Download presentation
Presentation is loading. Please wait.
Published byDarcy Jackson Modified over 9 years ago
1
INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEM BY ANTHONY GABRIELSON HAIM LEVKOWITZ Mohammed Alali | CS 69995 – Dr. RothsteinSummer 2013
2
Content Introduction Problems with the current implementation Third part libraries Proposed solution Operating system integration Network layer exploitation TCP/UDP enhancement More details. Advantages Disadvantages Conclusion
3
Introduction Cryptography is essential in today’s network communications. Most of OS’s today are “natively” lacking (development wise). Currently deployed cryptography implementations are often not secure. General-purpose network cryptography library is needed.
4
The current approach Third-party libraries: SSL Kerberos PGP Many others.
5
The current approach: problems Inflexibility: Non-intuitive. Difficult to use (Steep learning curve.) Diverse implementation Compatibility: Servers and clients have to match Security: Many security flaws Design flaws: “4 a.m. design decisions.”
6
The current approach: problems As a result, developers tend to Incorrectly implement them, or Avoid them. “In either case, security is compromised.”
7
Proposed solution The authors introduce and define: A new general-purpose network cryptography library that integrates directly with the Operating System. They argue that the best place for cryptography to be implemented is at the Operating System level rather than the current application-layer approach.
8
Proposed solution: OS Integration I Currently developers must directly link their application to a cryptography library to enable secure communication.
9
Proposed solution: OS Integration II The proposed solution is the general-purpose network cryptography that integrates with the OS’s kernel.
10
Proposed solution: Network stack exploitation I Both transport and internet layers are utilized. From the Internet Layer: Host info found in IP header is utilized to lookup cryptography keys. From host info, only “Destination Address” is need. No changes needed to Internet Layer. IP Host Info TCP/UDP Port Info
11
Proposed solution: Network stack exploitation II From the Transport Layer: Port info found in TCP header is utilized to lookup cryptography keys. From Port info, only “Destination Port” is need. So both “Destination Address + Destination Port” are needed for cryptography keys lookup. Transport layer needs to be changed to natively support cryptography.
12
Proposed solution: TCP/UDP Enhancements I Transport Layer (TCP/UDP) needs to be evolved: Appending cryptography in the TCP header. The new fields to be added (Taken from PGP header) :
13
Proposed solution: TCP/UDP Enhancements II TCP will also require an additional modification to streamline the key transfer process. The three-way handshake TCP uses can be enhanced to also transmit cryptography primitives. OriginatorDestination
14
Proposed solution: More details The system described in this paper works with the Encryption Key System (EKS). This system creates a chain of trust with a priori knowledge that is used to securely lookup keys. The system leverages two distinct IDs to enable more security (DNS and EKS lookup). This system also leverages a novel technique they called: “port-based sandboxing.” enables the use of separate key pairs for individual services and users.
15
Advantages 1. Shifts community focus. More security More flexibility. 2. Offers smaller number of implementations which means fewer potential issues. 3. Easier for developers to use w/ existing socket API 4. Port-aware library supporting existing protocols. 5. Always up-to-date – same way w/ network sockets. 6. Available out of the box.
16
Disadvantages 1. Each host on the network requires a priori information, i.e., the EKS servers IP address and public key. How to securely transfer the server’s public key? 2. Certain types of protocols, like components of email, will need to be updated. 3. Some applications would require small changes while other would require larger changes.
17
Conclusion A general-purpose cryptography library has been proposed. It is the only way to resolve the security and flexibility problems currently being experienced on the Internet. It provides a unified library that is easier to adopt by developers. It complements the existing transmission protocols; it does not replace them.
18
Thank you
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.