4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks
|
|
|
- Phyllis Bond
- 10 years ago
- Views:
Transcription
1 Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP Chapter 5: Security Concepts for Networks Page 1
2 Application Layer Security All common application layer protocols transfer data in plain text. Two possibilities to secure data transfer on application layer: 1. Use IPSec and/or SSL/TLS for secure E.g. HTTPS = HTTP over SSL/TLS 2. Develop own secure application layer protocols, e.g. SSH (Secure Shell) as secure remote login PGP (Pretty Good Privacy) as a secure protocol S-HTTP (Secure Hypertext Transfer Protocol) as secure enhancement of HTTP Page 2
3 Secure Shell (SSH) One of the oldest applications: remote login SSH is a secure protocol for this purpose: Log into a remote machine Execute commands on that machine Transport files from one machine to another SSH provides: Strong encryption, server authentication, integrity protection Compression (optional) An own secure transport layer protocol SSH protocol is subdivided into: Connection Protocol Authentication Protocol Authentication Request Host Key + Server Key Transport Layer Protocol Client Encrypted Session Key OK Host / Server Page 3
4 SSH Transport Layer Protocol Runs on top of TCP and provides: Connection Setup Over TCP, SSH connections use port 22 Security functions Server authentication (no user authentication) Data confidentiality Integrity protection Negotiation of the functions during connection setup Key exchange method (e.g. Diffie-Hellman) Public key algorithm (e.g. RSA) Symmetric encryption algorithm (e.g. 3DES or IDEA in CBC mode) Message authentication algorithm Hash algorithm (e.g. MD5) Optionally, also a compression algorithm Page 4
5 SSH Authentication and Connection Protocol SSH authentication protocol for user authentication Located on top of the SSH transport protocol Supported SSH authentication methods: Public key (required): signature created with a private key of the user. Often: private keys stored encrypted at client side and the user must supply a paraphrase before the signature can be generated Password (optional) Host-based (optional): the name of the host on which the user is logged in is used in authentication SSH connection protocol for remote work Located on top of the SSH transport protocol All channels established by a user are multiplexed onto a single, encrypted tunnel provided by the SSH transport protocol Provides interactive login sessions, remote execution of commands, forwarded TCP/IP connections, and forwarded X11 connections Page 5
6 Secure Lehrstuhl für Informatik 4 The sending of s raises several security issues: Privacy - prevent anyone but the intended recipient from reading the message Usually, the sender generates a session key S and sends it to the receiver, encrypted with the receiver s key Purpose of using a session key S for an m encryption instead of the receiver s key: only need to encrypt the message ones even if there is a receiver list: Alice K Bob [S],S[m] K Carol [S],S[m] K Dave [S],S[m] Bob Carol Dave Message flow confidentiality Hide from an eavesdropper the information about sender-recipient relationships Use mix concepts from anonymity Page 6
7 Secure Lehrstuhl für Informatik 4 Authentication Guarantee the identity of the sender to the recipient Implementation: sender digitally signs a message digest of the Integrity Guarantee to the recipient that the message has not been altered since it was transmitted by the sender by using encryption Usually implemented together with authentication Message sequence integrity Verify that a sequence of messages arrived in the order it was transmitted, without any loss e.g. by including sequence numbers before encryption Containment Ability of the network to prevent messages with certain security levels from leaving a particular region (for instance a virtual private network) Need to assign a security level marker to each sent message which would be considered by routers in the forwarding process (e.g. as part of a firewall) Page 7
8 Secure Lehrstuhl für Informatik 4 Non-repudiation The recipient is able to proof that the sender really sent the message; the sender cannot deny having sent the message Simplest way: digitally sign the message Proof of submission Proof (to the sender) that a message with certain content was sent to the mail delivery system on a particular date Implementation by computing a message digest from the message concatenated with other useful information, as e.g. time of submission; then sign the message. User can later use the signed message digest to prove message and time at once Proof of delivery Proof that the recipient received a certain message on a particular date Implemented by having either the recipient or the mail delivery system sign a message digest from the message concatenated with the time of receipt (as in proof of submission) Page 8
9 Privacy Enhanced Mail (PEM) PEM was developed by IETF with the aim of enhancing with encryption, authentication integrity protection The PEM specification consists of four parts: Message format (in addition to RFC 2822) Certificates (as defined in X.509), a certification authority (CA) hierarchy, and Certificate Revokation Lists (CRLs) Cryptographic algorithms to be used (e.g. DES-CBC, RSA, MD5, ) Formats of control messages PEM has been designed to work with a mail infrastructure that only handles plain text Enhancement: S/MIME to integrate Multi-purpose Internet Mail Extensions (MIME) into a secure mail standard Page 9
10 PEM Message Format PEM messages can consist of several parts of different security level: Ordinary: unsecured data Integrity-protected unmodified data (MIC-CLEAR): the original message is included unmodified as part of the PEM message, but an integrity check is added Integrity-protected encoded data (MIC-ONLY): the message first is base64-encoded, then an integrity check is added Encoded encrypted integrity-protected data (ENCRYPTED): an integrity check on the message is computed, then message and integrity check are encrypted with a randomly selected per-message secret key. The encrypted message/integrity check and the key are each base64-encoded to pass through message transfer agents as ordinary text Parts are included in a normal mail body (like for MIME) and seperated by markers Page 10
11 PEM Message Example Hi, this is a PEM example letter. Regards Marker Header information: security level and encryption mode (here: DES in CBC mode plus IV) Certificate of sender (optional) Message content: Encrypted MIC Message key, encrypted with the public key of one recipient (here: two recipients) Blank line -----BEGIN PRIVACY-ENHANCED MESSAGE----- Proc-Type: 4,ENCRYPTED Content-Domain: RFC822 DEK-Info: DES-CBC,C4E711C7F3F33772 Originator-Certificate: MIIBrDCCAVYCAUwwDQYJKoZIhvcNAQECBQAwSjELMAkGA1UEBhMCREUxOzA5BgNV BAoTMkdlc2VsbHNjaGFmdCBmdWVyIE1hdGhlbWF0aWsgdW5kIERhdGVudmVyYXJi ZWl0dW5nMB4XDTk0MDEyMTA4MTM1MVoXDTk1MTIzMTIzMDAwMFowezELMAkGA1UE BhMCREUxOzA5BgNVBAoTMkdlc2VsbHNjaGFmdCBmdWVyIE1hdGhlbWF0aWsgdW5k IERhdGVudmVyYXJiZWl0dW5nMRIwEAYDVQQHEwlEYXJtc3RhZHQxGzAZBgNVBAMT EldvbGZnYW5nIFNjaG5laWRlcjBZMAoGBFUIAQECAgIAA0sAMEgCQQCOj39uwvnu trndbdayu12bioomecmogic5m42nb1vwhrctgaj3aca7rjrildhlyiuiwbjv0ac7 QILEb97YssWdAgMBAAEwDQYJKoZIhvcNAQECBQADQQAzmvCqJqw6PvvsiDFUcbNC c/4cgig5xko1j6a+rvydmgbungjtsnk90nqxhl62xmb8h2l0mw5pn5+aiwwtbkdw MIC-Info: RSA-MD5,RSA, WQRudJHT8QKNRvSpgQlrnFBpFNOP+Ek6JwFImEXnnEW87/dL/sQe+Z4+JCEXZbnJ wxaxlpb3hueixmhesqjakfxna9uyco+n Recipient-ID-Asymmetric: MEoxCzAJBgNVBAYTAkRFMTswOQYDVQQKEzJHZXNlbGxzY2hhZnQgZnVlciBNYXRo ZW1hdGlrIHVuZCBEYXRlbnZlcmFyYmVpdHVuZw==,38 Key-Info: RSA, YIt1/6EYVV2zheVNiTyh0DA3vwX/GhMk2IDYp7MSlFhQ4PIODaXrIYUwTAzEw/oE 7cpI1jFxf3hqjjaSkZrkDA== Recipient-ID-Asymmetric: MF8xCzAJBgNVBAYTAkdCMSIwIAYDVQQKExlVbml2ZXJzaXR5IENvbGxlZ2UgTG9u ZG9uMRkwFwYDVQQLExBDb21wdXRlciBTY2llbmNlMREwDwYDVQQLEwhQQVNTV09S RA==,2D6A05AC Key-Info: RSA, Hu9/pODM8eMVhXnkKb75YEz4ToWeFWecpOGzoysz4uEGRsgTc/5kBoTz3ovykqXN 74JmRaD7VkWJWWKwki/7rA== qu8hymqlihbkfzo5ch3vrvqdp626fbnssyqnhtccpyi4zfcm+wwbz5zjyqhmav5r GJKmNjiGbws= -----END PRIVACY-ENHANCED MESSAGE----- Page 11
12 PEM - Forwarding And Enclosures When Alice wants to forward Bob a message she received from someone else (say, Fred), she encapsulates it in a new message to keep Fred s signatures: -----BEGIN PRIVACY-ENHANCED MESSAGE----- header, stating MIC-CLEAR MIC (message digest signed with Bob's private key) Bob- Have a look at the stuff Fred is sending me! - --Alice BEGIN PRIVACY-ENHANCED MESSAGE----- header, stating MIC-CLEAR MIC (message digest signed with Fred's private key) Alice- <Text from Fred> -- --Fred -----END PRIVACY-ENHANCED MESSAGE END PRIVACY-ENHANCED MESSAGE----- In case of a message in ENCRYPTED mode, Alice first has to decrypt the message from Fred and re-encrypt it with Bob s key Page 12
13 PEM Certification Authority Hierarchy PEM specifies a single root CA called the IPRA (Internet Policy Registration Authority) IPRA certifies PCAs (Policy Certification Authorities), organized as a tree: IPRA HACA DACA NACA PCAs HACA HACA CA CA CA CA Various organisations' CAs individual HACA individual CA individual CA Individuals or CAs etc Each PCA has to enforced a policy from one of three possible security levels: High Assurance (HA): super-secure, i.e. implemented on special hardware, tamper resistant, etc. Discretionary Assurance (DA): well managed at top level, but does not impose any rules on the organisations to which CA certificates are granted No Assurance (NA): only constraint: not allowed to issue two certificates with same name Page 13
14 S/MIME S/MIME introduces security in MIME-encoded mails: Similar algorithms to PEM Two new MIME content parts are defined to specify algorithm and contents 1. Multipart/Signed Consists of a MIME header with all information for checking the signature, and two informative blocks: The signed message Digital signature 2. Multipart/Encrypted Information for decryption (e.g. algorithms, keys) Encrypted contents Page 14
15 S/MIME Example Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary=boundary42 --boundary42 Content-Type: text/plain states that the content consists of two parts: message and signature protocol for computing the signature protocol for computing the MIC This is a clear-signed message. Block 1: signed message --boundary42 Content-Type: application/pkcs7-signature; name=smime.p7s Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=smime.p7s Block 2: digital signature ghyhhhuujhjhjh77n8hhgtrfvbnj756tbb9hg4vqpfyf467ghigfhfyt6 4VQpfyF467GhIGfHfYT6jH77n8HHGghyHhHUujhJh756tbB9HGTrfvbnj n8hhgtrfvhjhjh776tbb9hg4vqbnj7567ghigfhfyt6ghyhhhuujpfyf4 7GhIGfHfYT64VQbnj756 --boundary42-- Page 15
16 PGP Pretty Good Privacy PGP specifies encryption and integrity protection on files (not only for mail) Most relevant differences to PEM: Key distribution PEM assumes a rigid hierarchy of CAs PGP assumes anarchy certificates/keys are distributed informally, as well as certificate revokations Certificates PEM infrastructure decides whom the user should trust to certify people PGP leaves it up to the user whom he trusts Encoding PEM expects plain text (by using encodings like base64, expanding the contents by about 33%) PGP allows to specify whether a file is text or binary, additionally zip-compression is possible Page 16
17 PGP vs. PEM Key certification Developed by Lehrstuhl für Informatik 4 Supports encryption? Supports authentication? Supports non-repudiation? Supports compression? Algorithm for data encryption Key length for data encryption (bits) Algorithm for key management Key length for key management (bits) Certificates are X.509 conformant? Can eavesdroppers read messages? Can eavesdroppers read signatures? PGP Yes Yes Yes Yes IDEA, 3DES 128, 112 RSA, DSA/ElGamal Up to 4096 No Ad hoc No No Small team PEM Yes Yes Yes No DES, 3DES 56, 112 RSA Variable Yes IPRA/PCA/CA-hierarchy No Yes IETF Page 17
18 PGP Message Format session key component key ID of K rcv session key k timestamp Encrypted with public key of the receiver k rcv key ID of K snd signature message leading two octets of hash hash filename timestamp Encrypted with private key of the receiver k snd Compressed and encryted with k data Page 18
19 PGP and Trust Lehrstuhl für Informatik 4 In PGP, each user decides which keys he trusts More secure if the user is careful Each user decides how much trust he places on different people (none, partial or complete, resp. more levels in the commercial version) possible risk for careless users? More difficult to find a path of certificates (especially in large environments), e.g. if Alice wants to find out if to trust Bob: If Alice has a disorganized mass of certificates, how can she find a chain that leads from a key she knows to a key of Bob? There might be multiple chains, and some might lead to different keys for Bob If Alice finds a chain, how much can she trust that chain? With each key PGP stores a quantity, indicating how much the key should be trusted as being legitimate, and how much the owner of the key should be trusted in certifying other keys Page 19
20 Trust Management Check the trust level of a key: Computed by the PGP system If at least one signature trust is ultimate, then the key legitimacy is 1 (complete) Otherwise, a weighted sum of the signature trust values is computed Always trusted signatures has a weight of 1/X Usually trusted signatures has a weight of 1/Y X, Y are user-configurable parameters example: X=2, Y=4 1 ultimately trusted, or 2 always trusted, or 1 always trusted and 2 usually trusted, or 4 usually trusted signatures are needed to obtain full legitimacy Page 20
21 Example Check of Trust G C H B D user F X = 1, Y = 2 untrusted / usually untrusted usually trusted A E I K always trusted ultimately trusted (you) L J M signature legitimate Page 21
Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems
Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System
Email Security. Issues:
Email Security Email Security Issues: Not real time, can afford to use public key cryptosystems more. Certification of keys is much harder because anyone can send anyone else some mail Strictly end to
Lecture 10: 1. Secure E mail E systems. Systems. Page 1
1 2 Prof. Sead Matei Ciobanu Morogan Abdul Ghafoor Abbasi Lecture 10: Secure E-mailE Lecture 10 : Secure E mail E Subjects / opics : 1. Secure E mail E systems 2. Secure, rusted, Authorized and eliable
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Electronic mail security. MHS (Message Handling System)
Electronic mail security Diana Berbecaru < diana.berbecaru @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MS MS MUA MUA (Message Transfer ) MS (Message Store)
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
E-Mail Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail)
Dept. of Information & Communication Systems E-Mail Security: PGP (Pretty Good Privacy) & PEM (Privacy-Enhanced Mail) Konstantinos Raptis Supervisor: Sokratis Katsikas Samos, September 99 Table of Contents:
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Grid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
How To Protect Your Data From Attack
Security in Communication Networks Lehrstuhl für Informatik 4 RWTH Aachen Prof. Dr. Otto Spaniol Dr. rer. nat. Dirk Thißen Page 1 Organization Lehrstuhl für Informatik 4 Lecture Lecture takes place on
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang [email protected]
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang [email protected] Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Q: Why security protocols?
Security Protocols Q: Why security protocols? Alice Bob A: To allow reliable communication over an untrusted channel (eg. Internet) 2 Security Protocols are out there Confidentiality Authentication Example:
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 3: Securing applications Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section 8.5)
Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Email Security. Why do we have to hide from the police, Daddy? Because we use PGP, son. They use S/MIME
Email Security Why do we have to hide from the police, Daddy? Because we use PGP, son. They use S/MIME Email Security Problems with using email for secure communications include Doesn t handle binary data
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
E-Mail Security. Raj Jain. Washington University in St. Louis
E-Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Internet Technology 2/13/2013
Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Institute of Computer Technology - Vienna University of Technology. L96 - SSL, PGP, Kerberos
SSL, PGP, Kerberos Secure Socket Layer (Web Security), Pretty Good Privacy (Email Security) and Authentication Agenda SSL PGP Kerberos SSL, PGP, Kerberos, v4.4 2 Page 96-1 SSL versus IPsec Application
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.2:
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
