Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1



Similar documents
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 10. Network Security

Chapter 7 Transport-Level Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Security Essentials Chapter 5

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Transport Level Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Computer Networks. Secure Systems

Network Security Fundamentals

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Network Security Part II: Standards

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Overview. SSL Cryptography Overview CHAPTER 1

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

DRAFT Standard Statement Encryption

EXAM questions for the course TTM Information Security May Part 1

Chapter 8. Network Security

Key Management (Distribution and Certification) (1)

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems SSL

Chapter 17. Transport-Level Security

Secure Use of the New NHS Network (N3): Good Practice Guidelines

How To Understand And Understand The Security Of A Key Infrastructure

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Application Note: Onsight Device VPN Configuration V1.1

Security Protocols/Standards

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Transport Layer Security Protocols

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

What is network security?

Security vulnerabilities in the Internet and possible solutions

An Introduction to Cryptography as Applied to the Smart Grid

As enterprises conduct more and more

Cornerstones of Security

, ) I Transport Layer Security

Lecture 9 - Network Security TDTS (ht1)

Network Security. Lecture 3

Lecture 9: Application of Cryptography

Lecture 10: Communications Security

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

SSL Protect your users, start with yourself

Chapter 7: Network security

CSE/EE 461 Lecture 23

Chapter 32 Internet Security

SSL A discussion of the Secure Socket Layer

Release: 1. ICANWK502A Implement secure encryption technologies

How To Encrypt Data With Encryption

CRYPTOGRAPHY IN NETWORK SECURITY

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Web Security Considerations

Chapter 6 CDMA/802.11i

Topics in Network Security

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Virtual Private Networks

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Security in Computer Networks

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Lukasz Pater CMMS Administrator and Developer

Netzwerksicherheit: Anwendungen

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Client Server Registration Protocol

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Wireless Networks. Welcome to Wireless

Communication Security for Applications

Savitribai Phule Pune University

NETWORK ADMINISTRATION AND SECURITY

(d-5273) CCIE Security v3.0 Written Exam Topics

SBClient SSL. Ehab AbuShmais

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

SSL/TLS: The Ugly Truth

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Computer System Management: Hosting Servers, Miscellaneous

Transcription:

Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions SSL/TLS IPSec S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security requirements The main security requirements of a secure system are: Confidentiality - information is not made available to unauthorised entities Integrity - information has not been altered during transmission in an unauthorised manner Accountability users must authenticate themselves before being able to access the system Availability in first hand this means prevention of Denial of Service (DoS) attacks. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 2

Confidentiality In packed-based transmission, confidentiality is achieved by encrypting the information (plaintext) before transmission and decrypting the ciphertext at the receiving end using the same (= symmetric) key. Symmetric key Symmetric key Encryption Decryption Plaintext Ciphertext Plaintext S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 3

Integrity protection In packet-based transmission, integrity protection is ensured by using a message digest or hash algorithm to produce a Message Authentication Code (MAC) field that is appended to the data (usually before the encryption). Transmitting end Receiving end Data Data MAC MAC Data Data MAC MAC Calculate MAC by applying hash algorithm to data Calculate MAC again and check if = received MAC S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 4

Authentication There are two widely used authentication methods : Shared key authentication: The authentication key is stored securely in the network and user equipment. The network sends a challenge to the user, who sends back a response encrypted with the authentication key. If the network can decrypt the response using the authentication key, the user has been authenticated. Digital signature: This is an authentication method, intended for packet-based transmission, using public key cryptography (see later slide). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 5

Public key cryptography The efficient usage of modern security mechanisms (e.g. SSL or SSH) would not be possible without a concept called public key cryptography. Public key cryptography simultaneously makes use of both privat keys and public keys. Private keys must be securely stored in the end user equipment, whereas public keys can be sent in unencrypted form over the network without compromising the security of the system. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 6

Diffie-Hellman vs. RSA Public key cryptography is generally used in two ways: 1. by generating a shared secret at both ends of the communications link (key agreement) Diffie-Hellman key agreement scheme 2. by sending a secret to the other end of the communications link (key transport) RSA (Rivest, Shamir, Adleman) scheme S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 7

Symmetric keys vs. private/public keys The word key in key agreement and key transport refers to the actual symmetric keys used in encryption and decryption, not the privat or public keys used in the public key cryptography scheme. Symmetric key Symmetric key Encryption Decryption Plaintext Ciphertext Plaintext S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 8

Key agreement scheme In a key agreement scheme, two users, Alice and Bob, collectively generate a shared secret (for example, the symmetric key used in encryption and decryption) that only these two users know. To compute the shared secret, Alice combines her private key with Bob s public key. At the other end, Bob combines his private key with Alice s public key. In both cases, the result is the shared secret. Alice Private key Alice s public key Bob s public key Bob Bob Private key S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 9

Diffie-Hellman key agreement scheme (1) The Diffie-Hellman key agreement scheme is based on six numbers (p, g, a, b, x, and y) Alice Private key a Public key x Prime number p Base or generator g Public Public keys keys can can be be sent sent unencrypted over over the the network Private key b Public key y Bob S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 10

Diffie-Hellman key agreement scheme (2) The public keys x and y are calculated using p, g, a, and b. Private key a Prime number p Base or generator g Private key b Public key x Public key y Alice x = g a modp y = g b modp Bob S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 11

Diffie-Hellman key agreement scheme (3) Alice calculates the shared secret (K a ) using Alice s private key and Bob s public key. Private key a Private key b Public K a key = yx a modp = (g b modp) a modp Alice y = g b modp Public key y Bob S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 12

Diffie-Hellman key agreement scheme (4) Bob calculates the shared secret (K b ) using Bob s private key and Alice s public key. Private key a Private key b Alice Public key x x = g a modp K b = x b modp Public key y = (g a modp) b modp Bob S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 13

Diffie-Hellman key agreement scheme (5) It turns out that K a = K b. From the attacker point of view, it is virtually impossible to find out the value of K by using x and/or y, provided the numbers are sufficiently large. Private key a Private key b Public K a key = yx a modp = (g b modp) a modp Alice K b = x b modp Public key y = (g a modp) b modp Bob S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 14

Diffie-Hellman key agreement scheme (6) Computation of K is quite computationally intensive, so that public keys cannot be used for encrypting real time data (running at a high bit rate) directly, but rather for first generating a symmetric key K which is then used for encrypting and decrypting the data. K K Encryption Decryption Plaintext Ciphertext Plaintext S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 15

Man-in-the-middle attack vulnerability Key agreement schemes are vulnerable to man-in-themiddle attacks and the public key in at least one direction should be sent in a signed certificate. Public key x Fake public key m Fake public key n Public key y Alice Man-inthe-middle Bob S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 16

Man-in-the-middle attack vulnerability After a successful man-in-the-middle attack, the man in the middle can decrypt the information encrypted by Alice and Bob (if the shared secret is the symmetrical key used for encryption and decryption). K a = K n K m = K b Alice K a K n K m K b Man-inthe-middle Bob S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 17

Key transport scheme If Alice encrypts a message with Bob s public key, only Bob can decrypt the message using his private key. No one else can decrypt the message, since Bob s private key is required for this purpose. In other words, in this way Alice can send a secret (for example, the symmetric key used in encryption and decryption) to Bob. The public key algorithm Rivest, Shamir, and Adleman (RSA) is a key transport scheme. RSA was patented, but the patent expired in 2000. Due (among others) to this fact, RSA is widely used. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 18

Digital signature (for authentication) As an alternative way of using private and public keys, if Alice encrypts a message with her private key, anybody can decrypt the message using Alice s public key. No one else can encrypt the message in such a way that decrypting the message with Alice s public key will give a valid result. In other words, Alice has authenticated herself by providing a digital signature. Digital signature = authentication S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 19

RSA vs. DSA In addition to secure key transport, the public key encryption method RSA also offers authentication using a digital signature. Another algorithm that can be used for this purpose is Digital Signature Algorithm (DSA). RSA: Key management + authentication DSA: Only authentication, no key management Diffie-Hellman: Only key management, no authentication. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 20

Symmetrical encryption (for confidentiality) Public key cryptography algorithms are far too slow to be used for encrypting the actual traffic to be carried over the communication link directly. For this purpose symmetrical encryption (= encryption and decryption are performed with the same key) must be used. Some widely used symmetrical encryption algorithms are Advanced Encryption Standard (AES) and 3-fold Data Encryption Standard (3DES) for encrypting blocks of information, and Rivest Cipher 4 (RC4) for encrypting streams of information. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 21

Message digests (for integrity protection) In packet-based transmission, integrity protection is ensured by using a message digest or hash algorithm to produce a Message Authentication Code (MAC) field that is appended to the data (usually before the encryption). If an attacker changes the content of the message during transmission, the calculated MAC and transmitted MAC at the receiving end will nor match. Two widely used message digest or hash algorithms are Message Digest 5 (MD5) and Secure Hash Algorithm 1 (SHA-1). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 22

Certificates Key agreement (e.g. Diffie-Hellman) or key transport (e.g. RSA) schemes are vulnerable to man-in-the-middle attacks. A solution to this problem is to send the public key over the communication link using a signed certificate. A certificate is a document that contains, along with the public key of the sender, the name of the certificate holder as well as the digital signature of an independent and trusted third party, called certification authority, to ensure the validity of the transmitted information. The certificate format is usually based on ITU-T recommendation X.509. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 23

Key length In the same way as long passwords make password guessing impractical, long keys make exhaustive searches impractical. Every additional bit in the key doubles search time (and doubles the number of possible keys), so adding even a few bits to a key s length greatly increases the time needed to perform an exhaustive search. In addition to using long keys, it is important to change keys frequently. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 24

Putting it all together There are complete security solutions that incorporate the various security mechanisms presented on the previous slides, that is key management schemes (Diffie-Hellman, RSA), authentication methods (RSA, DSA), encryption methods (AES, 3DES, RC4), integrity protection methods (MD5, SHA-1), additional security measures (e.g. antireplay protection) and certificate management. Important security solutions are SSL (TLS), SSH and IPSec. For wireless networks, there is Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 25

SSL (TLS) Secure Socket Layer (SSL) is a transport layer protocol (running on top of TCP) that offers security features for applications running on top of SSL, for example HTTP over SSL (HTTPS), Simple Mail Transfer Protocol (SMTP) over SSL, or Lightweight Directory Access Protocol (LDAP) over SSL (LDAPS). These are client-server types of applications. The IETF adopted version 3.0 of the SSL protocol in 1999, renamed it Transport Layer Security (TLS) version 1.0 protocol and defined it in RFC 2246. SSLv3 and TLSv1 are compatible so far as the basic operation is concerned. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 26

Basic SSL handshake operation (1) Before data transport can take place over a secure SSL connection, the connection must first be established using a handshake procedure. During the SSL handshake, the client and server need to agree on the algorithms that will be used to protect the data (first phase). Then, the server sends its public key in a signed certificate to the client, so that the client can authenticate the server (second phase) using the RSA or DSA authentication method. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 27

Basic SSL handshake operation (2) The client generates a so-called pre-master secret, and sends this secret in encrypted form (using the server s public key for encryption) to the server (third phase). Both the server and client side use the pre-master secret for generating the actual keys for symmetrical encryption as well as the message authentication code (MAC). Finally, the client and server both calculate the MAC of the complete handshake information up to this point and send this information to the other side (fourth phase). Now the data communication can start. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 28

Basic SSL handshake operation (3) Client Compute keys Supported security algorithms Chosen security algorithms Encrypted pre-master secret MAC of handshake messages Server Compute keys Secure data transport S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 29

Virtual Private Network (VPN) A virtual private network (VPN) can be used within a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organisation's network. Secure communication User terminal in WLAN Public network (Internet) Server/client in corporate network S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 30

Implementing VPN using IPSec Secure VPN connections can be implemented using the IPSec protocol. There exist many security solutions at higher protocol layers (e.g. SSL, SSH). However, IPSec is the only widely available and standardised protocol (rather: set of protocols) that operates (operate) at the network (or IP) layer. IPSec is specified by the IETF in RFC 2401. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 31

IPSec offers two modes: Two modes of IPSec In Transport mode, only the IP packet payload is secured. The IP header is not encrypted, since it is used for routing the packet through the Internet. Transport mode is intended for end-to-end IPSec connections only. In Tunnel mode, the entire IP packet (including header) is secured. Tunnel mode is intended for applications involving security gateways. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 32

IPSec Transport mode In Transport mode the IP headers are not encrypted: IP header IP payload Original IP packet IPSec header IPSec header is inserted Secure Payload is secured (encrypted) IP header is still used for routing through the Internet S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 33

IPSec Tunnel mode In Tunnel mode the IP headers are also encrypted: Original IP packet IPSec header is appended Secure Secure Whole packet is secured (encrypted) New IP header is appended ( tunneling ) Original IP header cannot be used for routing Instead, new IP header is used for routing through the Internet S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 34

IPSec Tunnel mode scenario IPSec can (for instance) be used in the following way: IPSec VPN software installed in user terminal VPN Gateway (other end of the IPSec connection) Server (or client) Secure communication User terminal in WLAN Public network (Internet) Corporate network S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 35

IPSec security features Confidentiality Content of IP packet (or payload) is encrypted. Authentication It is not possible to establish an IPSec connection if authentication fails. In the case of IPSec, authentication also ensures data integrity. Anti-replay protection It is not possible to send the same IP packet twice. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 36

IPSec Security Association (SA) Before it is possible to use the IPSec protocol between two points in an IP network, two Security Associations have to be formed - one for each transport direction. SA 1 VPN Gateway Server User terminal in WLAN SA 2 Public network (Internet) Corporate network S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 37

IPSec Security Association (cont.) Security Associations consist of agreements (by both sides) on protocols, algorithms and parameters, as well as exchange of public security keys. SA 1 VPN Gateway Server SA 2 Exchange of public keys and other security information using Internet Key Exchange (IKE), as described in RFC 2401 S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 38