Survivable Trust for Critical Infrastructure David M. Nicol, Sean W. Smith, Chris Hawblitzel, Ed Feustel, John Marchesini, Bennet Yee* Cybersecurity Research.

Slides:



Advertisements
Similar presentations
Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols Tom Chothia CWI.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Symmetric Key Infrastructure Karel Masarik, Daniel Cvrcek Faculty of Information Technology Brno University of Technology
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
SECURITY IN MOBILE NETWORKS BY BHONGIRI ANAND RAJ VENKAT PAVAN RAVILISETTY NAGA MOHAN MADINENI.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Peer-to-Peer Computing
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Key Distribution CS 470 Introduction to Applied Cryptography
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
PKI in Higher Education: Dartmouth PKI Lab Update Internet2 Virtual Meeting 5 October 2001.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Washington System Center © 2005 IBM Corporation August 25, 2005 RDS Training Secure Socket Layer (SSL) Overview z/Series Security (Mary Sweat, Greg Boyd)
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Security fundamentals Topic 5 Using a Public Key Infrastructure.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Information Systems Design and Development Security Precautions Computing Science.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Security Outline Encryption Algorithms Authentication Protocols
Security and Encryption
Module 8: Securing Network Traffic by Using IPSec and Certificates
Message Digest Cryptographic checksum One-way function Relevance
Goals Introduce the Windows Server 2003 family of operating systems
Module 8: Securing Network Traffic by Using IPSec and Certificates
Advanced Computer Networks
Presentation transcript:

Survivable Trust for Critical Infrastructure David M. Nicol, Sean W. Smith, Chris Hawblitzel, Ed Feustel, John Marchesini, Bennet Yee* Cybersecurity Research Group Institute for Security Technology Studies, Dartmouth College Dartmouth College * UCSD

Cybersecurity Research Group, ISTS2 Secure Coprocessor A computing device attached to a host –that is tamper-resistant –that contains a cryptographic accelerator, and keys (loaded at the factory) private even from its host Such a device can provide authentication –Authentication of identity –Authentication of computational result –Protection against insider attack Such a device is a Trustable Third Party (TTP) IBM sells one, the Smith on design team.

Cybersecurity Research Group, ISTS3 Survivable TTP We are exploring a survivable TTP to support trust applications in critical infrastructure –communications, power, water, transportation Create a network of TTPs Survivability derives from –distribution –ubiquity –obscurity

Cybersecurity Research Group, ISTS4 Marianas* A peer-to-peer network of Islands (host + secure coprocessor). Protects against insider attack, even though the hosts may be compromised. Network gives a means of authenticating results of remote computation, even though the host may not be trusted. * a chain of islands in the Pacific Trust Territory

Cybersecurity Research Group, ISTS5 Application Areas Survivable, interoperable, self-organizing PKI Distributed control systems Distributed maintenance Highly available forward-secure logging Secure network Weather Service Highly available certificate revocation Shell game with critical information Privacy in delayed binding networks

Cybersecurity Research Group, ISTS6 Research Issues Myriad issues in trust management, beyond the scope of this talk Issues in peer-to-peer design –Dynamic and multi-dimensional trust relationships alter the notion of “peer” Trust might be broken by software upgrade A known neighbor may be trustworthy for only certain types of interactions A neighbor’s host may be suspected of having been compromised –Alternatives for query response include Playing dead Forward, but don’t participate Warn others of suspected rogue

Cybersecurity Research Group, ISTS7 Prototype We are developing a protocol which allows islands to communicate in a secure fashion. The protocol is entirely decentralized, modified from Gnutella. Since there are no network facilities in the card, we put the packet processing logic inside secure hardware, and used TCP/IP services provided by the host to ship the packets.

Cybersecurity Research Group, ISTS8 Communication: High level view 4758 TCP/IP port Host side : send/receive ciphertext Card side : packet processing, crypto, routing, p2p logic Island Application Vulnerable “only” to denial of service

Cybersecurity Research Group, ISTS9 Software - Gnutella Gnutella is a protocol that is used to locate information over a decentralized network. –Five packet formats (descriptors). –A few general routing rules. –That's it! Gnutella is not a piece of software, a network, or a file sharing service.

Cybersecurity Research Group, ISTS10 Why We Chose It We were only interested in the protocol and a servent (SERVer + cliENT) for a starting point. We were not interested in locating mp3's, our initial app. locates fragments of cryptographic keys. We took the Gnut (v0.4.25) servent and split it in two. One piece to implement the host side, and the other was ported to run inside the card. Gnut is open source, professionally coded, well documented, and runs on Linux.

Cybersecurity Research Group, ISTS11 Armor via Authentication We began to add some of the protections by using the services made available by the card. 1) Authentication – for our definition of secure, we need mutual authentication –We implemented FIPS 196, which is the core of most authentication protocols in use (e.g. SSL). –Card-side software entities can authenticate and even if an intruder were watching the transaction, they would still not be able to get any important information.

Cybersecurity Research Group, ISTS12 Armor via Encryption 2) Plans for encryption - Once two cards have authenticated, we plan to encrypt all subsequent traffic. –The parties need to agree upon symmetric keys to be used, and encrypt all packets with the keys. –We have the design, and are in the process of implementing this. Our command line Gnut servent - Once we have finished the encryption, we plan to make available for download our servent.

Cybersecurity Research Group, ISTS13 Application : Ephemeral Private Key Image a CA whose private key is partitioned with distributed replicates---gnutella used to retrieve and assemble Protection : –No island has entire key –Suspicion of rogue CA may trigger withholding of key fragement We will explore mediated RSA / threshold crypto

Cybersecurity Research Group, ISTS14 Summary We’re exploring the join of secure coprocessing with peer-to-peer Lots of interesting thesis problems here Lots of significant applications Stop on by :