CS 54001-1: Large-Scale Networked Systems Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao Lecture 4 www.classes.cs.uchicago.edu/classes/archive/2003/winter/54001-1.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Sri Lanka Institute of Information Technology
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Security Firewall Firewall design principle. Firewall Characteristics.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter3 Public-Key Cryptography and Message Authentication.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
PULIC –KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Behzad Akbari Spring In the Name of the Most High.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer Networks with Internet Technology William Stallings Network Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Network Security David Lazăr.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
ClientServer ClientID, E(x, CHK) E(x+1, SHK), E(y, SHK) E(y+1, CHK) E(SK, SHK) Three-way handshake Authentication Protocols CHK, SHK are keys known by.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
Public-Key Cryptography and Message Authentication
Computer Data Security & Privacy
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Message Digest Cryptographic checksum One-way function Relevance
Chapter 3 - Public-Key Cryptography & Authentication
Advanced Computer Networks
Presentation transcript:

CS : Large-Scale Networked Systems Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao Lecture 4

CS Winter Quarter 2 Week 1: Internet Design Principles & Protocols l An introduction to the mail system l An introduction to the Internet l Internet design principles and layering l Brief history of the Internet l Packet switching and circuit switching l Protocols l Addressing and routing l Performance metrics l A detailed FTP example

CS Winter Quarter 3 Week 2: Routing and Transport l Routing techniques –Flooding –Distributed Bellman Ford Algorithm –Dijkstra’s Shortest Path First Algorithm l Routing in the Internet –Hierarchy and Autonomous Systems –Interior Routing Protocols: RIP, OSPF –Exterior Routing Protocol: BGP l Transport: achieving reliability l Transport: achieving fair sharing of links

CS Winter Quarter 4 Week 3: Measurement & Characterization l What does the Internet look like? l What does Internet traffic look like? l How do I measure such things? l How do such characteristics evolve? l What Internet characteristics are shared with other networks? l Are all those Faloutsos’ related?

CS Winter Quarter 5 Week 4: Security l Context: Attacks, services, & mechanisms l Message encryption l Public key cryptography l Authentication protocols l Message integrity l Public key infrastructure l Firewalls

CS Winter Quarter 6 Attacks, Services and Mechanisms l Security Attack: Any action that compromises the security of information. l Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. l Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

CS Winter Quarter 7 Security Attacks

CS Winter Quarter 8 Security Attacks l Interruption: This is an attack on availability l Interception: This is an attack on confidentiality l Modification: This is an attack on integrity l Fabrication: This is an attack on authenticity

CS Winter Quarter 9 Active and Passive Threats

CS Winter Quarter 10 Methods of Defense l Encryption l Software Controls (access limitations in a data base, in operating system protect each user from other users) l Hardware Controls (smartcard) l Policies (frequent changes of passwords) l Physical Controls

CS Winter Quarter 11 Chapter 8, Figure 3 Security Cryptography algorithms Public key (e.g., RSA) Secret key (e.g., DES) Message digest (e.g., MD5) Security services AuthenticationPrivacyMessage integrity Security Algorithms & Services

CS Winter Quarter 12 Security Services l Confidentiality (privacy) l Authentication (who created or sent the data) l Integrity (has not been altered) l Non-repudiation (the order is final) l Access control (prevent misuse of resources) l Availability (permanence, non-erasure) – Denial of Service Attacks – Virus that deletes files

CS Winter Quarter 13

CS Winter Quarter 14

CS Winter Quarter 15 Week 4: Security l Context: Attacks, services, & mechanisms l Message encryption l Public key cryptography l Authentication protocols l Message integrity l Public key infrastructure l Firewalls

CS Winter Quarter 16 Conventional Encryption Principles l An encryption scheme has five ingredients: –Plaintext –Encryption algorithm –Secret Key –Ciphertext –Decryption algorithm l Security depends on the secrecy of the key, not the secrecy of the algorithm

CS Winter Quarter 17 Conventional Encryption Principles

CS Winter Quarter 18 Cryptography l Classified along three independent dimensions: –The type of operations used for transforming plaintext to ciphertext –The number of keys used >symmetric (single key) >asymmetric (two-keys, or public-key encryption) –The way in which the plaintext is processed

CS Winter Quarter 19 Average time required for exhaustive key search Key Size (bits) Number of Alternative Keys Time required at 10 6 Decryption/µs = 4.3 x milliseconds = 7.2 x hours = 3.4 x x years = 3.7 x x years

CS Winter Quarter 20 Conventional Encryption Algorithms l Data Encryption Standard (DES) –The most widely used encryption scheme –The algorithm is reffered to the Data Encryption Algorithm (DEA) –DES is a block cipher –The plaintext is processed in 64-bit blocks –The key is 56-bits in length

CS Winter Quarter 21

CS Winter Quarter 22

CS Winter Quarter 23 Chapter 8, Figure 6 4-bit chunk Expanded to 6 bits by stealing a bit from left and right chunks … …… … Expansion Phase of DES

CS Winter Quarter 24 Chapter 8, Figure 7 Block 1 IV DES Cipher 1 Block 2 DES Block 3 DES Block 4 DES + Cipher Cipher Block Chaining

CS Winter Quarter 25 Time to break a code (10 6 decryptions/µs)

CS Winter Quarter 26 Week 4: Security l Context: Attacks, services, & mechanisms l Message encryption l Public key cryptography l Authentication protocols l Message integrity l Public key infrastructure l Firewalls

CS Winter Quarter 27 Public-Key Cryptography

CS Winter Quarter 28 Applications for Public-Key Cryptosystems l Three categories: –Encryption/decryption: The sender encrypts a message with the recipient’s public key –Digital signature: The sender ”signs” a message with its private key –Key exchange: Two sides cooperate to exhange a session key

CS Winter Quarter 29 Requirements for Public-Key Cryptography l Computationally easy for a party B to generate a pair (public key KUb, private key KRb) l Easy for sender to generate ciphertext l Easy for the receiver to decrypt ciphertect using private key

CS Winter Quarter 30 Requirements for Public-Key Cryptography l Computationally infeasible to determine private key (KRb) knowing public key (KUb) l Computationally infeasible to recover message M, knowing KUb and ciphertext C l Either of the two keys can be used for encryption, with the other used for decryption

CS Winter Quarter 31 Public-Key Cryptographic Algorithms l RSA and Diffie-Hellman l RSA - Ron Rives, Adi Shamir and Len Adleman at MIT, in –RSA is a block cipher –The most widely implemented l Diffie-Hellman –Exchange a secret key securely –Compute discrete logarithms

CS Winter Quarter 32 The RSA Algorithm – Key Generation 1. Select p,q p and q both prime 2. Calculate n = p x q 3. Calculate 4. Select integer e 5. Calculate d 6. Public KeyKU = {e,n} 7. Private keyKR = {d,n}

CS Winter Quarter 33 Example of RSA Algorithm

CS Winter Quarter 34 The RSA Algorithm - Encryption l Plaintext:M<n l Ciphertext:C = M e (mod n)

CS Winter Quarter 35 The RSA Algorithm - Decryption l Ciphertext:C l Plaintext:M = C d (mod n)

CS Winter Quarter 36 Key Management Public-Key Certificate Use

CS Winter Quarter 37 Week 4: Security l Context: Attacks, services, & mechanisms l Message encryption l Public key cryptography l Authentication protocols l Message integrity l Public key infrastructure l Firewalls

CS Winter Quarter 38 Authentication Protocols l Simple three-way handshake –Assume two parties share a secret key l Trusted third party –E.g., Kerberos l Public key authentication

CS Winter Quarter 39 Chapter 8, Figure 9 Simple Three-Way Handshake E(m,k) denotes encryption of message m with key k

CS Winter Quarter 40 Chapter 8, Figure 10 ASB E (( T, L, K, B ), K A E (( A, T ), K E (( T, L, K, A ), K B ) A, B E ( T + 1, K ) E (( T, L, K, A ), K B ) Trusted Third Party Ka and Kb are secret keys shared with server S T=timestamp, L=lifetime, K=session key

CS Winter Quarter 41 Chapter 8, Figure 11 Public Key Cryptography

CS Winter Quarter 42 Message Integrity l Requirements - must be able to verify that: –Message came from apparent source or author, –Contents have not been altered, –Sometimes, it was sent at a certain time or sequence. l Protection against active attack (falsification of data and transactions)

CS Winter Quarter 43 Approaches to Message Integrity l Conventional encryption –Only the sender and receiver should share a key l Message integrity without message encryption –An authentication tag is generated and appended to each message l Message Authentication Code –Calculate the MAC as a function of the message and the key. MAC = F(K, M)

CS Winter Quarter 44

CS Winter Quarter 45 One-way HASH function

CS Winter Quarter 46 One-way HASH function l Secret value is added before the hash and removed before transmission.

CS Winter Quarter 47 Secure HASH Functions l Purpose of the HASH function is to produce a ”fingerprint. l Properties of a HASH function H : 1.H can be applied to a block of data at any size 2.H produces a fixed length output 3.H(x) is easy to compute for any given x. 4.For any given block x, it is computationally infeasible to find x such that H(x) = h 5.For any given block x, it is computationally infeasible to find with H(y) = H(x). 6.It is computationally infeasible to find any pair (x, y) such that H(x) = H(y)

CS Winter Quarter 48 Simple Hash Function l One-bit circular shift on the hash value after each block is processed would improve

CS Winter Quarter 49 Message Digest Generation Using SHA-1

CS Winter Quarter 50 SHA-1 Processing of single 512-Bit Block

CS Winter Quarter 51 Chapter 8, Figure 13 Sender identity and message integrity confirmed if checksums match Calculate MD5 checksum on received message and compare against received value Decrypt signed checksum with sender’s public key Calculate MD5 checksum over message contents Sign checksum using RSA with sender’s private key Transmitted message

CS Winter Quarter 52 Chapter 8, Figure 14 Decrypt message using DES with secret keyk DecryptE(k) using RSA with my private key ->k Convert ASCII message Encryptk using RSA with recipient’s public key Encode message +E(k) in ASCII for transmission Encrypt message using DES with secret keyk Create a random secret keykOriginal message Transmitted message

CS Winter Quarter 53 Week 4: Security l Context: Attacks, services, & mechanisms l Message encryption l Public key cryptography l Authentication protocols l Message integrity l Public key infrastructure l Firewalls

CS Winter Quarter 54 Public-Key Cryptography Principles l The use of two keys has consequences in: key distribution, confidentiality and authentication. l The scheme has six ingredients –Plaintext –Encryption algorithm –Public and private key –Ciphertext –Decryption algorithm

CS Winter Quarter 55 Encryption using Public-Key system

CS Winter Quarter 56 X.509 Authentication Service l Distributed set of servers that maintains a database about users l Each certificate contains the public key of a user and is signed with the private key of a CA l Is used in S/MIME, IP Security, SSL/TLS and SET l RSA is recommended

CS Winter Quarter 57 X.509 Formats

CS Winter Quarter 58 Typical Digital Signature Approach

CS Winter Quarter 59 Obtaining a User’s Certificate l Characteristics of certificates generated by CA: –Any user with access to the public key of the CA can recover the user public key that was certified. –No part other than the CA can modify the certificate without this being detected.

CS Winter Quarter 60 Chapter 8, Figure 12 User CA PCA1PCA2 IPRA PCA3 CA IPRA=Internet Policy Registration Authority (root) PCAn=policy certification authority CA=certification authority

CS Winter Quarter 61 X.509 CA Hierarchy

CS Winter Quarter 62 Revocation of Certificates l Reasons for revocation: –The users secret key is assumed to be compromised. –The user is no longer certified by this CA. –The CA’s certificate is assumed to be compromised.

CS Winter Quarter 63 Week 4: Security l Context: Attacks, services, & mechanisms l Message encryption l Public key cryptography l Authentication protocols l Message integrity l Public key infrastructure l Firewalls

CS Winter Quarter 64 Firewall Design Principles l The firewall is inserted between the premises network and the Internet l Aims: –Establish a controlled link –Protect the premises network from Internet-based attacks –Provide a single choke point

CS Winter Quarter 65 Firewall Characteristics l Design goals: –All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall) –Only authorized traffic (defined by the local security police) will be allowed to pass –The firewall itself is immune to penetration (use of trusted system with a secure operating system)

CS Winter Quarter 66 Four General Techniques l Service control –Determines the types of Internet services that can be accessed, inbound or outbound l Direction control –Determines the direction in which particular service requests are allowed to flow l User control –Controls access to a service according to which user is attempting to access it l Behavior control –Controls how particular services are used (e.g. filter )

CS Winter Quarter 67 Types of Firewalls l Three common types of Firewalls: –Packet-filtering routers –Application-level gateways –Circuit-level gateways –(Bastion host)

CS Winter Quarter 68 Types of Firewalls l Packet-filtering Router

CS Winter Quarter 69 Types of Firewalls l Packet-filtering Router –Applies a set of rules to each incoming IP packet and then forwards or discards the packet –Filter packets going in both directions –The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header –Two default policies (discard or forward)

CS Winter Quarter 70 Types of Firewalls l Advantages: –Simplicity –Transparency to users –High speed l Disadvantages: –Difficulty of setting up packet filter rules –Lack of Authentication

CS Winter Quarter 71 Types of Firewalls l Possible attacks and appropriate countermeasures –IP address spoofing –Source routing attacks –Tiny fragment attacks

CS Winter Quarter 72 Types of Firewalls l Application-level Gateway

CS Winter Quarter 73 Types of Firewalls l Application-level Gateway –Also called proxy server –Acts as a relay of application-level traffic l Advantages: –Higher security than packet filters –Only need to scrutinize a few allowable applications –Easy to log and audit all incoming traffic l Disadvantages: –Additional processing overhead on each connection (gateway as splice point)

CS Winter Quarter 74 Types of Firewalls l Circuit-level Gateway

CS Winter Quarter 75 Types of Firewalls l Circuit-level Gateway –Stand-alone system or –Specialized function performed by an Application-level Gateway –Sets up two TCP connections –The gateway typically relays TCP segments from one connection to the other without examining the contents

CS Winter Quarter 76 Types of Firewalls l Circuit-level Gateway –The security function consists of determining which connections will be allowed –Typically use is a situation in which the system administrator trusts the internal users –An example is the SOCKS package

CS Winter Quarter 77 Course Outline (Subject to Change) 1. (January 9 th ) Internet design principles and protocols 2. (January 16 th ) Internetworking, transport, routing 3. (January 23 rd ) Mapping the Internet and other networks 4. (January 30 th ) Security 5. (February 6 th ) P2P technologies & applications (Matei Ripeanu) (plus midterm) 6. (February 13 th ) Optical networks (Charlie Catlett) 7. *(February 20 th ) Web and Grid Services (Steve Tuecke) 8. (February 27 th ) Network operations (Greg Jackson) 9. *(March 6 th ) Advanced applications (with guest lecturers: Terry Disz, Mike Wilde) 10. (March 13 th ) Final exam * Ian Foster is out of town.