A Cryptographic Protocol to Protect MPLS Labels
|
|
|
- Milton Ford
- 10 years ago
- Views:
Transcription
1 A Cryptographic Protocol to Protect MPLS Labels David A. Barlow, Member, IEEE, Vasos Vassiliou, Member, IEEE, and Henry L. Owen, Member, IEEE Abstract -- We have designed a cryptographic protocol to protect the Multiprotocol Label Switching (MPLS) header used in an Internet Service Provider (ISP) network. This protocol protects the MPLS header primarily against tampering for purposes of hijacking ISP resources. Secondary goals are protection against replay attack and traffic analysis of ISP traffic. The protocol is fast so as to minimize delay introduced into the high-speed MPLS routers. We use the Blowfish encryption algorithm in our encryption system, and smart cards and the Diffie-Hellman protocol in our key distribution system. the labels are used to route the packets, without regard to the original packet header information. These labels can be stacked as a last in first out (LIFO) label stack, enabling MPLS flows to be combined for transport and separated later for distribution. Index terms MPLS, cryptographic, ISP, encryption I. INTRODUCTION This research develops and evaluates a cryptographic protocol to protect the MPLS header used in an Internet Service Provider (ISP) network. The primary requirement for this protocol is to prevent theft of services from an ISP. To insure that it does not interfere with the quality of service that an ISP provides, our protocol is both fast and simple to implement. The remainder of this paper is organized as background information, design considerations, the encryption system, the key distribution system, and conclusions. II. Background MPLS: Multiprotocol Label Switching (MPLS) [1] is a technology proposed by the Internet Engineering Task Force (IETF). It was designed to facilitate several problem areas in the Internet, including routing performance, and is increasingly being adopted by Internet Service Providers in their core networks. MPLS combines a label-swapping algorithm, similar to that used in ATM, with network layer routing. A label is a short, fixed-length identifier that is used to forward packets, shown in figure 1. In conventional IP forwarding, the router uses a longest-prefix match on the destination IP address to determine where to forward a packet. With MPLS, labels are attached to packets at the ingress point to an MPLS network. Within the network, Figure 1 MPLS Header and Relationship to TCP/IP Network Model Current proposed protocols for MPLS security, Behringer [2] and Senevirathne et al. [3] discuss two approaches to securing MPLS. Behringer [2] makes the assumption that the core MPLS network is "trusted and provided in a secure manner." We make no such assumption in our work. We assume that only the MPLS nodes themselves are secure. The physical links connecting the nodes are assumed to not be secure we protect them using our protocol. Senevirathne et al. [3] proposes an encryption approach using a modified version of IPsec. IPsec is defined by the IETF [4], and is an all-purpose encryption protocol that includes key distribution, authentication for the IP header, and authentication and encryption for the IP payload. Senevirathne et al. [3] translate these capabilities to an MPLS environment. Their proposed system does not meet the requirements specified above for our problem for two reasons: Dr. David Barlow is an Assistant Professor in the Department of Electrical Engineering and Computer Science, USMA, West Point, NY Dr. Vasos Vassiliou is an Assistant Professor in the Department of Computer Science, Intercollege, Nicosia, Cyprus Dr. Henry Owen is an Associate Professor in the School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA ISBN /03/$ IEEE 227
2 1. It adds at least 128 bits to each MPLS header. This is four times the size of the MPLS header itself. This level of overhead on every packet would probably prove unacceptable to an ISP. It would almost certainly add significantly more processing delay to each packet when compared to a simple encryption scheme. 2. It does not encrypt the MPLS header (but provides authentication). Therefore the header is vulnerable to traffic analysis. We require fast and inexpensive operation, since MPLS routers are mainly routers without the full capability to do Layer 3 routing operations or are Layer 2 (ATM) switches with some additional capability. For this reason, application layer distribution designs are not applicable in our case. We also require the key exchange algorithm to be aware of the computation burden it imposes on the underlying system and communications performance (quality of service). Currently, MPLS does not provide header or payload encryption. The only security function employed in MPLS is the use of MD5 [5] to sign and authenticate the control messages sent using TCP. MPLS control messages are transported using IP and do not fall under the scope of this research. They can be secured either by IPsec or any other proprietary method. Integration of the Label Distribution Protocol (LDP) security is an open issue for future study. Nevertheless, MD5 could be used for MPLS header security, since it is already present in the routers software. MD-5 is particularly suitable in fast re-keying and for the hash or keyed-hash functions that may need to be used. III. DESIGN CONSIDERATIONS In our design, we consider the types of attacks we intend to protect from, and operational considerations including speed, span of encryption, and key distribution. What kinds of attacks are we protecting from? We are protecting the header in an ISP provider s network so that an attacker cannot collect and analyze traffic data, understand route configuration, and eventually create a covert channel. This protocol will protect the links between MPLS routers by protecting the MPLS headers. All MPLS headers will be encrypted with this protocol. There are four general categories of attacks described by Stallings [6]: asset. This is an attack on availability. We are not protecting from this type of attack with our protocol. Interception -- An unauthorized party gains access to an asset and can capture data. This is an attack on confidentiality. We are not protecting from this type of attack with our protocol. Modification -- An attacker modifies the contents of a message. This is an attack on integrity. We are protecting the MPLS header contents with our protocol. Fabrication -- An attacker inserts counterfeit objects in to the system. This is an attack on authenticity. We are protecting an MPLS network from this type of attack with our protocol. Our encryption system must be as fast as possible (to minimize processing delay) while meeting the stated security objectives. The protocol should not add bits to the MPLS header or require an additional header to be inserted into each data packet. MPLS routers must be able to recognize a valid, decrypted (received) MPLS header. There will only be a small number of different MPLS headers exchanged between nodes, however there will be potentially hundreds of millions of copies of these same headers exchanged. Therefore, the protocol must not encrypt the same plaintext to the same cipher text. This, along with the fact that each MPLS header is only 32 bits long implies that some kind of stream protocol is necessary. Packets can be lost or damaged in transmission, so the encryption protocol must be selfsynchronizing. This further implies that a cipher feedback mode of operation is required. Each MPLS router in an MPLS network must be able to read and change the label in the MPLS headers it processes. Therefore, a link encryption scheme is necessary. A disadvantage of link encryption is that the MPLS header message is vulnerable at each router. A link encryption device must be present at each end of the link. Each pair of nodes that share a link could have a unique key with a different key for each link. As an alternative, the same key can be used for all links in an administrative domain and different keys can be used at the edges of the domain. This can expose a large number of nodes (belonging to the same domain) if the key is stolen. Interruption -- An asset on the system is destroyed or becomes unavailable. This does not have to be a physical ISBN /03/$ IEEE 228
3 IV. THE ENCRYPTION SYSTEM A. Encryption Algorithm We propose to use Blowfish [7] as the encryption algorithm. Use of Blowfish has two main advantages over other block ciphers adaptable to our problem: - It is relatively fast. See table 1 from Counterpane Labs [8]. - It is unpatented and royalty-free. In order to use Blowfish as our encryption algorithm, we have inserted it into a Cipher Feedback (CFB) mode of operation as described by Stallings [6]. This mode of operation is able to recover from both a bit error, and lost packet problems, producing three bad decrypted MPLS headers for the bit error and two for a missing header (packet). Algorithm Clock cycles per round # of rounds # of clock cycles per byte encrypted Blowfish RC DES IDEA Triple- DES Table 1 - Speed Comparisons of Block Ciphers on a Pentium 150 B. Speeding Processing If the Blowfish algorithm was to prove to add too much processing delay to the MPLS routers, we could use a reduced number of rounds to speed the processing. This would likely reduce the security afforded by 16 rounds; however, the published research to date has not been able to break five rounds or more of Blowfish. There is also a trade-off to be made between the time required to break Blowfish (by brute force) and the time between re-keying. If we are willing to re-key more frequently, we can use fewer rounds in our Blowfish encryption and speed the processing at each MPLS router. C. Determining if Decrypted MPLS header is Valid The method of determining if an MPLS header is valid is to check if the label portion of the header is a valid MPLS label in the context of that particular router. Unfortunately, if we are using a large number of labels there is a small but significant chance that an intruder's MPLS header or a valid header with an error will produce a valid label (though a random one). For example, if we are using 1024 labels there is a one in a thousand chance for a random "encrypted" label to produce a valid decrypted label. Our proposed solution to this problem is to "steal" bits from the CoS and TTL fields to increase our chances of detecting a bad MPLS header. Using the three bits from the CoS field (which assumes we create separate paths for each class of service and therefore do not need these bits) and two bits from the TTL field would improve our odds of detecting bad MPLS headers. Redoing the example above using the "stolen" bits, we determined that 15 in 1,000,000 bad MPLS headers would decrypt to a valid label. Changing the expected bit pattern of the unused bits from zero to some other value will not improve the security or ability to detect a valid header, since any value has an equally likely chance of occurring. D. Blowfish Setup The P and S boxes in the Blowfish algorithm require a large amount of processing to set up with each new key. MPLS routers used by an ISP will in general have a large amount of processing power to cope with the expected large traffic flows. Fortunately, virtually all ISP routers experience both busy periods of high traffic volume, and slow periods with reduced (far below capacity) traffic volume. The Blowfish P and S boxes setup process should be run during times of reduced traffic volume. An alternative to processing the P and S box setup in each router is to do so in a centralized server. This solution has several disadvantages, including providing a single point of failure for the network, and the requirement to transfer the P and S boxes to each router in a secure manner. ISBN /03/$ IEEE 229
4 V. VULNERABILITIES A. Denial of Service (DoS) Attack Since our protocol operates in CFB mode, an attacker could send junk MPLS packets (that will not decrypt to a valid header) every 3rd packet. This would cause the CFB mode to always produce invalid results and deny service to valid packets. A counter to this type of DoS attack would be to alt-route traffic around a link under a DoS attack using the ability to route individual MPLS paths. However, it would be necessary to track down the source of the injected packets. B. Exterior Attack A method of bypassing this protocol from the exterior of the network could be implemented at points where the network is connected to other MPLS networks and MPLS is used on those connecting links. In this case, an attacker attempting to pass traffic to a specific destination could inject a series of packets with all possible MPLS headers to map a path(s) through our network. This assumes the attacker could also observe at least one egress point from our network to look for his injected packets. Our protocol provides no protection from this type of service-stealing attack. VI. THE KEY DISTRIBUTION SYSTEM A. Key Distribution Methods There are many ways to distribute keys. We discuss each method listed below and conclude with our decision on the method best suited for our system: 1. Direct Physical Exchange 2. Trusted third-party physical exchange 3. Key transmission using a previously used key. 4. Key distribution through a KDC 5. Key transmission using an encrypted connection through a trusted third party. 6. Public Key model 7. Open Key model For link encryption and if the number of core nodes is not large, the first two methods are not unreasonable. Manual key exchange is the most primitive way of providing a shared key to two parties, but it is still a good way. What is essential in cases like ours (where manual key exchange can be done periodically, but not extremely frequently) is a key exchange protocol that is able to do an automatic periodic refreshment of keys and minimize the risk attached to long-lived master keys. Key distribution through a KDC has been the basis of many modern key distribution methods and it is always an option. However, we assume that an ISP would be reluctant to use a KDC managed by someone else because it would mean that it would have to rely on a server, out of its control, and which would be a single point of failure. The single point of failure problem is also a reason why the ISP would not be likely to implement the KDC by itself. We expect that the ISP is more interested in providing services that add value to its customer base and bring revenue, rather than invest in a KDC. Even though using a trusted third party may not be possible in our case, if the two routers have secure connections to a common-centralized server they could use that server to exchange keys. For that method we could design our key establishment protocol based on the framework given by Boyd [9]. Public key cryptography between links is not an option for our system. We do not want to use the limited storage for the public keys of every possible neighbor. In addition, PKI is not fully developed and still not proven in the opinion of Ellison and Schneier [10]. Future improvements in the areas of PKI and router processing ability may enable this scheme. The Open Key Model bases trust on the existence of a certification authority. Even though it is probably the most scalable model for the Internet, it is not necessarily the best for us because the size and availability of MPLS routers is not changing frequently. We propose to use SmartCards as a form of manual distribution. We view SmartCards as a good solution for the initial distribution because they remove the danger of a single person having the keys to all routers. They are considered tamper resistant elements and it would be reasonably difficult to get any information out of them. In addition, SmartCards can be used as probabilistic devices, in which case they do not even carry a key but a method for calculating the key. Probabilistic oracle methods are described by Shoup [11]. In addition to the method of key establishment and distribution, we are also interested in the frequency of such a process. As we will see later, there may be a ISBN /03/$ IEEE 230
5 connection between the encryption method and the rekeying frequency if the encryption algorithm proves to be weak or has to be weak because of certain constraints. For an ISP we expect that each router farm or co-location point would be visited at least once a month for maintenance and management purposes. Key distribution can be done during those visits. In addition to a monthly key change, we propose to frequently create new session keys for each link, utilizing the monthly key to protect the process. Using the same key on a link for a month or more is very risky if the encryption algorithm can be broken during that time. The more the key is used, the more information an adversary has for breaking it. Therefore, by shortening the key s useful life we limit the potential for breaking the key. By using session keys, we also protect against replay attacks in the case that the attacker has been able to record and/or compromise past communications. Key refreshment (if implemented correctly) should also be able to minimize the dependency between past and future keys and strengthen forward secrecy. B. Key exchange, Key distribution, Key agreement The first part of our key management protocol is a hybrid transport-exchange and the last part is a pure key exchange. 1. Share/Establish an Initial Secret Key Plain Transfer of K0 : SmartCard Router: 2. Establish a Session Key using D-H exponent exchange 3. Encrypt and Authenticate the D-H Exchange The first part could be done in several ways as follows: it difficult to reproduce the old keys: = F(Old-K KR 0 ) and the subsequent The secret key is the hash of the concatenation of the two half keys: New-K 0 = H(KR,K For an initial start where no has been defined, we should provide a unique IV for each pair to avoid having the same keys at different parts of the same network at the same time. C. Session Keys The second phase of the key exchange is the establishment of the session keys. We want to be sure that only the router at the other end of the link is communicating with us and that the session key is fresh. This is usually achieved by using one of the following methods: 1. Challenge response method - one of the parties generates a random number and sends it to the other end and the challenge is returned with the key (or whatever the other end s response may be). 2. Timestamps - communication is timestamped. Timestamps are problematic because there are difficulties in ensuring strict clock synchronization. We chose to use the D-H exchange for this phase because it is the simplest and most proven way. We first agree on a large prime number p and a generator number g and then we perform the exponent exchange. We can send the exponents in the clear and then authenticate them, or we can save a message pair and use a keyed-hash function with K0 as the key to both encrypt and authenticate, since only the two parties know the secret key. SC ) Encrypted Transfer of K o : SmartCard Router: Encrypted Transfer of a Half-Key: SmartCard Router: PKER(K 0 ) PKER(K We chose to use the last method. Following this last method, the router has to generate its own half-key and calculate the initial secret key. In order for both machines at the ends of the link to generate the same half key and secret key, we chose to use a function of the old key as the router s half key. This can be a hash function, making SC ) xa g xa R1 R2 : FK 0( g, ida) xb R1 R2 : FK 0( g, idb) The two routers can now calculate their session key. The function used for this exchange can be any function that involves the key in the processing. It can be a keyedhash function with as the key or just a transmission of. is never used to encrypt any data. It is only used in the keyed-hash functions that encrypt and authenticate the D-H exponent exchange. By using the ISBN /03/$ IEEE 231
6 secret key in the function that generates the session key xaxb KS = g we also provide forward secrecy [12]. The proof that the DH method we use is secure against man-in-the-middle attacks is presented by Ateniese et al. [13]. The method is secure because it is difficult for an xa xb xa attacker C to compute either g or g from g or xb g. We chose to use keyed hash functions because they are bi-one-way functions: they can be one way in either of the variables when the other is fixed [12]. For example, for a fixed and output value y0 it should be infeasible to find x in f ( k 0, x) = y0. Also, for a fixed x and y it should be infeasible to find K. VII. CONCLUSIONS Our proposed cryptographic system for the protection of MPLS headers would likely prove successful at its primary task preventing theft of services by an intruder with interior access to an ISP's MPLS network. Our encryption system uses the (to date) very strong Blowfish algorithm. Without actually implementing and testing this system, we cannot know for sure what delay our encryption protocol would produce in an MPLS router. This delay would be a critical issue for ISP's supporting Quality of Service protocols, like Differentiated Services. Our key distribution system strives to be as simple as possible to administer, yet provide a high level of security for the keys themselves. We believe we have met this goal. However, like the encryption system delay measurement, the proof of any system lies in the implementation and testing. Payloads," Internet Draft, IETF Network Working Group, February [4] Kent, S. and Atkinson, R., "Security Architecture for the Internet Protocol," IETF RFC 2401, November [5] Rivest, R., " The MD5 Message-Digest Algorithm," IETF RFC 1321, April [6] Stallings, W., Cryptography and Network Security Principles and Practice, 2nd Edition, Prentice Hall, New Jersey, [7] Schneier, B., Blowfish symmetric block cipher, [8] Counterpane Internet Security Web Site, Copyright Counterpane Internet Security, Inc., [9] Boyd C., A Framework for Design of Key Establishment Protocols, IEEE ACISP, [10] Ellison, C. and Schneier, B., "Ten Risks of PKI: What You re not BeingTold about Public Key Infrastructure," Computer Security Journal, Volume XVI, November [11] Shoup V. and Rubin A., Session Key Distribution Using Smart Cards, EUROCRYPT 96. [12] Boyd C., A Class of Flexible and Efficient Key Management Protocols, IEEE Computer Security Foundation Workshop, [13] Ateniese G, Steiner M, and Tsudik G., Authenticated Group Key Agreement and Friends, Proceedings of 5 th ACM Conference on Computer and Communication Security, San Fransisco, CA, Nov VIII. REFERENCES [1] Rosen, E., Viswanathan, A., and Callon, R. "Multiprotocol Label Switching Architecture," IETF RFC 3031, January [2] Behringer, M., "Analysis of the Security of the MPLS Architecture," Internet Draft, IETF Network Working Group, February [3] Senevirathne, T. and Paridaens, O., "Secure MPLS Encryption and Authentication of MPLS ISBN /03/$ IEEE 232
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec
Network Security #10 Parts modified from Computer Networking: A Top Down Approach Featuring the Internet, 2nd edition. Jim Kurose, Keith Ross, Addison-Wesley, 2002. 1 Overview Encryption Authentication
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper
Bosch Security Systems Video Systems Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper 4 July 2016 Secure the edge of the network Security devices are mostly located
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Network Security. Outline of the Tutorial
Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security Securing communications (SSL/TLS and IPSec) Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network communication Who are you
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
TELE 301 Network Management. Lecture 18: Network Security
TELE 301 Network Management Lecture 18: Network Security Haibo Zhang Computer Science, University of Otago TELE301 Lecture 18: Network Security 1 Security of Networks Security is something that is not
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
