Download presentation
Presentation is loading. Please wait.
Published byJaden Neaves Modified over 9 years ago
1
Customized Network Security Protocols Cristina Nita-Rotaru and Jeffrey Seibert SPONSORED BY DOUBLE-TAKE SOFTWARE (Jan. 2009 - July 2009) Department of Computer Science and CERIAS Purdue University
2
Jeffrey SeibertSERC Fall 2009 Showcase3 Security Goals for Network Protocols Confidentiality Authentication Integrity Non-repudiation Access control Availability Replay protection A network protocol defines rules: - Syntax (how) - Semantics (what) - Synchronization (when)
3
Jeffrey SeibertSERC Fall 2009 Showcase4 Communication Patterns Point-to-point One-to-many Many-to-one Many-to-many Reliable communication Unreliable communication
4
Jeffrey SeibertSERC Fall 2009 Showcase5 Menu of Secure Protocols Authentication+integrity+ confidentiality IPSEC: IP routing layer SSL/TLS: transport for reliable communication DTLS: transport for unreliable communication Kerberos: access control for network services
5
Jeffrey SeibertSERC Fall 2009 Showcase6 The Problem The available set of secure protocols and the services they provide do not match the security and performance requirements of various applications ``One solution fits all’’ is not good enough
6
Jeffrey SeibertSERC Fall 2009 Showcase7 The Goals of This Project Identify specific security goals for Double -Take Software protocols Customize to meet performance and management requirements Integrate the protocol with their product
7
Jeffrey SeibertSERC Fall 2009 Showcase8 Customizable Features Key management Authentication + integrity Authentication + integrity + confidentiality
8
Jeffrey SeibertSERC Fall 2009 Showcase9 End-to-end secure channel, providing: confidentiality, integrity, authentication, replay protection Defines how the characteristics of the channel are negotiated: key establishment, encryption cipher, authentication mechanism Requires reliable end-to-end protocol, so it runs on top of TCP Several popular open source implementations (www.openssl.org) Overview of TLS
9
Jeffrey SeibertSERC Fall 2009 Showcase10 TLS: Protocol Architecture Authentication, Confidentiality Integrity come as a package
10
Jeffrey SeibertSERC Fall 2009 Showcase11 Our Approach Leverage TLS to provide a wider menu choice of services and cryptographic algorithms: Integrity only Integrity + authentication Integrity + authentication + confidentiality Evaluation of cost of each service for all protocol choices
11
Jeffrey SeibertSERC Fall 2009 Showcase12 Why OpenSSL Long development history Good performance Allows immediate support of all cryptographic protocols supported by OpenSSL For example: Hash: MD5, SHA1, SHA256 Digital signatures: RSA, DSA, ECC Symmetric encryption: 3DES, Blowfish, RC4, AES
12
Jeffrey SeibertSERC Fall 2009 Showcase13 We implemented a new interface based on OpenSSL Platform: Intel(R) Pentium(R) 4 CPU 3.4 GHz GenuineIntel GNU/Linux Two computers in a 1Gbps LAN Evaluate: Throughput Handshake latency Experimental Evaluation Platform
13
Jeffrey SeibertSERC Fall 2009 Showcase14 Integrity-Only
14
Jeffrey SeibertSERC Fall 2009 Showcase15 Confidentiality and Data Integrity:RC4
15
Jeffrey SeibertSERC Fall 2009 Showcase16 Confidentiality and Data Integrity: AES128
16
Jeffrey SeibertSERC Fall 2009 Showcase17 Confidentiality and Data Integrity:AES256
17
Jeffrey SeibertSERC Fall 2009 Showcase18 Confidentiality and Data Integrity: Blowfish
18
Wide Area Network Experiments Transfer data between hosts at Purdue University and Washington University Purdue University: Intel(R) Pentium(R) 4 CPU 3.4 GHz GenuineIntel GNU/Linux Washington University: Intel(R) Pentium(R) 4 CPU 3.2 GHz GenuineIntel GNU/Linux Attempt to push as much data as possible over Internet Evaluate: Throughput Handshake latency Jeffrey SeibertSERC Fall 2009 Showcase19
19
Jeffrey SeibertSERC Fall 2009 Showcase20 Integrity-Only (WAN)
20
Jeffrey SeibertSERC Fall 2009 Showcase21 Confidentiality and Data Integrity:RC4 (WAN)
21
Jeffrey SeibertSERC Fall 2009 Showcase22 Confidentiality and Data Integrity: AES128 (WAN)
22
Jeffrey SeibertSERC Fall 2009 Showcase23 Confidentiality and Data Integrity:AES256 (WAN)
23
Jeffrey SeibertSERC Fall 2009 Showcase24 Confidentiality and Data Integrity: Blowfish (WAN)
24
Jeffrey SeibertSERC Fall 2009 Showcase25 Handshake Protocol
25
Jeffrey SeibertSERC Fall 2009 Showcase26 Handshake Configurations RSA (1024) Key exchange and message signing are done with RSA ECDH-ECDSA (161) Key exchange is done with ECDH Message signing is done with ECDSA ADH (1024) Key exchange is done with DH No message signing is done DH-DSA (1024) Key exchange is done with DH Message signing is done with DSA
26
Jeffrey SeibertSERC Fall 2009 Showcase27 TLS Handshake
27
Jeffrey SeibertSERC Fall 2009 Showcase28 TLS Handshake (WAN)
28
Jeffrey SeibertSERC Fall 2009 Showcase29 Summary Security comes at a cost: Complexity Communication cost Computation cost Trade-offs between performance, security goals, and manageability Customized secure protocols Leveraging existing protocols Meet performance and management requirements
29
Jeffrey SeibertSERC Fall 2009 Showcase30 We are looking forward to other practical projects where we can contribute our expertise in secure messaging systems (resilient to outsiders and insiders) Replication systems Unicast and multicast routing in wireless networks Group communication systems P2P streaming and multicast overlays
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.