T-79.4501 Cryptography and Data Security



Similar documents
T Cryptography and Data Security

Chapter 7 Transport-Level Security

Network Security Essentials Chapter 5

Communication Systems SSL

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Security for Applications

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Network Security Part II: Standards

Transport Layer Security Protocols

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

The Secure Sockets Layer (SSL)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Transport Level Security

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Web Security Considerations

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Web Security. Mahalingam Ramkumar

Lecture 10: Communications Security

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Network Security. Lecture 3

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Chapter 17. Transport-Level Security

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Chapter 10. Network Security

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Lecture 9 - Network Security TDTS (ht1)

How To Understand And Understand The Security Of A Key Infrastructure

Internetwork Security

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Introduction to Computer Security

Secure Socket Layer. Security Threat Classifications

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Introduction to Computer Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Chapter 32 Internet Security

Introduction to Security and PIX Firewall

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

CSC Network Security

CSC 474 Information Systems Security

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Virtual Private Networks

Netzwerksicherheit: Anwendungen

Securing IP Networks with Implementation of IPv6

Secure Sockets Layer

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

TLS/SSL in distributed systems. Eugen Babinciuc

Network Security Fundamentals

Computer and Network Security

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

SECURE SOCKETS LAYER (SSL)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Internet Protocol Security IPSec

Computer Networks. Secure Systems

Security Protocols/Standards

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

, ) I Transport Layer Security

Authenticity of Public Keys

Chapter 9. IP Secure

ETSF10 Part 3 Lect 2

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

IP Security. Ola Flygt Växjö University, Sweden

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SSL SSL VPN

This Working Paper provides an introduction to the web services security standards.

Case Study for Layer 3 Authentication and Encryption

IPsec Details 1 / 43. IPsec Details

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Overview. Protocols. VPN and Firewalls

SSL Secure Socket Layer

Overview. SSL Cryptography Overview CHAPTER 1

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

CS 4803 Computer and Network Security

TLS and SRTP for Skype Connect. Technical Datasheet

CSE/EE 461 Lecture 23

[SMO-SFO-ICO-PE-046-GU-

mod_ssl Cryptographic Techniques

Transcription:

T-79.4501 Cryptography and Data Security Lecture 12: Security systems using public keys 11.1 PGP 11.2 SSL/TLS 11.3 IPSEC Stallings: Ch 16,17 1 Pretty Good Privacy Email encryption program ottom up approach to the distribution of trust Each user acts as his/her own C and signs the public keys of other users User can accept authenticity of a public key based on recommendation by a third trusted user RS public key encryption used for distribution of session keys *) Digital signatures produced by RS or DS signature algorithms Hash functions are MD5 and SH-1 Symmetric encryption performed using IDE in CF mode (selfsynchronising stream cipher) Public keys held in Key-ring Revocation of public keys is a problem *) data encryption protocol, where the data is encrypted using symmetric encryption, and the symmetric encryption key is encrypted using public key encryption, is called as hybrid encryption 2 1

Secure Sockets Layer /Transport Layer Security SSL (by Netscape) adds security to the TCP level of the Internet Protocol stack Reliable end-to-end service. TLS developed by IETF is basically equivalent to SSL v 3.1 Structure: SSL Handshake Protocol SSL Change Cipher Spec Protocol SSL lert Protocol SSL Record Protocol TCP IP HTTP Hypertext Transfer Protocol (Web client/server interaction) can operate on top of SSL (https://...) 3 SSL Record Protocol pplication data fragment compressed fragment MC added encrypted SSL record header appended 4 2

SSL Record Protocol Crypto The MC is similar to HMC (indeed, an early version of HMC) with the difference that OPD and IPD fields are concatenated to the key data (not xored as in HMC). MC is based on MD5 or SH-1 lock Cipher lgorithms available (key size in bits): IDE (128) RC2-40 (40) DES-40 (40) DES (56) 3DES (112-168) Fortezza (Skipjack) (80) Stream Cipher lgorithms available (key size) RC4-40 (40) RC4-128 (128) 5 FORTEZZ FORTEZZ is a registered trademark of the U.S. National Security gency (NS) Defense Message System Encrypted voice communications over secure telephones. FORTEZZ cards cryptographic "co-processors" provide authentication (DS), data integrity (SH-1), and confidentiality (KE and Skipjack). FORTEZZ-enabled devices PCMCI-based crypto cards serial port devices, Ethernet cards, and modems. Cellular telephones, pagers, PDs, and other mobile devices. Microsoft supports FORTEZZ in its products. 6 3

PCMCI WIKIPEDI: PCMCI (nimetty Personal Computer Memory Card International ssociation tai humoristisemmin PCMCI: People Can't Memorize Computer Industry cronyms standardointielimen mukaan) on tietokoneen laajennuskorttipaikan tyyppi. Nykyisin käytetään nimitystä PC Card. Yleensä tämä liitäntä löytyy kannettavista tietokoneista. Kortti, joka voi sisältää esim. Ethernet-sovittimen, modeemin tai kiintolevyn, on yleensä lennossa vaihdettava, mikäli käyttöjärjestelmä sitä tukee. Liitäntä on verrattavissa pöytäkoneista löytyviin enemmän tilaa vieviin liitäntöihin, kuten pci-väylä. PCMCI -väyliä on kolmenlaisia, type I, type II ja type III. Lähes kaikki laitteet liitetään tyyppi 2 -väylään. Väylät eroavat toisistaan vain koossa. Ne ovat kaikki saman levyisiä ja pituisia, ja eroavat vain paksuudessa. Väylien leveys on - 54.0 mm. ja pituus 85.6 mm. Paksuudet ovat: Type 1-3.3 mm. (tähän liitetään esim. kortinlukijat) Type 2-5.0 mm. (tähän liitetään esim. ethernetsovittimet) Type 3-10.5 mm. 7 8 4

SSL Handshake Protocol Phase 1: Establishing Security Capabilities Nonces Session ID Cipher Suite 1. Key Exchange method: RS, Fixed, ephemeral, or anonymous Diffie-Hellman, Fortezza 2. Cipher lgorithm: ny of the ones mentioned above; Cipher type: Stream or lock; Exportability: Yes or No; 3. Hash algorithm: MD5 or SH-1; Hash size: 0, 16 (MD5), or 20 (SH-1) 4. Key Material (session key data) and IV size (for CC mode) Compression method Phase 2: Server uthentication and Key Exchange Phase 3: Client uthentication and Key Exchange Phase 4: Finish Explicit verification that the authentication and key exchange was successful 9 IPSec The toolbox for building Virtual Private Networks (VPN) Secure branch office connectivity over Internet Secure Remote ccess over Internet Extranet and Intranet connectivity with partners Enhanced electronic commerce security Efficient protection if IPSec implemented in firewall IPSec is below transport layer and so is transparent to applications IPSec is typically also transparent to end users IPSec can be used to provide secure remote login for individual users. 10 5

Network Network SEG SEG NE NE 11 IP Sec New specifications December 2005: RFC 4301 Security rchitecture for the Internet Protocol (obsoletes2401) RFC 4302 IP uthentication Header (obsoletes 2402) RFC 4303 IP Encapsulating Security Payload (ESP) (obsoletes 2406) RFC 4304 Extended Sequence Number (ESN) ddendum to IPsec Domain of Interpretation (DOI) for Internet Security ssociation and Key Management Protocol (ISKMP) RFC 4305 Cryptographic lgorithm Implementation Requirements for Encapsulating Security Payload (ESP) and uthentication Header (H) (obsoletes 2404, 2406) RFC 4306 Internet Key Exchange (IKEv2) Protocol (obsoletes 2407, 2408, 2409) RFC 4307 Cryptographic lgorithms for Use in the Internet Key Exchange Version 2 (IKEv2) RFC 4308 Cryptographic Suites for IPsec RFC 4309 Using dvanced Encryption Standard (ES) CCM Mode with IPsec Encapsulating Security Payload (ESP) 12 6

End-to-End Security (ESP in Transport Mode) 1 2 data data data 13 VPN Security (ESP in Tunnel Mode) 1 2 data 1 2 data data 14 7

Transport mode: IP HDR TCP HDR PYLOD IP HDR ESP HDR TCP HDR PYLOD padding MC encrypted integrity protected Tunnel mode: IP HDR TCP HDR PYLOD IP HDR ESP HDR IP HDR TCP HDR PYLOD padding MC encrypted integrity protected 15 IKEv2 ased on Diffie-Hellman Key Exchange KEi=g a, KEr=g b SK=g ab Initiator (i) HDR, Si1, KEi, Ni Responder (r) HDR, Sr1, KEr, Nr, [CERTREQ] HDR,SK{IDi,[CERT,][CERTREQ,][IDr,]UTH,Si2,TSi,TSr} HDR, SK{IDr, [CERT,] UTH, Sr2, TSi, TSr} 16 8

IKEv2 Secure Legacy uthentication (SL) Initiator (i) HDR, Si1, KEi, Ni Responder (r) HDR, Sr1, KEr, Nr, [CERTREQ] HDR, SK{IDi, [CERTREQ,] [IDr,] Si2, TSi, TSr} HDR, SK{IDr, [CERT,] UTH, EP } Cryptographic binding HDR, SK{EP, [UTH]} HDR, SK{EP, [UTH], Sr2, TSi, TSr } 17 Legacy Protocols and EP IETF PPPEXT working group: RFC 2284 Extensible uthentication Protocol (EP) EP is not an authentication protocol in itself, but a standard way of encapsulating an authentication protocol. Composed of message pairs: EP_Request - EP_Response; final pair: EP_Success/EP_Failure EP types have been standardised ( legacy protocols): RFC2716: PPP EP TLS uthentication Protocol Internet Drafts: EP SIM uthentication EP K uthentication Protected EP Protocol (PEP) EP-SKE authentication and key exchange protocol Microsoft EP CHP Extensions The EP GPRS Protocol (EP-GPRS) 18 9