The Use of System Security Description Method in Security Design Assessment: A Case Study Tsukasa Maeda, Masahito Kurihara Graduate School of Information.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Cryptographic Security CS5204 – Operating Systems1.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Grid Security. Typical Grid Scenario Users Resources.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Cryptography and Network Security Chapter 17
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Chapter 8 Web Security.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Chapter 20: Network Security Business Data Communications, 4e.
Web services security I
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Masud Hasan Secue VS Hushmail Project 2.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
Lecture 11: Strong Passwords
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI Wade Trappe.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Module 9: Fundamentals of Securing Network Communication.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Computer and Network Security - Message Digests, Kerberos, PKI –
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Fall 2006CS 395: Computer Security1 Key Management.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Web Applications Security Cryptography 1
Grid Security.
Secure Sockets Layer (SSL)
Basic Network Encryption
The Secure Sockets Layer (SSL) Protocol
Key Management Network Systems Security
Basic Network Encryption
Presentation transcript:

The Use of System Security Description Method in Security Design Assessment: A Case Study Tsukasa Maeda, Masahito Kurihara Graduate School of Information Science and Technologies Hokkaido University

Difficulty in developing secure systems HARD TO FIND  It is difficult to discover threats and vulnerabilities hidden behind the complex structure of a system Many system components HARD TO DESCRIBE  There is the difficulty of communications between various stakeholders of a system. Hard to express security properties Security expertise needed to analyze system security

Digital Right Management System Content Distribution License Request License CP UD LS Contents Providers (CPs): create content and distribute copies of them to the public. User devices (UDs): obtain content, purchase the licenses (right to use), and use or otherwise access the content. Mobile phones, game devices, and media players are examples of UDs. License server (LS): sells licenses to users who use UDs.

Solution: New Description Method Easy to depict weakness of system  Weak system components are replaceable Easy to express security properties  Description with abstract security services Confidentiality, authenticity  Description with single type of simple object Entity

Description Method: Building Block system : = {e 1, e 2,..., e k } ; e j is an entity entity : =(Identity, Secret, Credentials, Trust, Adjacency) Execution Entity Execution Entity Link Entity Type of Entity An execution entity is an object that performs information processing while interacting with other execution entities. A link entity is a virtual entity that models a communication channel established by a cryptographic protocol such as SSL/TLS and Kerberos between two interacting execution entities.

Entity Identity Secret Trust Credentials Adjacency Name to identify this entity Secret information for being authenticated Ex. passcode, private key, symmetric key Processes to generate information being given to entities authenticating this entity Ex. hash of passcode, signature, encrypted data Processes to receive information and verify it to authenticate other entities Entities adjacent to this entity Secret has strength. Ex. RSA 1024bits key ⇒ 128bits symmetric key AES 128bits key = 128bits symmetric key password ≒ 60 bits entropy *1 no secret = 0 ( ⊥ ) *1:NIST SP

Configuring A Link Entity AB Link X A Secret Trust for B Credentials to B X A,B B Secret Trust for A Credentials to A E(m)kE(m)k k E(m)kE(m)k Trust for B E(m) k Trust for A E(m) k Copy of Trust for B Copy of Trust for A XX

The Entity Combination Rule A Secret Credentials to B Trust for B B B Secret Credentials to A Trust for A A Two entities adjoined each other can be combined to form a single entity if 1.identities should be validated by each other on every data transfer, 2.Both entities have comparable strength strong enough to satisfy security requirements of the system, and 3.Credential elements to be given to each other for authentication have real-time factors in their input. Secret Credentials to B Credentials to A Trust for ATrust for B A,B Secret A,B

SSL Example1: Web Access ABC Step 1. Identifying execution entities in the system and diagramming them in a chart. A: User B: Browser C: Web Server

Step 2. Determining the SECRET, CREDENTIAL and TRUST elements of the execution entities Trust Identity Credential Adj Secret Example: Web Access Step 3. Specifying the link entities CAB PW ⊥ K pri PW ⊥  (K pri,r)  B.A ( ⊥ )  B.C (K pub,r)  A.B ( ⊥ )  A.C ( ⊥ )  C.A (PW)  C.B ( ⊥ ) XD Ks,KcKs,Kc ⊥ E(m) Ks, E(m) Kc ⊥ Step 4. Configuring the link entities XX,DDB,C A,B  D.C (K pub,r)  D.B ( ⊥ )  X.B ( ⊥ )  X.A ( ⊥ )  C.A (PW)  C.B ( ⊥ )  C.D (K c )  D.C (K pub,r)  D.B ( ⊥ )  (K pri,r)  B.A ( ⊥ )  B.C (K pub,r)  B.D (K s )  A.B ( ⊥ )  A.C ( ⊥ )  X.B ( ⊥ )  X.A ( ⊥ ) Step 5. Applying the combination rule; E K pri,K s,K c  E.A (PW)  E.B ( ⊥ ) B  (K pri,r), E(m) Ks, E(m) Kc Threats: Replaceable entities Weak secrets Not kept being validated by any non-replaceable entities Credential elements are replicable Risks: The possibility of replacing entities Measuring possibilities and taking suitable actions

A Case Study: Digital Right Management System Content Distribution License Request License CP UD LS Contents Providers (CPs): create content and distribute copies of them to the public. User devices (UDs): obtain content, purchase the licenses (right to use), and use or otherwise access the content. Mobile phones, game devices, and media players are examples of UDs. License server (LS): sells licenses to users who use UDs. Content package := S(E(CEK) KLSP ) KCPS || E(m) CEK License Request := S(E(CEK) KLSP ) KCPS (Sending the header) License := CEK (Receiving decrypted CEK)

Modeling Contents Distribution UDCP UIDK CPS  UD.LS (UID,r)  CP.LS (K LSP ) Content Package LS K LSS,UID  LS.UD (UID,r)  LS.CP (K CPP ) Secret Trust UCP K LSS K CPS CEK  M.CP (K CPP )  M.U (K LSP ) M Credential:  (K CPS ) =  U.CP (K CPP )  U.M (CEK,m)  CP.M (CEK,m)  CP.LS (K LSP ) Content package := S(E(CEK)KLSP)KCPS || E(m)CEK

Combining All Entities U K LSS  U.V (CEK,m) CEK , K CPS  V.U (K LSP )=  V.U (CEK) V Credential:  (K LSS ) =CEK All entities are combined and form a single entity. A Secure System

Challenge Can we make trust management dynamic?  Transitional Trust  Dynamic Trust Allocation

Thank you.

Description Method: Security Objectives Confidentiality of data and system information Integrity of system and data Availability of systems and data for intended use only 1. Trusted entities are believed to meet these objectives 2. The combination rule preserves them.

Example2:OTP EAB PW ⊥ K pri,K s,K c  B.A ( ⊥ )  A.C ( ⊥ )  B.A ( ⊥ )  B.E (K pub,r)  B.E (K s ) BX,EX  (PW,t) ⊥  (K pri,r), E(m) Ks, E(m) Kc X ⊥ ⊥  X.B ( ⊥ )  X.A ( ⊥ ) A,B  E.A (  (PW,t))  E.B ( ⊥ ) Threats: Relaceable entities Not kept being validated by any non- replaceable entities Weak secrets Credential elements are replicable