Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1



Similar documents
SECURITY IN NETWORKS

Network Security. HIT Shimrit Tzur-David

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Principles of Network Security

Chapter 7: Network security

Chapter 8 Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

What is network security?

What is network security?

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Network Security Technology Network Management

Security in Computer Networks

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Network Security. Omer Rana

7! Cryptographic Techniques! A Brief Introduction

24. Principles of Network Security/ Internet Attacks and Defenses

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

TELE 301 Network Management. Lecture 18: Network Security

Security in Computer Networks

Symmetric Key cryptosystem

Overview of Network Security

Chapter 8. Network Security

Security in Distributed Systems. Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Lukasz Pater CMMS Administrator and Developer

Properties of Secure Network Communication

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CSCE 465 Computer & Network Security

EXAM questions for the course TTM Information Security May Part 1

Telematics Chapter 11: Network Security Beispielbild User watching video clip

Chapter 6 CDMA/802.11i

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

CS 758: Cryptography / Network Security

CRYPTOGRAPHY IN NETWORK SECURITY

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Computer Security: Principles and Practice

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

How To Encrypt With A 64 Bit Block Cipher

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Application Layer (1)

Getting the most from Apple Mail

CSCE 465 Computer & Network Security

Network Security. Outline of the Tutorial

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network Security. Network Security. Security in Computer Networks

Public Key Cryptography Overview

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Chapter 8 Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Table of Contents. Bibliografische Informationen digitalisiert durch

Overview of Public-Key Cryptography

Chapter 10. Network Security

Overview of Symmetric Encryption

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Chapter 8. Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April Thanks and enjoy!

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Lecture 9 - Network Security TDTS (ht1)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Public Key (asymmetric) Cryptography

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Client Server Registration Protocol

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Chapter 9

Netzwerksicherheit: Anwendungen

CSE/EE 461 Lecture 23

Data Communications & Networks. Session 11 Main Theme Network Security. Dr. Jean-Claude Franchitti

Network Security Concepts: Review

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Lecture 9: Application of Cryptography

Cryptography and Network Security

CS Computer Security Third topic: Crypto Support Sys

Cryptography and Network Security

Chapter 7 Transport-Level Security

Elements of Applied Cryptography Public key encryption

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Computer Networks - CS132/EECS148 - Spring

ECE 428 Network Security

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

How To Understand And Understand The History Of Cryptography

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

The Misuse of RC4 in Microsoft Word and Excel

The Advanced Encryption Standard (AES)

Key Management (Distribution and Certification) (1)

Transcription:

Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1

Goals v understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity v security in practice: firewalls and intrusion detection systems security in application, transport, network, link layers 8-2

Roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication 4 Securing e-mail 5 Securing TCP connections: SSL 6 Network layer security: Ipsec 7 Securing wireless LANs 8 Operational security: firewalls and IDS 8-3

What is network security? confidentiality: only sender, intended receiver should understand message contents sender encrypts message receiver decrypts message authentication: sender, receiver want to confirm identity of each other message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection access and availability: services must be accessible and available to users 8-4

Friends and enemies: Alice, Bob, Trudy v well-known in network security world v Bob, Alice (lovers!) want to communicate securely v Trudy (intruder) may intercept, delete, add messages Alice channel data, control messages Bob data secure sender s secure receiver data Trudy 8-5

Who might Bob, Alice be? v well, real-life Bobs and Alices! v Web browser/server for electronic transactions (e.g., on-line purchases) v on-line banking client/server v DNS servers v routers exchanging routing table updates v other examples? 8-6

There are bad guys (and girls) out there! Q: What can a bad guy do? A: A lot! eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: take over ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) 8-7

Roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication 4 Securing e-mail 5 Securing TCP connections: SSL 6 Network layer security: Ipsec 7 Securing wireless LANs 8 Operational security: firewalls and IDS 8-8

The language of cryptography K A Alice s encryption key Bob s K decryption B key plaintext encryption algorithm ciphertext decryption algorithm plaintext m plaintext message K A (m) ciphertext, encrypted with key K A m = K B (K A (m)) 8-9

Breaking an encryption scheme v cipher-text only attack: Trudy has ciphertext she can analyze two approaches: brute force: search through all keys statistical analysis: e.g. birthday attack v known-plaintext attack: Trudy has some (plaintext, ciphertext) pair which he did not choose (say, stole after the receiver decrypted) v chosen-plaintext attack: Trudy can select any plaintext and obtain the corresponding ciphertext à can thus find the key Finding mapping for The quick brown fox jumps over the lazy dog à disaster for monoalphabetic cipher 8-10

Symmetric key cryptography K S K S plaintext message, m encryption algorithm ciphertext K S (m) decryption algorithm plaintext m = K S (K S (m)) symmetric key crypto: Bob and Alice share same (symmetric) key: K S v e.g., key is knowing substitution pattern in mono alphabetic substitution cipher Q: how do Bob and Alice agree on key value? 8-11

Simple encryption scheme substitution cipher: substituting one thing for another monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq e.g.: Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc Encryption key: mapping from set of 26 letters to set of 26 letters 8-12

A more sophisticated encryption approach v n substitution ciphers, M 1,M 2,,M n v cycling pattern: e.g., n=4: M 1,M 3,M 4,M 3,M 2 ; M 1,M 3,M 4,M 3,M 2 ;.. v for each new plaintext symbol, use subsequent subsitution pattern in cyclic pattern book: b from M 1, o from M 3, o from M 4, k from M 3 Encryption key: n substitution ciphers, and cyclic pattern Why is this better? 8-13

Symmetric key crypto: DES DES: Data Encryption Standard v US encryption standard [NIST 1993] developed by IBM v 56-bit symmetric key, 64-bit plaintext input v block cipher with cipher block chaining (CBC) CBC: a block is XORed with previous block before encryption v how secure is DES? DES Challenge: 56-bit-key-encrypted phrase decrypted (brute force) in less than a day there are analytical results showing weakness (although infeasible in practice) v making DES more secure: 3DES: encrypt 3 times with 3 different keys 8-14

Figure 8-7. The Data Encryption Standard. (a) General outline. (b) Detail of one iteration. The circled + means exclusive OR. SEC. 8.2 SYMMETRIC-KEY ALGORITHMS 781 Symmetric key crypto: DES 64-Bit plaintext L i-1 R i-1 Initial transposition 56-Bit key Iteration 1 Iteration 2 Iteration 16 L i-1 f(r i-1,k i ) Feistel function 32-Bit swap Inverse transposition 64-Bit ciphertext (a) 32 bits 32 bits L i R i Details of (b) an iteration 8-15

Symmetric key crypto: DES v Plaintext is encrypted in blocks of 64 bits, yielding 64 bits of ciphertext. v The algorithm has 19 distinct stages. v The first stage is a key-independent transposition on the 64-bit plaintext. The last stage is the exact inverse of this transposition. v The stage prior to the last one exchanges the leftmost 32 bits with the right- most 32 bits. v The remaining 16 stages (iterations) are identical but are parameterized by different functions of the key. 8-16

4-step Feistel Function v E (48 bit) is created by expanding 32-bit R i 1 using a transposition and duplication rule. v E and K i are XORed v This output is split into 8 groups of 6 bits each; each is mapped onto a 4- bit output. v These 8 4 bits are passed through a permutation box. K i 8-17

AES: Advanced Encryption Standard v symmetric-key NIST standard, replacied DES (Nov 2001) v processes data in 128 bit blocks v 128, 192, or 256 bit keys v brute force decryption (try each key): a machine taking 1 sec on DES, takes 149 trillion years for AES 8-18

AES: Advanced Encryption Standard v Rijndael proposal (Joan Daemen, Vincent Rijmen) v Rijndael is based on Galois theory, which gives it some provable security properties. v Like DES, Rijndael uses substitution and permutations, and it also uses multiple rounds. v The number of rounds depends on the key size and block size, being 10 for 128-bit keys with 128-bit blocks and moving up to 14 max. v Unlike DES, all operations involve entire bytes for efficient implementation in hardware and software. 8-19

Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret key v Q: how to agree on key in first place (particularly if never met )? public key crypto v radically different approach [Diffie- Hellman76, RSA78] v sender, receiver do not share secret key v public encryption key known to all v private decryption key known only to receiver 8-20

Public key cryptography + K B - K B Bob s public key Bob s private key plaintext message, m encryption algorithm ciphertext + K (m) B decryption algorithm plaintext message - + m = K (K (m)) B B 8-21

Public key encryption algorithms requirements: 1 2.. + - B - + B need K ( ) and K ( ) such that K (K (m)) = m B B given public key K B, it should be impossible to compute private - key K B + RSA: Rivest, Shamir, Adelson algorithm 8-22

Prerequisite: modular arithmetic v v v v x mod n = remainder of x when divide by n facts: [(a mod n) + (b mod n)] mod n = (a+b) mod n [(a mod n) - (b mod n)] mod n = (a-b) mod n [(a mod n) * (b mod n)] mod n = (a*b) mod n thus (a mod n) d mod n = a d mod n example: x=14, n=10, d=2: (x mod n) d mod n = 4 2 mod 10 = 6 x d = 14 2 = 196 x d mod 10 = 6 8-23

RSA: getting ready v message: just a bit pattern v bit pattern can be uniquely represented by an integer number v thus, encrypting a message is equivalent to encrypting a number. example: v m= 10010001. This message is uniquely represented by the decimal number 145. v to encrypt m, we encrypt the corresponding number, which gives a new number (the ciphertext). 8-24

RSA: Creating public/private key pair 1. choose two large prime numbers p, q. (e.g., 1024 bits each) 2. compute n = pq, z = (p-1)(q-1) 3. choose e (with e<n) that has no common factors with z (e, z are relatively prime ). 4. choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ). 5. public key is (n,e). private key is (n,d). + K B - K B 8-25

RSA: encryption, decryption 0. given (n,e) and (n,d) as computed above 1. to encrypt message m (<n), compute c = m e mod n 2. to decrypt received bit pattern, c, compute m = c d mod n magic happens! m = (m e mod n) c d mod n 8-26

RSA example: Bob chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z). encrypting 8-bit messages. encrypt: decrypt: bit pattern m m e c = m e mod n 0000l000 12 24832 17 c c d m = c d mod n 17 481968572106750915091411825223071697 12 8-27

Why does RSA work? v must show that c d mod n = m where c = m e mod n v fact: for any x and y: x y mod n = x (y mod z) mod n where n= pq and z = (p-1)(q-1) due to Kaufman 1995 v thus, c d mod n = (m e mod n) d mod n = m ed mod n = m (ed mod z) mod n = m 1 mod n = m 8-28

RSA: another important property The following property will be very useful later: - + K (K (m)) = m B B use public key first, followed by private key = + - B B K (K (m)) use private key first, followed by public key result is the same! 8-29

- + Why K (K (m)) = m = K (K (m))? B B + - B B follows directly from modular arithmetic: (m e mod n) d mod n = m ed mod n = m de mod n = (m d mod n) e mod n 8-30

Why is RSA secure? v suppose you know Bob s public key (n,e). How hard is it to determine d? v essentially need to find factors of n without knowing the two factors p and q fact: factoring a big number is hard 8-31

RSA in practice: session keys v exponentiation in RSA is computationally intensive v DES is at least 100 times faster than RSA v use public key cryto to establish secure connection, then establish second key symmetric session key for encrypting data session key, K S v Bob and Alice use RSA to exchange a symmetric key K S v once both have K S, they use symmetric key cryptography 8-32