Computer and Network Security. Alberto Marchetti Spaccamela



Similar documents
Chapter 7: Network security

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

What is network security?

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. HIT Shimrit Tzur-David

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Authenticated encryption

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

CPSC 467b: Cryptography and Computer Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Overview of Public-Key Cryptography

Software Tool for Implementing RSA Algorithm

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Cryptography and Network Security

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 10. Network Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

TELE 301 Network Management. Lecture 18: Network Security

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSCE 465 Computer & Network Security

Chapter 8. Network Security

Network Security Protocols

CS 758: Cryptography / Network Security

Symmetric Key cryptosystem

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Chapter 9

Client Server Registration Protocol

How To Protect Your Data From Attack

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Network Security Technology Network Management

Network Security. Outline of the Tutorial

Lecture 9 - Network Security TDTS (ht1)

7! Cryptographic Techniques! A Brief Introduction

Principles of Network Security

First Semester Examinations 2011/12 INTERNET PRINCIPLES

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Chapter 3. Network Domain Security

Chapter 7 Transport-Level Security

Cryptography: Authentication, Blind Signatures, and Digital Cash

Key Management (Distribution and Certification) (1)

What is network security?

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

SECURITY IN NETWORKS

Content Teaching Academy at James Madison University

Securing IP Networks with Implementation of IPv6

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOG NETWORK SECURITY

Message Authentication Codes

Compter Networks Chapter 9: Network Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CSE/EE 461 Lecture 23

Security: Focus of Control. Authentication

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm By Mihir Bellare and Chanathip Namprempre

Cryptography & Network Security

CRIPT - Cryptography and Network Security

Shor s algorithm and secret sharing

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Practice Questions. CS161 Computer Security, Fall 2008

Cryptography and Network Security

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Ch.9 Cryptography. The Graduate Center, CUNY.! CSc Theoretical Computer Science Konstantinos Vamvourellis

NETWORK ADMINISTRATION AND SECURITY

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

Chapter 6 CDMA/802.11i

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Introduction to Cryptography CS 355

IT Networks & Security CERT Luncheon Series: Cryptography

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Properties of Secure Network Communication

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

Cryptography and Network Security

Advanced Cryptography

Cryptographic Hash Functions Message Authentication Digital Signatures

Cryptography and Key Management Basics

Netzwerksicherheit: Anwendungen

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

THE UNIVERSITY OF TRINIDAD & TOBAGO

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Authentication, digital signatures, PRNG

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Transcription:

Computer and Network Security Alberto Marchetti Spaccamela

Slides are strongly based on material by Amos Fiat Good crypto courses on the Web with interesting material on web site of: Ron Rivest, MIT Dan Boneh, Stanford. Phil Rogaway, Davis. Doug Stinson, Waterloo. Amos Fiat, Tel Aviv

Cryptography vs Security Cryptography and Security differ Criptography deals with secrecy of information Most real security deals with problems of fraud: Message modifications User authentication Much of Security has little to do with encryption however it might use cryptography Almost invariably, Encryption does not live alone without some form of authentication

Requirements This course Secrecy of communication (encryption) Data integrity (how to check if data are modified maliciously) Digital signatures (how to sign a digital document) Authentication (of user) Standard and real world systems Availability of data, computing power, communications media???

Encryption: definitions Encryption function (& algorithm): E Decryption function (& algorithm): D Encryption key k 1 Decryption key k 2 Message space (usually binary strings) For every message m: D k2 (E k1 (m)) = m Secret key (Symmetric) k 1 = k 2 Public key (Asymmetric) k 1 k 2

Communication Model Alice Bob 1. Two parties Alice and Bob 2. Reliable communication line 3. Shared encryption scheme: E, D, k 1, k 2 4. Goal: send a message m confidentially

Threat (Attack) Model Alice Bob Trudy (also Eve) 4. Goal: send a message m confidentially

Adversary Passive: reads the exchanged messages (no change) legge il messaggio senza alterarlo (es. password) Active: Can modify messages sent by Alice or Bob Can send false (fake) messages claiming that they have sent by some elee (Alice or Bob)

Passive adversary : packet sniffing Trudy reads all messages exchanged by A and B A T src:b dest:a payload B

Active adversary: IP spoofing T is able to forge messages that look like messages sent by B (modification of IP header) A T src:b dest:a payload B

Security Threat: Denial of Service (DoS) Attcker send many many packets to the attacked host Distributed attack (through infection of unaware computers) SYN packets are often used, why? A T SYN SYN SYN SYN SYN SYN SYN B

Security goals If the keys are unknown then it is hard to obtain even partial information on the message It is hard to find the key dedurre la chiave con cui è stato cifrato un documento anche conoscendo il testo in chiaro HARD = Computationally hard: it takes long time even if the most powerful computers are available

Security Goals Possibilities: No adversary can determine m (not enough) No adversary can determine any information about m (not enough) No adversary can determine any meaningful information about m (good) Even in probabilistic sense : Adversary with prob.= 0.50000001 knows one bit of the message)

Adversarial model Trudy attempts to discover information about m Trudy knows the algorithms E,D Trudy knows the message space Trudy has at least partial information about E k1 (m) Trudy does not know k 1, k 2

Examples bad ciphers Shift cipher (Caesar s cipher) 26 keys; easy to check them all Conclusion large key space required Substitution cipher Large key space, still easy to break (computationally fast/ feasible)

Substitution cipher Example: plaintext: ciphertext: attack at dawn waaoq wa vwmk Size of key space: 26!=403291461126605635584000000 ~ 4 x 10 28 large enough

Additional definitions Plaintext the message prior to encryption ( attack at dawn, sell MSFT at 57.5 ) Ciphertext the message after encryption ( ax4erkjpjepmm, jhhfoghjklvhgbljhg ) Symmetric key encryption scheme where k 1 =k 2 (classical cryptography)

Perfect Cipher Plaintext space {0,1} n Given a ciphertext C the probability that D k2 (C)=P for any plaintext P is equal to the apriori probability that P is the plaintext. In other words: Pr[plaintext=P C] = Pr[plaintext=P] Probabilities are over the key space and the plaintext space.

Example One Time Pad Plaintext space - {0,1} n Key space - {0,1} n The scheme is symmetric, key k is chosen at random E k (P) = C = P K D k (C) = C K = P

Pros and Cons Claim: the one time pad is a perfect cipher. Problem: size of key space. Theorem (Shannon): A cipher cannot be perfect if its key space is less than the size of its message space. Why???

Attack Models Eavesdropping Known plaintext Chosen plaintext Chosen ciphertext Adaptive chosen text attacks Physical access Physical modification of messages

Computational Power With sufficient computational power any crypto code can be broken (by trying all possible keys) Time Hardware Storage When an attack is feasible? Theoretical polynomial time Practical (2008) 2 64 is feasible, 2 80 is infeasible (it requires too long time)

Key lenght Number of Keys increases over time: 20 bit (1 million keys) easy to break 56 bit (about 66 million of billion of keys) good 15 years ago: today not safe 512 bit (more than 40000000.0000000000-4 followed by 153 zeri - keys) today: safe; tomorrow?

Big numbers Enalotto: different columns 622.614.630=1.15 2 29 Seconds since the earth exists 1.38 2 57 Clocks in a century of a 3 GHz computer 4.05 2 61 Clock in a century of 1000000 2 GHz computers 4.05 2 81 249 bit prime numbers of 1.8 2 244 Electrons in the universe 1.8 2 258

Course outline Encryption (secret key and public key) Data integrity Digital signature User authentication Randomness, number theory Crypotgraphic protocols (SSL, IPSEC, Kerberos, X.509) Real world security systems Other (??): Watermarking, digital rights management, electronic voting,??

Textbook Network Security: private communication in a public world, 2 ed. Kaufman,Perlman,Speciner, Prentice Hall Slides: Other references: Handbook of Applied Cryptography Menezes, Van Oorschot, Vanstone, CRC Press download http://www.cacr.math.uwaterloo.ca/hac Wikipedia

Exam and office hours Written exam Possible assignment Office hour: Tuesday 14.30 or Friday after class E-mail: marchetti@dis.uniroma1.it