The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Advertisements

Lecture 10: Mediated Authentication
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
COS 461 Fall 1997 Todays Lecture u intro to security in networking –confidentiality –integrity –authentication –authorization u orientation for assignment.
CSC 474 Information Systems Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
CS470, A.SelcukNeedham-Schroeder1 Needham-Schroeder Protocol Authentication & Key Establishment CS 470 Introduction to Applied Cryptography Instructor:
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Key Management CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 1, 2004.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Slide 1 Vitaly Shmatikov CS 378 Key Establishment Pitfalls.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Topic 5 Essential Public Key Crypto Methods.
Key Distribution CS 470 Introduction to Applied Cryptography
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Strong Password Protocols
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
EEC 688/788 Secure and Dependable Computing
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Lecture 11: Strong Passwords
Authentication (ch 9~12) IT443 – Network Security Administration 1.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Week 4 - Wednesday.  What did we talk about last time?  RSA algorithm.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
1 Needham-Schroeder A --> S: A,B, N A S --> A: {N A,B,K AB,{K AB,A} KBS } KAS A --> B:{K AB,A} KBS B --> A:{N B } KAB A --> B:{N B -1} KAB.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
Chapter 9 Simple Authentication Protocols Simple Security Protocol Authentication Protocols Authentication and TCP Chapter 9 Simple Authentication protocols.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Chapter eight: Authentication Protocols 2013 Term 2.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Security Handshake Pitfalls. Client Server Hello (K)
Handshake Protocols COEN 150.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
AIT 682: Network and Systems Security
Presentation transcript:

The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake Pitfalls, Needham-Schroeder, Otway-Rees Credit: Prof. Dr. Peng Ning for slides Network Security Dr. Attila Altay Yavuz1Spring 2015

OSU EECS 2 Authentication Handshakes Building Blocks: E, H, HMAC Primitives: DH, DSA, Schnorr, RSA How to use them for security objectives? Cryptographic Protocols: –Involve potentially multiple parties –Generally interactive –Use multiple primitives for security objective(s) Initial Handshake: The most basic one!

OSU EECS 3 Authentication Handshakes Secure communication almost always includes an initial authentication handshake. –Authenticate each other –Establish session keys –This process is not trivial; flaws in this process undermine secure communication Cannot not specify “the best” solution Focus on general type of flaws that occur on these protocols

OSU EECS 4 Authentication with Shared Secret Weaknesses –Authentication is not mutual; jut Bob authenticates Alice. Trudy can convince Alice that she is Bob –Trudy can hijack the conversation after the initial exchange –If the shared key is derived from a password, Trudy can mount an off-line password guessing attack –Trudy may compromise Bob’s database and later impersonate Alice AliceBob I’m Alice A challenge R f(K Alice-Bob, R)

OSU EECS 5 Authentication with Shared Secret (Cont’d) A variation –Requires reversible cryptography (export issues and license) –Other variations are possible Weaknesses –All the previous weaknesses remain –Trudy doesn’t have to see R to mount off-line password guessing if R has certain patterns (e.g., concatenated with a timestamp) Trudy sends a message to Bob, pretending to be Alice AliceBob I’m Alice R K Alice-Bob {R}

OSU EECS 6 Authentication with Public Key Bob’s database is less risky Weaknesses –Authentication is not mutual; Trudy can convince Alice that she is Bob –Trudy can hijack the conversation after the initial exchange –Trudy can trick Alice into signing something Use different private key for authentication AliceBob I’m Alice R Sig Alice {R}

OSU EECS 7 Authentication with Public Key (Cont’d) A variation AliceBob I’m Alice {R} Alice R

OSU EECS 8 Mutual Authentication AliceBob I’m Alice R1R1 f(K Alice-Bob, R 1 ) R2R2 f(K Alice-Bob, R 2 ) AliceBob I’m Alice, R 2 R 1, f(K Alice-Bob, R 2 ) f(K Alice-Bob, R 1 ) Optimize

OSU EECS 9 TrudyBob I’m Alice, R 2 R 1, f(K Alice-Bob, R 2 ) Mutual Authentication (Cont’d) Reflection attack f(K Alice-Bob, R 1 ) TrudyBob I’m Alice, R 1 R 3, f(K Alice-Bob, R 1 )

OSU EECS 10 Reflection Attacks (Con’td) Lesson: Don’t have Alice and Bob do exactly the same thing –Different keys Totally different keys K Alice-Bob = K Bob-Alice + 1 –Different Challenges –The initiator should be the first to prove its identity Assumption: initiator is more likely to be the bad guy

OSU EECS 11 Mutual Authentication (Cont’d) Password guessing AliceBob I’m Alice, R 2 R 1, f(K Alice-Bob, R 2 ) f(K Alice-Bob, R 1 ) AliceBob I’m Alice R1R1 f(K Alice-Bob, R 1 ), R 2 f(K Alice-Bob, R 2 ) Countermeasure

OSU EECS 12 Mutual Authentication (Cont’d) Public keys –Authentication of public keys is a critical issue AliceBob I’m Alice, {R 2 } Bob R 2, {R 1 } Alice R1R1

OSU EECS 13 Mutual Authentication (Cont’d) Mutual authentication with timestamps –Require synchronized clocks –Alice and Bob have to encrypt different timestamps AliceBob I’m Alice, f(K Alice-Bob, timestamp) f(K Alice-Bob, timestamp+1)

OSU EECS 14 Integrity/Encryption for Data Communication after mutual authentication should be cryptographically protected as well –Require a session key established during mutual authentication

OSU EECS 15 Establishment of Session Keys Secret key based authentication –Assume the following authentication happened. –Can we use K Alice-Bob {R} as the session key? –Can we use K Alice-Bob {R+1} as the session key? –In general, modify K Alice-Bob and encrypt R. Use the result as the session key. AliceBob I’m Alice R K Alice-Bob {R}

OSU EECS 16 Establishment of Session Keys (Cont’d) Two-way public key based authentication –Alice chooses a random number R, encrypts it with Bob’s public key Trudy may hijack the conversation –Alice encrypts and signs R Trudy may save all the traffic, and decrypt all the encrypted traffic when she is able to compromise Bob Less severe threat Requires active attack

OSU EECS 17 Two-Way Public Key Based Authentication A better approach –Alice chooses and encrypts R 1 with Bob’s public key –Bob chooses and encrypts R 2 with Alice’s public key –Session key is R 1  R 2 –Trudy will have to compromise both Alice and Bob An even better approach –Alice and Bob establish the session key with Diffie- Hellman key exchange –Alice and Bob signs the quantity they send –Trudy can’t learn anything about the session key even if she compromises both Alice and Bob

OSU EECS 18 Mediated Authentication (With KDC) Some concerns –Trudy may claim to be Alice and talk to KDC Trudy cannot get anything useful –Messages encrypted by Alice may get to Bob before KDC’s message –It may be difficult for KDC to connect to Bob AliceBob KDC Generate K AB Alice wants Bob K Bob {K AB } K Alice {K AB } KDC operation (in principle)

OSU EECS 19 Mediated Authentication (With KDC) Must be followed by a mutual authentication exchange –To confirm that Alice and Bob have the same key KDC operation (in practice) AliceBob KDC Generate K AB Alice wants Bob K Bob {K AB } K Alice {K AB }, K Bob {K AB } ticket

OSU EECS 20 Needham-Schroeder Protocol Classic protocol for authentication with KDC –Many others have been modeled after it (e.g., Kerberos) Nonce: A number that is used only once –Deal with replay attacks Alice BobKDC Generate K AB N 1, Alice wants Bob ticket to Bob, K AB {N 2 } K Alice {N 1, “Bob”, K AB, ticket to Bob}, where ticket to Bob = K Bob {K AB, Alice} K AB {N 2  1, N 3 } K AB {N 3  1}

OSU EECS 21 Needham-Schroeder Protocol (Cont’d) A vulnerability –When Trudy gets a previous key used by Alice, Trudy may reuse a previous ticket issued to Bob for Alice –Essential reason The ticket to Bob stays valid even if Alice changes her key

OSU EECS 22 Expanded Needham-Schroeder Protocol The additional two messages assure Bob that the initiator has talked to KDC since Bob generates N B Alice BobKDC Generate K AB ; extract N B N 1, Alice wants Bob, K Bob {N B } ticket to Bob, K AB {N 2 } K Alice {N 1, “Bob”, K AB, ticket to Bob}, where ticket to Bob = K Bob {K AB, Alice, N B } K AB {N 2  1, N 3 } K AB {N 3  1} I want to talk to you K Bob {N B }

OSU EECS 23 Otway-Rees Protocol Only has five messages KDC checks if N C matches in both cipher-texts –Make sure that Bob is really Bob Alice Bob KDC Generate K AB Extract N B N C, “Alice”, “Bob”, K Alice {N A, N C, “Alice”, “Bob”} N C, K Alice {N A, K AB }, K Bob {N B, K AB } K Alice {N A, N C, “Alice”, “Bob”}, K Bob {N B, N C, “Alice”, “Bob”} K Alice {N A, K AB } K AB {anything recognizable}