Network Security. Network Security. Security in Computer Networks



Similar documents
Security in Distributed Systems. Network Security

Security: Focus of Control. Authentication

What is network security?

Chapter 7: Network security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Network Security. HIT Shimrit Tzur-David

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

SECURITY IN NETWORKS

TELE 301 Network Management. Lecture 18: Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Chapter 10. Network Security

Cornerstones of Security

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

CS5008: Internet Computing

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Client Server Registration Protocol

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Savitribai Phule Pune University

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Principles of Network Security

Chapter 8 Network Security

Network Security Technology Network Management

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CRYPTOGRAPHY IN NETWORK SECURITY

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Transport Level Security

Introduction to Encryption

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 7 Transport-Level Security

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

ISM/ISC Middleware Module

EXAM questions for the course TTM Information Security May Part 1

Chapter 8. Network Security

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Properties of Secure Network Communication

CSE/EE 461 Lecture 23

Computer Networks - CS132/EECS148 - Spring

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CSCE 465 Computer & Network Security

Secure Sockets Layer

Chapter 17. Transport-Level Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CS Computer Security Third topic: Crypto Support Sys

Communication Security for Applications

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Chapter 6 CDMA/802.11i

Security vulnerabilities in the Internet and possible solutions

CS 3251: Computer Networking 1 Security Protocols I

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

The Case For Secure

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Key Management (Distribution and Certification) (1)

Why you need secure

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Security Digital Certificate Manager

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Overview of Network Security

Overview. SSL Cryptography Overview CHAPTER 1

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

CS 758: Cryptography / Network Security

Three attacks in SSL protocol and their solutions

WS_FTP Professional 12. Security Guide

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

Lukasz Pater CMMS Administrator and Developer

Application Layer (1)

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

Internet Programming. Security

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Information Security

ERserver. iseries. Secure Sockets Layer (SSL)

Transcription:

Network Security Network Security introduction cryptography authentication key exchange Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete) Intruder may eavesdrop remove, modify, and/or insert messages read and playback messages Security in Computer Networks Important issues: cryptography: secrecy of info being transmitted authentication: proving who you are and having correspondent prove his/her/its identity User resources: login passwords often transmitted unencrypted in TCP packets between applications (e.g., telnet, ftp) passwords provide little protection

Encryption Network resources: often completely unprotected from intruder eavesdropping, injection of false messages mail spoofs, router updates, ICMP messages, network management messages Bottom line: intruder attaching his/her machine (access to OS code, root privileges) onto network can override many system-provided security measures users must take a more active role plaintext: unencrypted message ciphertext: encrypted form of message Intruder may intercept ciphertext transmission intercept plaintext/ciphertext pairs obtain encryption decryption algorithms A simple encryption algorithm Substitution cipher: abcdefghijklmnopqrstuvwxyz poiuytrewqasdfghjklmnbvczx replace each plaintext character inmessage with matching ciphertext character: plaintext: Charlotte, my love ciphertext: iepksgmmy, dz sgby key is pairing between plaintext characters and ciphertext characters symmetric key: sender and receiver use same key 26! (approx 10^26) different possible keys: unlikely to be broken by random trials substitution cipher subject to decryption using observed frequency of letters 'e' most common letter, 'the' most common word

DES: Data Encryption Standard encrypts data in 64-bit chunks encryption/decryption algorithm is a published standard everyone knows how to do it substitution cipher over 64-bit chunks: 56-bit key determines which of 56! substitution ciphers used substitution: 19 stages of transformations, 16 involving functions of key decryption done by reversing encryption steps sender and receiver must use same key Key Distribution Problem Problem: how do communicant agree on symmetric key? N communicants implies N keys Trusted agent distribution: keys distributed by centralized trusted agent any communicant need only know key to communicate with trusted agent for communication between i and j, trusted agent will provide a key We will cover in more detail shortly

Public Key Cryptography separate encryption/decryption keys receiver makes known (!) its encryption key receiver keeps its decryption key secret to send to receiver B, encrypt message M using B's publicly available key, EB send EB(M) to decrypt, B applies its private decrypt key DB to receiver message: computing DB( EB(M) ) gives M knowing encryption key does not help with decryption; decryption is a non-trivial inverse of encryption only receiver can decrypt message Question: good encryption/decryption algorithms RSA: public key encryption/decryption RSA (continued) RSA: a public key algorithm for encrypting/decrypting Entity wanting to receive encrypted messages: choose two prime numbers, p, q greater than 10^100 compute n=pq and z = (p-1)(q-1) choose number d which has no common factors with z compute e such that ed = 1 mod z, i.e., integer-remainder( (ed) / ((p-1)(q-1)) ) = 1, i.e., ed = k(p-1)(q-1) +1 three numbers: e, n made public d kept secret to encrypt: divide message into blocks, {b_i} of size j: 2^j < n encrypt: encrypt(b_i) = b_i^e mod n to decrypt: b_i = encrypt(b_i)^d to break RSA: need to know p, q, given pq=n, n known factoring 200 digit n into primes takes 4 billion years using known methods

RSA example choose p=3, q=11, gives n=33, (p-1)(q-1)=z=20 choose d = 7 since 7 and 20 have no common factors compute e = 3, so that ed = k(p-1)(q-1)+1 (note: k=1 here) plaintext e=3 ciphertext char # #^3 #^3 mod 33 S 19 6859 28 U 21 9261 21 N 14 2744 5 cipherte xt d=7 plaintex t c c^7 c^7 mod char 33 28 13492928512 19 S 21 1801 21 N Further notes on RSA why does RSA work? crucial number theory result: if p, q prime then b_i^((p-1)(q-1)) mod pq = 1 using mod pq arithmetic: (b^e)^d = b^{ed} = b^{k(p-1)(q-1)+1} for some k = b b^(p-1)(q-1) b^(p-1)(q-1)... b^(p-1)(q-1) = b 1 1... 1 = b Note: we can also encrypt with d and encrypt with e. this will be useful shortly How to break RSA? Brute force: get B's public key for each possible b_i in plaintext, compute b_i^e for each observed b_i^e, we then know b_i moral: choose size of b_i "big enough"

Authentication man-in-the-middle: intercept keys, spoof identity: Question: how does a receiver know that remote communicating entity is who it is claimed to be? Authentication Using Nonces Approach 1: peer-peer key-based authentication A, B (only) know secure key for encryption/decryption A sends encrypted msf to B and B decrypts: A to B: msg = encrypt("i am A") B computes: if decrypt(msg)=="i am A" then A is verified else A is fradulent failure scenarios? to prove that A is alive, B sends "once-in-a-lifetime-only" number (nonce) to A, which A encodes and returns to B A to B: msg = encrypt("i am A") B compute: if decrypt(msg)=="i am A" then A is OK so far B to A: once-in-a-lifetime value, n A to B: msg2 = encrypt(n) B computes: if decrypt(msg2)==n then A is verified else A is fradulent note similarities to three way handshake and initial sequence number choice problems with nonces?

Authentication Using Public Keys B wants to authenticate A A has made its encryption key EA known A alone knows DA symmetry: DA( EA(n) ) = EA ( DA(n) ) A to B: msg = "I am A" B to A: once-in-a-lifetime value, n A to B: msg2 = DA(n) B computes: if EA (DA(n))== n then A is verified else A is fradulent Digital Signatures Using Public Keys Goals of digital signatures: sender cannot repudiate message never sent ("I never sent that") receiver cannot fake a received message Suppose A wants B to "sign" a message M B sends DB(M) to A A computes if EB ( DB(M)) == M then B has signed M Question: can B plausibly deny having sent M? Symmetric key exchange: trusted server Problem: how do distributed entities agree on a key? Assume: each entity has its own single key, which only it and trusted server know Server: will generate a one-time session key that A and B use to encrypt communication will use A and B's single keys to communicate session key to A, B

Symmetric Key exchange: trusted server Preceding scenario: 1. A sends encrypted msg to S, containing A, B, nonce RA: EA(A,B,RA) 2. S decrypts using DA, generates one time session key, K, sends nonce, key, and B-encrypted encoding of key to A: EA(RA,B,K,EB(K,A)) 3. A decrypts msg from S using DA and verifies nonce. Extracts K, saves it and sends EB(K,A) to B. 4. B decrypts msg using DB, extracts K, generates new nonce RB, sends EK(RB) to A 5. A decrypts using K, extracts RB, computes RB-1 and encrypts using K. Sends EK(RB-1) to B 6. B decrypts using K and verifies RB-1 Public key exchange: trusted server public key retrieval subject to man-in-middle attack locate all public keys in trusted server everyone has server's encryption key (ED public) suppose A wants to send to B using B's "public" key Clipper Chip: technical aspects US gov't proposed federal information processing standard (voluntary) obviously need to encrypt many things passed over phone line encryption technique for Clipper (skipjack algorithm) highly classified voluntarily installed in telecommunications equipment (existing products) call setup: A and B want to communicate A, B use standard public key techniques to agree on a session key session key encrypted using clipper chips unit key encrypted session key and unencrypted unit ID put into LEAF (Law Enforcement Access Field) which is sent note: LEAF redundant, A and B know session K session key transmitted so it can be intercepted! session communication encrypted using session key

Privacy issues Clipper I: device manufacturers split unit chip key in half: unit chip key hardwired into tamper proof, non reverse-engineerable chip half in escrow at NIST, half at Treasury gov't wants to wiretap machine with known unit ID gov't (e.g., FBI) presents court orders to both agencies, gets unit chip key uses chip key to determine session key from LEAF decrypts using session key U.S. Export Laws Cryptography products are munitions 1992-40 bit key products can be exported 1996 - software key escrow 64bit key products can be exported provided key is registered with escrow agent in US 1996 - key recovery all encrypted msgs include session key encrypted using recovery agent key Other countries: most - none France - must escrow key for encryption Protection against Intruders: Firewalls Firewall: network components (host/router+software) sitting between inside ("us") and outside ("them) Packet filtering firewalls: drop packets on basis of source or destination address (i.e., IP address, port) Application gateways: application specific code intercepts, processes and/or relays application specific packets e.g., email of telnet gateways application gateway code can be security hardened can log all activity

Security: Internet activity IP layer: authentication of header: receiver can authenticate sender using messageauthentication code (MAC) encryption of contents: DES, RFC 1829 API SSL - secure socket layer: support for authentication and encryption port numbers: 443 for http with SSL, 465 for smtp with SSL Application Layer Privacy Enhanced Mail (PEM) secure http: supports many authentication, encryption schemes Secure Email PEM : operates on top of SMTP ASCII msg authentication - MD2, MD5 msg encryption - RSA, DES authenticated encrypted msgs and encrypted authenticated msgs PGP (Pretty Good Privacy): secure file transfer (incl. email) binary files key concerns: encryption authentication key exchange Security: conclusion also: increasingly an important area as network connectivity increases digital signatures, digital cash, authentication, increasingly important an important social concern further reading: Crypto Policy Perspectives: S. Landau et al., Aug 1994 CACM Internet Security, R. Oppliger, CACM May 1997 www.eff.org