Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties Jari Arkko & Pekka Nikander Presented by Riku Honkanen.

Slides:



Advertisements
Similar presentations
Authentication and Key Agreement – Flexibility in credentials – Modern, publically analysed/available cryptographic primitives – Freshness guarantees –
Advertisements

Internet Protocol Security (IP Sec)
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Authentication Trustworthiness The Next Stage in Identity-Based Access and Security Tom Board, NUIT.
Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Modelling and Analysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
IEEE Wireless Local Area Networks (WLAN’s).
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Applied Cryptography for Network Security
Key Distribution CS 470 Introduction to Applied Cryptography
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Introduction to Public Key Cryptography
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 11: Strong Passwords
Module 5: Configuring Access for Remote Clients and Networks.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Denial-of-Service, Address Ownership,and,Early Authentication in IPv6 World (An Approach) Aditya Vutukuri From article by Pekka Nikander Ericsson Research.
T Network Application Frameworks and XML Security and Naming Sasu Tarkoma Based on slides by Pekka Nikander.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Privacy and Authentication for Wireless LAN 1 Privacy And Authentication for Wireless Local Area Networks Ashar Aziz Whitfield Diffie Sun Microsystems,
Potential vulnerabilities of IPsec-based VPN
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
Azam Supervisor : Prof. Raj Jain
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Web Applications Security Cryptography 1
Virtual Private Network
Timing Analysis of Keystrokes And Timing Attacks on SSH
Presentation transcript:

Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties Jari Arkko & Pekka Nikander Presented by Riku Honkanen

Presentation Outline ”Cryptographically strong authentication between previously unknown parties without relying on trusted third parties” Why weak authentication? Weak authentication techniques –Classification –Concrete techniques –Technique Analysis Economic impacts & probabilities

If there are no real-world identities/effects Imperfect security is sometimes enough Higher cost of strong authentication Current & potential applications: –Personal area networks –Secure Shell (SSH) –Session Initiation Protocol (SIP) –Multi-homing –Mobilitity Why Weak Authentication?

Spatial Separation –Ensuring that the peer is on a certain path Temporal Separation –Peers relate past & current communications Asymmetric Costs –Cost of attack is higher than cost of defense Application Semantics –Cryptographic properties of identifiers Technique Categories (1/2)

Combined and Transitive Techniques –The mentioned categories can be combined for improved security Time and location as main dimensions Technique Categories (2/2) Time Location One time use Same peer Same peer, different location Over a specific path

Concrete Techniques Anonymous Encryption - temporal –e.g. unauthenticated Diffie-Hellman secures a single session Challenge-Response - spatial –Freshness and peer on a certain path Leap-of-Faith – temporal, spatial, asymmetric cost –Unauthenticated at start of first connection –Following connections authenticated Cryptographically Generated Addresses – spatial & application Opportunistic IPSec

Anonymous Encryption –Vulnurable for man-in-the-middle attack in the beginning of the session –Benefits community more than a single user Challenge-Response –Probability of a certain path having an attacker Leap-of-Faith –Uncertainty gets smaller when number of connections increases between specific peers Technique Analysis

Economic Impacts & Probabilities Cost of attack vs. cost of defense –Weak authentication may be enough to raise the cost of the attack to multiples of cost of the defense Probability of the attack –Weak authentication may lower the probability of an attacker being present significantly Economics and probabilities should be understood before application protocol design

Weak authentication is good enough for some applications Basic WA techniques can provide significant advantage with low cost Importance of uncertainty, probability and economic impact analysis –the results may be surprising Summary