Computer Security CS 426. CS426 Fall 2010/Lecture 40 1



Similar documents
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Table of Contents. Bibliografische Informationen digitalisiert durch

VALLIAMMAI ENGINEERING COLLEGE

IT Networks & Security CERT Luncheon Series: Cryptography

EXAM questions for the course TTM Information Security May Part 1

Transport Level Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Hash Functions. Integrity checks

Introduction to Cryptography CS 355

Client Server Registration Protocol

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

SSL Firewalls

BUY ONLINE FROM:

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

A Comparative Study of Security Features in FreeBSD and OpenBSD

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

CompTIA Security+ (Exam SY0-410)

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Summary of the SEED Labs For Authors and Publishers

CIS433/533 - Computer and Network Security Cryptography

CS 758: Cryptography / Network Security

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

CS 5490/6490: Network Security Fall 2015

Chapter 23. Database Security. Security Issues. Database Security

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 23. Database Security. Security Issues. Database Security

7! Cryptographic Techniques! A Brief Introduction

EECS 588: Computer and Network Security. Introduction January 14, 2014

CS5008: Internet Computing

Chapter 8. Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS155. Cryptography Overview

Project: Simulated Encrypted File System (SEFS)

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal

Message Authentication Codes. Lecture Outline

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Chapter 15: Security

EECS 588: Computer and Network Security. Introduction

CSE/EE 461 Lecture 23

Basic network security threats

Message Authentication

Information Security and Cryptography

Authentication, digital signatures, PRNG

Modes of Operation of Block Ciphers

Cryptographic Hash Functions Message Authentication Digital Signatures

Massachusetts Institute of Technology Handout : Network and Computer Security October 9, 2003 Professor Ronald L. Rivest.

Weighted Total Mark. Weighted Exam Mark

Security vulnerabilities in the Internet and possible solutions

Symmetric Crypto MAC. Pierre-Alain Fouque

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

BM482E Introduction to Computer Security

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CNT Computer and Network Security Review/Wrapup

Authenticity of Public Keys

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Cryptography & Network Security

Network Security Fundamentals

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Lecture 9 - Network Security TDTS (ht1)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Network Security: A Practical Approach. Jan L. Harrington

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security + Certification (ITSY 1076) Syllabus

Chapter 10. Network Security

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Cryptography and Network Security, PART IV: Reviews, Patches, and Theory 1 / 53

Chapter 18: System Security

Introduction to Computer Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Authentication requirement Authentication function MAC Hash function Security of

Chapter 6 Electronic Mail Security

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

CRYPTOGRAPHY IN NETWORK SECURITY

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

SECURITY IN NETWORKS

Cryptography and Network Security Chapter 12

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Chapter 7: Network security

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Message authentication and. digital signatures

Cryptography & Digital Signatures

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

What is network security?

Cryptography and Network Security Chapter 11

Tim Bovles WILEY. Wiley Publishing, Inc.

Security. Learning Objectives. This module will help you...

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Transcription:

Computer Security CS 426 Review for Final Exam CS426 Fall 2010/Lecture 40 1

Basic Concepts Confidentiality Integrity Availability Authenticity Integrity (in communications) Non-repudiation Privacy (general concept, need to defined for different contexts) K-Anonymity? CS426 Fall 2010/Lecture 40 2

Cryptography p y Basics Basic terminology: plaintext, ciphertext, ciphers Adversarial models: Ciphertext-only, known-plaintext, chosen plaintext, chosen ciphertext Brute-force attacks General Mono-alphabetic Substitution Cipher Breakable by frequency analysis in ciphertext-only attacks Information theoretic security Known as perfect secrecy for ciphers Requires key length >= msg length (proof idea) CS426 Fall 2010/Lecture 40 3

OTP & Stream Ciphers One-Time Pad (OTP) Provides perfect secrecy Two-time pad is insecure Stream cipher Simulate OTP by using PRNG Weaknesses: malleable, need to be very careful to avoid becoming two-time pad PRNG: should satisfy the next-bit test. CS426 Fall 2010/Lecture 40 4

Block Ciphers Block ciphers Use a larger block size to defeat frequency analysis Aim at providing Pseudo Random Permutation (PRP) DES: 56-bit key size, 64-bit block size, considered insecure now b/c bruteforce attack Brute-force: exhaustive key search, dictionary attack AES: block size, key sizes, no known weaknesses Encryption modes: ECB, CBC, CTR How they work? ECB insecure because of deterministic encryption CBC and CTR randomized, secure, CTR builds stream cipher from block cipher CS426 Fall 2010/Lecture 40 5

Cryptographic p Hash Functions Apply to arbitrary long messages, output fix-length digests. Three properties (what they mean, how much time to break them in brute-force fashion): preimage resistant (one-way) 2-nd preimage resistant (weak collision resistant): collision resistant (strong collision resistant): Well know hash functions: MD5 (128 bits, collision resistance broken), SHA-1 (160 bits, collision resistance appear soon to be broken), SHA2 family Message authentication code Why needed? Security requirements? HMAC construction CS426 Fall 2010/Lecture 40 6

Public Key Cryptography p y PK Encryption: two keys, can check whether two keys are a pair, but cannot compute private key from pubic key How RSA works: pub key: (n=pq,e), pri key (d) RSA security: depends on factoring, how long should the modulus n=pq be. RSA security: direct usage violates IND, use OAEP (how it works) Usage of RSA & secret-key encryption Diffie-Hellman key agreement (subject to active attacks) How El Gamal encryption works? CS426 Fall 2010/Lecture 40 7

Digital Signatures & Key Distributionstions Non-repudiation (why MAC doesn t work) How RSA signatures work? How to sign hashes h of messages? Why want the hash function to be collision resistant? In key distribution, ib ti what does the TTP need to do in the symmetric key setting? Scalability of the approach. Public key distribution Weaknesses of directory & public announcements Usage of public key certificates. How they work? Nature of trust in Root CA. Compare with symmetric case. CS426 Fall 2010/Lecture 40 8

Crypto Topics Not Required in Final Exam Quantum cryptography Details of Needham-Schroeder and Kerberos Commitment & Zero-knowledge Proofs CS426 Fall 2010/Lecture 40 9

Operating System Security Goal 1: multiple l users sharing one computer Goal 2: secure operation in networked environment CPU modes: kernel mode vs. user mode System calls Privileged processes vs. privileged code CS426 Fall 2010/Lecture 40 10

User Authentication Types of authentication: know, have, are Threats to passwords Online guessing, offline dictionary, spoofing, shoulder surfing, social engineering UNIX storage of passwords Addition of /etc/shadow in addition to /etc/passwd Usage of salts Other defenses Disabling account after multiple failed attempts Mechanisms to avoid weak passwords Trusted path Lamport s One-time Passwords scheme CS426 Fall 2010/Lecture 40 11

UNIX Access Control Reference monitor properties: Complete mediation (non-bypassable) Tamper-proof proof Small enough to be analyzable Users,,principals, p and subjects Permission bits: r/w/x on files and directories, suid on files Processes: how euid changes Need for setuid programs, violating least-privilege, potential vulnerabilities CS426 Fall 2010/Lecture 40 12

Software Vulnerabilities Buffer overflow Overflow ret address to shell code, return to libc, off by one, function pointers, heap overflow Effectiveness of different defenses Type safe languages, safe library functions, non-executable stack, StackGuard (using canary), Address space layout randomization, Instruction set randomization Integer overflow No question on types of malwares and their details. CS426 Fall 2010/Lecture 40 13

Market Failure of Software Security What is market failure? Why incentives are not aligned to make secure hardware? No measurement of security, needs to ship product early, no liability, patching costs little, testing/debugging expensive, buggy software forces users to ungrade What would help? CS426 Fall 2010/Lecture 40 14

Access Control Discretionary access control vs. mandatory access control DAC is vulnerable to trojan horses and buggy programs BLP model: simple security condition, *-property, trusted subjects, covert channels Security lattices CS426 Fall 2010/Lecture 40 15

Trusted Systems Trusted computing base TCSEC: D, C1, C2, B1, B2, B3, A1 B requires MAC, A requires formal verification (no other details required) Limited to OS Combine functionality and assurance in a single linear scale Common Criteria TOE, PP, ST, EAL Windows EAL4+ CS426 Fall 2010/Lecture 40 16

Biba, Clark-Wilson, and Chinese Wall Integrity levels different from security levels in BLP Five policies in Biba (what they are) Two meanings of integrity it levels l on objects Difference between confidentiality and integrity Integrity has to trust subjects Clark & Wilson Two high-level mechanisms: Well-formed transactions and separation of duty Concepts: UDI, CDI, IVP, TP Chinese wall: avoid COI CS426 Fall 2010/Lecture 40 17

SELinux, UMIP, and IFEDAC Type enforcement idea: use binary to determine access What is an assured pipeline policy UMIP: security objective (network-based attacks) Basic UMIP policy. How integrity of subjects & objects changes? Gap between requests and policies Why UNIX DAC s approach of maintaining one responsible principal is problematic. Implicit assumptions of DAC: software are benign and correct IFEDAC: integrity level tracking and access rules Comparison with Biba CS426 Fall 2010/Lecture 40 18

RBAC RBAC96 models Features in the four models How to determine session permissions, and which roles can be activated. Semantics of role hierarchies Mutual exclusion constraints RBAC manages how to assign permissions to principals, unlike DAC and MAC, which primarily focus on how to authorize subjects CS426 Fall 2010/Lecture 40 19

Network Security ARP spoofing TCP sequence prediction attacks Session hijacking DOS attacks SYN flooding, Smurf, reflection, DDoS, pulsing CS426 Fall 2010/Lecture 40 20

DNS Attacks Fundamental reason: Integrity/authenticity of DNS response messages not guaranteed Attack 1: control one evil domain, return malicious answers when queried, defended by the Bailiwicks Rules Response racing attacks Need to guess transaction IDs Attack based on the birthday paradox Kaminsky attack (why effective, why different from previous) Defense: source port randomization. Benefits and limitations. Defense: 0x20 encoding. CS426 Fall 2010/Lecture 40 21

Network Defenses & IDS Firewalls/ IDS/ IPS Terminologies: DMZ, VPN, and why need them. Why need defense in depth, beyond perimeter defense. Stateless/stateful/proxy/personal firewalls IDS assumptions: System activities are observable Normal and intrusive activities have distinct evidence Misuse (signature based) vs. Anomoly NIDS vs. HIDS Detection rate and false positive rate. Exploit-based sig vs. vulnerability-based sig CS426 Fall 2010/Lecture 40 22

Web Security SQL injection How it works? How to avoid such attacks when writing new apps? How does the CANDID approach work? Cross Site Scripting If we reach the topic in Friday CS426 Fall 2010/Lecture 40 23