1 Some Backgrounds on Network Security Rocky K. C. Chang 12 February 2003.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Sri Lanka Institute of Information Technology
Digital Signatures and Hash Functions. Digital Signatures.
L0. Introduction Rocky K. C. Chang, January 2013.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Katz, Stoica F04 EE 122: (More) Network Security November 5, 2003.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 21 Public-Key Cryptography and Message Authentication.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Chapter 2 Advanced Cryptography (Part C)
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Computer and Network Security - Message Digests, Kerberos, PKI –
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
UNIT-VIII Syllabus Application Layer – Network Security, Domain name system, SNMP, Electronic Mail; the World WEB, Multi Media.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Reviews Rocky K. C. Chang 20 April 2007.
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
Presentation transcript:

1 Some Backgrounds on Network Security Rocky K. C. Chang 12 February 2003

2 Purposes of network security Four main purposes (or services): –Secrecy (or confidentiality): Prevent others from reading information shared between two participants. –Authentication: Verifying someone’s or something’s identity. –Message integrity: Assure that the message received has not be altered since it was generated by a legitimate source. –Nonrepudiation: A sender should not be able to falsely deny later that he sent a message. Two approaches: –Secrecy of the cryptographic algorithm (restricted algorithm) –The cryptographic algorithm is not a secret, but the key is.

3 Types of attacks Passive attacks (eavesdropping), e.g., –ciphertext-only attacks –known-plaintext attacks –chosen-plaintext attacks Active attacks, e.g., –pretend to be someone else –introduce new messages in the protocol –delete existing messages –substituting one message for another –replay old messages

4 Scope of consideration Scope: –Concern mainly communication between two parties (group communication security will be discussed later). –Concern attacks against protocols, not those against cryptographic algorithms or cryptographic techniques used to implement the algorithms. Other network security issues –Infrastructure security, i.e. attacks on routers, DNS root servers, etc. –Worms and viruses –Distributed DDoS attacks (DoS attacks will be considered though) –System security

5 Three cryptographic functions Hash functions: require 0 key Secret key functions: require 1 key Public key functions: require 2 keys

6 Secret key (symmetric) cryptography Given: –Alice and Bob agree on a secret key cryptosystem. –Alice and Bob agree on a key (secret). Encryption and decryption using the key. –M --> E K (M) --> D K (E K (M)) --> M Problems: –Keys must be distributed in secret. –Compromising keys means compromising all aspects of security. –The number of keys is not scalable to the user population size.

7 Secret key cryptography algorithms Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), and Advanced Encryption Standard (AES) Example: an 64-bit DES –There is no mathematical proof that DES is secure. –Two techniques used: confusion and diffusion. –The only approach is to search the entire key space. When more than 64 bits are required, use a cipher block chaining (CBC). –The ciphertext for block i is XORed with the plaintext for block i+1 before running it through DES. –An initialization vector (IV) is used in lieu of the nonexisting block 0. –The IV is randomly generated by a sender and it is sent along with the encrypted message. Triple-DES, i.e., encrypt the data three times.

8 DES algorithm Initial permutation Round 1 Round 2 Round bit key Final permutation …

9 Cipher block chaining Block 1 IV DES Cipher 1 Block 2 DES Block 3 DES Block 4 DES + Cipher

10 Security uses of secret key cryptography Secrecy, authentication, and message integrity services Assumption: both client and server already share a secret key. Approach: –Each side generate a random number encrypted with the secret key. –See whether the other side can decrypt it. Successful if CHK = SHK (client and server handshaking keys) SK: Session key

11 Secret key based authentication This approach is based on a trusted third party (authenti- cation server), e.g., Kerberos protocol. Assumptions: A shares a secret key with S, and so is B with S. Notations in the messages: –T: Timestamp –L: Lifetime –K: Session key for A and B –K A, K B : A’s secret key shared with S and B’s secret key shared with S, respectively. –A, B: The participants’ identities ASB E (( T, L, K, B ), K A E (( A, T ), K E (( T, L, K, A ), K B ) A, B E ( T + 1, K ) E (( T, L, K, A ), K B )

12 Secret key based message integrity Produce a small, fixed-sized “checksum” based on the message under protection. –This cryptographic checksum is referred to as message integrity code (MIC) or message authentication code (MAC). E.g., apply the DES with CBC to the message, and then to use the CBC residue as the message integrity code (MIC). –The residue is the last block of the CBC output. –The plaintext message plus the MIC would be sent to the receiver. –The receiver needs to reproduce the “checksum” and compares it with the MIC.

13 Hash functions A hash, or message digest, is a one-way function that produces a short, fixed-sized output. Properties: –One-way functions are relatively easy to compute, i.e., given x and compute h(x). –However, given h(x), it is significantly harder to compute x. –It is computationally infeasible to find two inputs that hash to the same value. Provide mainly message integrity service, and help in generating digital signatures.

14 Hash algorithms Message Digest (MD-n, n = 1, …, 5), and Secure Hash Algorithm (SHA-1) Transform Initial“digest” (constant) Message (padded) Transform 128-bit Message digest 512 bits … …

15 Keyed message integrity protocols Just hash a message under protection is inadequate. Message integrity protocols can be based on secret key encryption. –Assume that Alice and Bob share a secret key k. –Alice sends M + MD5(M + k), where + refers to the concatenation of two messages. –Bob applies MD5 to M + k, and compares it with the MIC. Message integrity protocols can be based on public key encryption. –Alice sends M + MD5(M + k) + E Pri(A) (k), where k is a random number picked by Alice. –Bob recovers k by D Pub(A) (E Pri(A) (k)).

16 Public key (asymmetric) cryptography Given: –Alice and Bob agree on a public key cryptosystem. –Alice owns a pair of public key and private key, and Bob knows Alice’s public key, which is not a secret. Encryption using the public key and decryption using the private key. –Bob sends a message intended only for Alice to see. –M --> E Pub(A) (M) --> D Pri(A) (E Pub(A) (M)) --> M. Problems: –Public-key algorithms are slow. Symmetric algorithms are at least 1000 times faster. –Vulnerable to chosen-plaintext attacks.

17 Public key cryptography algorithms RSA (Rivest, Shamir, And Aldeman), Elliptic Curve Cryptography (ECC), ElGamal (ElG), Digital Signature Standard (DSS), Diffie-Hellman (DH) –RSA and ECC do encryption and digital signatures –ElG and DSS do digital signatures –DH allows an establishment of a shared secret. It is computationally hard to deduce the private key from the public key. –For example, the choice of the public and private keys in RSA is based on a multiplication of two large prime numbers.

18 Public key based authentication A picks a random number and encrypts it with B’s public key. Unlike the secret key approach, Bob only needs to remember its own private key for authentication. Moreover, Alice does not need to keep any secret in order to verify Bob. AB E ( x, Public B ) x

19 Digital signatures Digital signatures, similar to handwritten signatures, are used as a proof of authorship. A digital signature is a special case of an MIC, where the code can only be generated by the authorized participant. The digital signatures must be –verifiable, –nonforgeable, –unalterable, –not reusable, and –nonrepudiable.

20 Public key based digital signatures Private key algorithms cannot achieve the nonrepudiable objective. To digitally sign a document using RSA, a sender uses its private key to produce the signature, and the receiver uses the public key to verify it. –In RSA, both the private key and public key can be used for encryption (not with DSS). –Alice encrypts M using its private key: E Pri(A) (M). –Alice sends M and E Pri(A) (M) to Bob. –Bob decrypts M using Alice’s public key, D Pub(A) (E Pri(A) (M)), and compares the result with M.

21 RSA digital signatures Verifiable (use Alice’s public key) Nonforgeable (only Alice has the private key) Unalterable (do not produce the same document) Not reusable (pertain to that document), and Nonrepudiable

22 RSA digital signatures with MD5 In practice, public key algorithms are too slow to sign long documents, and the signature is also too long. Instead of signing the whole document, a sender signs the checksum produced by a hash function, such as MD5. –Alice signs the hash value of the document and send M + E Pri(A) (MD5(M)). –Bob computes the hash by running MD5(M). –Bob decrypts E Pri(A) (MD5(M)). –Bob compares MD5(M) and D Pub(A) (E Pri(A) (MD5(M))).

23 Digital signatures with encryption The security of encryption can be combined with the authenticity of digital signatures. –Alice signs a message M and sends S A (M), where the signing can be based on any method discussed before. –Alice encrypts the signed message with Bob’s public key: E Pub(B) (S A (M)). –Bob decrypts the received message: D Pri(B) (E Pub(B) (S A (M))). –Bob verifies the signed message S A (M). Signing before encrypting is a prudent practice. –You know what you are signing. –Signatures cannot be removed from an encrypted message.

24 Remaining issues For the private key approach, how does a pair of participants generates and manages their shared secret key? –Use RSA key exchange with digital signatures. –Diffie-Hellman key exchange For the public key approach, how can one obtain another’s true public key or how can one reliably advertise one’s public key to others? –Digital certificates –Certification authority (a trusted third party approach)

25 Internet security IP layer: IP security (IPSec)---Encapsulating Security Payload (ESP) and Authentication Header (AH) –AH mainly provides access control, connectionless message integrity, and anti-replay protection. –ESP, in addition to the services provided by AH, provides also secrecy. Transport layer: Secure Socket Layer (SSL) and Transport Layer Security (TLS) –Provide secrecy and message integrity between two communicating applications. –This is a generic security protocol supporting any applications, for example, HTTP/TLS/TCP.

26 Internet security Application-specific: –SET for payment-card transactions –Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP) for security –Secure HTTP (S-HTTP) for WWW (RFC 2660) –DNSSEC for DNS Others: –Multicast group security –Multimedia security –Mobile and wireless network security –Enterprise security (virtual private network) –Remote access security

27 Acknowledgments This set of notes is based on –C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in Public World, Second Edition, Prentice Hall PTR, –L. Peterson and B. Davie, Computer Networks: A Systems Approach, Morgan Kaufmann, –B. Schneier. Applied Cryptography, Second Edition, Wiley, 1996.