Authenticated Encryption in TLS Kenny Paterson
|
|
|
- Garry Kelly
- 10 years ago
- Views:
Transcription
1 Authenticated Encryption in TLS Kenny Paterson DIAC 2013 Information Security Group
2 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 2
3 TLS SSL = Secure Sockets Layer. Developed by Netscape in mid 1990s. SSLv3 still widely supported. TLS = Transport Layer Security. IETF-standardised version of SSL. TLS 1.0 in RFC 2246 (1999). TLS 1.1 in RFC 4346 (2006). TLS 1.2 in RFC 5246 (2008). 3
4 TLS Why You Should Care Originally for secure e-commerce, now used much more widely. Retail customer access to online banking facilities. Access to gmail, facebook, Yahoo, etc. Mobile applications, including banking apps. Payment infrastructures. TLS has become the de facto secure protocol of choice. Used by hundreds of millions of people and devices every day. A serious attack could be catastrophic, both in real terms and in terms of perception/confidence. 4
5 TLS Protocol Architecture Handshake Protocol Change Cipher Spec Protocol Alert Protocol HTTP, other apps Record Protocol TCP 5
6 TLS Record Protocol TLS Record Protocol provides: Data origin authentication, integrity using a MAC. Confidentiality using a symmetric encryption algorithm. Anti-replay using sequence numbers protected by the MAC. Optional compression. Fragmentation and reassembly of application layer messages. Keys for the algorithms are supplied by the TLS Handshake Protocol. 6
7 TLS Record Protocol: MAC-Encode-Encrypt SQN HDR Payload MAC Payload MAC tag Padding Encrypt HDR Ciphertext MAC Encrypt Padding HMAC-MD5, HMAC-SHA1, HMAC-SHA256 CBC-AES128, CBC-AES256, CBC-3DES, RC or or or. or FF FF.FF 7
8 AE and TLS Dedicated Authenticated Encryption (AE) schemes are supported in TLS 1.2. AES-GCM specified in RFC AES-CCM specified in RFC But TLS 1.2 is not yet widely supported. Most browsers support SSLv3 and TLS 1.0 only. Currently, roughly 50/50 usage split between CBC-mode and RC4. Less than 15% of servers support TLS 1.1 or higher (source: SSL Pulse). [29% of servers still support SSLv2!] In the rest of the talk, we focus on CBC-mode and RC4. 8
9 TLS Record Protocol Features Sequence number is 64 bits in size and is incremented for each new message. Sequence number not transmitted as part of message. Each end of connection maintains its own view of the current value of the sequence number. TLS is reliant on TCP to deliver messages in order. Wrong sequence number leads failure of MAC verification A fatal error leading to session teardown. Creates stateful encryption scheme. Preventing replay, insertion, reordering attacks, 9
10 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 10
11 Theory for TLS TLS employs a (stateful) MAC-then-encrypt composition. This is known to be not generically secure, according to results of [BN00]. We can construct an IND-CPA secure encryption scheme and a SUF-CMA secure MAC scheme for which the MAC-then-encrypt composition fails to be IND-CCA secure. 11
12 Theory for TLS Building on results of Krawczyk [K01], the basic MACthen-encrypt construction can be shown to be IND-CCA secure for the special case of CBC mode encryption. Even better, for CBC mode encryption, the composition is both IND-CPA and INT-CTXT secure, i.e. AE-secure. INT-CTXT: hard to forge a new, valid ciphertext, having seen many ciphertexts for chosen messages. This extends to the stateful setting, as formalised in [BKN03]. AE security also holds for RC4 under the assumption that its output is pseudorandom. 12
13 Theory for TLS Caveats Krawczyk s analysis assumes random IVs for CBC mode. SSL 3.0 and TLS 1.0 use chained IVs. TLS is really using MAC-Encode-Encrypt. With a specific padding scheme for the Encode step. But padding is not treated in the analysis of [K01]. Data is assumed to be block-aligned, and MAC size = block size. RC4 has known statistical weaknesses. Do these gaps between theory and reality matter? 13
14 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 14
15 CBC Mode in TLS P i-1 e K C i-1 P i e K C i SSLv3 and TLS 1.0 use a chained IV in CBC mode. IV for current message is the last ciphertext block from the previous message. C i-1 d K P i-1 C i d K P i Modified in TLS 1.1, 1.2. TLS 1.2 now has explicit IV and recommends IV SHOULD be chosen at random for each message. 15
16 Attacking Predictable IVs IV chaining in SSLv3 and TLS 1.0 leads to a chosen-plaintext distinguishing attack against TLS. First observed for CBC mode by Rogaway in Then applied to TLS by Dai and Moeller in Extended to theoretical plaintext recovery attack by Bard in 2004/2006. Turned into a practical plaintext recovery attack by Duong and Rizzo in The BEAST! 16
17 The BEAST and client-side malware Cookie for remote site Browser TLS tunnel 17
18 The BEAST Key points: - BEAST malware injected ahead of time into client browser. - Achieves chosen-plaintext capability for TLS encryption. - Uses HTTP padding to control positions of unknown bytes. - Communicates with MITM attacker. - It works. Malware can also initiate its own TLS sessions to remote host. - Browser will then automatically inject HTTP cookies into TLS session on behalf of malware. - Enables multi-session attacks targeting HTTP cookies. - More later! 18
19 The BEAST Countermeasures Switch to using TLS 1.1 or Uses random IVs, so attack prevented. For TLS 1.0 users: - Use 1/n-1 record splitting. - Now implemented in most but not all browsers. - Safari (Apple): status unknown. - Send 0-length dummy record ahead of each real record. - Breaks some implementations. - Switch to using RC4. - As recommended by many expert commentators. 19
20 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 20
21 TLS Record Protocol: MAC-Encode-Encrypt SQN HDR Payload MAC Payload MAC tag Padding Encrypt HDR Ciphertext MAC Encrypt Padding HMAC-MD5, HMAC-SHA1, HMAC-SHA256 CBC-AES128, CBC-AES256, CBC-3DES, RC or or or. or FF FF.FF 21
22 TLS and Padding Oracles [V02,CHVV03]: Specifics of TLS padding format can be exploited to mount a plaintext recovery attack. No chosen-plaintext requirement. The attack depends on being able to distinguish good from bad padding. In practice, this is done via a timing side-channel. The MAC is only checked if padding good, and the MAC is always bad in the attack. Distinguish cases by timing TLS error messages. 22
23 TLS and Padding Oracles [V02,CHVV03]: The attack is multi-session. Each trial in the attack causes a fatal error and TLS session termination. The attack still works if a fixed plaintext is repeated in a fixed location across many TLS sessions. e.g. a password in an automated login. Modern viewpoint: use BEAST-style malware and target HTTP cookies. Attack worked for OpenSSL. Roughly 2ms difference for long messages. Enabling recovery of TLS-protected Outlook passwords in about 3 hours. 23
24 Countermeasures? Redesign TLS: Pad-MAC-Encrypt or Pad-Encrypt-MAC. Too invasive, did not happen. Switch to RC4. Or add a fix to ensure uniform errors? If attacker can t tell difference between MAC and pad errors, then maybe TLS s MEE construction is secure? So how should TLS implementations ensure uniform errors? 24
25 Ensuring Uniform Errors From the TLS 1.2 specification: implementations MUST ensure that record processing time is essentially the same whether or not the padding is correct. In general, the best way to do this is to compute the MAC even if the padding is incorrect, and only then reject the packet. Compute the MAC on what though? 25
26 Ensuring Uniform Errors For instance, if the pad appears to be incorrect, the implementation might assume a zero-length pad and then compute the MAC. This approach is adopted in many implementations, including OpenSSL, NSS (Chrome, Firefox), BouncyCastle, OpenJDK, One alternative (GnuTLS and others) is to remove as many bytes as are indicated by the last byte of plaintext and compute the MAC on what s left. 26
27 Ensuring Uniform Errors This leaves a small timing channel, since MAC performance depends to some extent on the size of the data fragment, but it is not believed to be large enough to be exploitable, due to the large block size of existing MACs and the small size of the timing signal. 27
28 Ensuring Uniform Errors This leaves a small timing channel, since MAC performance depends to some extent on the size of the data fragment, but it is not believed to be large enough to be exploitable, due to the large block size of existing MACs and the small size of the timing signal. 28
29 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 29
30 Lucky 13 [AP13] Distinguishing attacks and full plaintext recovery attacks against TLS-CBC implementations following the advice in the TLS 1.2 spec. And variant attacks against those that do not. Applies to all versions of SSL/TLS. SSLv3.0, TLS 1.0, 1.1, 1.2. And DTLS. Demonstrated in the lab against OpenSSL and GnuTLS. 30
31 Lucky 13 Plaintext Recovery XOR 2-byte Δ here and submit for decryption IV R 1 R 2 C t-1 C t d K d K d K d K P t (HMAC-SHA-1 + AES-CBC) Produces valid patterns or 00, OR bad pad. 31
32 Case: (or longer valid pad) XOR 2-byte Δ here and submit for decryption IV R 1 R 2 C t-1 C t d K d K d K d K SQN HDR P t = 55 bytes 20 bytes 4 SHA-1 compression function evaluations (or longer valid pad) 32
33 Case: 00 XOR 2-byte Δ here and submit for decryption IV R 1 R 2 C t-1 C t d K d K d K d K SQN HDR P t 56 bytes 20 bytes 00 5 SHA-1 compression function evaluations 33
34 Case: Bad padding XOR 2-byte Δ here and submit for decryption IV R 1 R 2 C t-1 C t d K d K d K d K SQN HDR P t 57 bytes 20 bytes 5 SHA-1 compression function evaluations zero-length pad 34
35 Lucky 13 Plaintext Recovery The injected ciphertext causes bad padding and/or a bad MAC. This leads to a TLS error message, which the attacker times. There is a timing difference between case and the other 2 cases. A single SHA-1 compression function evaluation. Roughly 1000 clock cycles, 1µs range on typical processor. Measurable difference on same host, LAN, or a few hops away. Detecting the case allows last 2 plaintext bytes in the target block C t to be recovered. Using the standard CBC algebra. Attack then extends easily to all bytes. 35
36 Lucky 13 Attack Cost We need 2 16 attempts to try all 2-byte Δ values. And we need around 2 7 trials for each Δ value to reliably distinguish the different events. Noise level depends on experimental set-up. Each trial kills the TLS session. Hence the headline attack cost is 2 23 sessions, all encrypting the same plaintext. So what was all the fuss about? 36
37 Lucky 13 Improvements If 1-out-of-2 last bytes known, then we only need 2 8 attempts per byte. If the plaintext is base64 encoded, then we only need 2 6 attempts per byte. And 2 7 trials per attempt to de-noise, for a total of BEAST-style attack targeting HTTP cookies. Malicious client-side Javascript makes HTTP GET requests. TLS sessions are automatically generated and HTTP cookies attached. Pad GET requests so that 1-out-of-2 condition always holds. Cost of attack is 2 13 GET requests per byte of cookie. Now a practical attack! 37
38 Experimental Results Hardware Cycles Calculated by Adversary xFE Byte 14 of plaintext set to 01; byte 15 set to FF. OpenSSLv1.0.1 on server running at 1.87Ghz. 100 Mbit LAN. Median times (noise not shown)
39 Experimental Results Success Probabilities 1.0 Ù Ù Ú Ú Ú Ù Ù Ù Ù Á Á Á Á Á Ú Á Á Á Ù Á Ù Á Ú Ù Ù Ú Á 0.8 Á Ú Ú Ù Ï Ï Ï Ï Ï Ï Ù Ú Ú Ê 2 12 Trials HL=2 4 L 0.6 Ï 2 13 Trials HL=2 5 L Ï Ú Ï Á Ï 2 14 Trials HL=2 6 L 0.4 Ú Ï Ú 2 Ï Ù 15 Trials HL=2 7 L Á Ï Ú Ù 2 16 Trials HL=2 8 L Ù 0.2 ÊÊÊÊ ÊÊÊ Ê Ê Ê Ê Ê Ê Ê Ê Ê Ê Ê Ê Ï Ê Á 2 17 Trials HL=2 9 L Ê Ê Ê ÏÏÏ Ê ÏÏÏ Ï Ï Ú ÏÚ Ù ÁÚÚÚÚ ÙÙÙÙ Á Á ÁÁÁ ÚÚÚ ÙÙÙ ÁÚ Ù Á ÏÁ ÚÙ Percentiles OpenSSL: recovering last byte in a block, using percentile test to extract correct byte value, no assumptions on plaintext. 39
40 Lucky 13 Further Extensions The attack extends to other MAC algorithms. Nice interplay between block-size, MAC tag size and 13-byte field SQN HDR. The attack extends to other methods for dealing with bad padding. e.g. as in GnuTLS, faster but partial plaintext recovery. [The attack can be applied to DTLS. No error messages, but simulate these via DTLS Heartbeats. Errors non-fatal, so can execute attack in a single session. Cam amplify timing differences using AlFardan-Paterson techniques (NDSS 2012).] 40
41 Lucky 13 Impact OpenSSL patched in versions 1.0.1d, 1.0.0k and 0.9.8y, released 05/02/2013. NSS (Firefox, Chrome) patched in version , released 15/02/2013. Opera patched in version 12.13, released 30/01/2013 Oracle released a special critical patch update of JavaSE, 19/02/2013. BouncyCastle patched in version 1.48, 10/02/2013 Also GnuTLS, PolarSSL, CyaSSL, MatrixSSL. Microsoft determined that the issue had been adequately addressed in previous modifications to their TLS and DTLS implementation. Apple: status unknown. (Full details at: 41
42 Lucky 13 Countermeasures We really need constant-time decryption for TLS-CBC. Add dummy hash compression function computations when padding is good to ensure total is the same as when padding is bad. Add dummy padding checks to ensure number of iterations done is independent of padding length and/or correctness of padding. Watch out for length sanity checks too. Need to ensure there s enough space for some plaintext after removing padding and MAC, but without leaking any information about amount of padding removed. TL;DR: It s a bit of a nightmare. 42
43 Performance of Countermeasures Before After Probability Probability Hardware Cycles Calculated by Attacker Hardware Cycles Calculated by Attacker 43
44 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 44
45 More Theory for TLS Theorem ([PRS11], informal statement) Suppose E is a block cipher with block size n that is sprp-secure. Suppose MAC has tag size t and is prf-secure. Suppose that for all messages M queried by the adversary: M + t n. Then MEE with CBC mode encryption, random IVs, TLS padding, and uniform errors is (LH)AE secure. e K e K e K C 0 C 1 C 2 C 3 45
46 Other Lucky 13 Countermeasures? Introduce random delays during decryption. Surprisingly ineffective, analysis in [AP13]. Redesign TLS: Pad-MAC-Encrypt or Pad-Encrypt-MAC. Currently, some discussion on TLS mailing lists. No easy deployment route, seems unlikely to happen. Switch to TLS 1.2 Has support for AES-GCM and AES-CCM. Use RC4. 46
47 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 47
48 RC4 The RC4 stream cipher has long been known to have statistical weaknesses. - e.g. Mantin-Shamir bias, recent work of Maitra et al., Isobe et al. - Most attention has been given to the initial few bytes of keystream. - The focus has been on finding and giving theoretical explanations for individual biases, and on key-recovery attacks. Usual countermeasure is to discard the initial bytes of keystream and use only good bytes. So what does RC4 in TLS do? 48
49 RC4 in TLS TLS does not discard bytes! Because it hurts performance too much; The biases are small anyway; and only exist in the first few bytes. [ABPPS13]: we estimated the biases in the first 256 output bytes by sampling RC4 keystreams for 2 45 random 128-bit keys. We found many previously unreported biases of significant size 49
50 Biases in byte 16 of RC4 Output Ciphertext distribution at position 16 Probability Byte value [ ] 50
51 Biases in byte 31 of RC4 Output Ciphertext distribution at position 31 Probability Byte value [ ] 51
52 Biases in byte 128 of RC4 Output Ciphertext distribution at position 128 Probability Byte value [ ] 52
53 TLS-RC4 Attack These biases are large enough to enable plaintext recovery attacks on first 256 bytes of TLS sessions. Needs a multi-session attack. BEAST-style malware as possible generation mechanism. Attack using simple Bayesian technique: - For each byte position i: C i = P i K i - Many samples of C i, so each guess for P i induces a distribution on K i. - Estimate likelihood of induced distribution using measured distribution on K i. - Select as correct plaintext byte the candidate P i giving highest likelihood. 53
54 Success probability: 2 24 sessions 1.2" 1" 0.8" 0.6" 0.4" 0.2" 0" 0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250" 54
55 Success probability: 2 26 sessions 1.2" 1" 0.8" 0.6" 0.4" 0.2" 0" 0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250" 55
56 Success probability: 2 28 sessions 1.2" 1" 0.8" 0.6" 0.4" 0.2" 0" 0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250" 56
57 Success probability: 2 30 sessions 1.2" 1" 0.8" 0.6" 0.4" 0.2" 0" 0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250" 57
58 Success probability: 2 32 sessions 1.2" 1" 0.8" 0.6" 0.4" 0.2" 0" 0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250" 58
59 Possible Attack Enhancements Many sessions are needed. The attack can only target the first 256 plaintext bytes. Containing less interesting HTTP headers. In [ABPPS13], we solved both problems using 2-byte Fluhrer-McGrew biases. Smaller biases, but persistent throughout keystream. Arrange for HTTP session cookie to be repeatedly sent at predictable locations in keystream. Use Viterbi-style algorithm to do ML estimation of plaintext bytes. Roughly 2 33 encryptions needed for reliable recovery. 59
60 Results for 2-byte Biases 1.2" 1" 0.8" 0.6" 0.4" 0.2" 0" 0" 1" 2" 3" 4" 5" 6" 7" 8" 9" 10" 11" 12" 13" 14" x-axis: units of 2 30 encryptions. Blue line: success rate for 16-byte plaintext recovery. Red line: success rate for individual byte recovery. 60
61 TLS-RC4 Attack Countermeasures We can t just discard initial output bytes without updating all clients and servers simultaneously. And this doesn t help against 2-byte attacks anyway. We had lots of discussion with vendors on ad hoc measures for HTTP. Randomisation. Burn-off initial bytes via short messages. Put limits on number of times cookies can be sent. 61
62 TLS-RC4 Attack Impact Fewer vendors have reacted publicly. Google focussed on implementing TLS 1.2. Microsoft disabled RC4 in Windows 8.1 Preview. Opera has implemented cookie limit countermeasure. Further details at: 62
63 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 63
64 CRIME/BREACH Duong and Rizzo [DR12] found a way to exploit TLS s optional compression feature. Similar to idea in 2002 paper by Kelsey. Compression algorithms are stateful. Replace repeated strings by shorter references to previous occurrences. Degree of compression obtained for chosen plaintext reveals something about prior plaintexts! This small amount of leakage can be boosted to get plaintext recovery attack for HTTP cookies. Using same chosen plaintext vector as for BEAST. Countermeasures: disable compression; use variable length padding. BREACH: similar ideas, applied to HTTP compression. 64
65 Outline TLS and the TLS Record Protocol Theory for TLS Attacks: The BEAST Padding oracles Lucky 13 (More theory for TLS) RC4 attack CRIME/BREACH Discussion 65
66 Where Do We Stand Currently? Most TLS implementations now patched against BEAST. Many TLS implementations patched against Lucky 13. No simple TLS patch for RC4 attack. Needs application-layer modifications. Disable TLS compression to prevent CRIME. Still issues with compression at application layer (BREACH). We need TLS 1.2! Use patched CBC-mode until we get it. Other people advise differently. Their logic is that BEAST-vulnerable browsers still exist, so less-broken RC4 is preferable. 66
67 Discussion TLS s ad hoc MAC-Encode-Encrypt construction is hard to implement securely and hard to prove positive security results about. Long history of attacks and fixes. Each fix was the easiest option at the time. Now reached point where a 500 line patch to OpenSSL was needed to fully eliminate the Lucky 13 attack. Attacks show that small details matter. The actual TLS-CBC construction was only fully analysed in RC4 was known to be weak for many years. Actual exploitation of weaknesses in a TLS context went unexplored. Needed multi-session mechanism (BEAST technology) to make the attack plausible. 67
68 Discussion Once a bad cryptographic choice is out there in implementations, it s very hard to undo. Old versions of TLS hang around for a long time. There is no TLS product recall programme! Slow uptake of TLS 1.1, 1.2. TLS is coming under sustained pressure from attacks. BEAST, Lucky 13 and RC4 attacks are providing incentives to move to TLS 1.2. Attacks are semi-practical but we ignore such attacks at our peril. Good vendor response to Lucky 13, less so to RC4 attack. One is fixable, the other not (really). 68
69 Lessons for CAESAR Attacks really do improve with age. BEAST ( ), Lucky 13 (Feb. 13 Mar. 13). Design AE schemes for a broad set of use-cases and attack vectors. Fixed-key, many-key (multi-session) attacks. Chosen-plaintext, partially known-plaintext, Compression-based attacks? Look carefully at error conditions and handling. Be realistic about timescale for adoption in already deployed systems. 69
70 Research Directions? TLS Record Protocol cryptography has now been heavily analysed. Still some mileage in looking at AE implementations? Major recent progress in analysing TLS Handshake protocol. [JKSS12], [KPW13]. Can still expect implementation issues to emerge. Check the OpenSSL Fact twitter feed regularly! Complex system of interacting protocols can still throw up surprises. Alert Protocol desynchronisation attack [BFKPS13]. TLS Renegotiation attack [RD09]. 70
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre Some slides were also taken from Chanathip Namprempre's defense
A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL
A Perfect CRIME? TIME Will Tell Tal Be ery, Web research TL Agenda BEAST + Modes of operation CRIME + Gzip compression + Compression + encryption leak data TIME + Timing + compression leak data Attacking
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
HTTPS:// Secure HTTP
The CRIME attack HTTPS:// Secure HTTP HTTPS provides: Confidentiality (Encryption), Integrity (Message Authentication Code), Authenticity (Certificates) CRIME decrypts HTTPS traffic to steal cookies and
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Message Authentication Code
Message Authentication Code Ali El Kaafarani Mathematical Institute Oxford University 1 of 44 Outline 1 CBC-MAC 2 Authenticated Encryption 3 Padding Oracle Attacks 4 Information Theoretic MACs 2 of 44
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Information Security
SE 4472 / ECE 9064 Information Security Week 11: Transport Layer Security (TLS): Putting it all together Fall 2015 Prof. Aleksander Essex Security at the Transport Layer Where we started in this course:
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Authenticated encryption
Authenticated encryption Dr. Enigma Department of Electrical Engineering & Computer Science University of Central Florida [email protected] October 16th, 2013 Active attacks on CPA-secure encryption
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition
Directions in Authenticated Ciphers DIAC 2013, 11 13 August 2013, Chicago, USA AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition Shay Gueron University
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Implementation Vulnerabilities in SSL/TLS
Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
Cryptography for Secure Channels Kenny Paterson
Cryptography for Secure Channels Kenny Paterson Information Security Group Royal Holloway, University of London [email protected] Onassis Foundation Science Lecture Series 1 Outline Introduction
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Juraj Somorovsky Ruhr University Bochum 3curity GmbH [email protected] About me Security Researcher at: Chair
MAC. SKE in Practice. Lecture 5
MAC. SKE in Practice. Lecture 5 Active Adversary Active Adversary An active adversary can inject messages into the channel Active Adversary An active adversary can inject messages into the channel Eve
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
Introduction. Purpose. Background. Details
Introduction Recent media reports confirm that Secure Socket Layer (SSL) 3.0 is obsolete and insecure. This report provides guidance on how to ensure your communications use the more secure Transport Layer
TLS/SSL (Mis)Protecting our Connections Security
Intro Wrong Wrong2 Downgrade Summary TLS/SSL (Mis)Protecting our Connections Security Orr Dunkelman Computer Science Department University of Haifa 6 th September, 2015 Orr Dunkelman TLS/SSL (Mis)Protecting
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
1 Construction of CCA-secure encryption
CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Failures of secret-key cryptography. D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven. http://xkcd.
Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven http://xkcd.com/538/ 2011 Grigg Gutmann: In the past 15 years no one ever lost
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
IPV6 vs. SSL comparing Apples with Oranges
IPV6 vs. SSL comparing Apples with Oranges Reto E. Haeni [email protected] The George Washington University Cyberspace Policy Institute 2033 K Str. Suite 340 N Washington DC 20006 Washington DC,
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng
What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Transport Layer Security (TLS)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected]
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 13 Some More Secure Channel Issues Outline In the course we have yet only seen catastrophic
SSH Secure Shell. What is SSH?
Security, like correctness, is not an add-on feature. -- Andrew S. Tanenbaum SSH Secure Shell - - Binary Packet Protocol - key exchange - server authentication - - SSH Connection Protocol What is SSH?
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN
Vulnerability Scan 06 October 2014 at 16:21 URL : http://www.test.co.uk Summary: 34 vulnerabilities found 0 10 24 72 Cookie Does Not Contain The "HTTPOnly" Attribute Cookie Does Not Contain The "secure"
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
Internet Engineering Task Force (IETF) Request for Comments: 7568. Category: Standards Track ISSN: 2070-1721 A. Langley Google June 2015
Internet Engineering Task Force (IETF) Request for Comments: 7568 Updates: 5246 Category: Standards Track ISSN: 2070-1721 R. Barnes M. Thomson Mozilla A. Pironti INRIA A. Langley Google June 2015 Deprecating
AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1?
Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1? Shay Gueron University of Haifa Department of Mathematics,
SSL implementieren aber sicher!
SSL implementieren aber sicher! Karlsruher Entwicklertag 2014 21.05.2014 Dr. Yun Ding SSL in the news 2011 2012 2013 2014 BEAST CRIME Lucky 13 Compromised CAs RC4 biases BREACH DRBG Backdoor Apple goto
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail
Insecure network services NFS (port 2049) - Read/write entire FS as any non-root user given a dir. handle - Many OSes make handles easy to guess Portmap (port 111) - Relays RPC requests, making them seem
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
