CSIT324 OS &WEB INTERFACE SECURITY Introduction. C OURSE O UTLINE Concepts Security environment: Threats, intruders, accidental data loss. Cryptography.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Public Key Infrastructure and Applications
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Sri Lanka Institute of Information Technology
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 9 Security Environment Basics of Cryptography Protection Mechanisms Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Types of Electronic Infection
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Private key
Outline for Today’s Lecture Administrative: –Happy Thanksgiving –Sign up for demos. Objective: –Peer-to-peer file systems Mechanisms employed Issues Some.
Network Security Celia Li Computer Science and Engineering York University.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Security Protecting information data confidentiality
Security Outline Encryption Algorithms Authentication Protocols
Cryptographic Hash Function
IS3230 Access Security Unit 9 PKI and Encryption
Presentation transcript:

CSIT324 OS &WEB INTERFACE SECURITY Introduction

C OURSE O UTLINE Concepts Security environment: Threats, intruders, accidental data loss. Cryptography basics: types Protection mechanisms Authentication Insider attacks, Code bug exploitation plus defenses.

A SSESSMENT Course works, test – 30% Final Exam – 70%

R EFERENCE Modern OS by Andrew S. Tanenbaum

S ECURITY E NVIRONMENT OS - Security – Protection mechanisms – the specific OS mechanisms used to safeguard information in the PC.

S ECURITY F ACETS 1. Threats PC has 4 general goals with corresponding threats to them: Data confidentiality – concerned with having secret data remain secret. Data integrity – unauthorized users should not be able to modify any data without the owner’s permission. Data modification includes changing data, removing data and adding false data. System availability – nobody can disturb the system to make it unusable. Denial of service attacks. Privacy – protecting individuals from misuse of information about them

2. I NTRUDERS /A DVERSARIES People who are nosing around places where they have no business. Forms: Passive intruders – want to read files they are not authorized to read. Active intruders – more malicious (want to make unauthorized changes to data).

C ATEGORIES OF I NTRUDERS Casual prying by nontechnical users: people reading other users’ &other files if no barriers are placed in the way. Snooping by insiders. Determined attempts to make money: bank programmers have attempted to steal from the bank they are working for. Commercial/military espionage: espionage is a serious &well-funded attempt by a competitor/a foreign country to steal programs, trade secrets, patentable ideas, technology, circuits designs, business plans e.t.c.

3. A CCIDENTAL DATA LOSS Valuable data can be lost by accident. Causes: Act of God – fires, floods, earthquakes, wars, riots. Hardware/software errors – CPU malfunctions, unreadable disks, telecom errors, program bugs. Human errors – incorrect data entry, wrong program run, lost disk. Solutions: Maintain adequate backups far away from the original data.

C RYPTOGRAPHY B ASICS. Cryptography refers to the process of converting plaintext into ciphertext (encrypt) in that only authorized people know how to convert it back to plaintext. Ciphertext is an incomprehensible pile of bits. Encryption &decryption algorithms (functions) should always be public.

F ORMS OF C RYPTOGRAPHY Secret-key cryptography – mono-alphabetic substitution. Also referred to as symmetric cryptography. Advantage: Efficient because the amount of computation required to encrypt/decrypt a message is manageable. Drawback : Sender &receiver must both be in possession of the shared secret key. Public-key cryptography – private (decryption key) and public key pair but the public key (encryption key) is published.

P UBLIC KEY ENCRYPTION …. Key generation is automated with a user-selected password fed into the algorithm. The correspondent encrypts the message with the receiver’s public key. Since only the receiver has the private key, only the receiver can decrypt the message.

D IGITAL S IGNATURES Digital signatures – sign a document digitally. Make it possible to sign s &other digital documents in such a way that they can’t be repudiated by the sender later. One way is to first run the document through a one-way cryptographic hashing algorithm which very hard to invert. Hashing function produces a fixed length result independent of the original document size. Common hash functions: Message Digest 5 (MD5) that produces a 16byte result, Secure Hash Algorithm (SHA-1) that produces a 20-byte result.

H ASHING PROCESS.. S ENDER ’ S END. The document owner applies his private key to the hash to get D(hash). This value, called the Signature block, is appended to the document &sent to the receiver. The application of D to the hash is also referred to as decrypting the hash though its not really a decryption because the hash has not been encrypted. It just a mathematical transformation on the hash.

R ECEIVER ’ S END.. When the doc and hash arrive, the receiver first computes the hash of the doc using MD5 or SHA. The receiver then applies the sender’s public key to the signature block to get E{D(hash)}. It encrypts the decrypted hash, canceling it out &getting the hash back. If the computed hash doesn’t match the hash from the signature block, the doc, the signature block, or both have been tampered with or changed by accident. NB: the value of this scheme is that it applies public-key cryptography only to a relatively small piece of data, called the hash.

T RUSTED P LATFORM M ODULE (TPM) TPM is crypto-processor with some nonvolatile storage inside it for keys. TPM can perform cryptographic operations such as encrypting blocks of plaintext or decrypting blocks of ciphertext in main memory. TPM can also verify digital signatures. According to Microsoft, operating system controls the TPM to prevent unauthorized software from being run.

TPM APPLICATIONS … If the TPM is involved in the booting process, it will start only operating systems signed by a secret key placed inside the TPM by the manufacturer &disclosed only to selected OS vendors e.g. Microsoft. Thus TPM can be used to limit users’ choices of software to those approved by the computer manufacturer.

TPM APPLICATIONS … Music &movie industries are very keen on TPM as it could be used to prevent piracy of the content. It also open up new business models such as renting songs/movies for a specific period of time by refusing to decrypt them after the expiration date. TPM drawback: Doesn’t make PCs more secure against external attacks. It only focuses on using cryptography to prevent users from doing anything not approved directly or indirectly by the TPM controllers.

R ESEARCH ON : Certificate Authorities PKI Next Lecture: Protection Mechanisms. End!