Cipher Techniques on Networks. Amit Konar Math and CS, UMSL



Similar documents
Chapter 10. Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Overview. SSL Cryptography Overview CHAPTER 1

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

CSE/EE 461 Lecture 23

Chapter 8. Network Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Lecture 9 - Network Security TDTS (ht1)

NETWORK ADMINISTRATION AND SECURITY

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Savitribai Phule Pune University

Key Management (Distribution and Certification) (1)

As enterprises conduct more and more

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Properties of Secure Network Communication

What is network security?

Chapter 17. Transport-Level Security

SSL/TLS: The Ugly Truth

Communication Systems SSL

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Network Security Protocols

Application Layer (1)

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Web Security Considerations

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

CS 758: Cryptography / Network Security

Security: Focus of Control. Authentication

CS 3251: Computer Networking 1 Security Protocols I

CRYPTOGRAPHY IN NETWORK SECURITY

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Security for Applications

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

[SMO-SFO-ICO-PE-046-GU-

Cornerstones of Security

Lukasz Pater CMMS Administrator and Developer

Three attacks in SSL protocol and their solutions

EXAM questions for the course TTM Information Security May Part 1

Web Security. Mahalingam Ramkumar

The Secure Sockets Layer (SSL)

An Introduction to Cryptography as Applied to the Smart Grid

Network Security Part II: Standards

Protocol Rollback and Network Security

Lecture 9: Application of Cryptography

Chapter 32 Internet Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Netzwerksicherheit: Anwendungen

SSL Protect your users, start with yourself

Security. Learning Objectives. This module will help you...

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Chapter 6 CDMA/802.11i

SSL A discussion of the Secure Socket Layer

First Semester Examinations 2011/12 INTERNET PRINCIPLES

A Simulation Game for Teaching Secure Data Communications Protocols

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Chapter 7: Network security

Institute of Computer Technology - Vienna University of Technology. L96 - SSL, PGP, Kerberos

Network Security. HIT Shimrit Tzur-David

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Standards and Products. Computer Security. Kerberos. Kerberos

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Security Protocols/Standards

Introduction to Cryptography

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Network Security. Omer Rana

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Chapter 9. IP Secure

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Multimedia Networking and Network Security

Virtual Private Networks

CSC Network Security

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

CSC 474 Information Systems Security

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

ISM/ISC Middleware Module

Chapter 7 Transport-Level Security

Transport Level Security

mod_ssl Cryptographic Techniques

Content Teaching Academy at James Madison University

Web Security: Encryption & Authentication

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Transcription:

Cipher Techniques on Networks Amit Konar Math and CS, UMSL

Why to learn Cipher Techniques on Networks? Because 1) Cryptographic systems are sensitive to environments, 2) using cryptography on networks thus introduces many problems, Observation: Stream and Block ciphers have been found to be most convenient for realization of cryptography on computer networks.

Sensitivity of Cryptographic Systems to Environment Example 1: Pre-computing the possible messages Alice K B K B = Public key of Bob Bob Buy/SELL Cathy intercepts Alice s message, encrypts BUY and SELL using Bob s public key and compares with the two computed. Cathy K B Compare BUY When no. of potential plaintexts < 100K, such attack is more likely. K B SELL

Example 2: Sensitivity to Environment: Misordered Blocks Alice K B = Public key of Bob Bob K B 11 08 21 10 L I V E Even when Alice digitally signs each part, Bob cannot detect it. Sol n : Compute cryptographic checksum and sign that value. Cathy 44 57 21 16 16 21 57 44 E V I L

Example 3: Sensitivity to Environment:Statistical Regularities Plaintext: HELLO WORLD Ciphertext: KHOOR ZRUOG Technique: Caeser Cipher When the same word world appears once again, ciphertext will be same. Such structure of information in ciphertexts is helpful for the intruders to determine plaintext.

Definition: Block Cipher Let message m= b 1 b 2., where b i has a fixed length. Then a block cipher is a cipher for which the encipherment algorithm E k (m)= E k (b 1 ) E k (b 2 ).. where k is a given key. Example: DES. It breaks the message into 64-bit blocks, and uses the same 56-bit key to encipher each block.

Definition: Stream Cipher Let message m= b 1 b 2, where each b i has a fixed length. Let k= k 1 k 2. be the keys for each stream of binary data b 1, b 2 Then a stream cipher is a cipher for which E k (m)= E k1 (b 1 ) E k2 (b 2 ) Example: Vigenere Cipher, where b i is the character of the message, and k i is a character of the key.

Synchronous Stream Ciphers Let r= r 0 r 1 r n-1 be a n-bit linear feedback register, and t=t 1 t 2 t n-1 be a n-bit tap sequence. r n-1 is used as key. Evaluate r 0 t 0 xor r 1 t 1 xor xor r n-1 t n-1, Shift the register r right by one bit and insert the evaluated result as r 0. The register r is called n- stage linear feedback register.

Example: Synchronous Stream Ciphers Let tap sequence= 1001. Current Key New bit New Reg. Reg. 0010 0 1.0 + 0.0 +0.1+1.0 0001 = 0 0001 Key stream thus generated: 010001111010110

Limitations of Linear Feedback Shift Register based Stream Cipher 1.If the key is shorter than the message, breaking part of the ciphertext gives cryptoanalysts information about other parts of the ciphertext. 2. For an LFSR, a known plaintext attack can reveal parts of the key sequence. 3. If the known plaintext is of length 2n, the tap sequence for an n-stage LFSR can be determined completely.

Synchronous Stream Ciphers with Let Nonlinear Feedback Shift Register r= r 0 r 1 r n-1 be a n-bit register, f(r 0, r 1,,r n-1 ) be a nonlinear function. Then if we shift the register right by one bit and f() is inserted in the r 0 bit-position, we call the system a Non-linear Feedback Shift Register.

Example: Non-linear Feedback shift Register Let Current Key New Bit New Reg. Reg. (r 0 and r 2 ) or r 3 1100 0 f(1,1,0,0) =(1 and 0)or 0 0110 0110 =0 Merits: No tap sequence needed.

Block Ciphers Key k E k (r ) m i r 0 r 1 r n-1 E XOR The register r is enciphered with key k and algorithm E. The register r is shifted right and the m i xor E k (r n-1 ) = C i is placed at r 0 position. Scope of attack: Since each block is enciphered independently using the same key, identical plaintext blocks produce identical ciphertexts. C i

Example: Scope of Attack in Block Ciphers Plaintext: MEMBER HOLY INCOME $100K MEMBER HEIDI INCOME $100k Ciphertext: ABCQZRME GHQMRSIB CTXUVYSS RMGRPFQN ABCQZRME ORMPABRZ CTXUVYSS RMGRPFQN If the attackers knows CTXUVYSS is the encipherment of INCOME, and he knows HOLY and HEIDI, then he can easily identify that the income of both people are same.

How to overcome this problem? To prevent this, some information related to blocks position is inserted into the plaintext blocks before it is enciphered. The information could be sequence no. of repeated blocks. The disadvantage is that effective block size is reduced because fewer message bits are present in a block.

Cipher Block Chaining Advantage: It does not require extra information to occupy bit spaces; so every bit in the block is part of the message. Let E k be the encipherment algo. with key k, I- initialization vector, m = message Then cipher block chaining technique is C 0 = E k (m 0 xor I), C i = E k (m i xor C i-1 ) for I >0

Multiple Encryption Let two keys be k / and k. Encipherment algo. Is C= E / k (E k (m)) Merits: It has an effective key length of 2n whereas keys to E are of length n.

Communication Protocol in Computer Networks Appl n layer Presentation layer Session Layer Transport layer Network layer Datalink layer Physical layer Network layer Datalink layer Physical layer Appl n layer Presenta. layer Session Layer Transport layer Network layer Datalink layer Physical layer The ISO/OSI model: The dashed arrow indicates peer-to-peer communication. For example, transport layers are communicating with each other. The solid arrows indicate actual flow of bits. For example, the transport layer invokes network layer routines on local host, which invokes data link layer routines, which puts the bits onto the network. The physical layer passes the bits to the next hop, or host on the path.

Example: How communication takes place from one host to another? Host nob wants to send a message to host windsor. Endpoints nob baton sunapee windsor Single hop neighbors Solid lines indicate message flow path to the nearest host through a routing protocol.

End-to-End and Link Protocol Let hosts C 0, C 1,, C n be such that C i and C i+1 are directly connected, for 0<=i<=n. A communication protocol that has C 0 and C n as its end points is called end-to-end protocol. A communication protocol that has C j and C j+1 as its endpoints is called a link protocol.

Difference between End-to-end and Link Protocols The intermediate hosts play no roles in an end-to-end protocol other than forwarding the messages. On the other hand, a link protocol describes how each pair of intermediate hosts process each message.

Cryptographic Protocols: Link Encryption and End-to-End Encryption In Link Encryption, the encryption and decryption takes place between two neighboring hosts. In End-to-End encryption, the encryption and decryption takes place between endto-end hosts.

Link Encryption In link encryption, 1. Each host shares a cryptographic key with its neighbor. 2. Keys may be distributed on per host-pair basis/ individual private plus public key basis. 3. Message is encrypted by the sender, and decrypted at the neighborhood link host. 4. For each next hop, the messages are reenciphered with a different key.

Example: Host nob likes to send message to host windsor using link encryption nob K nb Mes. baton K bw Mess windsor Nob encrypts the message using K nb, shared key between nob and baton; baton decrypts it and reencrypts with K bw, the shared key between baton and windsor; windsor decrypts it and gets the message.

Example: Host nob wants to send a message to a distant host windsor using End-to-End encryption nob K nw message baton K nw message windsor nob encrypts the message with K nw and baton simply forwards it to windsor. Windsor decrypts it and gets the message.

Security Protocols at Different Layer LAYER PROTOCOL Application layer Pretty Good Privacy (PGP) Transportation Layer Security Socket layer (SSL) IP layer IP Security (IPSec)

Pretty Good Service (PGP) Protocol: Secure Email service Alice sends email to Bob. One-time secret-key Bob s public key Email Hash Digest Alice s private key Encryption Digital signature of Alice + Email Signed digest Email+signed digest Encrypt Privacy + Encrypt Encrypted secret key & message plus digest

Decryption at Bob s site Encrypted secret key Bob s private key Encrypted secret key & message plus digest Decrypt One-time secret key Encrypted message plus digest Allice s public key Decrypt Email Decrypt Hash Digest Digest

Transportation Layer Security: Why needed? For transactions on the internet, a browser needs the following: 1. The customer needs to be sure that the server belongs to the actual vendor, not an imposter. For example, a customer does not want to give an imposter her credit card no. In other words, the server must be authenticated.

Why Transportation layer security? 2. The customer must be sure that the contents of the message are not modified during transaction. A bill of $100 should not be changed to $1000. The integrity of the message must be preserved, 3. The customer needs to know that the imposter does not intercept sensitive information, such as credit card no. There is a need for privacy.

Position of Transport Layer security HTTP TLS TCP IP The application layer protocol HTTP uses the services of TLS, and TLS in turn uses the services of transportation layer.

Handshake Protocol in Transport Client/ Browser Layer Security Browser knows CA s public key Server Hello Certificate containing public key encrypted by CA s public key Secret key encrypted with public key of server End handshaking message encrypted by secret key End of handshaking issued by server encrypted by Secret key