CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay



Similar documents
Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Chapter 10. Network Security

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Computer System Management: Hosting Servers, Miscellaneous

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Network Security Technology Network Management

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

EXAM questions for the course TTM Information Security May Part 1

CRYPTOGRAPHY IN NETWORK SECURITY

Client Server Registration Protocol

Lukasz Pater CMMS Administrator and Developer

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Public Key Cryptography Overview

Cryptography and Network Security

Cornerstones of Security

CSCE 465 Computer & Network Security

Compter Networks Chapter 9: Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Information Security

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

CS 758: Cryptography / Network Security

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Overview. SSL Cryptography Overview CHAPTER 1

Security: Focus of Control. Authentication

SECURITY IN NETWORKS

Content Teaching Academy at James Madison University

Message Authentication Codes

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Savitribai Phule Pune University

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Overview of Public-Key Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Security in Distributed Systems. Network Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Chapter 7: Network security

CSE/EE 461 Lecture 23

Security vulnerabilities in the Internet and possible solutions

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Lecture 9 - Network Security TDTS (ht1)

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Chapter 7 Transport-Level Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Module 7 Security CS655! 7-1!

Lecture 6 - Cryptography

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)

Notes on Network Security Prof. Hemant K. Soni

Network Security. Outline of the Tutorial

Chap. 1: Introduction

Internet Programming. Security

TELE 301 Network Management. Lecture 18: Network Security

Introduction to Computer Security

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Security Sensor Network. Biswajit panja

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

COSC 472 Network Security

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

ISM/ISC Middleware Module

Internetwork Security

Chapter 37. Secure Networks

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

CS5008: Internet Computing

Application Layer (1)

Release: 1. ICANWK502A Implement secure encryption technologies

Symmetric Key cryptosystem

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

SCP - Strategic Infrastructure Security

Lecture 9: Application of Cryptography

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Cryptography and Network Security

Transport Level Security

Chapter 17. Transport-Level Security

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Authentication requirement Authentication function MAC Hash function Security of

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security in Computer Networks

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Cryptography and Network Security Chapter 10

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Public Key (asymmetric) Cryptography

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Transcription:

CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay

Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement security mechanisms Monitor events, handle incidents Cost of protecting should be less than the cost of recovering IIT Bombay cs 348 2

Security requirements Confidentiality: No unauthorized disclosure Integrity: No unauthorized modification Authentication: Assurance of identity of originator Non-Repudiation: Originator cannot deny sending the message IIT Bombay cs 348 3

Security threats and levels Threats Host: Unauthorized access Transmission: sniffing, masquerading Host level Authentication and access control Network level Firewalls and proxies Application level Encryption and signatures IIT Bombay cs 348 4

Firewalls Control the flow of traffic between the Internet and internal networks and systems Like a guard post in the lobby of a building Single choke point is easier to control/defend from outside hackers (and inside spies!) IIT Bombay cs 348 5

Packet filtering IIT Bombay cs 348 6

Sample filtering rules Permit incoming Telnet sessions only to a specific internal hosts Permit all outbound Telnet and FTP sessions Deny all incoming traffic from specific external networks IIT Bombay cs 348 7

Sample /etc/hosts.allow This file describes the names of the hosts which are allowed to use the local INET services, as decided by the '/usr/sbin/tcpd' server ALL: 202.54.44.112/255.255.255.240 ALL: 144.16.111.180 ALL: 144.16.111.81 ALL: 144.16.106.218 IIT Bombay cs 348 8

Sample /etc/hosts.deny This file describes the names of the hosts which are *not* allowed to use the local INET services, as decided by the '/usr/sbin/tcpd' server ALL:ALL IIT Bombay cs 348 9

Proxy servers IIT Bombay cs 348 10

IITB configuration IIT Bombay cs 348 11

Benefits of firewalls/proxy servers Internet security can be monitored Audit and log Internet Usage Network Address Translator (NAT) alleviates IP address shortage Central point of contact (email,www,ftp) Caching WWW proxy servers (squid) IIT Bombay cs 348 12

Cryptography Components: Plain text Encryption/Decryption Algorithms Encryption/Decryption Keys Cipher text IIT Bombay cs 348 13

Encryption: Basic scheme Text Key Encrypted Text (Cipher) P K C Encrypted Text Key Plain Text C K P Plain Text : We need 20,000 litres of diesel Key : qw3edkl*&b43@tn,, ;[67~]}23#@!h3 Encrypted: bv56*($#@vbggght ;[]=+_,.Gfuyrt IIT Bombay cs 348 14

Encryption operator: XOR P K = C C K = P P : 110101 C: 011110 K : 101011 K: 101011 = C : 011110 = P: 110101 IIT Bombay cs 348 15

Some cryptography techniques Symmetric/Private Key: (DES) secure environment for key exchange Asymmetric/Public Key: (RSA) private-public key pair Hash Algorithms: (MD5, SHA) message integrity Digital Signatures: integrity and authentication IIT Bombay cs 348 16

Symmetric key encryption Source: http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s02.html IIT Bombay cs 348 17

Diffie-Hellman Key exchange Establish a shared secret key in public A and B agree on two large primes n & g. (n-1)/2 must be prime A picks a large (say 512 bit number) x and keeps it secret. B picks y A sends to B: X = g x mod n B sends to A: Y = g y mod n IIT Bombay cs 348 18

D-H key exchange A computes Y x mod n B computes X y mod n Secret Key is now g xy mod n Suppose C knows n & g. If C could get x and y, C would know the key Given only g x mod n, C cannot find x no algorithm for computing discrete logarithms modulo a large prime known IIT Bombay cs 348 19

Asymmetric key encryption Source: http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s03.html IIT Bombay cs 348 20

Public-Key cryptography Every user is assigned two keys a private key that is known only to user a public key that is known to everyone Cryptosystem has following properties D(E(P)) = P Exceedingly difficult to deduce D from E E cannot be broken by a chosen plaintext attack IIT Bombay cs 348 21

Public-Key cryptography EKU Encryption using public key KU DKR Decryption using private key KR P Plain Text DKR (E KU (P)) = P IIT Bombay cs 348 22

Public-key vs. Symmetric key Public-key algorithms are slow Symmetric algorithms are typically at least 1000 times faster In practice a public-key system is used to secure and distribute session keys - hybrid cryptosystem Also see: http://en.wikipedia.org/wiki/public-key_cryptography IIT Bombay cs 348 23

IIT Bombay cs 348 24

Authentication, No confidentiality Sender s private Key Sender plaintext Encrypt Receiver plaintext Decrypt Sender s public Key Encrypted text Encrypted text IIT Bombay cs 348 25

Confidentiality, No Authentication Sender Receiver plaintext plaintext Receiver s public Key Encrypt Decrypt Receiver s private Key Encrypted text Encrypted text IIT Bombay cs 348 26

Digital signatures Two approaches can be combined for both confidentiality and authentication Sender encrypts message with his/her private key for authentication Resulting cipher text is encrypted again using receiver s public key, for confidentiality Receiver first decrypts with private key, then decrypts with senders private key IIT Bombay cs 348 27

Digital Signatures Source: http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s03.html IIT Bombay cs 348 28

Encryption in practice In practice, for performance reasons all data traffic is encrypted using secret key (symmetric) cryptography public key cryptography is used for the authentication protocols themselves and for establishing a session key session keys minimize the traffic which contains the users secret/public keys and reduces cipher text available to intruder IIT Bombay cs 348 29

Security mechanisms Confidentiality: Encryption (usually symmetric) Integrity: Message digests Authentication: Signatures (asymmetric encryption) Non-Repudiation: Certificates, Signatures IIT Bombay cs 348 30

Secure Shell (SSH) Provides secure encrypted communication between two hosts over an insecure network Uses public key authentication User creates public/private pair Server knows the user's public key, and only the user has the private key IIT Bombay cs 348 31