems enable attacks –A media player playing a modified WMA music done the job! –Lots of remote exploits Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurelien Francillon, Boris Danev, and Srdjan Capkun Network and Distributed System Security Symposium (NDSS), 2011Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Ishtiaq Roufa, Rob Millerb, Hossen Mustafaa, Travis Taylora, Sangho Ohb Wenyuan Xua, Marco Gruteserb, Wade Trappeb, and Ivan Seskarb USENIX conference on Security, 2010Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study –Listing internal components from 40 meters away! –Play with tire-pressure system, stop and ambush drivers 3 Intra-Car Communication Security

OSU EECS 4 Secure Inter-ECU Communication Secure ECU Communication in Car Scenario: Communication among Electrical Contorl Units (ECUs) on internal vehicle systems –Bus system: CAN, FlexRay (Ethernet) Malicious falsification of messages –Sending corrupted messages by infected control units or interceptions for defective influence of recipient Why? –No authentication and/or integrity mechanism is used in intra-car systems!

OSU EECS 5 Secure Inter-ECU Communication Secure ECU Communication in Car Challanges: Ultra Limited Bandwidht –We have 16 bit (or 24 bit) allocated for securtiy purposes Limited Memory, little space for crypto keys –Keys must be re-newed (re-transmitted) –Time and synronization issues, package loss PKC crypto not feasible as is Safety versus Security –Satefy is priority for auto industry, no one will change any standard easily –Interpret security as a safety concern with malicious intent

OSU EECS 6 Secure ECU Communication in Car Proposal: Use of different Message Authentication Code with Truncation –A 128-bit HMAC can be truncated up to 32 bits with no extra security loss 2^32 guaranteed. –Can we do better than this? Universal Message Authentication Codes (UMACs) are algebraic one- time/multiple time MACs –They are faster than traditional MACs under certain assumptions Strategy is to identify suitable UMACs, investigate under truncation and set up a key management method –Why key management? UMACs require key sycnronization and renewal!

OSU EECS UMAC is itself two times faster than CMAC on ARM But key set up phase of UMAC is pretty slow Perform key setup beforehand, and use pre-computed keys. This enables fast computation with a memory trade-off If memory is a constraint, CMAC is a better choice If speed is more important and we can tolerate store, UMACs are fast. We can pre-compute keys in idle times and use them for a fast real-time computation Storing/transmitting a different key for each message is impractical 7 Secure ECU Communication in Car

OSU EECS Use crypto PRNGs: Signer and verifier share seed (root) key sk=(a,b), and for each message m j, a new key is derived from the previous key as sk j  CPRNG( sk j-1 ) –Not unconditionally secure anymore, at most as secure as CPRNG –Requires synchronization between the signer and receivers Optional, evolution of UMACs from a formal perspective –(i) Wegman-Carter, M is hashed to a short digest via a universal hash function indexed by a secret key. Resulting value is OTP encrypted. –(ii) Brassard replaces OTP with a PRF along with a random nonce. –(iii) Apply PRF directly to the hash result. –(iv) Derive UMAC key from a short key (as above), –(v) Reuse keys for some messages. Many UMACs use this approach, and it is problematic 8 Secure ECU Communication in Car

OSU EECS Some Important UMACs Polynomial UMACs (e.g., [1]): (k,k’) are n-bit keys, messages with l=t*n bits. Split message x into t blocks, work on GF(2^{n}) Square Hash [2]: MMH [3]: There are many more: NMH family (e.g., [4]), WH [5], NH [6] Polynomial evaluation and message authentication [7] by Daniel J. Bernstein is a very fast UMAC 9 Secure ECU Communication in Car

OSU EECS Group Size: 1-2 student –Students considering security research, or Winter 2014:Applied crypto class Required Background: –C/C++ or Java programming, or ability to use software packages from existing libraries –Knowledge on cryptographic hash functions, MAC, block ciphers (AES), Pseudo Random 1) Identify a set of good UMACs 2) Implement selected UMACs (or obtain implementation) 3) Work on efficient key update mechanisms for UMACs 4) Understand Blundo polynomials to set up keys between ECUs 5) Report overall security architecture and scheme 6) Final report and presentation 10 Secure ECU Communication in Car

OSU EECS Universal Message Authentication Code (UMAC) References [1] Ted Krovetz. UMAC: Message Authentication Code using Universal Hashing, March RFC 4418, –Version for 2000, [ 2] M. Etzel, S. Patel, Z. Ramzan, “Square Hash: Fast Message Authentication via Optimized Universal Hash Functions,” Proc. Crypto’99, LNCS 1666, M. Wiener, Ed., Springer-Verlag, 1999, pp. 234–251. [3] S. Halevi, H. Krawczyk, “MMH: Software Message Authentication in the Gbit/second Rates,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 172–189. [4] M.N. Wegman, J.L. Carter, “New Hash Functions and their Use in Authentication and Set Equality,” Journal of Computer and System Sciences, Vol. 22, No. 3, 1981, pp. 265–279. [5] J.-P. Kaps, K. Yuksel, B. Sunar, “Energy Scalable Universal Hashing,” IEEE Trans. on Computers, Vol. 54, No. 12, 2005, pp. 1484–1495. [6] J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway. “UMAC: Fast and Secure Message Authentication,” Proc. Crypto’99, LNCS 1666, M. Wiener, Ed., Springer-Verlag, 1999, pp. 216–233. [7] Daniel J. Bernstein, The Poly1305-AES message-authentication code [8] W.Nevelsteen and B. Preneel. Software performance of universal hash functions. In Proceedings of the 17th international conference on Theory and application of cryptographic techniques (EUROCRYPT'99), Springer-Verlag, [9] H. Handschuh and B. Preneel. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology (CRYPTO 2008), Springer-Verlag, Berlin,

OSU EECS 12 Secure Inter-ECU Communication Encryption Methods for Medical Systems Research Problem: Chaos-based encryption methods are proposed for medical systems –They are claimed to be more „effective“ (?) than traditiona encryption methods Secure of Chaous-based methods are being critizied Security is dubious, but even are they so much more efficient than traditional encryption? Investigate this case! It is likely that their efficiency advantages do not justy the security

OSU EECS 13 Secure Inter-ECU Communication Encryption Methods for Medical Systems Some papers: 1 ) An Efficient Medical Image Cryptosystem Based on Chaotic Maps 2) Chaos Based Encryption System for Encrypting Electroencephalogram Signals, Journal of Medical Systems. ncrypting_electroencephalogram_signals The above paper discusses a C# based implementation 3) An efficient and secure medical image protection scheme based on chaotic maps. 4) A review paper on Chaos-based encryption 5) issues/multimedia-security-a-survey-of-chaos-based-encryption-technology

OSU EECS Group Size: 1-2 student(s) Required Background: –C/C++ or Java programming, or ability to use software packages from existing libraries –Knowledge on cryptographic hash functions, MAC, block ciphers (AES), Pseudo Random F. Work on implementation of the latest Chaos schemes –Totally ok if you can obtain existing implementations Work on efficient AES implementations or ciphers such as –Present Cipher Suite –Humming Bird Compare efficiency, discuss security differences, analyze the claim, final report and presentation 14 Encryption Methods for Medical Systems