Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

By Md Emran Mazumder Ottawa University Student no:
Advanced Security Constructions and Key Management Class 16.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Sri Lanka Institute of Information Technology
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Security Issues In Sensor Networks By Priya Palanivelu.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
1 Chap 1: Introduction Some background –The message is usually represented as M or P (plaintext), the encryption result is usually represented as C (ciphertext).
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Network Security Sorina Persa Group 3250 Group 3250.
Security Introduction Class February Overview  Security Properties  Security Primitives  Sample Protocols.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
Information Security Principles (ESGD4222)
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
I-4 security.
Key Management in Mobile and Sensor Networks Class 17.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Cryptography, Authentication and Digital Signatures
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security David Lazăr.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Computer Communication & Networks
SPINS: Security Protocols for Sensor Networks
Security Of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Security of Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

Security Review Q&A Session May 1

Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class 4 Key Management  Class 5 Secure Code Execution

Class 1 Security Overview  What is Security?  Attacker Model  Readings Mitigating Routing Misbehavior Sybil Attack Insecurity

What is Security?  Managing a malicious adversary  Guaranteeing properties in the presence of a determined malicious adversary  Basic security properties Authenticity Integrity Confidentiality Availability  Trust assumptions & security mechanisms & attacker model give security properties

Attacker Model  Passive & active attackers  Active attack examples Node compromise Denial-of-service attacks  Wired communication environment Eavesdropping possible Packet injection (source address spoofing) easy  Wireless communication environment Eavesdropping easy Packet injection (source address spoofing) easy Sybil attack Jamming attack

Sample Exam Questions  Mitigating Routing Misbehavior What are the challenges for using IDS in ad hoc networks to detect selfish nodes?  Sybil Attack How could we use the Sybil attack against system X?  Insecurity What is the danger of re-using the same pseudo-random stream to encrypt different messages with a stream cipher?

Class 2 Security Introduction  Security Properties  Security Primitives  Readings SPINS Payword and MicroMint

Security Properties  Confidentiality (secrecy) Eve cannot get any information Semantic security – Even if Eve knows plaintext/ciphertext pairs, she cannot learn any new information  Integrity Prevent modification  Authentication Prevent impersonation Bob knows that Alice sent message

Security Properties (cont)  Non-repudiation Alice cannot deny having created message  Freshness Bob knows that Alice’s message is recent Replay protection – Mallory cannot replay Alice’s messages

Security Primitives  Asymmetric (public-private key) Diffie-Hellman key agreement Public-key encryption Digital signature  Symmetric (shared-key, same-key) Block cipher (pseudo-random permutation PRP) Stream cipher (pseudo-random generators PRG) Message authentication code (MAC)  Others (unkeyed symmetric) One-way function Cryptographic hash function

Sample Exam Question  Bob and Carol want to authenticate information broadcast by Alice. Alice sets up a key K, sends it to Bob and Carol, and uses K to compute a MAC on each message she broadcasts. Is this secure?

Class 3 Advanced Security Constructions  One-time signatures  Merkle hash trees  Readings Stream Signatures Zhou and Haas key management

One-time Sig Construction  Uses 1-bit signature construction to sign multiple bits S0 P0 Bit 0Bit 1Bit 2Bit n S0’ P0’ S0’’ P0’’ S0* P0* … c0 p0 c0’ p0’ c0* p0* … Bit 0Bit 1Bit log(n) Sign messageChecksum bits: encode # of signature bits = 0

Sample Exam Question  How could we use one-way chains to solve problem X?

Class 4 Key Management  Key management scenarios Closed networks, centralized deployment (trusted authority controls and deploys nodes) – All-pairs shared keys, or all public keys – PKI, TTP (Kerberos, SPINS) – Zhou & Haas threshold key management – Randomkey predistribution Open networks, autonomous deployment – Resurrected duckling – PGP web of trust – Key infection

Sample Exam Question  Given a deployment scenario Y, what are the tradeoffs for using key distribution technique X?

Class 5 Secure Code Execution  Techniques for securing mobile code execution Process separation Code signing Sandboxing Software Fault Isolation (SFI) Proof-Carrying Code (PCC)

Sample Exam Questions  Open book: why is the address sandboxing technique in SFI not secure if we only use 4 registers? How could we fix it to make it secure with 4 registers?  Closed book: what are the tradeoffs for using technique X to secure mobile code in environment Y?