Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #1 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science, University of Innsbruck, Austria 22.03.2012
Administrative Issues Welcome to the Proseminar! What you need Registration for the PS Active ZID (Linux) account Basic C/C++ programming skills Network Security Exercise #1 2
Proseminar Objectives of the proseminar Hands-on experiences In-depth study of lecture topics In case of questions, please do ask! Drop by our offices or simply send emails! Schedule Thursday, 2:15pm 5:00pm, RR 22 Network Security Exercise #1 3
Exercises Exercises Once per week Can be done at home Announcement during the proseminar and on the web site http://www.ccs-labs.org/teaching/netsec-2012s/ Group work! Programs in C/C++ check for buffer overflows! Submission and evaluation Electronically, via scp to our server Deadlines are Tuesday, 23:59h Presentation of selected solutions and discussion Network Security Exercise #1 4
Credits and grading All exercises must be completed in time(!) Keep in mind that the proseminar is organized in form of group work The grade will reflect both the discussions in the proseminar and the completed exercises Network Security Exercise #1 5
Topics in the Proseminar Enigma RSA, modes of encryption Hash collisions WEP OpenSSL IPSec Spoofing MIX networks Firewalls Monitoring Network Security Exercise #1 6
Our scp submission system We are now setting up working groups (2 3 students per group) We need to set up the group account Network Security Exercise #1 7
Attack Trees Formal method to model threats on a (computer) system Possible attacks can be visualized in form of a tree: The root is the final objective Edges represent necessary steps to achieve this goal Can be used for security analysis of a system Security estimation (How secure is my system?) What-if questionnaire Cost estimation... Network Security Exercise #1 8
Example Open safe Pick lock (I) Learn combo Cut open safe (P) Install improperly (I) Find written combo (I) Get combo from target Threaten (I) Blackmail (I) Eavesdrop Bribe (P) Listen to conversation (P) Get target to state combo (I) from Bruce Schneier, Attack Trees Modeling security threats. Dr. Dobbs Journal, December 1999 Network Security Exercise #1 9
Example Marking all impossible actions Open safe Pick lock (I) Learn combo Cut open safe (P) Install improperly (I) Find written combo (I) Get combo from target Threaten (I) Blackmail (I) Eavesdrop Bribe (P) Listen to conversation (P) Get target to state combo (I) from Bruce Schneier, Attack Trees Modeling security threats. Dr. Dobbs Journal, December 1999 Network Security Exercise #1 10
Example Estimating costs Open safe ($10 K) Pick lock ($30 K) Learn combo ($20 K) Cut open safe ($10 K) Install improperly ($100 K) Find written combo ($75 K) Get combo from target ($20 K) Threaten ($60 K) Blackmail ($100 K) Eavesdrop ($60 K) Bribe ($20 K) Listen to conversation ($20 K) Get target to state combo ($40 K) from Bruce Schneier, Attack Trees Modeling security threats. Dr. Dobbs Journal, December 1999 Network Security Exercise #1 11
Enigma The term Enigma is Greek, meaning riddle Invented by Arthur Scherbius (1878 1929) Primarily used during World War 2 by the German army More than 200 000 machines have been produced Network Security Exercise #1 12
Picture Network Security Exercise #1 13
Internal Structure 5 different rotos, can be arbitrarily used Each rotor has 26 positions Additional plug connections to swap characters Key concept: each input character must not map to the same character in ciphertext Encryption process is the same as decryption Network Security Exercise #1 14
Code Books Network Security Exercise #1 15
Code Books Network Security Exercise #1 16
Cryptanalysis Polish mathematician Marian Rejewski deciphered the rotors using permutation theory in 1932 Weaknesses in using the Enigma, e.g., submission of the rotor start positions in encrypted form Mechanical decoding became possible The Polish submitted their information to the British in 1939 Alan Turing invented the bomb in 1940 More than 30 000 radio messages have been deciphered Currently preserved in Hut 6 in Bletchley Park Network Security Exercise #1 17
Weaknesses 2 10 23 different keys assuming 3 out of 5 rotors, plug connections, and two possible reflectors, which roughly translates to a key length of 77 bit The period of the middle and leftmost rotors are too long Weaknesses introduced by the reflector Effective key length of 22 bit Network Security Exercise #1 18
Copyleft Slide 13: Wikipedia, User Littlejoe, GNU Free Documentation Licence Slides 14, 18, 17: Wikipedia, GNU Free Documentation Licence Slides 15, 16: Copyright (c) 2008 Frode Weierud, http://cryptocellar.web.cern.ch/cryptocellar/enigma/ Network Security Exercise #1 19