Strengths and Weaknesses of Cybersecurity Standards



Similar documents
Security Protocols/Standards

An Introduction to Cryptography as Applied to the Smart Grid

Practical Invalid Curve Attacks on TLS-ECDH

2014 IBM Corporation

National Security Agency Perspective on Key Management

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.

Web Security Considerations

Chapter 7 Transport-Level Security

Secure Network Communications FIPS Non Proprietary Security Policy

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Authentication requirement Authentication function MAC Hash function Security of

Is Your SSL Website and Mobile App Really Secure?

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track ISSN: A. Langley Google June 2015

SSL implementieren aber sicher!

Network Security Part II: Standards

CRYPTOGRAPHY IN NETWORK SECURITY

ITL BULLETIN FOR AUGUST 2012

Network Security Essentials Chapter 5

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

SHA3 WHERE WE VE BEEN WHERE WE RE GOING

Lecture 10: Communications Security

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

mod_ssl Cryptographic Techniques

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Guideline for Implementing Cryptography In the Federal Government

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Cryptography and Key Management Basics

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS by Nikos Mavroyanopoulos

Randomized Hashing for Digital Signatures

Computer Security: Principles and Practice

Security Policy. Security Policy.

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

WebSphere DataPower Release FIPS and NIST SP a support.

Biometrics, Tokens, & Public Key Certificates

How To Protect Your Network From Attack

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

DRAFT Standard Statement Encryption

Secure Sockets Layer

McAfee Firewall Enterprise 8.2.1

Secure web transactions system

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Public-Key Infrastructure

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

How To Use Gnutls (Ansi) To Get A Certificate From A Server To A Gnutl (Ancient) To A Password Protected (Anarchic) Key (Oracle) To Anntls (Orcient) (

Cloud Security & Standardization. Markku Siltanen Tietoturvakonsultti CISA, CGEIT, CRISC

Communication Systems SSL

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Certification Report

FIPS Security Policy LogRhythm Log Manager

Strong Authentication for Future Web Applications

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures

The Importance of Security Standards

Recommended Wireless Local Area Network Architecture

Security. Learning Objectives. This module will help you...

Cryptographic Hash Functions Message Authentication Digital Signatures

FORWARD: Standards-and-Guidelines-Process.pdf. 1

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

FIPS Security Policy LogRhythm or Windows System Monitor Agent

Chapter 6 Electronic Mail Security

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS Non-Proprietary Security Policy

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Transport Level Security

I N F O R M A T I O N S E C U R I T Y

The Secure Sockets Layer (SSL)

Using BroadSAFE TM Technology 07/18/05

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Cryptography & Digital Signatures

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

CPSC 467b: Cryptography and Computer Security

I N F O R M A T I O N S E C U R I T Y

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

Communication Security for Applications

Certification Report

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION

Transcription:

Strengths and Weaknesses of Cybersecurity Standards Bart Preneel COSIC KU Leuven and iminds, Belgium firstname.lastname@esat.kuleuven.be April 7, 2014 Bart Preneel 1

What is cybersecurity? Liddell and Scott, Greek-English Lexicon Cyber- is a prefix derived from "cybernetic," which comes from the Greek adjective κυβερνητικός meaning skilled in steering or governing Oxford Dictionary The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. UMUC Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.

What is cybersecurity? ISACA or

What is cybersecurity? Cyber security strategy the Netherlands (2011) Cyber security is to be free from danger or damage caused by disruption or fall-out of ICT or abuse of ICT. The danger or the damage due to abuse, disruption or fall-out can be comprised of a limitation of the availability and reliability of the ICT, breach of the confidentiality of information stored in ICT or damage to the integrity of that information. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace - JOIN(2013) 1 final - 7/2/2013 Cyber-security commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. Cyber-security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein.

What is cybersecurity? ITU-T X.1205 (2008) Overview of cybersecurity Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user s assets. Organization and user s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability Integrity, which may include authenticity and non-repudiation Confidentiality

Security standards: a taxonomy Base standards Cryptographic algorithms Modes of use Application Program Interfaces (APIs) Functional standards procurement, product certification, services TLS, IPsec, X.509, EMV specifications Evaluation Criteria Common Criteria ISO/IEC 15408 (Evaluation Criteria for IT Security) FIPS 140-2 (Security Requirements for Cryptographic Modules) Interpretative documents and best practices: ISO/IEC 27002 (Code of Practice for Information Security Management)

A.S. Tanenbaum: The nice thing about Major standards Standardization is there's so many Bodies to choose from International European ISO: International Organization for Standardization IEC: International Electrotechnical Commission ITU: International Telecommunications Union IETF: Internet Engineering Task Force IEEE: Institute of Electrical and Electronic Engineers CEN: Comité Européen de Normalisation ETSI: European Telecommunications Standards Institute Cyber Security Coordination Group ICTSB: ICT Standards Board NISSG ( 04-08) National ANSI: American National Standards Institute NIST: National Institute of Standards and Technology Industry W3C, OASIS, Liberty Alliance, FIDO, Wi-Fi Alliance, BioAPI, WS-Security, TCG GP, PC/SC, Open Card Framework, Multos PKCS, SECG

Are security standards different? Selection for inclusion in standard: needs an independent security evaluation Required security depends on threat analysis may be strongly application dependent Security level changes over time: ad hoc security heuristic analysis based on unproven assumptions formal analysis based on hard problems J.L. Massey: A hard problem is a problem that nobody works on

Role of evaluation academic research Standard ization bodies Broad spectrum of solutions, variants Not always fully specified Ignore small technical problems Not in sync with academic developments No evaluation effort Need clear specs

Open competitions DES AES SHA-3 CAESAR RIPE NESSIE estream CRYPTREC CRYPTREC 1975-1977 1988-1992 1997 2000 2004 2008 2012 So far only in cryptology.

Dual_EC_DRBG or Dual Elliptic Curve Deterministic Random Bit Generator 1 of the 4 PRNGs in NIST SP 800-90A draft Dec. 2005; published 2006; revised 2012 in spite of negative comments and Crypto 2007 rump session attack 6 Sept. 2013 [Snowden]: backdoored by NSA 9 Sept. 2013: NIST strongly recommends" against the use of dual_ec_drbg, as specified in the January 2012 version of SP 800-90A. Why was the slowest and least secure of the 4 NIST PRNGs chosen as the default algorithm in BSAFE?

Secure mechanisms are not sufficient incorrect specifications or requirements implementation errors Evaluation criteria Functionality and assurance security management Guidelines and codes of practice

Evaluation criteria Expensive Slow Only high assurance levels count National security interests Can you trust the protection profile? Criteria seem sometimes ad hoc Are evaluations up to date? Crypto, side channel attacks,

The maintenance problem Context changes New technical vulnerabilities Cite a broken standard Is fixing it better than doing nothing? Fast changes incompatible with slow consensus-based procedures

The complexity problem Committee designs Backwards compatibility Optimizations for various cases High complexity barrier for evaluation barrier for market entry makes secure implementation very difficult

TLS overview [Stebila 14] Crypto primitives Ciphersuite details Protocol Framework Libraries Applications RSA, DSA, ECDSA DH, EC-DH HMAC MD5, SHA-1, SHA-2 DES, 3DES, RC4, AES Data structures Key derivation Encryption modes and IVs Padding Compression Alerts and errors Certification/revocation (Re- )Negotiation Session Resumption Key reuse OpenSSL GnuTLS SChannel Java JSSE0 Web browsers Web servers Application SDKs Certificates Theoretical analysis 16

TLS attack overview [Stebila 14]

Conclusion Secure standards essential for security standards are a tool, and not a goal Developing and maintaining security standards is perhaps more complex than general standards Plenty of fora and liaisons, but not enough real coordination Open evaluation procedures essential KISS principle Stimulate market through procurement?