Network Security. Chapter 1. Introduction



Similar documents
Network Security. Chapter 1 Introduction. Prof. Dr.-Ing. Georg Carle

Compter Networks Chapter 9: Network Security

Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

IY2760/CS3760: Part 6. IY2760: Part 6

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chap. 1: Introduction

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Content Teaching Academy at James Madison University

Cryptography and Network Security

COSC 472 Network Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

IT Networks & Security CERT Luncheon Series: Cryptography

Information System Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Notes on Network Security - Introduction

Cryptography & Network Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Chapter 1

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

CRYPTOGRAPHY IN NETWORK SECURITY

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security. HIT Shimrit Tzur-David

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

History of Cryptography AN EASY TO UNDERSTAND HISTORY OF CRYPTOGRAPHY

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

544 Computer and Network Security

Weighted Total Mark. Weighted Exam Mark

Security for Computer Networks

Introduction to Security

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

CSCI 4541/6541: NETWORK SECURITY

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Lecture 9 - Network Security TDTS (ht1)

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CPSC 467b: Cryptography and Computer Security

Network Security. Outline of the Tutorial

Information Security

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Computer and Network Security. Alberto Marchetti Spaccamela

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Software Tool for Implementing RSA Algorithm

Security Goals Services

CRIPT - Cryptography and Network Security

Chapter 10. Network Security

Cryptography & Digital Signatures

Chapter 23. Database Security. Security Issues. Database Security

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

A SOFTWARE COMPARISON OF RSA AND ECC

CSE331: Introduction to Networks and Security. Lecture 20 Fall 2006

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

CSCE 465 Computer & Network Security

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Savitribai Phule Pune University

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Chapter 23. Database Security. Security Issues. Database Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Module 7 Security CS655! 7-1!

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

VALLIAMMAI ENGINEERING COLLEGE

How To Understand And Understand The History Of Cryptography

ICOM 5018 Network Security and Cryptography

Symmetric Key cryptosystem

Chapter 7 Transport-Level Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Split Based Encryption in Secure File Transfer

Network Security Technology Network Management

Authentication requirement Authentication function MAC Hash function Security of

Network Security - ISA 656 Introduction to Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

EXAM questions for the course TTM Information Security May Part 1

Cryptography and Network Security

CS 203 / NetSys 240. Network Security

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Lukasz Pater CMMS Administrator and Developer

Properties of Secure Network Communication

Transcription:

Network Security Chapter 1 Introduction Threats in Communication Networks Security Goals & Requirements Network Security Analysis Safeguards Historic Remarks General Course Bibliography http://www-tkn.ee.tu-berlin.de/curricula/networksecurity Network Security (WS 2003): 01 Introduction 1

What is a Threat in a Communication Network? Abstract Definition: A threat in a communication network is any possible event or sequence of actions that might lead to a violation of one or more security goals The actual realization of a threat is called an attack Examples: A hacker breaking into a corporate computer Disclosure of emails in transit Someone changing financial accounting data A hacker temporarily shutting down a website Someone using services or ordering goods in the name of others... What are security goals? Security goals can be defined: depending on the application environment, or in a more general, technical way Network Security (WS 2003): 01 Introduction 2

Security goals depending on the application environment 1 Banking: Protect against fraudulent or accidental modification of transactions Identify retail transaction customers Protect PINs from disclosure Ensure customers privacy Electronic trading: Assure source and integrity of transactions Protect corporate privacy Provide legally binding electronic signatures on transactions Government: Protect against disclosure of sensitive information Provide electronic signatures on government documents Network Security (WS 2003): 01 Introduction 3

Security goals depending on the application environment 2 Public Telecommunication Providers: Restrict access to administrative functions to authorized personnel Protect against service interruptions Protect subscribers privacy Corporate / Private Networks: Protect corporate / individual privacy Ensure message authenticity All Networks: Prevent outside penetrations (who wants hackers?) Sometimes security goals are also called security objectives Network Security (WS 2003): 01 Introduction 4

Security Goals Technically Defined Confidentiality: Data transmitted or stored should only be revealed to an intended audience Confidentiality of entities is also referred to as anonymity Data Integrity: It should be possible to detect any modification of data This requires to be able to identify the creator of some data Accountability: It should be possible to identify the entity responsible for any communication event Availability: Services should be available and function correctly Controlled Access: Only authorized entities should be able to access certain services or information Network Security (WS 2003): 01 Introduction 5

Threats Technically Defined Masquerade: An entity claims to be another entity Eavesdropping: An entity reads information it is not intended to read Authorization Violation: An entity uses a service or resources it is not intended to use Loss or Modification of (transmitted) Information: Data is being altered or destroyed Denial of Communication Acts (Repudiation): An entity falsely denies its participation in a communication act Forgery of Information: An entity creates new information in the name of another entity Sabotage: Any action that aims to reduce the availability and / or correct functioning of services or systems Network Security (WS 2003): 01 Introduction 6

Threats and Technical Security Goals General Threats Technical Security Goals Masquerade Eavesdropping Authorisation Violation Loss or Modification of (transmitted) information Denial of Communication acts Forgery of Information Sabotage (e.g. by overload) Confidentiality x x x Data Integrity x x x x Accountability x x x x Availability x x x x Controlled Access x x x These threats are often combined in order to perform an attack! Network Security (WS 2003): 01 Introduction 7

Network Security Analysis In order to take appropriate countermeasures against threats, these have to be evaluated appropriately for a given network configuration. Therefore, a detailed network security analysis is needed that: evaluates the risk potential of the general threats to the entities using a network, and estimates the expenditure (resources, time, etc.) needed to perform known attacks. Attention: It is generally impossible to assess unknown attacks! A detailed security analysis of a given network configuration / specific protocol architecture: might also be required in order to convince financially controlling entities in an enterprise to grant funding for security enhancements, and can better be structured according to the more fine grained attacks on the message level. Network Security (WS 2003): 01 Introduction 8

Attacking Communications on the Message Level Passive attacks: Eavesdropping Active attacks: Delay of PDUs (Protocol Data Units) Replay of PDUs Deletion of PDUs Modification of PDUs Insertion of PDUs Successful launch of one of the above attacks requires: There are no detectable side effects to other communications (connections / connectionless transmissions) There are no side effects to other PDUs of the same connection / connectionless data transmission between the same entities A security analysis of a protocol architecture has to analyse these attacks according to the architecture s layers Network Security (WS 2003): 01 Introduction 9

Communication in Layered Protocol Architectures Network Endsystem Endsystem Layer Layer 55 Application Layer Layer Layer 55 Layer Layer 4 4 Transport Layer Layer Layer 4 4 Layer Layer 33 Network Layer Layer Layer 33 Layer Layer 33 Network Layer Layer Layer 33 Layer Layer 22 Data Link Layer Layer Layer 22 Layer Layer 22 Data Link Layer Layer Layer 22 Layer Layer 11 Physical Layer Layer Layer 11 Layer Layer 11 Physical Layer Layer Layer 11 Network Security (WS 2003): 01 Introduction 10

Security Analysis of Layered Protocol Architectures 1 Endsystem (Initiator) Network Endsystem (Responder)??? Dimension 1: At which interface does the attack take place? Network Security (WS 2003): 01 Introduction 11

Security Analysis of Layered Protocol Architectures 2? Layer Layer 55 Application Layer Layer Layer 55? Layer Layer 44 Transport Layer Layer Layer 44? Layer Layer 33 Network Layer Layer Layer 33 Layer Layer 33 Network Layer Layer Layer 33? Layer Layer 22 Data Link Layer Layer Layer 22 Layer Layer 22 Data Link Layer Layer Layer 22? Layer Layer 11 Physical Layer Layer Layer 11 Layer Layer 11 Physical Layer Layer Layer 11 Dimension 2: In which layer does the attack take place? Network Security (WS 2003): 01 Introduction 12

Safeguards Against Information Security Threats 1 Physical Security: Locks or other physical access control Tamper-proofing of sensitive equipment Environmental controls Personnel Security: Identification of position sensitivity Employee screening processes Security training and awareness Administrative Security: Controlling import of foreign software Procedures for investigating security breaches Reviewing audit trails Reviewing accountability controls Emanations Security: Radio Frequency and other electromagnetic emanations controls Referred to as TEMPEST protection Network Security (WS 2003): 01 Introduction 13

Safeguards Against Information Security Threats 2 Media Security: Safeguarding storage of information Controlling marking, reproduction and destruction of sensitive information Ensuring that media containing sensitive information are destroyed securely Scanning media for viruses Lifecycle Controls: Trusted system design, implementation, evaluation and endorsement Programming standards and controls Documentation controls Computer Security: Protection of information while stored / processed in a computer system Protection of the computing devices itself Communications Security: (the main subject of this course) Protection of information during transport from one system to another Protection of the communication infrastructure itself Network Security (WS 2003): 01 Introduction 14

Communications Security: Some Terminology Security Service: An abstract service that seeks to ensure a specific security property A security service can be realised with the help of cryptographic algorithms and protocols as well as with conventional means: One can keep an electronic document on a floppy disk confidential by storing it on the disk in an encrypted format as well as locking away the disk in a safe Usually a combination of cryptographic and other means is most effective Cryptographic Algorithm: A mathematical transformation of input data (e.g. data, key) to output data Cryptographic algorithms are used in cryptographic protocols Cryptographic Protocol: A series of steps and message exchanges between multiple entities in order to achieve a specific security objective Network Security (WS 2003): 01 Introduction 15

Security Services Overview Authentication The most fundamental security service which ensures, that an entity has in fact the identity it claims to have Integrity In some kind, the small brother of the authentication service, as it ensures, that data created by specific entities may not be modified without detection Confidentiality The most popular security service, ensuring the secrecy of protected data Access Control Controls that each identity accesses only those services and information it is entitled to Non Repudiation Protects against that entities participating in a communication exchange can later falsely deny that the exchange occurred Network Security (WS 2003): 01 Introduction 16

Security Supporting Mechanisms General mechanisms: Key management: All aspects of the lifecycle of cryptographic keys Random number generation: Generation of cryptographically secure random numbers Event detection / security audit trail: Detection and recording of events that might be used in order to detect attacks or conditions that might be exploited by attacks Intrusion detection: Analysis of recorded security data in order to detect successful intrusions or attacks Notarization: Registration of data by a trusted third party that can confirm certain properties (content, creator, creation time) of the data later on Communication specific mechanisms: Traffic Padding: Creation of bogus traffic in order to prevent traffic flow analysis Routing Control: Influencing the routing of PDUs in a network Network Security (WS 2003): 01 Introduction 17

Cryptology Definition and Terminology Cryptology: Science concerned with communications in secure and usually secret form The term is derived from the Greek kryptós (hidden) and lógos (word) Cryptology encompasses: Cipher: Cryptography (gráphein = to write): the study of the principles and techniques by which information can be concealed in ciphertext and later revealed by legitimate users employing a secret key Cryptanalysis (analýein = to loosen, to untie): the science (and art) of recovering information from ciphers without knowledge of the key Method of transforming a message (plaintext) to conceal its meaning Also used as synonym for the concealed ciphertext Ciphers are one class of cryptographic algorithms The transformation usually takes the message and a (secret) key as input (Source: Encyclopaedia Britannica) Network Security (WS 2003): 01 Introduction 18

Cryptology Some Historic Remarks 1 400 BC: The Spartans employ a cipher device called scytale for communications between military commanders. The scytale consisted of a tapered baton, around which was spirally wrapped a strip of parchment or leather on which the message was written When unwrapped, the letters were scrambled in order and formed the cipher When the strip was wrapped around another baton of identical proportions to the original, the plaintext reappeared During 4. century BC: Aeneas Tacticus (Greek) writes On the defense of fortifications, with one chapter devoted to cryptography Polybius (Greek) invents a means of encoding letters into pairs of symbols by a device called the Polybius Checkerboard which realizes a bi-literal substitution and presages many elements of later cryptosystems Network Security (WS 2003): 01 Introduction 19

Cryptology Some Historic Remarks 2 The Romans used monoalphabetic substitution with simple cyclic displacement of the alphabet: Julius Caesar employed a shift of three letters (A giving D,..., Z giving C) Augustus Caesar employed a single shift (A giving B,...) The Arabs were the first people to understand the principles of cryptography and to discover the beginnings of cryptanalysis: Design and use of substitution and transposition ciphers Discovery of the use of letter frequency distributions and probable plaintext in cryptanalysis By 1412 AD Al-Kalka-Shandi includes an elementary and respectable treatment of several cryptographic systems and their cryptanalysis in his encyclopaedia Subh al-a sha European Cryptography: Development started in the Papal States and the Italian city-states in the middle age First ciphers used only vowel substitution Network Security (WS 2003): 01 Introduction 20

Cryptology Some Historic Remarks 3 European Cryptography: (cont.) 1397: Gabriele de Lavinde of Parma writes first European manual on cryptography, containing a compilation of ciphers as well as a set of keys for 24 correspondents and embracing symbols for letters, numbers and several two-character code equivalents for words and names Code vocabularies, called Nomenclators became the mainstay for several centuries for diplomatic communications of most European governments 1470: Leon Battista Alberti publishes Trattati In Cifra, which describes the first cipher disk and already prescribes to regularly reset the disk, conceiving the notion of polyalphabeticity 1563: Giambattista della Porta provides a modified form of a square table and the earliest example of a digraphic cipher (2-letter-substitution) 1586: Blaise de Vigenère publishes Traicté des chiffres containing the square table commonly tributed to him By 1860 large codes were used for diplomatic communications and ciphers were only used in military communications (except high command level) because of the difficulty of protecting codebooks in the field Network Security (WS 2003): 01 Introduction 21

Cryptology Some Historic Remarks 4 Developments during World Wars 1 and 2: During World War 1: cipher systems were mostly used for tactical communications and high level communication was protected using codes 1920: The communication needs of telecommunications and the maturing of electromechanical technology bring about a true revolution in cryptodevices - the development of rotor cipher machines: The rotor principle is discovered independently by E. E. Hebern (USA), H. A. Koch (Netherlands) and A. Scherbius (Germany) Rotor cipher machines cascade a collection of cipher disks to realize polyalphabetic substitution of high complexity Cryptanalysis of tactical communications plays a very important role during World War 2 with the greatest triumphs being the British and Polish solution of the German Enigma and two teleprinter ciphers and the American cryptanalysis of Japanese ciphers Network Security (WS 2003): 01 Introduction 22

Cryptology Some Historic Remarks 5 Developments after World War 2: Modern electronics allow even more complex ciphers, initially following the rotor principles (and including their weaknesses) Most information about electronic cipher machines used by various national cryptologic services is not publicly available By the end of the 1960 s commercially available cryptography was poorly understood and strong cryptography was reserved for national agencies 1973-1977: Development of the Data Encryption Standard (DES) 1976-1978: Discovery of Public Key Cryptography 1976: W. Diffie and M. Hellman publish New Directions in Cryptography introducing the concepts of public key cryptography and describing a scheme of exchanging keys over insecure channels R. Merkle independently discovers the public key principle, but his first publications appear 1978, due to a slow publishing process 1978: R. L. Rivest, A. Shamir and A. M. Adleman publish A Method for Obtaining Digital Signatures and Public Key Cryptosystems, containing the first working and secure public key algorithm RSA Network Security (WS 2003): 01 Introduction 23

Course Overview 2. Basics of cryptography 3. Symmetric cryptography 4. Asymmetric cryptography 5. Modification check values 6. Random number generation 7. Cryptographic protocols 8. Access control 9. Integrating security services into communication architectures 10. Security protocols of the data link layer 11. The IPSec architecture for the Internet Protocol 12. Security protocols of the transport layer 13. Internet Firewalls 14. Security aspects of mobile communications 15. Security of wireless local area networks 16. Security of GSM and UMTS networks 17. Security of mobile Internet communications Network Security (WS 2003): 01 Introduction 24

General Course Bibliography [Amo94] [Cha95] [For94b] [Gar96] [Men97a] [Sch03] [Sch96] [Sta98a] [Sti95a] E. G. Amorosi. Fundamentals of Computer Security Technology. Prentice Hall. 1994. Brent Chapman and Elizabeth Zwicky. Building Internet Firewalls. O'Reilly, 1995. Warwick Ford. Computer Communications Security - Principles, Standard Protocols and Techniques. Prentice Hall. 1994. Simson Garfinkel and Gene Spafford. Practical Internet & Unix Security. O'Reilly, 1996. A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone. Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and Its Applications, Hardcover, 816 pages, CRC Press, 1997. G.Schäfer. Netzsicherheit - Algorithmische Grundlagen und Protokolle. dpunkt.verlag, 435 Seiten Broschur, 44.- Euro, 2003. B. Schneier. Applied Cryptography Second Edition: Protocols, Algorithms and Source Code in C. John Wiley & Sons, 1996. W. Stallings. Cryptography and Network Security: Principles and Practice. Hardcover, 569 pages, Prentice Hall, 2nd ed, 1998. D. R. Stinson. Cryptography: Theory and Practice (Discrete Mathematics and Its Applications). Hardcover, 448 pages, CRC Press, 1995. Network Security (WS 2003): 01 Introduction 25