Computer and Network Security - Message Digests, Kerberos, PKI –

Slides:



Advertisements
Similar presentations
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Public Key Cryptography & Message Authentication By Tahaei Fall 2012.
Computer Security Key Management
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Authentication Digital Signature Key distribution.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
8: Network Security – Integrity, Firewalls.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Network Security understand principles of network security:
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Behzad Akbari Spring In the Name of the Most High.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
7: Network Security1 Chapter 7: Network security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Internet and Intranet Protocols and Applications Lecture 10 Network (Internet) Security April 3, 2002 Joseph Conron Computer Science Department New York.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
 This Class  Chapter 8. 2 What is network security?  Confidentiality  only sender, intended receiver should “understand” message contents.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 12 Network Security (2)
Computer and Internet Security. Introduction Both individuals and companies are vulnerable to data theft and hacker attacks that can compromise data,
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Network Security Understand principles of network security:
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Public Key Infrastructure (PKI) Chien-Chung Shen
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Network Security7-1 Chapter 8: Network Security Chapter goals: r Understand principles of network security: m cryptography and its many uses beyond “confidentiality”
 Last Class  Chapter 7 on Data Presentation Formatting and Compression  This Class  Chapter 8.1. and 8.2.
Lecture 22 Network Security (cont) CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger slides are modified from Jim Kurose,
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Public-Key Cryptography and Message Authentication
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Chapter 7 Network Security
Basic Network Encryption
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Message Security, User Authentication, and Key Management
Information Security message M one-way hash fingerprint f = H(M)
Intro to Cryptography Some slides have been taken from:
Protocol ap1.0: Alice says “I am Alice”
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Security: Integrity, Authentication, Non-repudiation
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Computer and Network Security - Message Digests, Kerberos, PKI –

Course textbook References: Kaufman, C., Perlman, R. and Speciner, M., Network Security (Private Communication in a Public World), 2 nd edition, Prentice Hall William Stalling, Cryptography and Network Security, 2 nd edition, Prentice Hall Class notes: Computer Security, Pennsylvania State University

Message Digests Computationally expensive to public-key-encrypt long messages Goal: fixed-length,easy to compute digital signature, “fingerprint” apply hash function H to m, get fixed size message digest, H(m). Hash function properties: Many-to-1 Produces fixed-size msg digest (fingerprint) Given message digest x, computationally infeasible to find m such that x = H(m) computationally infeasible to find any two messages m and m’ such that H(m) = H(m’).

Digital signature = Signed message digest Bob sends digitally signed message: Alice verifies signature and integrity of digitally signed message:

Hash Function Algorithms Internet checksum would make a poor message digest. –Too easy to find two messages with same checksum. MD5 hash function widely used. –Computes 128-bit message digest in 4-step process. –arbitrary 128-bit string x, appears difficult to construct msg m whose MD5 hash is equal to x. SHA-1 is also used. –US standard –160-bit message digest

Trusted Intermediaries Problem: –How do two entities establish shared secret key over network? Solution: –trusted key distribution center (KDC) acting as intermediary between entities Problem: –When Alice obtains Bob’s public key (from web site, , diskette), how does she know it is Bob’s public key, not Trudy’s? Solution: –trusted certification authority (CA)

Trusted Key Distribution Center (KDC) Keberos –Key Distribution Center –Ticket Granting Server

Keberos Kerberos authenticates users. –Authentication: Assessing identity of users Most widely used centralized password system Now: part of Windows 2K, XP network authentication

The setup of Kerberos The players – Principal - person being authenticated – Service - entity performing authentication – Key Distribution Center (KDC) Trusted third party for key distribution Each principal and service has a Kerberos password known to KDC –Ticket granting server Server granting transient authentication The objectives – Authenticate Alice (Principal) to Bob (Service) – Negotiate a symmetric (secret) session key k AB

Key Distribution Center (KDC) Alice,Bob need shared symmetric key. KDC: server shares different secret key with each registered user. Alice, Bob know own symmetric keys, K A-KDC K B-KDC, for communicating with KDC. Alice communicates with KDC, gets session key R1, and K B-KDC (A,R1) Alice sends Bob K B-KDC (A,R1), Bob extracts R1 Alice, Bob now share the symmetric key R1.

Kerberos Ticket Bob’s Ticket K A-KDC (R1, K B-KDC (A,R1)) contains – Alice’s identity – The session key (R1) –Only Alice and KDC can open K A-KDC (R1, K B-KDC (A,R1)) –Only Bob and KDC can open K B-KDC (A,R1).

Trusted Certificate Authorities (CA) Public Key Infrastructure –Public Key Cryptography –CA (Certificate Authorities)

What is Certificate? A certificate … – … makes an association between a user identity/job/attribute and a private key – … contains public key information {e,n} – … has a validity period – … is signed by some certificate authority (CA) Issued by CA for some purpose – Verisign is in the business of issuing certificates – People trust Verisign to vet identity

Certification Authorities Certification authority (CA) binds public key to particular entity. Entity (person, router, etc.) can register its public key with CA. –Entity provides “proof of identity” to CA. –CA creates certificate binding entity to public key. –Certificate digitally signed by CA. When Alice wants Bob’s public key: gets Bob’s certificate (Bob or elsewhere). Apply CA’s public key to Bob’s certificate, get Bob’s public key

Diffie-Hellman Key Exchange Given –p: Prime number –g: g < p, prime root of p {g 1 mod p, g 2 mod p, g 3 mod p,…, g p-1 mod p} = {1, 2, 3, 4, …, p-1}

Diffie-Hellman Alice Bob S1.1 choose random R A choose random R B S1.2 compute compute S1.3 A  B : Q A B  A : Q B S1.4 compute compute

So far, we talked about Basic Techniques of Security… Those are used in many different security scenarios –secure –secure transport (SSL) –IPsec