Cryprography and Network Security, PART II: Key Exchange Protocols
|
|
|
- Vivien Quinn
- 10 years ago
- Views:
Transcription
1 Cryprography and Network Security, PART II: Key Exchange Protocols Timo Karvi Cryprography and Network Security, PART II: Key Exchange Protocols / 62
2 Building a Key Establishement Protocol We now explicate an attempt to design a good protocol. The situation is as follows: We assume that there is a set of users, any two of whom may wish to establish a new key for use in securing their subsequent communications through cryptography. Such a key is known as a session key. In order to achieve their aim the users interact with an entity called the server which will also engage in the protocol. All users trust the server to execute the protocol faithfully and not to engage in any other activity that will deliberately compromise their security. Furthermore, the server is trusted to generate the new key and to do so in such a way that it is sufficiently random to prevent an attacker gaining any useful information about it. Thus there are two users, A and B, and the trusted server S. The aim of the protocol is to establish a new secret key K AB between A and B. The role of S is to generate the key and transport it to A and B. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
3 First Attempt Our first attempt is the following naïve protocol with three messages: 1 A S: A,B 2 S A: K AB 3 A B: K AB, A Usually we make the following security assumption 1: The adversry is able to eavesdrop on all messages sent in a cryptographic protocol. If we assume this assumption, we see that the protocol is vulnerable, because the adversary can take the secret key. We must thus assume that A and S as well as B and S share a secret key. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
4 Second Attempt I 1 A S: A,B 2 S A: {K AB } KAS, {K AB } KBS 3 A B: {K AB } KBS, A This protocol is as insecure in an open environment as our first attempt, but for a completely different reason. Security Assumption 2: The adversary is able to alter all messages sent in a cryptographic protocol using any information available. In addition the adversary can re-route any message to any other principal. This includes the ability to generate and insert completely new messages. By applying the second security assumption it is possible to break the protocol without breaking the cipher: The attack proceeds as follows: Cryprography and Network Security, PART II: Key Exchange Protocols / 62
5 Second Attempt II 1 A S: A,B 2 S A: {K AB } KAS, {K AB } KBS 3 A C: {K AB } KBS, A 4 C B: {K AB } KBS, D The adversary C simply intercepts the message from A to B and substitutes D s identity for A s. The consequence is that B believes he is sharing the key with D whereas he is in fact sharing it with A. Maybe B will give D s confidential information to A. Security Assumption 3 The adversary may be a legitimate protocol participant (an insider), or an external party (an outsider), or a combination of both. This assumption leads to an alternative attack against the second protocol: Cryprography and Network Security, PART II: Key Exchange Protocols / 62
6 Second Attempt III 1 A C: A,B 2 C S: A,C 3 S C: {K AC } KAS, {K AC } KCS 4 C A: {K AC } KAS, {K AC } KCS 5 A C: {K AC } KCS, A Now A thinks he is communicating with B, but in reality he communicates with C who is able to read all the messages sent by A. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
7 Third Attempt I The previous attacks show that we must add the identities of the participants into the messages in a secure way. This leads to the following attempt: 1 A S: A,B 2 S A: {K AB,B } KAS, {K AB,A} KBS 3 A B: {K AB,A} KBS However, even this version is not completely satisfactory. Security Assumption 4: An adversary is able to obtain the value of the session key K AB used in any sufficiently old previous run of the protocol. The attack based on this assumption as follows: Cryprography and Network Security, PART II: Key Exchange Protocols / 62
8 Third Attempt II 1 A C: A,B 2 C A: {K AB,B } K AS, {K AB,A} K BS 3 A B: {K AB,A} K BS This time C intercepts the message from A to S. The key K AB is an old session key used by A and B in a previous session. Because K AB is old, C has maybe succeeded to break it. Even if K AB has not been broken, C could replay old messages in this new session, and it can cause a lot of problems. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
9 Fourth Attempt In order to prevent replays, we must add timestamps or nonces into the protocol. A nonce is a random value generated by one party and returned to that party to show that a message is newly generated. The fourth version uses nonces: 1 A S: A,B,N A 2 S A: {K AB,B,N A,{K AB,A} KBS } KAS 3 A B: {K AB,A} KBS 4 B A: {N B } KAB 5 A B: {N B 1} KAB This protocol is the famous protocol of Needham and Schroeder, published in Unfortunately, it still has a flaw. If an attacker knows old session keys, he can use such in the last three messages. Then B thinks he is communicating with A using a new session key while actually he is communicating with the attacker using an old session key. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
10 Fifth and Final Attempt By adding nonces we achieve finally a correct protocol: 1 A S: A,B,N A,N B 2 S A: {K AB,B,N A } KAS, {K AB,A,N B } KBS 3 A B: {K AB,A,N B } KBS 4 B A: B,N B Cryprography and Network Security, PART II: Key Exchange Protocols / 62
11 Concepts Related to Key Establishment Protocols I Definition A key transport protocol is a key establishment protocol in which one of the principals generates the key and this key is then transferred to all protocol users. Definition A key agreement protocol is a key establishment protocol in which the session key is a function of inputs by all protocol users. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
12 Concepts Related to Key Establishment Protocols II Definition A hybrid protocol is a key establishment protocol in which the session key is a function of inputs by more than one principal, but not by all users. This means that the protocol is a key agreement protocol from the viewpoint of some users, and a key transport protocol from the viewpoint of others. Key establishment protocols pay usually attention on compromised keys. Especially, the following properties are important. Definition A key establishment protocol provides forward secrecy if compromise of the long-term keys of a set of principals does not compromise the session keys established in previous protocols runs involving those principals. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
13 Concepts Related to Key Establishment Protocols III Definition A protocol provides partial forward secrecy if compromise of the long-term keys of one or more specific principals does not compromise the session keys established in previous protocols runs involving those principals. Definition A protocol provides resistance to key compromise impersonation if compromise of a long-term key of a principal A does not allow the adversary to masquerade to A as a different principal. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
14 Types of Attacks The following list is not complete. The ways in which the adversary may interact with one or more protocol runs are infinite. Before condemning new protocols we must remember that different protocols have different objectives. For example, some protocols may have no material to convey confidentially, being concerned solely with real-time authentication. Similarly, some protocols may use only light measures against adversaries, because efficiency requirements prevent heavy cryptography or many messages. Moreover, one should always clearly define the goals a security protocol is aimed to satisfy. Without such definitions, security proof and analyses are difficult. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
15 Eavesdropping Eavesdropping is perhaps the most basic attack on a protocol. It is obvious that encryption must be used to protect confidental information such as session keys. In certain protocols there may be other information that also needs to be protected. An interesting example is that protocols for key establishment in mobile communications usually demand that the identity of the mobile station remains confidental. Eavesdropping is sometimes distinguished as being a passive attack. The other attacks we consider all require the adversary to be active. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
16 Modification If any protocol message field is not redundant then modification of it is a potential attack. Use of cryptographic integrity mechanisms is therefore pervasive in protocols for authentication and key establishment. Whole messages, as well as individual fields, are vulnerable to modification. Many attacks do not alter any known message fields at all, but split and re-assemble fields from different messages. This means the integrity measures must cover all parts of the message that must be kepttogether; encryption is not enough. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
17 Replay Replay attacks include any situation where the adversary interferes with a protocol run by insertion of a message, or part of a message, that has been sent previously in any protocol run. We may regard replay as another fundamental type of attack which is often used in combination with other attack elements. All security protocols must take this attack into account. It is repelled usually by using enumeration of packets, nonces or timestamps. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
18 Preplay Preplay might be regarded as a natural extension of replay, although it is not clear that this is really an attack that can be useful on its own. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
19 Reflection I Reflection is really an important special case of replay. A typical scenario is where two principals engage in a shared key protocol and one simply returns a challenge that is intended for itself. This attack may only be possible if parallel runs of the same protocol are allowed but this is often a realistic assumption. That is why we pose Security Assumption 5: The adversary may start any number of parallel protocol runs between any principals including different runs involving the same principals and with principals taking the same or different protocol roles. The following example is basic. Suppose A and B already share a secret key K and choose respective nonces N A and N B for use in the protocol. The protocol is intended to mutually authenticate both parties by demonstrating knowledge of K. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
20 Reflection II 1. A B: {N A } K 2. B A: {N B } K, N A 3. A B: N B On receipt of message 2, A deduces that it must have been sent by B since only B has K. However, if A is willing to engage in parallel protocol runs then there is another possibility, namely that message 2 was originally formed by A. An adversary C can masquerade as B and successfully complete two runs of the protocol: 1. A C B : {N A } K 1. C B A: {N A } K 2. A C B : {N A } K, N A 2. C B A: {N A } K, N A 3. A C B : N A 3. C B A: N A Cryprography and Network Security, PART II: Key Exchange Protocols / 62
21 Typing Attacks I When a protocol is written on the page its elements are clearly distinct. But in practice a principal receiving a message, whether encrypted or not, simply sees a string of bits which have to be interpreted. Typing attacks exploit this by making a recipient misinterpret a message, accepting one protocol element as another one (that is, a message element of a different type). For example, an element which was intended as a principal identifier coould be accepted as a key. Such attacks typically work with replay of a previous message. An example can be seen in the well-known protocol of Otway and Rees. A and B share a long-term keys, K AS and K BS respectively, with the server S. S generates a new session key K AB and passes it to B and via B to A. N (1) A and N(2) A are nonces chosen by A and N B is a nonce chosen by B. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
22 Typing Attacks II 1. A B: N (1) A, A, B, {N(2) A,N(1) A,A,B} K AS 2. B S: N (1) A, A, B, {N(2) A,N(1) A,A,B} K AS, {N B,N (1) A,A,B} K BS 3. S B: N (1) A, {N(2) A,K AB} KAS, {N B,K AB } KBS 4. B A: N (1) A, {N(2) A,K AB} KAS Cryprography and Network Security, PART II: Key Exchange Protocols / 62
23 Typing Attacks III The typing attack works because of the similarity in the encrypted parts of the first and last messages they start with the same message field and are encrypted with the same key. As usual for this kind of attack we need to make some extra assumptions if the attack is to succeed. The attack depends on the length of the composite field N (1) A, A, B being the same as that expected for the key K AB. This may be quite reasonable assumption: N (1) A may be 64 bits, A and B could be 32 bits, so that K AB would have to be of length 128 bits, which is a popular choice of symmetric key size today. With these assumptions, an adversary C is able to execute an attack. The notation C B means that the adversary C is masquerading as principal B. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
24 Typing Attacks IV 1. A C B : N (1) A, A, B, {N(2) A,N(1) A,A,B} K AS 4. C B A: N (1) A, {N(2) A,N(1) A,A,B} K AS Cryprography and Network Security, PART II: Key Exchange Protocols / 62
25 Typing Attacks V C masquerades as B and intercepts the message from A. C then returns the encrypted part of this message to A, which is interpreted by A as message 4 of the protocol. A will accept the composite field N (1) A,A,B as the shared key K AB. Of course C knows the values of N (1) A, A and B from message 1, and so is able to continue masquerading as B for the duration of the session. Typing attacks can be countered by various methods. Ad hoc precautions include changing the order of the message elements each time they are used, and ensuring that each encryption key is used only once. More systematic methods are to include an authenticated message number in each message or an autenticated type field with each field. Naturally these come at a cost in computation and bandwidth. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
26 Cryptanalysis Cryptographic algorithms used in protocols are often treated abstractly and considered immune to cryptanalysis. However, there are some exceptions that should be mentioned. The most important exception is when it is known that a key is weak and relatively easy to guess once sufficient evidence is available. This evidence will normally be a pair of values, one of which is a function of the key; examples are a plaintext valueand its MAC (message authentication code). The most common example of use of a weak key is when the key is formed from a password that needs to be remembered by a human. In this situation the effective key length can be estimated from the set of values that are parctically use as passwords, and is certainly much smaller than would be acceptable as the key length of any modern cryptosystem. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
27 Certificate Manipulation I Principals, who make use of a certicate are trusting that a certificate authority has correctly identified the owner of the public key at the time that the certificate was issued. However, it is not necessarily expected that the authority is provided with evidence that the correspondending private key is actually held by the principal claiming ownership of the key pair. This leads to potential attacks in which the adversary gains a certificate that a public key is its own, even though it does not know the corresponding private key. Consider a key agreement protocol of Matsumoto et al. Principals A and B possess public keys g a and g b, respectively, and corresponding private keys a and b. Here g generates a suitable group in which the discrete logarithm problem is hard. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
28 Certificate Manipulation II Each public key is certified and so A and B possess certificates Cert(A) and Cert(B) which contain copies of their public keys. 1. A B: g x, Cert(A) 2. B A: g y, Cert(B) The shared key is K AB = g ay+bx, calculated by A as (g y ) a (g b ) x and by B as (g a ) y (g x ) b. The adversry C engineers an attack by choosing a random value c, claiming that g ac is its public key, and obtaining a certificate for this public key. Notice that C cannot obtain the corresponding private key ac. C then masquerades as B, and completes two runs of the protocol, one with A and one with B, as shown in the attack below. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
29 Certificate Manipulation III 1. A C B : g x, Cert(A) 1. C B: g x, Cert(C) 2. B C: g y, Cert(B) 2. C B A: g yc, Cert(B) After the attacking run is complete, A will calculate the key K AB = (g yc ) a (g b ) x = g acy+bx and B will calculate the key K CB = (g ac ) c (g x ) b = g acy+bx. Thus A and B have found the same key, but A believes that this key is known only to A and B while B believes it is known only to C and B. This misunderstanding can lead to problems in the subsequent use of the session key. Attacks of this sort can be avoided by demanding that every principal demonstrates knowledge of the private key before a certificate is issued for any public key. Such a demonstration is ideally achieved using zero knowledge techniques. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
30 Certificate Manipulation IV A more convenient method may be to have the private key owner sign a specific message or challenge. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
31 Protocol Interaction Most long-term keys are intended to be used for a single protocol. However, it could be the case that keys are used in multiple protocols. This could be due to careless design, but may be deliberate in cases where devices with small storage capability are used for multiple applications. It is easy to see that protocols designed independently may interact badly. For example, a protocol that uses decryption to prove possession of an authenticating key may be used by an adversary to decrypt messages from another protocol, if the same key is used. One method to prevent such attacks is to include the protocol details (such as unique identifier and version number) in an authenticated part of the protocol messages. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
32 Design Principles for Cryptographic Protocols I Adadi and Needham have proposed a set of principles intended to act as rules of thumb for protocol designers. They were derived from observation of the most common errors that have been found in published protocols. Of course, new kind of errors or attacks will be found, but the following list helps at least to avoid old mistakes. 1. Every message should say what it means: the interpretation of the message should depend only on its content. 2. The conditions for a message to be acted upon should be clearly set out so that someone reviewing a design may see whether they are acceptable or not. 3. If the identity of a principal is essential to the meaning of a message, it is prudent to mention the principal s name explicitly in the message. 4. Be clear about why encryption is being done. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
33 Design Principles for Cryptographic Protocols II 5. When a principal signs material that has already been encrypted, it should not be inferred that the principal knows the content of the message. 6. Be clear about what properties you are assuming about nonces. 7. If a predictable quantity is to be effective, it should be protected so that an intruder cannot simulate a challenge and later replay a response. 8. If timestamps are used as freshness guarantees, then the difference between local clocks at various machines must be much less than the allowable age of a message. 9. A key may have been used recently, for example to encrypt a nonce, and yet be old and possibly compromised. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
34 Design Principles for Cryptographic Protocols III 10. It should be possible to deduce which protocol, and which run of that protocol, a message belongs to, and to know its number in the protocol. 11. The trust relations in a protocol should be explicit and there should be good reasons for the necessity of these relations. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
35 Bellare-Rogaway MAP1 Protocol I We start with an instructive example of a protocol which has formally been proved correct, but which anyway has a flaw. The protocol, Bellare-Rogaway MAP1, assumes that both entities have the same secret key. The entities try to authenticate each other. We use the following notations: {M} K : encryption of message M with key K to provide confidentiality and integrity. [M] K : one-way transformation of message M with key K to provide integrity. The MAP1 mutual authentication protocol was proposed in a landmark paper of Bellare and Rogaway. They provided a formal definition and showed that MAP1 is provably secure. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
36 Bellare-Rogaway MAP1 Protocol II 1. A B: N A 2. B A: N B, [B,A,N A,N B ] KAB 3. A B: [A,N B ] KAB In the Bellare-Rogaway model of security, an adversary may only interact with sessions of the same protocol. An attack of Alves-Foss shows why this assumption is insufficient. He designed the following protocol, known as EVE1, which can also be shown to be provably secure: 1. A B: N A 2. B A: N B, [A,B,N A,N B ] KAB 3. A B: [A,N B ] KAB Cryprography and Network Security, PART II: Key Exchange Protocols / 62
37 Bellare-Rogaway MAP1 Protocol III. A chosen protocol attack on the MAP1 protocol is now possible. Suppose I is an adversary who wishes to attack the protocol. In the following attack A is used as an oracle against himself. In the attack, I masquerades as B in a run of the MAP1 protocol started by A. In parallel, I starts a run of the EVE1 protocol with A while masquerading as B. 1. A I B : N A 1. I B A: N A 2. A I B : N A, [B,A,N A,N A ] K AB 2. I B A: N A, [B,A,N A,N A ] K AB 3. A I B : [A,N A ] K AB Is the attack on the MAP1 protocol valid? Cryprography and Network Security, PART II: Key Exchange Protocols / 62
38 Bellare-Rogaway MAP1 Protocol IV A reasonable conclusion may be that the attack is invalid since it violates an assumption of the model used in proving the protocol secure. On the other hand, the attack is a reminder that provably security does not guarantee security against a chosen protocol attacks. There is also an article which pays attention on security proofs: Kim-Kwang Raymond Choo, Colin Boyd, and Yvonne Hitchcock: Errors in Computational Complexity Proofs for Protocols, ASIACRYPT 2005, LNCS 3788, pp Cryprography and Network Security, PART II: Key Exchange Protocols / 62
39 ISO/IEC standards I The international standard ISO/IEC 9798 Part 2 specifies six authentication protocols using symmetric encryption algorithms. Four of these protocols are intended to provide entity authentication alone, while two are intended to provide key establsihment as well as entity authentication. We present here the fourth protocol: 1. B A: N B 2. A B: {N A,N B,B} KAB 3. B A: {N B,N A } KAB No attack against this protocol has been found. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
40 Server-Less Key Establishment We present two protocols that allow keys to be established directly between two users without the use of a server. The protocol require that the two users share a long-term secret key. In what follows, K AB is a long-term secret key shared by the entities and K AB is a new session key. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
41 Andrew Secure RPC Protocol I 1. A B: {N A } KAB 2. B A: {N A +1,N B } KAB 3. A B: {N B +1} KAB 4. B A: {K AB,N B } K AB Burrows et al. have pointed out a major problem with the protocol: A has no assurance that K AB is fresh. An intruder could substitute a previously recorded message 4 and force A to accept an old, possibly compromised, session key. Clark and Jacob pointed out another problem, using the following attack: 1. A B: {N A } KAB 2. B A: {N A +1,N B } KAB 3. A B: {N B +1} KAB 4. I B A: {N A +1,N B } KAB Cryprography and Network Security, PART II: Key Exchange Protocols / 62
42 Andrew Secure RPC Protocol II The result of the attack is that A accepts the value N A +1 as a session key with B. The potential damage of the attack depends on what property the nonce N A is assumed to have. If N A is a predictable nonce such as a counter value, then the attacker could force A into accepting a bogus quantity as a session key, whose value could be known to the attacker. If N A were random, however, then the potential damage is not so immediate since there is no release of the session key. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
43 Burrows et al Modification I Burrows et al. has suggested a modification of Andrew s protocol, where the treatment of the nonces are changed. The nonce N A needs not to be secret and the nonce N B could be omitted altogether: 1. A B: A,N A 2. B A: {N A,K AB } K AB 3. A B: {N A } K AB 4. B A: N B Lowe has published the following attack. An intruder engages in two protocol runs with A while masquerading as B. In one of these runs I is the initiator of the protocol, while in the other A is induced to act as initiator. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
44 Burrows et al Modification II 1. A I B : A,N A 1. I B A: B,N A 2. A I B : {N A,K AB } K AB 2. I B A: {N A,K AB } K AB 3. A I B : {N A } K AB 3. I B A: {N A } K AB 4. I B A: N I 4. A I B : N A The result of the attack is that A has completed two successful runs, apparently with B, although B has not engaged in the protocol. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
45 Boyd s protocol Boyd has invented a surprisingly simple protocol which seems to be correct. 1. A B: N A 2. B A: N B The new key is K AB = f(n A,N B,K AB ). Function f must be such that it infeasible to find the value of f without knowing K AB. Typically, f could be a MAC function. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
46 Server-Based Key Establishment We use the following notations: A and B are two users wishing to establish a session key. S is the server. K AS and K BS are long-term keys, initially shared by A and S, and by B and S. K AB is a session key shared by A and B. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
47 Denning-Sacco Protocol I We have already seen Needham-Schroeder protocol which contains a flaw. Denning and Sacco suggested the following protocol as a solution: 1. A S: A, B 2. S A: {B,K AB,T S,{A,K AB,T S } KBS } KAS 3. A B: {A,K AB,T S } KBS Here T is a timestamp. When B receives the message in step 3, he rejects it, if the timestamp is too old. This method demands synchronization of clocks in a distributed system which may be not simple. There are a lot of other protocols which do not use timestamps. Maybe the best known is Otway-Rees Protocol, but it contains also a flaw. We skip these protocols. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
48 Robust Principles for Public Key Protocols I Anderson and Needham have proposed a set of what they call robustness principles for publi-key-based protocols. These can be considered as more specific instances of the general principles for protocol design proposed earlier by Adabi and Needham. 1. Sign before encrypting. If a signature is affixed to encrypted data then one cannot assume that the signer has any knowledge of the data. 2. Be careful how entities are distinguished. If possible avoid using the same key for two different purposes (such as signing and decryption) and be sure to to distinguish different runs of the same protocol from each other. 3. Be careful when signing or decrypting data that you never let yourself be used as an oracle by your opponent. 4. Account all the bits: how many provide equivocation, redundancy, computational complexity, and so on. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
49 Robust Principles for Public Key Protocols II 5. Do not assume that a message you receive has a particular form (such as g r for known r) unless you can check this. 6. Do not assume the secrecy of anybody else s secrets (except possibly those of a certification authority). 7. Be explicit about the security parameters of cryptographic primitives. Syverson (Limitations on design principles for public key protocols) questioned the applicability of some of the principles by showing examples when they are not appropriate. Nevertheless, Syverson concludes that the principles are still useful but should be used intelligently and critically by the protocol designer. Especially, the first principle is often ignored. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
50 ISO/IEC protocols I The standard specifies six key transport protocols in a generic fashion and with some optional items. We study three of these. The first is very simple and shows the power of public key cryptography: 1. A B: E B (A,K AB,T A ) where E B is encryption function using B s public key. It is essential to assume that the public key encryption used provides non-malleability An encryption scheme provides non-malleability, if it is infeasible to take an existing ciphertext and transfer it into a related ciphertext without knowledge of the input plaintext. If the protocol does not satisfy non-malleability, then the adversary may be able to change the value of the fields A and T A included in the encrypted message. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
51 ISO/IEC protocols II However, the standard does not mention this property. The protocol works well with respect to A. On the other hand, A achieves no assurance with regard to key confirmation, or even that B is operative. Moreover, B cannot be sure with whom he is communicating. The timestamp T A guarantees the freshness of the message, but not the freshness of the key. That is why the timestamp is optional in the standard. In mechanism 2, authentication is added: 1. A B: B,T A,E B (A,K AB ),Sig A (B,T A,E B (A,K AB )) Again, no key confirmation from B, but the signature of A allows B to achieve key confirmation. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
52 ISO/IEC protocols III This protocol violates the first principle of Andersson and Needham, but this does not seem to lead into difficulties. The final protocol 6 achieves mutual entity authentication and mutual key confirmation. 1. A B: E B (A,K AB,N A ) 2. B A: E A (B,K BA,N A,N B ) 3. A B: N B No attacks are known against this protocol. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
53 Needham-Schroeder Public Key Protocol I The Needham-Schroeder public key protocol was one the earliest published key establishment protocols along with it well-known companion using symmetric encryption. 1. A B: E B (N A,A) 2. B A: E A (N A,N B ) 3. A B: E B (N B ) In 1996, an attack was found with the help of the automatic analysing tool FDR: 1. A C: E C (N A,A) 1. C A B: E B (N A,A) 2. B C A : E A (N A,N B ) 2. C A: E A (N A,N B ) 3. A C: E C (N B ) 3. C A B: E B (N B ) Cryprography and Network Security, PART II: Key Exchange Protocols / 62
54 Needham-Schroeder Public Key Protocol II The correction is simple: 1. A B: E B (N A,A) 2. B A: E A (N A,N B,B) 3. A B: E B (N B ) Cryprography and Network Security, PART II: Key Exchange Protocols / 62
55 Key Generation with Diffie-Hellman So far we have studied protocols which transport keys from one entity to another. The other possibility is to generate keys together, without transporting them at all. These methods are based on the Diffie-Hellman key generating method. The basic method suffers from man-in-the-middle attack, so something must be added to the basic scheme. There are many suggestions: MTI protocols, MQV, STS, Oakley, SKEME, IKE etc. We present Station-to-Station (STS) protocol, because it is simple and its modified version seems correct. We study also IKE which is the key agreement phase of the IPSec protocol. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
56 Station-to-Station Protocol I In the protocol, A and B use Z q with q prime and with a generator (primitive root) g. A and B calculate t A = g r A, t B = g r B, respectively, where r A and r B are random numbers. Then: 1. A B: A,B,t A 2. B A: B,A,t B,{Sig B (t B,t A )} KAB 3. A B: A,B,{Sig A (t A,t B )} KAB where K AB = g r Ar B (or derived from g r Ar B ). This version seems to prevent the man-in-the-middle attack. There is, however, a similar attack: 1. A C B : A,B,t A 1. C B: C,B,t A 2. B C: B,C,t B,{Sig B (t B,t A )} KAB 2. C B A: B,A,t B,{Sig B (t B,t A )} KAB 3. A C B : A,B,{Sig A (t A,t B )} KAB Cryprography and Network Security, PART II: Key Exchange Protocols / 62
57 Station-to-Station Protocol II Result: B has no indication that A has engaged in the protocol and yet A has completed a succesful run and accepted that her partner is B. These kind of unknown key-share attacks can be prevented by including the name of the partner entity in the signatures exchanged. Moreover, this change provides an explicit indication of the peer entity so that the stronger form of entity authentication is achieved. In addition, there no longer seems to be a need for the symmetric encryption: 1. A B: t A 2. B A: t B,Sig B (t B,t A,A) 3. A B: Sig A (t A,t B,B)} Cryprography and Network Security, PART II: Key Exchange Protocols / 62
58 Internet Key Exchange, IKE I IKE is the key establishment protocol of IPSec. IPSec is used to communicate confidentally over a public network. By creating a so-called security association IPSec transports encrypted and authenticated packets. It is a network layer protocol and it is used to build virtual private networks. Moreover, if IPSec is applied between gateways or routers, its tunnel mode hides the source and destination IP-addresses. In order to create and to use a security association, symmetric session keys must be established first. Many protocols have been suggested for the key establishment of IPSec: Oakley, SKEME, Photuris, ISAKMP/Oakley. After many, confusing, years, a single Internet standard emerged in 1998, known as Internet Key Exchange or IKE. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
59 Internet Key Exchange, IKE II However, the first versions of IKE were complicated and they generated a lot of critisism. For example, one early version had eight different modes of operation. The newest version, IKEv2, developed , has only one operation mode with some options. We describe here the option which uses public key cryptography with certificates. Our presentation concentrates on the security aspects of IKE, so we drop the headers from the messages. Typically, headers contain version numbers and flags of various sort plus security parameter index SPI which identifies the security association uniquely. Similarly, we drop SA-payloads which are used to negotiate cryptographic algorithms for encryption, digital signatures and hash functions. The algorithm: Cryprography and Network Security, PART II: Key Exchange Protocols / 62
60 Internet Key Exchange, IKE III Here: 1. A B: t A,N A 2. B A: t B,N B,C B 3. A B: {A,C A,Auth} KAB 4. B A: {B,C B,Auth} KBA 1 t A and t B are the Diffie-Hellman values calculated by A and B, respectively. 2 N A and N B are nonces. 3 C B and C A are the public key certificates of B and A, respectively. 4 Auth is a block of data signed by the sender s secret key. 5 The keys K AB and K BA are different, but they have been derived from the common DH value. So both A and B know these keys. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
61 Internet Key Exchange, IKE IV An expected attack against IKE is state and CPU exhaustion, where the target is flooded with session initiation requests from forged IP addresses. Against this attack, IKE has a possibility to use cookies in the first response message. A cookie contains a challenge which must be solved and sent back by the initiator. The first three messages look in this case as follows: 1. A B: t A,N A 2. B A: Cookie 3. A B: Cookie, t A,N A Cryprography and Network Security, PART II: Key Exchange Protocols / 62
62 Internet Key Exchange, IKE V After this, the protocol continues as before. B should send a cookie back when it detects a large number of half-finished IKE-negotiations. There are many other details which must be taken into account in this type of a practical protocol. For example: Retransmission timers. Use of sequence numbers (against reply). Window size for overlapping requests. State synchronization and connection timeouts. Rekeying. Reuse of DH-exponentials. Generating keying material. Extensible authentication methods (EAP). Error handling. NAT traversal. Cryprography and Network Security, PART II: Key Exchange Protocols / 62
Cryptography and Network Security: Summary
Cryptography and Network Security: Summary Timo Karvi 12.2013 Timo Karvi () Cryptography and Network Security: Summary 12.2013 1 / 17 Summary of the Requirements for the exam The advices are valid for
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
A Search-Based Framework for Security Protocol Synthesis
A Search-Based Framework for Security Protocol Synthesis Hao Chen Submitted for the degree of Doctor of Philosophy The University of York Department of Computer Science April 2007 For My Mum and Dad 献
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Q: Why security protocols?
Security Protocols Q: Why security protocols? Alice Bob A: To allow reliable communication over an untrusted channel (eg. Internet) 2 Security Protocols are out there Confidentiality Authentication Example:
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext
Part 2 Plaintext M Encrypt with public key E(M, K) Ciphertext Plaintext M D(E(M, K),K ) Decrypt with private key E(M, K) Public and private key related mathematically Public key can be published; private
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack
Elements of Applied Cryptography Key Distribution Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack Point-to-point key establishment Alice Bob Each pair of users must share
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Modeling and verification of security protocols
Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt [email protected] Paper and slides available
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Kerberos. Guilin Wang. School of Computer Science, University of Birmingham [email protected]
Kerberos Guilin Wang School of Computer Science, University of Birmingham [email protected] 1 Entity Authentication and Key Exchange In the last talk, we discussed key exchange and reviewed some concrete
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a one-round Feistel cipher
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Cryptography and Network Security, PART IV: Reviews, Patches, and11.2012 Theory 1 / 53
Cryptography and Network Security, PART IV: Reviews, Patches, and Theory Timo Karvi 11.2012 Cryptography and Network Security, PART IV: Reviews, Patches, and11.2012 Theory 1 / 53 Key Lengths I The old
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
SIGMA: the SIGn-and-MAc Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols
SIGMA: the SIGn-and-MAc Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols Hugo Krawczyk June 12, 2003 Abstract We present the SIGMA family of key-exchange protocols and the SIGn-and-MAc
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security Securing communications (SSL/TLS and IPSec) Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network communication Who are you
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
CS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Exercise: Chapters 13, 15-18 18 1. [Kaufman] 13.1
Dr. Arjan Durresi. Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/
Set of Problems 2 Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana State University
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
IPSEC: IKE. Markus Hidell [email protected]. Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers
IPSEC: IKE Markus Hidell [email protected] Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers 1 Reading Kaufman, chapter 18 (and some of 16) 2 Secure Key Establishment
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Computer Networks - CS132/EECS148 - Spring 2013 --------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 5 Deadline : May 30th 9:30pm (hard and soft copies required) --------------------------------------------------------------------------
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Network Security. Network Security Hierarchy. CISCO Security Curriculum
Network Security Network Security Hierarchy Material elaborat dupa: CISCO Security Curriculum Kenny Paterson s Lectures for: M.Sc. in Information Security, Royal Holloway, University of London 1 Objectives
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec
Network Security #10 Parts modified from Computer Networking: A Top Down Approach Featuring the Internet, 2nd edition. Jim Kurose, Keith Ross, Addison-Wesley, 2002. 1 Overview Encryption Authentication
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Kerberos. Login via Password. Keys in Kerberos
Kerberos Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos
Message Authentication Code
Message Authentication Code Ali El Kaafarani Mathematical Institute Oxford University 1 of 44 Outline 1 CBC-MAC 2 Authenticated Encryption 3 Padding Oracle Attacks 4 Information Theoretic MACs 2 of 44
TELE 301 Network Management. Lecture 18: Network Security
TELE 301 Network Management Lecture 18: Network Security Haibo Zhang Computer Science, University of Otago TELE301 Lecture 18: Network Security 1 Security of Networks Security is something that is not
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
