0. Course Overview. Architecture models; network architectures: OSI, Internet and LANs; interprocess communication

Size: px
Start display at page:

Download "0. Course Overview. Architecture models; network architectures: OSI, Internet and LANs; interprocess communication"

Transcription

1 0. Course Overview I. Introduction II. Fundamental Concepts of Distributed Systems Architecture models; network architectures: OSI, Internet and LANs; interprocess communication III. Time and Global States Clocks and concepts of time; Event ordering; Synchronization; Global states IV. Coordination Distributed mutual exclusion; Multicast; Group communication, Byzantine problems (consensus) V. Distribution and Operating Systems Protection mechanisms; Processes and threads; Networked OS; Distributed and Network File Systems (NFSs) VI. Peer to peer systems Routing in P2P, OceanStore, Bittorrent, OneSwarm, Ants P2P, Tor, Freenet, I2P VII. Security Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets Distributed Systems Fall 2009 VII 1

2 Computer Security Security Objective abstract requirement to be met by system examples confidentiality of word/data protection from loss Security Policy organizational guidelines established in order to achieve security objectives example access to building only allowed for regular employees or registered visitors Security Mechanism technical mechanism used to implement security policies badges front desk clerk Distributed Systems Fall 2009 VII 2

3 Computer Security Security Threats leakage eavesdropping masquerading message tampering replaying denial of service Distributed Systems Fall 2009 VII 3

4 Computer Security Challenges in the Design of Secure Distributed Systems insecurity of open networks (like Internet) forgery: message sources can be modified address spoofing : Mallory (impostor) can pretend to be Alice and receive messages destined for her cryptographic algorithms widely distributed don t rely on own secret cryptographic algorithm the best cryptographic algorithms are usually in the public domain, there is even source code publicly available (c.f. [Schneider]) rely on secrecy of cryptographic keys instead! large computing resources available to everyone in particular to attackers example: distributed code hacking attempts via distributed background computation trusted base minimize the availability of secrets be sceptical e.g., don t trust Java VM s protection mechanisms when implementing security Distributed Systems Fall 2009 VII 4

5 Computer Security Some examples of Security Problems in Distributed Systems secrecy of contents authentication of sender e commerce payment for goods and services on the web authenticate vendor to buyer ensure privacy of payment information (e.g., credit card number) Access to restricted information stored in databases Security mechanisms need to be provided at reasonable cost Distributed Systems Fall 2009 VII 5

6 Computer Security invocation Access rights Object Client result Server Principal (user) Network Addison-Wesley Publishers 2000 Principal (server) Processes and Principals client server interactions each client/server interaction has an authorized user or process that invokes the request, or receives the results these processes or users are called principals central problem to computer security authentication of principals use or secure channels Distributed Systems Fall 2009 VII 6

7 Computer Security Principal A Principal B Process p Secure channel Process q Addison-Wesley Publishers 2000 Secure Channels each process knows identity of principal on behalf of whom peer process is executing ensures privacy and integrity of data transmitted there is a protection mechanism against replaying or reordering of messages, usually a sequence number or time stamp Distributed Systems Fall 2009 VII 7

8 Cryptography Protagonists Alice Bob Carol Dave Eve Mallory Sara First participant Second participant Participant in three- and four-party protocols Participant in four-party protocols Eavesdropper Malicious attacker A server Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 8

9 Cryptography Notation K A K B K AB K Apriv K Apub {M} K [M] K Alice s secret key Bob s secret key Secret key shared between Alice and Bob Alice s private key (known only to Alice) Alice s public key (published by Alice for all to read) Message M encrypted with key K Message M signed with key K Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 9

10 Cryptography Basic Concepts encoding of information so that content is hidden from naïve third party keys parameter of encoding and decoding process decoding cannot be obtained without knowledge of a suitable key notation: encryption for message M using key K E(K, M) = {M} K pair of keys K 1 and K 2 is called cognate, if D(K 1, E(K 2, M)) = M symmetric, if cognate and K 1 = K 2 asymmetric, if cognate and K 1 K 2 Distributed Systems Fall 2009 VII 10

11 Cryptography Basic Concepts shared secret keys symmetric cryptography same key used for encoding and decoding sender and receiver share knowledge of key key not revealed to third party public/private keys asymmetric cryptography different keys used for encoding and decoding sender encodes message using recipient's public key recipient decodes message using her/his private key Distributed Systems Fall 2009 VII 11

12 Cryptography Basic Concepts symmetric cryptography, one way property: F k ([M]) := E(K, M) and D(K, {M} K ) are easy to compute F 1 k ([M]) so hard to compute that it is practically infeasible naïve approach: given M, {M} K, try all possible values for K on M until {M} K is obtained example: DES requires 2 K tries at maximum 2 K 1 tries on average i.e., trial procedure is exponential in the length of K Distributed Systems Fall 2009 VII 12

13 Cryptography Basic Concepts asymmetric cryptography goal: avoid the need for trust no need to share secret key with communication partner trap door function: one way function with secret exit easy to compute in one direction infeasible to compute inverse unless a secret is known example (RSA) given two large prime numbers is root multiply prime numbers to yield key use key for encoding decoding impossible (factorization of primes) unless one of the primes given depends on safe sizes for N generally, computationally quite heavy Distributed Systems Fall 2009 VII 13

14 Cryptography plaintext blocks ciphertext blocks n+3 n+2 n+1 XOR n-3 n-2 n-1 n E(K, M) Addison-Wesley Publishers 2000 Cypher Block Chaining encoding of fixed length blocks attacker may infer key from repetitions cannot detect if message corrupted make one block depend on previous block use XOR indempotence: repeated application of XOR delivers original data (do second XOR at receiver before decryption) problem sending of same message to two recipients means identical cyphertext will be sent to both destinations eavesdropper may draw conclusions from this prepend randomly generated initialization string before every message Distributed Systems Fall 2009 VII 14

15 Cryptography keystream number generator n+3 n+2 n+1 E(K, M) buffer XOR plaintext stream Addison-Wesley Publishers 2000 ciphertext stream Stream Cypher continuous data streams, e.g., telephone samples of 8 bit length wasteful to fit into 64 bit block for encoding encryption algorithm encrypting one bit at a time keystream secure, arbitrary length sequence of bits obscuring the plaintext required to be able to decrypt ({M} K xor plaintext) at receipient in order to filter original stream use identical keystream and number generator at receipient to generate argument for XOR operation of ({M} K xor plaintext) works only for symmetric cryptography Distributed Systems Fall 2009 VII 15

16 Symmetric Cryptography void encrypt(unsigned long k[], unsigned long text[]) { unsigned long y = text[0], z = text[1]; 1 unsigned long delta = 0x9e3779b9, sum = 0; int n; 2 for (n= 0; n < 32; n++) { 3 sum += delta; 4 y += ((z << 4) + k[0]) ^ (z+sum) ^ ((z >> 5) + k[1]); 5 z += ((y << 4) + k[2]) ^ (y+sum) ^ ((y >> 5) + k[3]); 6 } text[0] = y; text[1] = z; 7 } Addison-Wesley Publishers 2000 Tiny Encryption Algorithm (TEA) components integer addition (4, 5, 6) bitwise logical shifts >> and << (5, 6), achieves diffusion hide repetition and redundancy in plaintext confusion combine each block of plaintext with key obscures relationship of blocks in M and {M} K avoids inferring key from character frequencies in text (c.f. German Enigma cypher machine: used one character blocks) Distributed Systems Fall 2009 VII 16

17 Symmetric Cryptography void decrypt(unsigned long k[], unsigned long text[]) { unsigned long y = text[0], z = text[1]; unsigned long delta = 0x9e3779b9, sum = delta << 5; int n; for (n= 0; n < 32; n++) { z -= ((y << 4) + k[2]) ^ (y + sum) ^ ((y >> 5) + k[3]); y -= ((z << 4) + k[0]) ^ (z + sum) ^ ((z >> 5) + k[1]); sum -= delta; } text[0] = y; text[1] = Addison-Wesley z; Publishers 2000 } Tiny Encryption Algorithm (TEA) components integer addition (4, 5, 6) bitwise logical shifts >> and << (5, 6), achieves diffusion hide repetition and redundancy in plaintext confusion combine each block of plaintext with key obscures relationship of blocks in M an {M}K avoids inferring key from character frequencies in text (c.f. German Enigma cypher machine: used one character blocks) Distributed Systems Fall 2009 VII 17

18 Symmetric Cryptography Data Encryption Standard (DES) developed at IBM, then ANSI standard (1977) encrypts 64 bit long plaintext in ciphertext of the same length uses 56 bit key encryption 16 rounds of bit rotation, number of bits to be rotated determined by key plus 3 key independent transpositions fast if implemented in VLSI hardware DES was cracked first in 1997 brute force attack based on a plaintext/cyphertext sample cracked key to be used to decrypt challenge message set of up to Internet users who allowed decoding processes to run in background on their computers each had computing power comparable to a 200 MHz Pentium Processor key discovered after about 12 days, after 25% of the possible 2 56 (6*10 16 ) values had been explored second attack 1998 on dedicated hardware successful after three days DES with 56 bit can be considered obsolete triple DES : E 3DES (K 1, K 2, M) = E DES (K 1, D DES (K 2, E DES (K 1, M))) comparable to a key with 112 bit Distributed Systems Fall 2009 VII 18

19 Symmetric Cryptography International Data Encryption Algorithm (IDEA) uses 128 bit key to encode 64 bit blocks (block cipher) uses both confusion and diffusion based on algebra of groups, depending on key, eight rounds of XOR additon modulo 2 16 mutiplication modulo like DES, uses same function for encoding like for decoding allows for efficient hw implementation no major weaknesses known to date Advanced Encryption Standard (AES) proposed by NIST in the US selected algorithm (October 2000): Rijndael (Daemen and Rijmen) iterated block cipher algorithm variable block and key lengths both of which can be independently specified as being of 128, 192 and 256 bits in length see likely to become the most heavily used symmetric algorithm Distributed Systems Fall 2009 VII 19

20 Asymmetric Cryptography Principle cognate pair of keys K e and K d for secure communication produce K e and K d keep K d as secret publish K e sender can send {M} K e only authorized receipient can decode {M} K using trap door e Rivest, Shamir and Adleman (RSA) Algorithm (1978) principle encoding: multiplication of very large prime numbers decoding: division (trap door function) without knowledge of secret key this would amount to factorization of very large numbers, computationally impossible Distributed Systems Fall 2009 VII 20

21 Asymmetric Cryptography Rivest, Shamir and Adleman (RSA) Algorithm (1978) choose prime numbers P, Q > form N = P*Q Z = (P 1) * (Q 1) choose d a number that has no common factors with Z (other than 1) find e by solving e*d = 1 mod Z i.e., e is smallest element divisible by d in the series Z+1, 2Z+1,... to encrypt, use plaintext blocks of equal length k bits such that 2 k < N (k in practice usually between 512 and 1024) E (e, N, M) = M e mod N to decrypt ciphertext block c D (d, N, c) = c d mod N it has been proven that E and D are mutual inverses Example with small numbers P = 13, Q = 17 N = 221 Z = 192 d = 5 e*d = 1 mod 192 = 1, 193, 385, is divisible by d = 5 e = 385 / 5 = 77 k = 7 (2 7 = 128 < 221) ciphertext = M 77 mod 221 plaintext = ciphertex 5 mod 221 Distributed Systems Fall 2009 VII 21

22 Asymmetric Cryptography Rivest, Shamir and Adleman (RSA) Algorithm (1978) K e = <e, N> key for encryption function K d = <d, N> key for decryption function security argument recipient must publish K e does not compromise security of d, since determination of d depends on original prime numbers P and Q can only be obtained through factorization of N complexity of factorization equivalent to cracking of code 1978: Rivest et al. predicted factoring number as large as would take four billion years today, numbers of 155 digits (corresponds to 500 binary digits) have been successfully factorized consider 512 bit key length not entirely secure RSA Corp. recommends key lengths of at least 768 bits (230 digital digits) for long term (~20 years) security keys of up to 2048 bits are used in some applications Distributed Systems Fall 2009 VII 22

23 Asymmetric Cryptography Rivest, Shamir and Adleman (RSA) Algorithm (1978) chosen plaintext attack public key available to attackers use public key to encode arbitrary bit strings until they match observed ciphertext infer private key counter measure make sure all messages are at least as long as key attack at least as heavy as direct attack on key Distributed Systems Fall 2009 VII 23

24 Asymmetric Cryptography Hybrid Symmetric/Asymmetric Protocols asymmetric cryptography, i.e., RSA, is computationally extremely expensive, even for smaller message exchanges approach: combine asymmetric and symmetric protocols use public key cryptography to authenticate parties and exchange secret (session) keys afterwards, use exchanged session keys to en and decrypt application data example: ssl Distributed Systems Fall 2009 VII 24

25 Digital Signatures Objectives of Ink on Paper Signatures convinces recipient of document that (take with grain of salt...) signer, and nobody else but signer, deliberately signed document (authenticity of signature), and document was not altered since signing the signature was meant to be placed on this document, and no other document, since signatures cannot be copied the signer cannot claim that s/he didn t sign the document (nonrepudiability) Differences for digital, electronic documents simply appending identity of sender in digital form won t suffice, since this process can easily be forged therefore, find ways to irrevocably bind signer s identity to a digital document non repudiation of electronic documents deliberate publication of private key special protocols needed undeniable digital signatures (c.f. [Schneier]), or non transferable signatures cannot be verified without signer s consent Alice can prove she did not sign, and cannot falsely do so Distributed Systems Fall 2009 VII 25

26 Digital Signatures Approaches to Digital Signatures digital signatures signing of document M by prinicpal A [M] KA : encryption of M by A with Key K A signed document M, A, [M] KA [M] KA can be used by receiving principal to verify that message originated from A and was not subsequently modified secret keys requires sharing keys public key cryptography signer uses its private key to encrypt message arbitrary receipients use signers public key to decrypt more like ink on paper signatures non repudiability problem remains secure hash functions H(M) design H so that H(M) H(M ) for all likely pairs of messages M and M otherwise, principal could deny having signed M, saying that it had originally sent M Distributed Systems Fall 2009 VII 26

27 Digital Signatures Digital Signatures with Public Keys Signing through A 1. generate K pri M H(M) h E(K pri, h) signed doc {h} Kpri K pub 2. compute h = H(M) and encrypts h to {h} Kpriv 3. send signed Message M, {h} Kpriv 128 bits M Verification through B 4. receive M*, {h*} Kpri h = D(K pub, {h*} Kpri ) h = H(M*) if h = h signature authentic document contents unchanged {h*} Kpri M* D(K pub,{h*}) h' H(M*) h Addison-Wesley Publishers 2000 h = h '? Distributed Systems Fall 2009 VII 27

28 Digital Signatures Digital Signatures with Shared Secret Key problematic, since shared key must be disclosed transmission of key must be secured signer may not know at time of signing who will later want to verify signature delegate verification to trusted third party holding secret keys for all signers signatures are more likely to be forged frequently used to authenticate messages sent across secure channels established according to hybrid protocol signatures are then called message authentication codes (MACs) Distributed Systems Fall 2009 VII 28

29 Digital Signatures Digital Signatures with Shared Secret Key Signing through A 1. generate random key K 2. distribute K to principals through secure channels, principals trusted not to reveal K 3. compute h = H(M;K) 4. send [M] K = M,h (h is a MAC) Signing M K H(M;K) signed doc h M Verification through B 5. receive M*, h* h = H(M*;K) if h* = h signature verified Verifying M* K H(M*;K) h* h' h* = h'? Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 29

30 Digital Signatures Secure Digest Functions requirements for one way hash functions given M, H(M) is easy to compute given H(M), M is difficult to compute given M, it is difficult to find M such that H(M) = H(M ) threat of birthday attack A generates M and M, M is favourable to B, M isn t A makes several subtly different versions of both M and M that are visually indistinguishable (e.g., by adding spaces at end of line) A compares hashes for all of the Ms and all for all of the M s until she finds two that are identical gives favourable variant of M to Bob for him to sign using his private key replaces M by variant of M that hashes to same value and combines it with the original signature obtained from M 64 bit hash values means we need 2 32 variants of M and M on average min key length 128 hash functions used in practice MD5: generates 128 bit digest from 512 bit block, very efficient SHA: based on MD4, produces 160 bit digest, much less efficient than MD5 Distributed Systems Fall 2009 VII 30

31 Cryptographic Algorithm Performance Key size/hash size (bits) Extrapolated speed (kbytes/sec.) PRB optimized (kbytes/s) TEA DES Triple-DES IDEA RSA RSA MD SHA Addison-Wesley Publishers 2000 key size: rough estimate of relative security against brute force attacks speed: estimate of algorithm s performance left column: non optimized C code as given in literature PRB optimized: commercial, proprietary assembler implementation Distributed Systems Fall 2009 VII 31

32 Certificates Certificate somebody s key, signed by a trusted authority avoids substitution of one key for another example authentication, that Alice has an account with Bob (a bank) 1. Certificate type: Account number 2. Name: Alice 3. Account: Certifying authority: Bob s Bank 5. Signature: {Digest(field 2 + field 3)} KBpriv Addison-Wesley Publishers 2000 Alice needs to prove to merchant Carol that she can validate the signature using K Bpub attack Alice generates K B pub and K B priv Alice uses this to generate a forged certificate, claiming it comes from Bob solution Carol needs certificate for K Bpub signed by a trusted authority Distributed Systems Fall 2009 VII 32

33 Certificates 1. Certificate type: Public key 2. Name: Bob s Bank 3. Public key: K Bpub 4. Certifying authority: Fred The Bankers Federation 5. Signature: {Digest(field 2 + field 3)} KFpriv Addison-Wesley Publishers 2000 Chained Certificates choice of trusted authority? revelation of private keys => keep chain as short as possible Revocation of Certificates Bob manages a club, maintains list list open only to members Bob issues certificates ( Alice is a member, Bob, {digest( Alice is a member )}KB priv ) problem: what if Alice leaves the club? explicit certificate revocation too expensive add expiry date to certificate Distributed Systems Fall 2009 VII 33

34 Certificates Subject Issuer Period of validity Administrative information Extended Information Distinguished Name, Public Key Distinguished Name, Signature Not Before Date, Not After Date Version, Serial Number Addison-Wesley Publishers 2000 X.509 Certificate Standard useful if certificates have common format used in Secure Socket Layer (SSL) protocol certificate authorities Verisign Distributed Systems Fall 2009 VII 34

35 Authentication Authentication authentication between pair of principals each principal is assured of the identity of its communication peer possible with secret and public key schemes Authenticated Communication via Authentication Server assume Sara to be a securely operated authentication server maintains user passwords holds secret keys for all principals in system generated by applying a one way function to principal s password maintains tickets encrypted data object identity of principal to whom it is issued shared key that has been set up for the current principal toprincipal communication session Distributed Systems Fall 2009 VII 35

36 Authentication Authenticated Communication via Authentication Server a simple protocol: Alice sends plaintext request for ticket to access Bob to Sara Sara returns {{Ticket} KB, K AB } KA to Alice {Ticket} KB : ticket to be decoded and used by Bob Ticket = {K AB, Alice} KB K AB : session key K A : key derived from Alice s password Alice decrypts received message uses K A if her password is consistent with that stored on Sara, she will obtain valid ticket for access to Bob this is called a challenge neither Alice nor any impostor can make use of ticket unless s/he can generate K A Alice sends {{Ticket} KB, Alice, access request} in plaintext to Bob Bob decrypts ticket using K B note password is not transmitted prior knowledge of Alice s password on Sara requires secure network Distributed Systems Fall 2009 VII 36

37 Authentication Authenticated Communication with Public Keys using a hybrid cryptographic protocol assume Bob has generated K Bpub and K Bpriv and has a certificate with trusted authority Alice obtains Bob s public key certificate from trusted authority and retrieves K Bpub Alice creates shared key K AB and encrypts it using K Bpub Alice sends {keyname, {K AB }KB pub } to Bob unique keyname, since Bob may be using a number of private/public key pairs at any given time Bob uses K Bpriv corresponding to keyname and obtains K AB note if message corrupted in transit from Alice to Bob, then they don t share common key message may contain a string like address so that having obtained an incorrect key can be detected by Bob Distributed Systems Fall 2009 VII 37

38 Authentication Authenticated Communication with Public Keys man in the middle attack Mallory intercepts Alice s initial request sends a response to Alice containing its own public key henceforth, Mallory can intercept all messages and pretend to be Bob protection: Alice needs to make sure that Bob s public key originates from a certificate that is signed by a trusted authority Distributed Systems Fall 2009 VII 38

39 Needham Schroeder Authentication Needham Schroeder (1978) here: only secure key variant public key variant similar to ssl goal: authentication and key distribution based on authentication server supplies secret keys to pairs of clients basic principle A requests key from server often: A is client, and B provides some service obtains key one version to use one version encrypted for secure transfer to B authentication server maintains name and key (= password) for all clients in system protocol based on tickets to ensure freshness, protocol uses nonces integers used only once, generated on demand protocol ensures A receives message decoded with K AB, it knows it can only come from B A sends message encoded with K AB, it knows it can only be read by B Distributed Systems Fall 2009 VII 39

40 Needham Schroeder Authentication Needham Schroeder Secret Key Authentication Protocol Header Message Notes 1. A->S: A, B, N A A requests S to supply a key for communication with B. 2. S->A: {N A, B, K AB, {K AB, A} KB } KA S returns a message encrypted in A s secret key, containing a newly generated key K AB and a ticket encrypted in B s secret key. The nonce N A demonstrates that the message was sent in response to the preceding one. A believes that S sent the message because only S knows A s secret key. 3. A->B: {K AB, A} KB A sends the ticket to B. 4. B->A: {N B } KAB B decrypts the ticket and uses the new key K AB to encrypt another nonce N B. 5. A->B: {N A demonstrates to B that it was the sender of the B - 1} KAB previous message by returning an agreed transformation of N B. Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 40

41 Needham Schroeder Authentication One Known Weakness in Needham Schroeder assume intruder manages to obtain K AB and get a copy of ticket {K AB, A}K B not unrealistic since these may reside in unprotected memory of an application programme then intruder can later reuse ticket and pretend to be A possible solution: add nonce or timeout to ticket {K AB, A, t}k B Distributed Systems Fall 2009 VII 41

42 Kerberos Kerberos server based authentication extension of Schroeder Needham often used to support secure client server communication History developed at MIT (1988) Internet standard: RFC 1510 (1993) part of OSF/DCE part of Windows 2000 as default authentication protocol Distributed Systems Fall 2009 VII 42

43 Kerberos Security objects ticket verifies that a client has recently been authenticated usually valid for a few hours has fixed begin/end time of validity authenticator session key encrypted token sent from client to server contains client name and timestamp proving identity of user and currency of server communication session key randomly generated by authentication server used for encrypting all authenticators used for client server communication whenever client requires it Comparison to Needham Schroeder uses time values to avoid re use of old tickets impose lifetime for tickets allows system to cancel authorization Distributed Systems Fall 2009 VII 43

44 Kerberos Kerberos Architecture Kerberos Key Distribution Centre Step A 1. Request for TGS ticket Authentication service A Authentication database Ticketgranting service T 2. TGS ticket Client C Login session setup Server session setup DoOperation Step B 3. Request for server ticket 4. Server ticket Step C 5. Service request Request encrypted with session key Reply encrypted with session key Service function Server S Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 44

45 Kerberos Kerberos Protocol challenge Addison-Wesley Publishers 2000 Notation A: authentication service T: ticket granting service C: client n: a nonce t: a timestamp t 1 /t 2 : start/ending time for ticket Distributed Systems Fall 2009 VII 45

46 Kerberos Kerberos Protocol challenge Addison-Wesley Publishers 2000 Note use of K C if principal is user, K C is a scrambled (transformed) version of password upon receipt of message 2, client will prompt user for password client will use user password to decode challenge Distributed Systems Fall 2009 VII 46

47 Kerberos Kerberos Protocol when client has obtained ticket for ticket granting server, it can obtain an arbitrary number of server tickets until ticket for ticket granting server expires protocol to obtain ticket for server note: {auth(c)} KCT = {C, t} KCT Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 47

48 Kerberos Kerberos Protocol client issues request to server server returns nonce to assure client of its authenticity Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 48

49 Kerberos Application of Kerberos authentication in an insecure network environment only Kerberos servers are assumed to be operated in a secure manner possible application areas: any type of client server interactions user login client sends user name to Kerberos server returns session key, nonce encoded in user s password, ticket for TGS login client decrypts session key, nonce, using user s password client checks nonce, stores session key and ticket for further use login client can erase user pw from memory (no longer needed) client can now start login session with login server note: password never revealed on network network file access (e.g., NFS or Andrew FS) (access to smtp server/imap server) rlogin printing Distributed Systems Fall 2009 VII 49

50 Kerberos Critique of Kerberos Kerberos 4 uses timestamps for freshness nonces requires at least loose clock synchronization synchronization protocol itself must be secured against attacks Kerberos 5 allows nonces to be implemented as sequence numbers need to be unique servers need to keep memory of recently used nonces to detect replay inconvenient implementation constraint Kerberos variant that does not rely on timestamps has been suggested Kerberos security depends on session lifetime choice of life span too short: may cause inconvenient interruptions of service too long: users no longer authenticated may continue to use service Distributed Systems Fall 2009 VII 50

51 Secure Socket Layer Objective achieve secure channels adjusted security in a heterogeneous environment like the Internet the cryptographic capabilities and security needs of the prinicpals are highly varied cryptographic overkill may waster resources therefore: adjusted, negotiable levels of security switches: from unencoded to public key to secret key History of SSL originally developed by Netscape for use in Web Browser Transport Layer Security (TSL) extended version of SSL Internet standard: RFC 2246 (1999) Use of SSL secure HTTP interactions on Internet ( e commerce basis for secure telnet, ftp, pop, remote login, etc proprietary and public domain implementations exist include Java and CORBA APIs Distributed Systems Fall 2009 VII 51

52 Secure Socket Layer SSL Handshake protocol SSL Change Cipher Spec SSL Alert Protocol HTTP Telnet SSL Record Protocol Transport layer (usually TCP) Network layer (usually IP) SSL protocols: Addison-Wesley Publishers 2000 Other protocols: SSL Protocol Architecture session level layer protocol implementing a secure channel above transport layer beneath application level authentication mechanisms Distributed Systems Fall 2009 VII 52

53 Secure Socket Layer SSL Protocol Handshake Phases ClientHello ServerHello Establish protocol version, session ID, cipher suite, compression method, exchange random values Certificate Certificate Request ServerHelloDone Optionally send server certificate and request client certificate Client Certificate Server Send client certificate response if Certificate Verify requested Change Cipher Spec Finished Change cipher suite and finish handshake Change Cipher Spec Finished Addison-Wesley Publishers 2000 Distributed Systems Fall 2009 VII 53

54 Secure Socket Layer Cipher Suites particular choice for each of the following components facilitates negotiation of cryptographic mechanisms each cipher suite can be understood as a cryptographic profile example cipher suite configuration: Component Description Example Key exchange method Cipher for data transfer Message digest function the method to be used for exchange of a session key the block or stream cipher to be used for data for creating message authentication codes (MACs) Addison-Wesley Publishers 2000 RSA with public-key certificates IDEA SHA Distributed Systems Fall 2009 VII 54

55 Secure Socket Layer SSL Record Protocol Application data Fragment/combine abcdefghi Record protocol units abc def ghi Compressed units Compress (opt.) MAC Encrypted Hash Encrypt Transmit TCP packet Distributed Systems Fall 2009 VII 55

56 Security in Distributed Systems Kerberos based Authentication in NFS in standard NFS, there is no check whether the supplied user identity in each request is correct approach: use Kerberos authentication use full Kerberos tickets and authenticators as credentials problem NFS server is state less necessary to perform Kerberos authentication for every single request considered too expensive solution when mounting root and home file systems supply NFS mount server with full Kerberos user authentication credentials user s numerical id address of client computer when serving accesses, compare numerical id and address of client with data stored on server resistant against most attacks works only if not more than one user logs on to one client computer Distributed Systems Fall 2009 VII 56

57 Security in Distributed Systems Firewalls used to protect intranets, in particular to control communication in and out of an intranet goals of firewall policies service control: limit allowed services on the intranet disallow http requests to certain machines reject non secure remote login behaviour control: disallow behaviours that infringe on organization s policies spam detection user control: discriminate between user groups allow only system personnel to download and install software Distributed Systems Fall 2009 VII 57

58 Security in Distributed Systems Firewall Mechanisms IP packet filtering destination/source address inspection inspection of service type filed of IP packets e.g., prohibit use of NFS servers by external clients usually done by router ensure that router runs securely TCP gateway check all TCP connection requests check all TCP segment transmissions avoidance of denial of service attacks application level gateway check content of TCP segments often, implemented as a proxy for application process e.g.: telnet connection request starts telnet proxy connection application/telnet proxy and telnet proxy/external user bastion: separate secure computer for TCP gateway and application level gateway Distributed Systems Fall 2009 VII 58

59 Security in Distributed Systems Firewall Architectures a) Filtering router Router/ filter Protected intranet Internet web/ftp server b) Filtering router and bastion R/filter Bastion Internet web/ftp server c) Screened subnet for bastion R/filter Bastion R/filter Internet web/ftp server advantages of c) IP addresses of hosts on intranet need not be made public if first filter fails, second (inner) filter will step in Distributed Systems Fall 2009 VII 59

60 Security in Distributed Systems Virtual Private Networks (VPNs) extend the intranet security beyond intranet boundaries requires establishing secure channels across internet links usually used: IPSec extensions of IPv4 (RFC 2411) variant 1: transport mode client supports cryptography inside TCP/IP stack variant 2: tunnel mode security is achieved only between gateways gateways encrypt IP packets and wrap new headers around them Distributed Systems Fall 2009 VII 60

61 Security in Distributed Systems Virtual Private Networks (VPNs) IPSec services confidentiality through encryption authentication of sender integrity through detection of data tampering replay protection methodologies for key management: Internet Key Exchange (IKE) Standardization IPSec and IKE developed by IETF and standardized as RFCs Why not rely on application level end to end cryptography and authentication? avoids relying on correct handling of security mechanisms at application program level avoids cryptographic overhead inside intranet disadvantage reliance on faithful handling of keys inside and by IP routers IPv6 implements secure channels using extension IP header types authentication encrypted payload Distributed Systems Fall 2009 VII 61

62 Security in Distributed Systems Access Control objects encapsulate data that may need to be protected against unauthorized accesses objects often maintained by servers that provide methods for access to data generic server request format <operation, principal, resource> steps authenticate request message authenticate principal's credentials evidence provided by principal when accessing a resource apply access control protection domains execution environment shared by a number of processes contains list of <resource, rights> pairs specifies rights on resources that all processes in protection domain are entitled to often, protection domain corresponds to all rights that a user has defined by user id and group id in UNIX access control schemes capabilities access control lists (ACLs) Distributed Systems Fall 2009 VII 62

63 Security in Distributed Systems Access Control capabilities: concept similar to certificates format resource identifier operations authentication code digital signature, rendering capability unforgeable capability will only be granted if grantee is authenticated by server as belonging to the protection domain necessary to perform the requested operation requests have format <operation, userid, capability> access control validation of the capability (authentication code) check that requested operation is in set of allowed operations for that capability problems key theft, e.g., through eavesdropping include information identifying holder of capability revocation of capabilities include timeouts Distributed Systems Fall 2009 VII 63

64 Security in Distributed Systems Access Control access control lists (ACLs) ACL stored with every resource entries <domain, operations>, one for each domain domain may be identifier expression, e.g., "owner of the file", "users in the same group as file" (UNIX) requests <operation, principal, resource> authenticate principal check admissibility or operation for requested resource Implementation digital signatures, credentials and public key certificates used Java allows objects to manage access control with ACL, Principal and Signer classes CORBA security service offering access control with credentials and ACLs for ORBs Distributed Systems Fall 2009 VII 64

65 Security in Distributed Systems CORBA Security Service included services principal authentication generation of credentials for principals delegation of credentials, including restriction access control for remote invocations access rights can be specified using ACLs auditing of remote invocations facilities for non repudiation secure remote invocation client s credentials included in request message server validates credentials and checks for freshness and whether they are signed by an acceptable authority server makes access control decision made by contacting object holding access right mappings possibly using an ACL target server may log invocations and store non repudiation credentials Distributed Systems Fall 2009 VII 65

66 Security in Distributed Systems CORBA Security Service security policies message protection policy authentication of client and/or server protection of messages against corruption/disclosure auditing policy non repudiation policy access control policy one per domain, a group of objects user credentials are called privileges, and access control checks whether user has credentials to access objects in a given domain methods are categorized into four classes get: return part of object state set: alter object state use: cause object to perform a task manage: functions not available for general use application programmer must use these attributes for any new interface s/he defines also application programmer s task to: setting privilege attributes and helping users to obtain necessary privileges Distributed Systems Fall 2009 VII 66

67 Biographic References for Cryptography Generally, refer to the extensive bibliography in the [Coulouris] textbook, or to the list of online reference available through Specific references on cryptography B. Schneier, Applied Cryptography, 2nd ed., John Wiley, 1996 A. Menezes et al., Handbook of Applied Cryptography, CRC Press, 1997 Distributed Systems Fall 2009 VII 67

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Communication Security for Applications

Communication Security for Applications Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of

More information

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Authentication Application

Authentication Application Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be

More information

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec Network Security #10 Parts modified from Computer Networking: A Top Down Approach Featuring the Internet, 2nd edition. Jim Kurose, Keith Ross, Addison-Wesley, 2002. 1 Overview Encryption Authentication

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Chapter 7: Network security

Chapter 7: Network security Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport

More information

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder

More information

Authentication requirement Authentication function MAC Hash function Security of

Authentication requirement Authentication function MAC Hash function Security of UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

More information

!" # $%!" &$' *'! +&,% -./!&,%!!/ 0!" 1$! Eve. Bob. Alice. Bob. Alice

! # $%! &$' *'! +&,% -./!&,%!!/ 0! 1$! Eve. Bob. Alice. Bob. Alice !" # $%!" &% &$' ) $%" '$ '! +&,% -./!&,%!!/ 0!" '$ $" 1$! Alice Bob Alice Eve 2$ Bob 1 ! " Alice Malek Bob Spikey Bob tampering Exemplo: Email spoofing... " ## Alice Dan, the Devil Alice Exemplo: Web-Site

More information

What is network security?

What is network security? Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond

More information

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Network Security. Outline of the Tutorial

Network Security. Outline of the Tutorial Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and

More information

Network Security Part II: Standards

Network Security Part II: Standards Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security (2) CPSC 441 Department of Computer Science University of Calgary Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate

More information

Chapter 16: Authentication in Distributed System

Chapter 16: Authentication in Distributed System Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

NETWORK ADMINISTRATION AND SECURITY

NETWORK ADMINISTRATION AND SECURITY NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security

More information

Communication Systems SSL

Communication Systems SSL Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security

More information

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security

More information

Security: Focus of Control. Authentication

Security: Focus of Control. Authentication Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Public Key Cryptography Overview

Public Key Cryptography Overview Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

The Secure Sockets Layer (SSL)

The Secure Sockets Layer (SSL) Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

Why you need secure email

Why you need secure email Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with

More information

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1 Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication

More information

Network Security. Network Security. Security in Computer Networks

Network Security. Network Security. Security in Computer Networks Network Security Network Security introduction cryptography authentication key exchange Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete) Intruder may eavesdrop remove, modify, and/or

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol) WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

More information

mod_ssl Cryptographic Techniques

mod_ssl Cryptographic Techniques mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises

More information

Lecture G1 Privacy, Security, and Cryptography. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007

Lecture G1 Privacy, Security, and Cryptography. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007 Lecture G1 Privacy, Security, and Cryptography Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007 Functionalia Instructor Chipp Jansen, chipp@sci.brooklyn.cuny.edu Course Web Page http://www.sci.brooklyn.cuny.edu/~chipp/cc3.12/

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice: Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Web Security Considerations

Web Security Considerations CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security

More information

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS) Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Standards and Products. Computer Security. Kerberos. Kerberos

Standards and Products. Computer Security. Kerberos. Kerberos 3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2

More information

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination

More information

Module 7 Security CS655! 7-1!

Module 7 Security CS655! 7-1! Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed

More information

Transport Level Security

Transport Level Security Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002 INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before

More information

Securing an IP SAN. Application Brief

Securing an IP SAN. Application Brief Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.

More information

Chapter 6 CDMA/802.11i

Chapter 6 CDMA/802.11i Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang xwy@cs.duke.edu

CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang xwy@cs.duke.edu CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang xwy@cs.duke.edu Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing

More information

Properties of Secure Network Communication

Properties of Secure Network Communication Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

More information

E- Encryption in Unix

E- Encryption in Unix UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 537 A. Arpaci-Dusseau Intro to Operating Systems Spring 2000 Security Solutions and Encryption Questions answered in these notes: How does

More information

Chapter 8. Network Security

Chapter 8. Network Security Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

Netzwerksicherheit: Anwendungen

Netzwerksicherheit: Anwendungen Internet-Technologien (CS262) Netzwerksicherheit: Anwendungen 22. Mai 2015 Christian Tschudin & Thomas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 8 Security in Computer Networks

More information

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)

More information

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security

More information