Network Security Exercise #1

Similar documents
Network Security Exercise #1

Chapter 8. Network Security

ICOM 5018 Network Security and Cryptography

Cryptography & Digital Signatures

Network Security - ISA 656 Introduction to Cryptography

Introduction to Encryption

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

CPSC 467b: Cryptography and Computer Security

CS5008: Internet Computing

Lecture 9 - Network Security TDTS (ht1)

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CS Ethical Hacking Spring 2016

How To Protect Your Data From Attack

The Impact of the Allied Cryptographers on World War II: Cryptanalysis of the Japanese and German Cipher Machines

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Wireless Networks. Welcome to Wireless

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CSE/EE 461 Lecture 23

Encryption and Digital Signatures

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Compter Networks Chapter 9: Network Security

Project 2: Firewall Design (Phase I)

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Attack Net Penetration Testing

EXAM questions for the course TTM Information Security May Part 1

AN OFFLINE CAPTURE THE FLAG-STYLE VIRTUAL MACHINE FOR CYBER SECURITY EDUCATION

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

The science of encryption: prime numbers and mod n arithmetic

Computer Architecture. Secure communication and encryption.

IT Networks & Security CERT Luncheon Series: Cryptography

Topics in Network Security

Tutorial 3. June 8, 2015

CS 758: Cryptography / Network Security

Tim Bovles WILEY. Wiley Publishing, Inc.

MySQL Security: Best Practices

Insight Guide. Encryption: A Guide

SCP - Strategic Infrastructure Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CS 356 Lecture 28 Internet Authentication. Spring 2013

Fundamentals of Computer Security

Security Awareness. Wireless Network Security

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Maths delivers! A guide for teachers Years 11 and 12. RSA Encryption

Security in IEEE WLANs

Network Security Technology Network Management

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Computer and Network Security

7! Cryptographic Techniques! A Brief Introduction

Network Security. HIT Shimrit Tzur-David

Cryptography & Network Security

Security Goals Services

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

Learning Network Security with SSL The OpenSSL Way

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

CS Computer Security Third topic: Crypto Support Sys

How To Teach A Cyber Security Course

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 10. Network Security

How To Understand And Understand The History Of Cryptography

Networking: EC Council Network Security Administrator NSA

Virtual Private Networks

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

The Misuse of RC4 in Microsoft Word and Excel

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Computer Networks - CS132/EECS148 - Spring

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

MSc Computer Security and Forensics. Examinations for / Semester 1

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

SSL Firewalls

Client Server Registration Protocol

Protocol Security Where?

Cisco Trust Anchor Technologies

CSE343/443 Lehigh University Fall Course Overview. Presenter: Yinzhi Cao Lehigh University

Dashlane Security Whitepaper

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Network Security. Outline of the Tutorial

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

WLAN Security Networking with Confidence

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline

Transcription:

Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #1 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science, University of Innsbruck, Austria 22.03.2012

Administrative Issues Welcome to the Proseminar! What you need Registration for the PS Active ZID (Linux) account Basic C/C++ programming skills Network Security Exercise #1 2

Proseminar Objectives of the proseminar Hands-on experiences In-depth study of lecture topics In case of questions, please do ask! Drop by our offices or simply send emails! Schedule Thursday, 2:15pm 5:00pm, RR 22 Network Security Exercise #1 3

Exercises Exercises Once per week Can be done at home Announcement during the proseminar and on the web site http://www.ccs-labs.org/teaching/netsec-2012s/ Group work! Programs in C/C++ check for buffer overflows! Submission and evaluation Electronically, via scp to our server Deadlines are Tuesday, 23:59h Presentation of selected solutions and discussion Network Security Exercise #1 4

Credits and grading All exercises must be completed in time(!) Keep in mind that the proseminar is organized in form of group work The grade will reflect both the discussions in the proseminar and the completed exercises Network Security Exercise #1 5

Topics in the Proseminar Enigma RSA, modes of encryption Hash collisions WEP OpenSSL IPSec Spoofing MIX networks Firewalls Monitoring Network Security Exercise #1 6

Our scp submission system We are now setting up working groups (2 3 students per group) We need to set up the group account Network Security Exercise #1 7

Attack Trees Formal method to model threats on a (computer) system Possible attacks can be visualized in form of a tree: The root is the final objective Edges represent necessary steps to achieve this goal Can be used for security analysis of a system Security estimation (How secure is my system?) What-if questionnaire Cost estimation... Network Security Exercise #1 8

Example Open safe Pick lock (I) Learn combo Cut open safe (P) Install improperly (I) Find written combo (I) Get combo from target Threaten (I) Blackmail (I) Eavesdrop Bribe (P) Listen to conversation (P) Get target to state combo (I) from Bruce Schneier, Attack Trees Modeling security threats. Dr. Dobbs Journal, December 1999 Network Security Exercise #1 9

Example Marking all impossible actions Open safe Pick lock (I) Learn combo Cut open safe (P) Install improperly (I) Find written combo (I) Get combo from target Threaten (I) Blackmail (I) Eavesdrop Bribe (P) Listen to conversation (P) Get target to state combo (I) from Bruce Schneier, Attack Trees Modeling security threats. Dr. Dobbs Journal, December 1999 Network Security Exercise #1 10

Example Estimating costs Open safe ($10 K) Pick lock ($30 K) Learn combo ($20 K) Cut open safe ($10 K) Install improperly ($100 K) Find written combo ($75 K) Get combo from target ($20 K) Threaten ($60 K) Blackmail ($100 K) Eavesdrop ($60 K) Bribe ($20 K) Listen to conversation ($20 K) Get target to state combo ($40 K) from Bruce Schneier, Attack Trees Modeling security threats. Dr. Dobbs Journal, December 1999 Network Security Exercise #1 11

Enigma The term Enigma is Greek, meaning riddle Invented by Arthur Scherbius (1878 1929) Primarily used during World War 2 by the German army More than 200 000 machines have been produced Network Security Exercise #1 12

Picture Network Security Exercise #1 13

Internal Structure 5 different rotos, can be arbitrarily used Each rotor has 26 positions Additional plug connections to swap characters Key concept: each input character must not map to the same character in ciphertext Encryption process is the same as decryption Network Security Exercise #1 14

Code Books Network Security Exercise #1 15

Code Books Network Security Exercise #1 16

Cryptanalysis Polish mathematician Marian Rejewski deciphered the rotors using permutation theory in 1932 Weaknesses in using the Enigma, e.g., submission of the rotor start positions in encrypted form Mechanical decoding became possible The Polish submitted their information to the British in 1939 Alan Turing invented the bomb in 1940 More than 30 000 radio messages have been deciphered Currently preserved in Hut 6 in Bletchley Park Network Security Exercise #1 17

Weaknesses 2 10 23 different keys assuming 3 out of 5 rotors, plug connections, and two possible reflectors, which roughly translates to a key length of 77 bit The period of the middle and leftmost rotors are too long Weaknesses introduced by the reflector Effective key length of 22 bit Network Security Exercise #1 18

Copyleft Slide 13: Wikipedia, User Littlejoe, GNU Free Documentation Licence Slides 14, 18, 17: Wikipedia, GNU Free Documentation Licence Slides 15, 16: Copyright (c) 2008 Frode Weierud, http://cryptocellar.web.cern.ch/cryptocellar/enigma/ Network Security Exercise #1 19