William Stallings Data and Computer Communications Chapter 18 Network Security.

Slides:



Advertisements
Similar presentations
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Advertisements

Internet Security CSCE 813 IPsec
1 Chapter 10 Network Security. 2 Security Requirements zConfidentiality zIntegrity zAvailability.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Computer Networks with Internet Technology William Stallings Chapter 16 Network Security.
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Chapter 18: Network Security Business Data Communications, 5e.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 20: Network Security Business Data Communications, 4e.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Network/Information Security z“The terms network security and information security refer in a broad sense to confidence that information and services available.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
William Stallings Data and Computer Communications Chapter 18 Network Security.
William Stallings Data and Computer Communications Chapter 18 Network Security.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
CIS 325: Data Communications1 Chapter Seventeen Network Security.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
By: Nasoor Bagheri In the name of god Network Security By: Nasoor Bagheri
Cryptography: Authenticating Messages Anita Jones CS451 Information Security Copyright(C) Anita Jones.
1 IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 21 – Network Security.
IP Security
William Stallings Data and Computer Communications 7th Edition
Virtual Private Network
IPSec Detailed Description and VPN
IPSecurity.
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
Network Security.
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPNs)
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
Chapter 6 IP Security.
Presentation transcript:

William Stallings Data and Computer Communications Chapter 18 Network Security

Security Requirements zConfidentiality zIntegrity zAvailability

Passive Attacks zEavesdropping on transmissions zTo obtain information zRelease of message contents yOutsider learns content of transmission zTraffic analysis yBy monitoring frequency and length of messages, even encrypted, nature of communication may be guessed zDifficult to detect zCan be prevented

Active Attacks zMasquerade yPretending to be a different entity zReplay zModification of messages zDenial of service zEasy to detect yDetection may lead to deterrent zHard to prevent

Security Threats

Conventional Encryption

Ingredients zPlain text zEncryption algorithm zSecret key zCipher text zDecryption algorithm

Requirements for Security zStrong encryption algorithm yEven if known, should not be able to decrypt or work out key yEven if a number of cipher texts are available together with plain texts of them zSender and receiver must obtain secret key securely zOnce key is known, all communication using this key is readable

Attacking Encryption zCrypt analysis yRelay on nature of algorithm plus some knowledge of general characteristics of plain text yAttempt to deduce plain text or key zBrute force yTry every possible key until plain text is achieved

Algorithms zBlock cipher yProcess plain text in fixed block sizes producing block of cipher text of equal size yData encryption standard (DES) yTriple DES (TDES)

Data Encryption Standard zUS standard z64 bit plain text blocks z56 bit key

DES Encryption Algorithm

DES Single Iteration

Strength of DES zDeclared insecure in 1998 zElectronic Frontier Foundation zDES Cracker machine zDES now worthless zAlternatives include TDEA

Triple DEA zANSI X9.17 (1985) zIncorporated in DEA standard 1999 zUses 3 keys and 3 executions of DEA algorithm zEffective key length 168 bit

Location of Encryption Devices

Link Encryption zEach communication link equipped at both ends zAll traffic secure zHigh level of security zRequires lots of encryption devices zMessage must be decrypted at each switch to read address (virtual circuit number) zSecurity vulnerable at switches yParticularly on public switched network

End to End Encryption zEncryption done at ends of system zData in encrypted form crosses network unaltered zDestination shares key with source to decrypt zHost can only encrypt user data yOtherwise switching nodes could not read header or route packet zTraffic pattern not secure zUse both link and end to end

Key Distribution zKey selected by A and delivered to B zThird party selects key and delivers to A and B zUse old key to encrypt and transmit new key from A to B zUse old key to transmit new key from third party to A and B

Automatic Key Distribution (diag)

Automatic Key Distribution zSession Key yUsed for duration of one logical connection yDestroyed at end of session yUsed for user data zPermanent key yUsed for distribution of keys zKey distribution center yDetermines which systems may communicate yProvides one session key for that connection zFront end processor yPerforms end to end encryption yObtains keys for host

Traffic Padding zProduce cipher text continuously zIf no plain text to encode, send random data zMake traffic analysis impossible

Message Authentication zProtection against active attacks yFalsification of data yEavesdropping zMessage is authentic if it is genuine and comes from the alleged source zAuthentication allows receiver to verify that message is authentic yMessage has not altered yMessage is from authentic source yMessage timeline

Authentication Using Encryption zAssumes sender and receiver are only entities that know key zMessage includes: yerror detection code ysequence number ytime stamp

Authentication Without Encryption zAuthentication tag generated and appended to each message zMessage not encrypted zUseful for: yMessages broadcast to multiple destinations xHave one destination responsible for authentication yOne side heavily loaded xEncryption adds to workload xCan authenticate random messages yPrograms authenticated without encryption can be executed without decoding

Message Authentication Code zGenerate authentication code based on shared key and message zCommon key shared between A and B zIf only sender and receiver know key and code matches: yReceiver assured message has not altered yReceiver assured message is from alleged sender yIf message has sequence number, receiver assured of proper sequence

Message Authentication Using Message Authentication Code

One Way Hash Function zAccepts variable size message and produces fixed size tag (message digest) zAdvantages of authentication without encryption yEncryption is slow yEncryption hardware expensive yEncryption hardware optimized to large data yAlgorithms covered by patents yAlgorithms subject to export controls (from USA)

Using One Way Hash

Secure Hash Functions zHash function must have following properties: yCan be applied to any size data block yProduce fixed length output yEasy to compute yNot feasible to reverse yNot feasible to find two message that give the same hash

SHA-1 zSecure Hash Algorithm 1 zInput message less than 2 64 bits yProcessed in 512 bit blocks zOutput 160 bit digest

Public Key Encryption zBased on mathematical algorithms zAsymmetric yUse two separate keys zIngredients yPlain text yEncryption algorithm yPublic and private key yCipher text yDecryption algorithm

Public Key Encryption (diag)

Public Key Encryption - Operation zOne key made public yUsed for encryption zOther kept private yUsed for decryption zInfeasible to determine decryption key given encryption key and algorithm zEither key can be used for encryption, the other for decryption

Steps zUser generates pair of keys zUser places one key in public domain zTo send a message to user, encrypt using public key zUser decrypts using private key

Digital Signature zSender encrypts message with their private key zReceiver can decrypt using sneders public key zThis authenticates sender, who is only person who has the matching key zDoes not give privacy of data yDecrypt key is public

RSA Algorithm

RSA Example

IPv4 and IPv6 Security zIPSec zSecure branch office connectivity over Internet zSecure remote access over Internet zExtranet and intranet connectivity zEnhanced electronic commerce security

IPSec Scope zAuthentication header zEncapsulated security payload zKey exchange zRFC 2401,2402,2406,2408

Security Association zOne way relationship between sender and receiver zFor two way, two associations are required zThree SA identification parameters ySecurity parameter index yIP destination address ySecurity protocol identifier

SA Parameters zSequence number counter zSequence counter overflow zAnti-reply windows zAH information zESP information zLifetime of this association zIPSec protocol mode yTunnel, transport or wildcard zPath MTU

Transport and Tunnel Modes zTransport mode yProtection for upper layer protocols yExtends to payload of IP packet yEnd to end between hosts zTunnel mode yProtection for IP packet yEntire packet treated as payload for outer IP “packet” yNo routers examine inner packet yMay have different source and destination address yMay be implemented at firewall

Authentication Header

Encapsulating Security Payload zESP zConfidentiality services

ESP Packet

Scope of ESP

Key Management zManual zAutomatic yISAKMP/Oakley xOakley key determination protocol xInternet security association and key management protocol

Required Reading zStallings chapter 18