Network Security Understand principles of network security:

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Chapters 8 Network Security Professor Rick Han University of Colorado at Boulder
Lecture 25 Secure Communications CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross and Dave Hollinger.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
8: Network Security – Integrity, Firewalls.
Chapter 29 Internet Security
Network Security understand principles of network security:
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 31 Network Security
24-1 Last time □ Message Integrity □ Authentication □ Key distribution and certification.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Network Security7-1 Today r Collect Ch6 HW r Assign Ch7 HW m Ch7 #2,3,4,5,7,9,10,12 m Due Wednesday Nov 19 r Continue with Chapter 7 (Security)
7: Network Security1 Chapter 7: Network security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Internet and Intranet Protocols and Applications Lecture 10 Network (Internet) Security April 3, 2002 Joseph Conron Computer Science Department New York.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
1-1 1DT066 Distributed Information System Chapter 8 Network Security.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 12 Network Security (2)
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Computer and Network Security - Message Digests, Kerberos, PKI –
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Chapter 10: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality” m authentication.
 Last Class  Chapter 7 on Data Presentation Formatting and Compression  This Class  Chapter 8.1. and 8.2.
Lecture 22 Network Security (cont) CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger slides are modified from Jim Kurose,
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
What is network security?
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Network Security Understand principles of network security: Cryptography and its many uses beyond “confidentiality”. Authentication. Message integrity Non-repudiation Key distribution. Security in practice: Firewalls Security and protocols in application, transport, network, and link layers (NAT, IPSec, SSL, Kerberos, etc)

Security in network layers

Common Security Attacks Packet sniffing: To gain access to cleartext network data and passwords Impersonation: To gain unauthorized access to data or to create unauthorized e-mails by impersonating an authorized entity Denial-of-service: To render network resources non-functional Replay of messages: To gain access to information and change it in transit Guessing of keys: To gain access to encrypted data and passwords (brute-force attack) Port scanning: To discover potential available attack points

What is Network Security? Confidentiality: only sender, intended receiver should “understand” message contents Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered without detection Non-Repudiation: being able to prove that the sender did send the message

A Security Example: Alice, Bob, Trudy Alice and Bob want to communicate “securely”. Trudy (intruder) may intercept, delete, add messages, and so on to disrupt their communications.

Who Might Alice and Bob Be? Users Web browser/server for electronic transactions (e.g., on-line purchases) On-line banking client/server DNS servers Routers exchanging routing table updates

Cryptography Definitions Encryption is a process by which a message (called plaintext) is transformed into another message (called ciphertext) using a mathematical function and a special encryption password (called a key). Decryption is the reverse process

Cryptography Definitions Alice’s encryption key Bob’s decryption key K A K B encryption algorithm plaintext ciphertext decryption algorithm plaintext

Symmetric (Secret) Key Cryptography Same key decrypts and encrypts information. The encryption functions used need not be secret, but the keys used must be secret Sender and receiver must agree on the key before secured communication starts The encryption and decryption functions used can be the same or different.

Symmetric Key Cryptography: Key Issues A-B K A-B encryption algorithm plaintext message, m ciphertext decryption algorithm plaintext K (m) K (m) A-B m = K ( ) A-B Symmetric key cryptography: Bob and Alice share the same (symmetric) key: K Question: How is the agreed upon key distributed to both Bob and Alice in a secure fashion?

Symmetric Key Cryptography: DES DES: Data Encryption Standard US encryption standard 56-bit symmetric key, 64-bit plaintext input AES: Advanced Encryption Standard Newer (November 2001) symmetric key replacing DES. 128, 192, or 256 bit keys, 128-bit plaintext input Brute force decryption (trying each key) would take 1 second on DES, but would take 149 trillion years for AES. IDEA: International Data Encryption Algorithm 64-bit input, 128-bit keys Stronger, more efficient than DES.

Public Key Cryptography Symmetric key cryptography Requires both the sender and receiver to know the shared secret key. Question: how do they agree on the key in the first place (particularly if they have never “met”)? Public key cryptography Sender and receiver do not share secret key. Public encryption key known to all. Private decryption key known only by the owner.

Public (Assymetric) Key Cryptography Keys are generated in pairs. Public key is publicly registered so everyone knows it, and private one is kept secret by the owner. Each key can decrypt what the other encrypts, but not what it encrypts itself. Important properties of key generation: There is a one-to-one correspondence in the generated key pairs – if one key can decrypt a message, it must have been encrypted by the other. It must be extremely difficult, if not impossible, to deduce the private key when given a public key.

Public Key Cryptography + Bob’s public key K B - Bob’s private key K B plaintext message, m encryption algorithm ciphertext decryption algorithm plaintext message K (m) B + m = K (K (m)) B + -

Public Key Encryption Algorithms Diffie-Hellman: the first public key approach proposed. RSA: the best known public key system, developed by Rivest, Shamir, and Adleman (hence RSA). DSA: Digital Signature Algorithm, developed by the U.S. National Security Agency (NSA).

Symmetric vs. Public Key Cryptography Which method provides stronger security? Which method is more convenient? Which method performs better? Ideally, we would like to combine the strengths of symmetric and public key cryptography, and avoid their weaknesses: We want the efficiency of symmetric cryptography combined with the ease of use and convenience of public key cryptography.

Hybrid Secret-Public Key Cryptography When two parties want to communicate securely, public key cryptography is used to exchange a random symmetric session key. To communicate, symmetric cryptography is used with the session key. When done, both parties destroy the session key.

Hash functions/Message Digests Message digest is a special kind of checksum produced using cryptographic means. Typically produced from a one-way hash function that is difficult to reverse or predict. This function takes the entire input and reduces it to a small value of fixed length, typically 128 to 512 bits in length. Must be collision-resistant: must be difficult for 2 messages to produce the same digest Encrypted hash (MAC) is used to ensure authentication and integrity

Message Digests: Hash Function Algorithms MD5 hash function widely used SHA-1 is also used. Issues in both MD5 and SHA-1 have been found in recent years though These algorithms are now being phased out more quickly in favour of other, newer approaches like SHA-2.

Authentication and Integrity Authentication is the process of proving one’s identity to someone else. There are three main ways of authenticating an individual: Something you know Something you own Something you are Message integrity: ensuring that a message not altered without detection.

Digital Signatures We would like to have a cryptographic technique analogous to hand-written signatures. This digital signature is verifiable and not forgeable: recipient (Alice) can prove to someone that Bob, and no one else (including Alice), must have signed the document. Hash encrypted by a private key is a digital signature that is then attached to the original message By signing only the digest, we have the same level of security, as the digest is tied to the message, with less encryption and decryption overhead.

Signed Message Digests as Digital Signatures Bob sends digitally signed message: large message m H: Hash function H(m) digital signature (encrypt) Bob’s private key K B - KB(H(m)) - encrypted msg digest +

Signed Message Digests as Digital Signatures Alice verifies signature and integrity of digitally signed message: Bob sends digitally signed message: large message m H: Hash function KB(H(m)) - encrypted msg digest H(m) digital signature (encrypt) Bob’s private key large message m K B - Bob’s public key digital signature (decrypt) K B + KB(H(m)) - encrypted msg digest H: Hash function + H(m) H(m) equal ?

Certification Authorities With public key cryptography there’s a danger of a “man-in-the-middle attacks” How do we make sure that a particular public key belongs to a certain entity? How can we avoid impersonation? The International Telecommunication Union (ITU) specifies an authentication service and specific syntax for certificates in X.509.

Certification Authorities Certification Authority (CA): binds a public key to particular entity, E. E (person, router) registers its public key with CA. E provides “proof of identity” to CA. CA creates certificate binding E to its public key. Certificate containing E’s public key digitally signed by CA – CA says “this is E’s public key” digital signature (encrypt) K B + Bob’s public key K B + CA private key certificate for Bob’s public key, signed by CA - Bob’s identifying information K CA

Certification Authorities When Alice wants Bob’s public key: Gets Bob’s certificate (Bob or elsewhere). Apply CA’s public key to Bob’s certificate, get Bob’s public key. K B + digital signature (decrypt) Bob’s public key K B + CA public key + K CA

Firewalls firewall isolates an organization’s internal network from a larger external network, allowing some packets to pass, blocking others

Packet Filtering Firewalls All incoming and outgoing packets are examined according to some parameters (such as source/destinations IP address and/or port number)

Application Layer Gateway/Firewalls An application gateway (proxy) is an application-specific server through which all application data (inbound and outbound) must pass.

IPsec: Network Layer Security Network-layer secrecy: Sending host encrypts the data in IP datagram. TCP and UDP segments; ICMP and SNMP messages. Network-layer authentication Destination host can authenticate source IP addresses. Two principle protocols: Authentication header (AH) protocol Encapsulation security payload (ESP) protocol For both AH and ESP protocols, the source and destination handshake: Create network-layer logical channel called a security association (SA).

Authentication Header (AH) Protocol Provides source authentication, data integrity, but not confidentiality. AH header inserted between IP header, data field. IP header data (e.g., TCP, UDP segment) AH header

Encapsulation Security Payload (ESP) Protocol Provides secrecy, host authentication, and data integrity. Packet data and the ESP trailer are encrypted. authenticated encrypted ESP header ESP trailer ESP authent. IP header TCP/UDP segment

Secure Sockets Layer (SSL) Transport layer security to any TCP-based application using SSL services. Used between Web browsers, servers for e-commerce (shttp). Security services: Server authentication. Data encryption. Client authentication (optional). Server authentication: SSL-enabled browser includes public keys for trusted CAs. Browser requests server certificate, issued by trusted CA. Browser uses CA’s public key to extract server’s public key from certificate.

SSL (Continued) Encrypted SSL session: Browser generates symmetric session key, encrypts it with server’s public key, sends encrypted key to server. Using private key, server decrypts session key. Only the browser and server know session key. All data sent into TCP socket (by client or server) encrypted with session key. SSL can be used for non-Web applications, e.g., IMAP. Client authentication can be done with client certificates which have also been issued by CAs. SSL serves as a basis for TLS protocol

VPN A virtual private network is an extension of an enterprise's private intranet across a public network such as the Internet, creating a secure private connection, through a private tunnel.

Kerberos an encryption-based security system that provides mutual authentication between the users and the servers in a network environment. Authorization can be implemented independently from the authentication a ticket-granting server (key distribution center) acts as a mutually trusted third party

Key Distribution Centers (KDCs) Alice, Bob need shared symmetric key. KDC: server shares different secret key with each registered user (many users). Alice, Bob know own their symmetric keys, KA-KDC and KB-KDC , for communicating with KDC. KDC KB-KDC KP-KDC KA-KDC KX-KDC KY-KDC KZ-KDC KA-KDC KB-KDC

Key Distribution Centers (KDCs) Q: How does KDC allow Bob, Alice to determine shared symmetric secret key to communicate with each other? KDC generates R1 KA-KDC(A,B) KA-KDC(R1, KB-KDC(A,R1) ) Alice knows R1 Bob knows to use R1 to communicate with Alice KB-KDC(A,R1) Alice and Bob communicate: using R1 as session key for shared symmetric encryption