Key Management (Distribution and Certification) (1)



Similar documents
Application Layer (1)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security: Focus of Control. Authentication

Cryptography and Network Security

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Chapter 8. Network Security

Netzwerksicherheit: Anwendungen

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

What is network security?

Chapter 6 CDMA/802.11i

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security Protocols

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Properties of Secure Network Communication

Chapter 7: Network security

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Chapter 10. Network Security

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

SSL A discussion of the Secure Socket Layer

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

The Secure Sockets Layer (SSL)

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

As enterprises conduct more and more

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Transport Layer Security Protocols

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Security in IEEE WLANs

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Three attacks in SSL protocol and their solutions

Institute of Computer Technology - Vienna University of Technology. L96 - SSL, PGP, Kerberos

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Using etoken for SSL Web Authentication. SSL V3.0 Overview

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Web Security. Mahalingam Ramkumar

Computer Networks. Secure Systems

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

, ) I Transport Layer Security

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Cornerstones of Security

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Release: 1. ICANWK502A Implement secure encryption technologies

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

TELE 301 Network Management. Lecture 18: Network Security

Lecture 9 - Network Security TDTS (ht1)

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Is your data safe out there? -A white Paper on Online Security

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

SSL/TLS: The Ugly Truth

CS 3251: Computer Networking 1 Security Protocols I

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Chapter 32 Internet Security

EEC-682/782 Computer Networks I

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

How To Analyze The Security On An Ipa Wireless Sensor Network

Overview. SSL Cryptography Overview CHAPTER 1

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Communication Systems SSL

EXAM questions for the course TTM Information Security May Part 1

NETWORK ADMINISTRATION AND SECURITY

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Savitribai Phule Pune University

Network Security Part II: Standards

Distributed Systems Security

Wireless Local Area. Network Security

Secure Use of the New NHS Network (N3): Good Practice Guidelines

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

What is an SSL Certificate?

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Standards and Products. Computer Security. Kerberos. Kerberos

Cipher Techniques on Networks. Amit Konar Math and CS, UMSL

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Lab 7. Answer. Figure 1

An Introduction to Cryptography as Applied to the Smart Grid

Authentication in WLAN

SSL: Secure Socket Layer

Authenticity of Public Keys

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Protocol Rollback and Network Security

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Kerberos. Login via Password. Keys in Kerberos

SSL Protect your users, start with yourself

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Wireless LAN Security Mechanisms

Computer Networks - CS132/EECS148 - Spring

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Client Server Registration Protocol

Wireless security. Any station within range of the RF receives data Two security mechanism

Transcription:

Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem 18

Key Management (Distribution and Certification) (2) Solution: Using a trustworthy third person, the so-called Certification Authority (CA) Idea: CA checks the identity of public key holders and creates a certificate which binds the key to the correct holder and is digitally signed by the CA. Job of the CA 19

Key Management (Distribution and Certification) (2a) Example of a Certificate 20

Key Management (Distribution and Certification) (3) Remaining problem of the symmetric key approach: How to agree a priori, i.e. before the secure communication between two partners starts, on their secret key? Solution: Using a trustworthy third person, the so-called Key Distribution Center (KDC) Idea: KDC is a server having a secret key with each registered user of the system. Key distribution (session key management) and authentication now goes through the KDC. Creating and distributing a unique session key between Alice and Bob via the KDC 21

Key Management (Distribution and Certification) (4) Often used in networked operating systems to control the access to shared resources like, e.g., file servers Example: Kerberos named after a multiheaded dog in Greek mythology guarding the entrance to Hades designed at MIT to allow workstation (end) users to access network resources (servers) in a secure way, i.e. when accessing users are authenticated and checked whether they have adequate access rights the so-called Authentication Server (AS) takes the role of the KDC used in many real operating systems (Windows, Unix) in addition to the general approach addressed before: o a so-called ticket now contains, in addition to Alice s name and R1, a timestamp marking the timeout of the communicated session key o Alice sends the ticket to Bob together with a Nonce encrypted with R1. o Bob sends back to Alice the incremented Nonce encrypted with R1 authenticating himself to Alice. 22

Application layer: Secure E-Mail (1) Secrecy approach: Symmetric session key encrypted by RSA (public key algorithm) 23

Application layer: Secure E-Mail (2) Approach to sender authentication and integrity: Message Digests and digital signature Combination of both approaches: 24

De facto Standard: PGP (Pretty Good Privacy) reflects in principle the approach just described A message signed with PGP Application layer: Secure E-Mail (3) A secret PGP message: 25

Steganography Three zebras and a tree Three zebras, a tree, and the complete text of five plays by Shakespeare 26

Transport layer: E-Commerce (1) Typical scenario for Internet-Commerce Bob is surfing in the web and arrives at the site of Alice Inc. Bob can order by selecting the product, the desired quantity, giving his address, and his credit card number Somewhat later he receives the products by ordinary mail and the charge in his next card statement Bad surprises could be among others: Trudy intercepts the order, obtains Bob s credit card information and uses them to purchase anything else Trudy is masquerading as Alice Inc., taking Bob s money and disappear. Solution I: Using Secure Socket Layers (SSL) - Protocol originally developed by Netscape protocol providing data encryption and authentication between a Web client and a Web server widely used in internet commerce, being implemented in almost all popular browsers and Web servers constitutes the basis of the TLS (Transport Layer Security) protocol not limited to web applications sits between the application layer and the transport layer - on the sending side: receives messages (e.g. HTTP, IMAP), encrypts the data, sends it to a TCP socket - on the receiving side: reads from the TCP socket, decrypts the data, sends it to the application process 27

Transport layer: E-Commerce (2) SSL provides the following features: SSL server authentication, allowing a user to get confirmation about a server s identity SSL client authentication, allowing a server to get confirmation about a client s identity (optional) An encrypted SSL session, in which all information sent between browser and web server is encrypted by the sending software SSL handshake protocol (executed before sending data between the communication partners) 28

Security in WLAN (IEEE 802.11) (1) Experiment undertaken: Driving around the S.F. Bay area equipped with a laptop and a 802.11 card looking for wireless networks that were visible from outside the buildings Results: more than 9000 of such networks were recorded one street corner in S.F. offered 6(!) different available networks 85% of the 9000 did not utilize the WEP (Wired Equivalent Privacy) protocol The IEEE 802.11 WEP (Wired Equivalent Privacy) protocol Objective: Making a WLAN as secure as a LAN. It provides authentication and data encryption between a host and the base station (AP:= Access Point) using a symmetric shared key approach no key management algorithm host and AP must agree on the key out-of-protocol 29

Security in WLAN (IEEE 802.11) (2) Authentication (comparable to the approach mostly used in the wired scenario) (wireless) host requests authentication by an AP AP responds by sending a 128-byte nonce value (nonce:= number which is used only once) host sends back the nonce encrypted by the shared key AP decrypts, compares and provides authentication if the values match thus preventing replays WEP data encryption: used encryption algorithm: RC4 (Ron s Code 4 Pseudo Number Generator) from RSA Security Inc. key: a secret 40-bit key + a 24-bit IV (Initialization Vector) ---> WEP 64 IV value changes from frame (packet) to frame, and is included as plaintext in the header of each frame data payload + a 4-byte CRC value are XORed bytewise with the random numbers generated by the key How RC4 works 30

Security in WLAN (IEEE 802.11) (3) Weaknesses: surprisingly many installations use the same shared key for all users many 802.11 cards for notebook computers reset IV to 0 when the card is inserted, and increment it by 1 on each packet sent. ----> The strength (proper use) requires to use a 64-bit key value only once ---> For a given 40-bit symmetric key (which changes rare, if ever), there are only 2 24 different keys ---> 2 24 = 16.777.216 frames = max. 24 GB, if 1 frame 1500 bytes Given a data transmission rate of 11 Mbps: ---> Given a full utilization of the network, every 5 hours the IV s are used again! The probability of having chosen the same IV value is 99% after 12 000 frames sent (a few seconds)! 31

Key Management (Distribution and Certification) (1) Remaining problem of the symmetric key approach: How to agree a priori, i.e. before the secure communication between two partners starts, on their secret key? Solution: Using a trustworthy third person, the so-called Key Distribution Center (KDC) Idea: KDC is a server having a secret key with each registered user of the system. Key distribution (session key management) and authentication now goes through the KDC. Creating and distributing a unique session key between Alice and Bob via the KDC 32