Internet Security Protocols
|
|
|
- Annis Fitzgerald
- 10 years ago
- Views:
Transcription
1 Internet Security Protocols Bart Preneel February 2011 With thanks to Joris Claessens and Walter Fumy
2 Context 1. Cryptology: concepts and algorithms 2. Cryptology: protocols 3. Public-Key Infrastructure principles 4. Networking protocols 5. New developments in cryptology 6. Cryptography best practices 7. Hash functions
3 Outline Internet summary IETF process Basic principles Transport layer security SSL / TLS Network layer security IPSec, VPN, SSH 3
4 Internet Evolution Subscriptions worldwide (millions) Mobile Fixed Mobile Internet Fixed Internet mobile subscribers mobile Internet subscribers
5 The Internet - A Network of Networks IP is the protocol that integrates all infrastructures Workstation, PC, Laptop, PDA,... IP Router Internet IP Router Workstation, PC, Laptop, PDA,... Network A Network B Network C various transmission technologies Ethernet Token Ring WLAN Powerline DECT GSM UMTS Satellites PSTN ISDN ATM Frame Relay
6 Internet Protocols SMTP HTTP... Application SMTP HTTP... TCP/UDP Transport TCP/UDP IP Network IP Link Link Network Layer Internet Protocol (IP) Transport Layer Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
7 Data Encapsulation Application Layer (Web, FTP,... ) Data Application Data Application Layer (Web, FTP,... ) Transport Layer (TCP, UDP) Transport Header Data Transport Transport Header Data Transport Layer (TCP, UDP) Network Layer (IP) IP Header Transport Header Data Network IP Header Transport Header Network Layer (IP) Data Network Access Layer Network Access Layer Internet 7
8 Internet Standardization ISOC/IAB/IESG/IETF Internet Engineering Task Force (IETF) IETF Working Groups Mailing List Information Scope of the Working Group Goals and Milestones Current Internet Drafts & RFCs RFCs ftp://ftp.isi.edu/in-notes/
9 IETF Standards: RFC Proposed Standard (PS) stable spec lowest level of standards track Draft Standard (DS) at least two independent and interoperable implementations Standard (STD) widely, successfully used Proposed Draft std Standard Experimental Historic
10 IETF Intermediate documents Request for Comments (RFCs) with different maturity levels Experimental (E) Informational (I) Historic (H) Best Current Practice (BCP) Internet-Drafts (I-D) are working documents of the working groups and have no formal status Protocol Status (requirement level) "required", "recommended", "elective", "limited use", or "not recommended must and should
11 IETF Security Area Area Directors: Stephen Farrell, Tim Polk, Sean Turner abfab Application Bridging for Federated Access Beyond web dane DNS-based Authentication of Named Entities dkim Domain Keys Identified Mail emu EAP Method Update hokey Handover Keying ipsecme IP Security Maintenance and Extensions isms Integrated Security Model for SNMP kitten Common Authentication Technology Next Generation krb-wg Kerberos ltans Long-Term Archive and Notary Services msec Multicast Security nea Network Endpoint Assessment pkix Public-Key Infrastructure (X.509) tls Transport Layer Security
12 Communications insecurity architectural errors wrong trust assumptions default = no security protocol errors unilateral entity authentication weak entity authentication mechanism downgrade attack modes of operation errors no authenticated encryption wrong use of crypto cryptographic errors weak crypto implementation errors range of wireless communication is often underestimated! 12
13 A historical perspective (1) wireless 1900 data Vernam: OTP rotor machines LFSR wired 1900 data wired voice digital encryption block ciphers analog scramblers STU X25 WLAN PAN 3GSM TLS SSH IPsec VoIP 13
14 A historical perspective (2) mobile phones AMPS analog cloning, scanners GSM/TDMA TDMA cloning attacks on A5, COMP128 3GSM WLAN PAN WEP WPA WPA i WEP broken WPA weak Bluetooth Zigbee 14 Bluetooth problems
15 Security Goals (started in ISO ) confidentiality: entities (anonimity) data traffic flow (unilateral or mutual) entity authentication data authentication (connection-less or connection-oriented): data origin authentication + data integrity access control non-repudiation of origin versus deniability 15
16 Security Protocols & Services Cryptographic techniques: symmetric encipherment message authentication mechanisms entity authentication mechanisms key establishment mechanisms (e.g., combined with entity authentication) SP hdr data SP tlr MAC confidentiality integrity 16
17 Internet Security Protocols Electronic Commerce Layer PayPal, Ecash, 3D Secure... S-HTTP PGP PEM S/MIME PKIX Transport Layer Security (SSH, SSL, TLS) SPKI Transmission Control Protocol (TCP) User Datagram Protocol (UDP) IP/ IPSec (Internet Protocol Security) Public-Key Infrastructure security services depend on the layer of integration: the mechanisms can only protect the payload and/or header information available at this layer header information of lower layers is not protected!!
18 Security: at which layer? Application layer: closer to user more sophisticated/granular controls end-to-end but what about firewalls? Lower layer: application independent hide traffic data but vulnerable in middle points Combine? 18
19 SP Architecture I: Encapsulation unprotected data SP hdr encrypted data MAC confidentiality integrity Bulk data: symmetric cryptography Authenticated encryption: best choice is to authenticate the ciphertext 19
20 SP Architecture II: Session (Association) Establishment Host A SP hdr encrypted data MAC Host B Security Associations (Security Parameters incl. Shared Keys) Key Management and Security Association Establishment Protocols 20
21 Algorithm Selection "a la carte each algorithm (encryption, integrity protection, pseudorandom function, Diffie- Hellman group, etc.) is negotiated independently less compact to encode more flexible suite all parameters are encoded into a single suite number; negotiation consists of offering one or more suites and having the other side choose simpler and more compact to encode potentially exponential number of suites less flexible e.g., IKEv1 e.g., TLS and IKEv2 21
22 Transport layer security SSL / TLS
23 SSL/TLS Protocols Browser Secure WWW Server HTTP SSL Transport System HTTP over SSL SSL Transport System connection-oriented data confidentiality and integrity, and optional client and server authentication. 23
24 Transport Layer Security Protocols IETF Working Group: Transport Layer Security (tls) RFC 2246 (PS), 01/99 transparent secure channels independent of the respective application. available protocols: Secure Shell (SSH), SSH Ltd. Secure Sockets Layer (SSL), Netscape Transport Layer Security (TLS), IETF Application TLS TCP IP Application Data Encapsulation Decapsulation Protected Data Negotiation Authentication Key Establishment Handshake
25 SSL / TLS Mainly in context of WWW security, i.e., to secure the HyperText Transfer Protocol (HTTP) But, in between application layer and TCP, thus can be used to secure other applications than HTTP too (IMAP, telnet, ftp, ) 25
26 Other WWW security protocols PCT: Microsoft s alternative to SSL S-HTTP: S/MIME-like protocol SET: for credit card transactions XML-Signature: PKCS#7-based signature on XML documents... 26
27 SSL / TLS Secure Sockets Layer (Netscape) SSL 2.0: security flaws! SSL 3.0: still widely used - not interoperable with TLS 1.0 Transport Layer Security (IETF) TLS 1.0: adopted SSL 3.0 with minor changes RFC 2246, 01/99 (PS) TLS: security at the transport layer can be used (and is intended) for other applications too end-to-end secure channel, but nothing more... data is only protected during communication no non-repudiation! 27
28 28
29 SSL/TLS in more detail Record layer protocol fragmentation compression (not in practice) cryptographic security: encryption data confidentiality MAC data authentication [no digital signatures!] Handshake protocol client and server authentication establish cryptographic keys (for encryption and MAC) negotiation of cryptographic algorithms 29
30 Handshake: overview CLIENT SERVER Hello Request Client Hello Server Hello Certificate Client Key Exchange Certificate Verify [changecipherspec] Certificate Server Key Exchange Certificate Request Server Hello Done Finished start handshake, protocol version, algorithms authentication server + exchange (pre)master secret client authentication end handshake, integrity verification [changecipherspec] Finished 30
31 TLS 1.0 Data Encapsulation Options Confidentiality key size algorithm options RC4_40 RC4_40 RC2_CBC_40 DES_CBC_40 Integrity key size algorithm options HMAC- MD5 DES_CBC HMAC- SHA mandatory RC4 IDEA_CBC 3DES_ EDE_CBC 31 mandatory
32 TLS 1.0 Key Management Options Anonymous Non anonymous DH_anon Server authentication, no client authentication Server and client authentication vulnerable to a meet-in-themiddle attack mandatory RSA DH_DSS DH_RSA DHE_DSS DHE_RSA RSA DH_DSS DH_RSA DHE_DSS DHE_RSA 32
33 RFC 3268: AES Ciphersuites for TLS 06/2002 CipherSuite Key Exchange TLS_RSA_WITH_AES_128_CBC_SHA RSA RSA TLS_DH_DSS_WITH_AES_128_CBC_SHA DH_DSS DSS TLS_DH_RSA_WITH_AES_128_CBC_SHA DH_RSA RSA TLS_DHE_DSS_WITH_AES_128_CBC_SHA DHE_DSS DSS TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE_RSA RSA TLS_DH_anon_WITH_AES_128_CBC_SHA DH_anon TLS_RSA_WITH_AES_256_CBC_SHA RSA RSA TLS_DH_DSS_WITH_AES_256_CBC_SHA DH_DSS DSS TLS_DH_RSA_WITH_AES_256_CBC_SHA DH_RSA RSA TLS_DHE_DSS_WITH_AES_256_CBC_SHA DHE_DSS DSS TLS_DHE_RSA_WITH_AES_256_CBC_SHA DHE_RSA RSA TLS_DH_anon_WITH_AES_256_CBC_SHA DH_anon Certificate Type 33
34 TLS 1.1 RFC 4346 April 2006 Makes RSA with 3DES the mandatory cipher suite TLS 1.1: TLS_RSA_WITH_3DES_EDE_CBC_SHA TLS 1.0: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA Provides several fixes, including for the Rogaway and Vaudenay CBC attacks for the Vaudenay, Boneh-Brumley, and KPR attacks TLS 1.2 RFC August 2008 reduces dependency on MD5 and SHA-1 add support for authenticated encryption add AES ciphersuites 34
35 SSL/TLS: security services SSL/TLS only provides: entity authentication data confidentiality data authentication SSL/TLS does not provide: non-repudiation unobservability (identity privacy) protection against traffic analysis secure many-to-many communications (multicast) security of the end-points (but relies on it!) 35
36 SSL/TLS: security? SSL/TLS offers an adequate security level but it is a very complex protocol TLS 1.x is the result of a public reviewing process: several problems have been identified in earlier versions (SSL 2.0/3.0) and have been solved Limited deployment of 1.1 and almost none of
37 SSL/TLS: evaluation Some remaining security problems though bad implementation; e.g., random number generation PKCS#1 attack is patched (use other padding scheme: OAEP; server error messages should contain less information) version / cipher suite roll back attempts now patched (due to backward compatibility; disable export algorithms if possible) traffic analysis: e.g., length of ciphertext might reveal useful info PKI issues: revocation, root keys, certificate parsing, Web spoofing and phishing plenty of known plaintext (both SSL/TLS and HTTP related) 37
38 TLS Renegotiation attack [Marsh Ray 9 November 2009] Cipher suite can be renegotiated dynamically throughout the session Negotiation and renegotiation look the same Person-In-The-Middle can inject (plaintext) traffic in a protected session as if it came from a client establishes an unauthenticated session with a server proxies another authenticated session between the client victim and the same server triggers a renegotiation server: last message received from attacker prior to renegotiation is attached to first message received from client after renegotiation TLS renegotiation indication extension RFC 5746 February 2010
39 Implementation attacks Debian-OpenSSL incident [13 May 2008] Weak key generation: only 32K keys easy to generate all private keys collisions Between May bad keys out of 40K (0.6%) Revocation problematic 39
40 TLS certificate "NULL" issue. [Moxie Marlinspike 09] Black Hat browsers may accept bogus SSL certs CAs may sign malicious certs certificate for will be issued if the request comes from a kuleuven.be admin response by PayPal: suspend Moxie s account paypal_banishes_ssl_hacker/
41 Security in transport layer Transparent for application Pro: can be used for all TCP-based applications, without modifying them Con: authentication is one, but who/what to trust, is important Non-repudiation? In practice: (partially) integrated in application 41
42 Non-repudiation Strictly speaking only if in application, thus not provided by SSL/TLS SSL/TLS secures the communication channel, but not the exchanged messages SSL/TLS does not use digital signatures in the first place (except for client authentication) For electronic business, more advanced security protocols are needed... 42
43 User authentication First authentication, then authorization! SSL/TLS client authentication: during handshake, client digitally signs a specific message that depends on all relevant parameters of secure session with server software devices, smart cards or USB tokens can be deployed through standardized cryptographic interfaces supported by browsers (Netscape: PKCS#11; MSIE: PC/SC) PKCS#12 key container provides software mobility Usually another mechanism on top of SSL/TLS 43
44 TLS in the future (1) TLS 2.0? Some possible TLS enhancements, discussed within the IETF TLS WG: RSA-OAEP identity protection [note that this is already indirectly possible by authenticating within a DH_anon session] cipher suites for compression missing cipher suites (not all combinations possible) Backward compatibility remains very important! 44
45 TLS in the future (2) Enhancements proposed in literature performance improvements: batching [ShachamBoneh 01] and fasttrack [ShachamBoneh 02] user (identity) privacy [PersianoVisconti 00] client puzzles [DeanStubblefield 01] to counter denial-ofservice attacks trust negotiation [Hess et al 02] 45
46 Network layer security IPsec, VPN, SSH
47 IP Security Protocols IETF Working Group: IP Security Protocol (ipsec) Security Architecture for the Internet Protocol RFC 2401 (PS), 11/98 IP Authentication Header (AH) RFC 2402 (PS), 11/98 IP Encapsulating Security Payload (ESP) RFC 2406 (PS), 11/98 Internet Key Exchange (IKE) RFC 2409 (PS), 11/98 Application layer protocol for negotiation of Security Associations (SA) and Key Establishment Application / IKE TCP/UDP IP/IPSec Application Data Encapsulation Decapsulation Protected Data SA Establishment Authentication Key Establishment Handshake Large and complex. (48 documents) Mandatory for IPv6, optional for IPv4
48 IPSec VPN models: Hosts and Security Gateways Host-tohost (not VPN) Internet Untrusted Network Branchto-branch IPSec Gateway Internet Untrusted Network IPSec Gateway Trusted Network Trusted Network Host-togateway Internet Untrusted Network IPSec Gateway Trusted Network 48
49 IPsec - Security services Access control Connectionless integrity Data origin authentication Rejection of replayed packets (a form of partial sequence integrity) Confidentiality Limited traffic flow confidentiality 49
50 IPsec - Concepts Security features are added as extension headers that follow the main IP header Authentication header (AH) Encapsulating Security Payload (ESP) header Security Association (SA) Security Parameter Index (SPI) IP destination address Security Protocol Identifier (AH or ESP) 50
51 IPsec - Parameters sequence number counter sequence counter overflow anti-replay window AH info (algorithm, keys, lifetimes,...) ESP info (algorithms, keys, IVs, lifetimes,...) lifetime IPSec protocol mode (tunnel or transport) path MTU (maximum transmission unit) 51
52 IKE Algorithm Selection Mandatory Algorithms Algorithm Type IKE v1 IKE v2 Payload Encryption DES-CBC AES-128-CBC Payload Integrity HMAC-MD5 HMAC-SHA1 HMAC-SHA1 DH Group 768 Bit 1536 Bit Transfer Type 1 (Encryption) Transfer Type 2 (PRF) Transfer Type 3 (Integrity) ENCR_DES_CBC PRF_HMAC_SHA1 [RFC2104] AUTH_HMAC_SHA1_96 [RFC2404] ENCR_AES_128_CBC PRF_HMAC_SHA1 [RFC2104] AUTH_HMAC_SHA1_96 [RFC2404] Source: draft-ietf-ipsec-ikev2-algorithms-00.txt, May
53 IPsec - Modes Transport (host-to-host) ESP: encrypts and optionally authenticates IP payload, but not IP header AH: authenticates IP payload and selected portions of IP header Tunnel (between security gateways) after AH or ESP fields are added, the entire packet is treated as payload of new outer IP packet with new outer header used for VPN 53
54 IPsec - AH Transport mode Security Parameters Index: identifies SA Sequence number: anti-replay Integrity Check Value: data authentication using HMAC-SHA-1-96 or HMAC-MD5-96 IP hdr upper layer data IP hdr AH (..., Seq. Num., ICV) upper layer data Integrity (only header fields that are not changed or are changed in a predictable manner) 54
55 IPsec - AH Tunnel mode IP hdr upper layer data New IP hdr AH (..., Seq. Num., ICV) IP hdr upper layer data Integrity (only header fields that are not changed or are changed in a predictable manner)) 55
56 IPsec - ESP header Security Parameters Index: identifies SA Sequence number: anti-replay Encrypted payload data: data confidentiality using DES, 3DES, RC5, IDEA, CAST, Blowfish Padding: required by encryption algorithm (additional padding to provide traffic flow confidentiality) Integrity Check Value : data authentication using HMAC-SHA-1-96 or HMAC-MD
57 IPsec - ESP Transport mode IP hdr upper layer data IP hdr ESP hdr upper layer data ESP tlr ICV Confidentiality Integrity 57
58 IPsec - ESP Tunnel mode IP hdr upper layer data new IP hdr ESP hdr IP hdr upper layer data ESP tlr ICV Confidentiality Integrity 58
59 IPsec: Key management RFCs 2407, 2408, and 2409 Manual Automated procedure / framework Internet Security Association and Key Management Protocol (ISAKMP), RFC 2408 (PS) key exchange mechanism: Internet Key Exchange (IKE) Oakley: DH + cookie mechanism to thwart clogging attacks SKEME 59
60 IPsec: Key management IKE defines 5 exchanges Phase 1: establish a secure channel Main mode Aggressive mode Phase 2: negotiate IPSEC security association Quick mode (only hashes, PRFs) Informational exchanges: status, new DH group based on 5 generic exchanges defined in ISAKMP cookies for anti-clogging 60
61 IPsec: Key management protection suite (negotiated) encryption algorithm hash algorithm authentication method: preshared keys, DSA, RSA, encrypted nonces Diffie Hellman group: 5 possibilities 61
62 IKE - Main Mode with Digital Signatures proposed attributes Initiator selected attributes Responder g x, N i K derived from master = prf( N i N r, g xy ) SIG i = Signature on H( master, g x g y... ID i ) g y, N r E(K, ID i, [Cert(i)], SIG i ) E(K, ID r, [Cert(r)], SIG r ) SIG r = Signature on H( master, g y g x... ID r ) H is equal to prf or the hash function tied to the signature algorithm (all inputs are concatenated)
63 IKE - Main Mode with Digital Signatures mutual entity authentication mutual implicit and explicit key authentication mutual key confirmation joint key control identity protection freshness of keying material perfect forward secrecy of keying material non-repudiation of communication cryptographic algorithm negotiation 63
64 IKE v2 - RFC Dec 2005 IKEv1 implementations incorporate additional functionality including features for NAT traversal, legacy authentication, and remote address acquisition, not documented in the base documents Goals of the IKEv2 specification include to specify all that functionality in a single document to simplify and improve the protocol, and to fix various problems in IKEv1 that had been found through deployment or analysis IKEv2 preserves most of the IKEv1 features while redesigning the protocol for efficiency, security, robustness, and flexibility 64
65 IKE v2 Initial Handshake (1/2) Alice and Bob negotiate cryptographic algorithms, mutually authenticate, and establish a session key, creating an IKE-SA Usually consists of two request/response pairs The first pair negotiates cryptographic algorithms and does a Diffie-Hellman exchange The second pair is encrypted and integrity protected with keys based on the Diffie- Hellman exchange 65
66 IKE v2 Initial Handshake (2/2) Second exchange divulge identities prove identities using an integrity check based on the secret associated with their identity (private key or shared secret key) and the contents of the first pair of messages in the exchange establish a first IPsec SA ( child-sa ) is during the initial IKE-SA creation 66
67 IPsec Overview Much better than previous alternatives IPsec documents hard to read Committee design: too complex ESP in Tunnel mode probably sufficient Simplify key management Clarify cryptographic requirements and thus difficult to implement (securely) avoid encryption without data authentication 67
68 VPN? Virtual Private Network Connects a private network over a public network. Connection is secured by tunneling protocols. The nature of the public network is irrelevant to the user. It appears as if the data is being sent over the private network. 68
69 69
70 VPN - Common use Remote user access over the Internet Connecting networks over the Internet Connection computers over an intranet 70
71 Remote user access over the Internet You can use existing local Internet connections. No need for long distance connections 71
72 Connecting networks over the Internet You can use existing local Internet connections. No need for long distance connections or leased lines 72
73 Connecting computers over an intranet Provides easy client access to secured or hidden networks within the corporate network 73
74 VPN - Basic requirements User authentication and user authorization Data authentication and data confidentiality Key management Encapsulation data of private network is encapsulated in packets suited for transmission over the public network. (tunneling protocol) Address management assign a client s address on the private net 74
75 Tunneling 75
76 Final remarks
77 Some observations IPSec is really transparent, SSL/TLS only conceptually, but not really in practice SSH, PGP: stand-alone applications, immediately and easy to deploy and use Network security: solved in principle Electronic commerce security: more is needed! 77
78 More information (1) William Stallings, Cryptography and Network Security - Principles and Practice, Fifth Edition, 2009 N. Doraswamy, D. Harkins, IPSec (2nd Edition), Prentice Hall, 2003 (outdated) Erik Rescorla, SSL and TLS: Designing and Building Secure Systems, Addison-Wesley, IETF web site: e.g., IETF-TLS Working Group 78
79 More information (2) Jon C. Snader, VPNs Illustrated: Tunnels, VPNs, and IPsec, Addison-Wesley, 2005 Sheila Frankel, Demystifying the IPsec Puzzle, Artech House Computer Security Series, 2001 Anup Gosh, E-Commerce Security, Weak Links, Best Defenses, Wiley, 1998 Rolf Oppliger, Security Technologies for the World Wide Web, Artech House Computer Security Series 1999 W3C Security (incl WWW Security FAQ) 79
How To Add Security To The Basic Protocols
Goals Security Protocols Prof. Bart Preneel COSIC KU Leuven - Belgium Firstname.Lastname(at)esat.kuleuven.be http://homes.esat.kuleuven.be/~preneel October 2014 Understanding how security can be added
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Internetwork Security
Internetwork Security Why Network Security Layers? Fundamentals of Encryption Network Security Layer Overview PGP Security on Internet Layer IPSec IPv6-GCAs SSL/TLS Lower Layers 1 Prof. Dr. Thomas Schmidt
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Chapter 5: Network Layer Security
Managing and Securing Computer Networks Guy Leduc Mainly based on Network Security - PRIVATE Communication in a PUBLIC World C. Kaufman, R. Pearlman, M. Speciner Pearson Education, 2002. (chapters 17 and
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Computer and Network Security
Computer and Network Security c Copyright 2000 R E Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@ciseufledu Network Security Protocols
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
T-79.159 Cryptography and Data Security
T-79.159 Cryptography and Data Security Lecture 11: Security systems using public keys 11.1 PGP Kaufman et al: Ch 17, 11.2 SSL/TLS 18, 19 11.3 IPSEC Stallings: Ch 16,17 1 Pretty Good Privacy Email encryption
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
IPSec and SSL Virtual Private Networks
IPSec and SSL Virtual Private Networks ISP Workshops Last updated 29 June 2014 1 Acknowledgment p Content sourced from n Merike Kaeo of Double Shot Security n Contact: [email protected] Virtual
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
Outline. Internet Security Protocols. Internet Evolution. Internet Standardization. IETF Intermediate documents. IETF Standards.
Outline Internet Security Protocols Bart Preneel June 2003 With thanks to Joris Claessens and Walter Fumy Preliminaries: Internet protocols, PKI, X.509, Encoding Application layer security (email) PGP,
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang [email protected]
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang [email protected] Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing
Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities
SSL/TLS Today s Topics Server Certificates Client Certificates Certification Authorities Trust Registration Authorities VPN IPSec Client tunnels LAN-to-LAN tunnels Secure Sockets Layer Secure Sockets Layer
CS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Security architecture and protocol stack Applicat. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP,
Internet Security Architecture
accepted for publication in Computer Networks and ISDN Systems Journal Internet Security Architecture Refik Molva Institut Eurécom 2229, route des Crêtes F-06904 Sophia-Antipolis [email protected] Abstract
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Using IPSec in Windows 2000 and XP, Part 2
Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
Netzwerksicherheit: Anwendungen
Internet-Technologien (CS262) Netzwerksicherheit: Anwendungen 22. Mai 2015 Christian Tschudin & Thomas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 8 Security in Computer Networks
T-79.4501 Cryptography and Data Security
T-79.4501 Cryptography and Data Security Lecture 12: Security systems using public keys 11.1 PGP 11.2 SSL/TLS 11.3 IPSEC Stallings: Ch 16,17 1 Pretty Good Privacy Email encryption program ottom up approach
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms
Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
Security Protocols and Infrastructures. h_da, Winter Term 2011/2012
Winter Term 2011/2012 Chapter 7: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents Overview Record Protocol Cipher
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail
Insecure network services NFS (port 2049) - Read/write entire FS as any non-root user given a dir. handle - Many OSes make handles easy to guess Portmap (port 111) - Relays RPC requests, making them seem
VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
VPNs Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Laboratory Exercises V: IP Security Protocol (IPSec)
Department of Electronics Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture (FESB) University of Split, Croatia Laboratory Exercises V: IP Security Protocol (IPSec) Keywords:
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
