Internet security protocols



Similar documents
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Chapter 17. Transport-Level Security

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Web Security: Encryption & Authentication

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Network Security Essentials Chapter 5

Web Security Considerations

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

TLS and SRTP for Skype Connect. Technical Datasheet

Network Security. Lecture 3

Chapter 7 Transport-Level Security

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Using etoken for SSL Web Authentication. SSL V3.0 Overview

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Transport Level Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Chapter 16: Authentication in Distributed System

CS 356 Lecture 28 Internet Authentication. Spring 2013

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

CSE/EE 461 Lecture 23

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

, ) I Transport Layer Security

Transport Layer Security Protocols

Network Security Protocols

Savitribai Phule Pune University

Overview. SSL Cryptography Overview CHAPTER 1

Security Policy Revision Date: 23 April 2009

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

SSL A discussion of the Secure Socket Layer

As enterprises conduct more and more

SSL/TLS: The Ugly Truth

The Secure Sockets Layer (SSL)

Chapter 8. Network Security

Three attacks in SSL protocol and their solutions

Standards and Products. Computer Security. Kerberos. Kerberos

Network Security Part II: Standards

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

How To Protect Your Data From Attack

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Einführung in SSL mit Wireshark

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Key Management (Distribution and Certification) (1)

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Communication Systems SSL

Chapter 6 CDMA/802.11i

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

EXAM questions for the course TTM Information Security May Part 1

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Authentication in WLAN

Chapter 10. Network Security

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

TLS/SSL in distributed systems. Eugen Babinciuc

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Q: Why security protocols?

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

SSH Secure Shell. What is SSH?

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

CS 758: Cryptography / Network Security

SBClient SSL. Ehab AbuShmais

Secure Sockets Layer

Internetwork Security

Introduction to Cryptography

Midterm. Name: Andrew user id:

, SNMP, Securing the Web: SSL

Client Server Registration Protocol

Network Security. A Quick Overview. Joshua Hill josh-web@untruth.org

Authenticity of Public Keys

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Security Fundamentals

Information Security

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

tcpcrypt Andrea Bittau, Dan Boneh, Mike Hamburg, Mark Handley, David Mazières, Quinn Slack Stanford, UCL

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Protocol Rollback and Network Security

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Sync Security and Privacy Brief

Cryptography and Network Security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

CSCI 454/554 Computer and Network Security. Final Exam Review

CS Final Exam

Lecture 9 - Network Security TDTS (ht1)

CRYPTOGRAPHY AS A SERVICE

OpenHRE Security Architecture. (DRAFT v0.5)

Transcription:

Internet security protocols

In this lecture: SSH Kerberos SSL/TLS

SSH protocol is used to mutually authenticate the Client and the Server and to establish a secure channel between them. It consists of Transport Layer Protocol unilaterally authenticates the Server to the Client. Establishes a channel that the Client deems secure. User Authentication Protocol authenticates the Client to the Server. Connection Protocol multiplexes the secure channel into several logical channels.

Transport layer protocol. 0. Client and Server establish connection. 1. Both sides send to each other the key exchange messagesá,áëcontaining a nonceæ,æë; the protocol and software versions; lists of names of accepted key exchange protocols and cryptographic primitives, in order of preference. Primitives are asymmetric primitives symmetric encryption primitives MAC primitives

If D-H key exchange with the chosen, then group Ô, Õ ½ 2. Client choosesü¾ê Õ, sends ÜÑÓ Ôto 3. Server Server. choosesý¾ê Õ, computes ÝÑÓ Ô; computes ÝÑÓ Ô; computesà Á ÁË pk Ã˵ µ; sends pk Ã˵ À Ã˵to Client. 4. Client checks whether it recognizes pk Ã˵; recomputes À, checks the signature.

The shared secretãand the hashàare used to derive keys and initial vectors for the secure channel: IV Ëis À A µ; IVË is À B µ; same for encryption keys and MAC keys ( Ëand Ë ). ÀforÀfrom the initial key exchange. All further communication is encrypted and MAC-ed. Both sides may initiate a new exchange of keys.

A payloadåis encoded in a packet as whereô is used to make the length of packet a multiple of the cipher block length. È Ô ØÐ Ò Ô Ò Ð Ò Å Ô Ò µ A packet is encoded as where ÕÒÓ¾ ¾ ¾. È Ãenc MACÃmac ÕÒÓ Èµµ Encryption: actually the stream of is encrypted, not each packet separately. Standard suggests using some block cipher in the CBC-mode. packetsè½ È¾ È Exercise. What is the problem here with MACs? With encrypting?

User authentication protocol. Password-based: Client sends his name and password. Server checks that (name,password)-pair is valid. Signature-based: Client sends his public key and a signature on various things: including the session identifier. Server checks the knowledge of the key and the signature.

Connection protocol. Not a security protocol.

Kerberos protocol suite provides a single sign-on to various services offered on a corporate network. corporate there exists a single authority. Each useríhas a single password (shared keyãí). It is agreed out-of-band.

The intranet of a large corporation: Several domains. in different geographic locations Each domain contains several serversë. Each domain has a ticket-granting serverì Ë. There is a global authentication server Ë.

2. Ë :Í Ì Ì Ë Ì Ì, where To get a service from a serverë, the client on behalf of the userífirst connects the Ë: HereÌÁ½is the desired validity interval (start and end Ë:Í Ì Ë ÌÁ½ ƽ 1. times) of the ticket. ÌÁ¾is not intended as a security feature here. Ì Ì Ì Ë Ã Ì Ë ÌÁ¾ ƽ ÃÍ Ì Ì Ë Í Ì Ë Ã Ì Ë ÌÁ¾ Ã Ë Ì Ë

:Í Ì Ë ÌÃÌ, where Ì Ë Í Ë Ã Ë ÌÁ ÃÌ Ë Ë 4.Ì Ë ÌÃÌ Ë Ã Ë ÌÁ ƾ Ã Ì Ë then contactsì Ëin a similar manner: The last component (the authenticator) shows that Ì Ë:Ë ÌÁ ƾ Ì Ì Ë ÌÙÖÖ Ã Ì Ë 3. the client could decryptì Ì. They should be cached to make sure that they re not used twice.

andëthen authenticate using the shared keyã Ë: also andë. Ë:Ì Ë ÌÙÖÖ Ã Ë 5. : ÌÙÖÖ Ã Ë 6.Ë The keyã Ëis used to secure the channel between

Ë: Æ 1. : Ã ÌÁ Æ Ã Ë Ã ÌÁ Ã Ë 2.Ë : Ã ÌÁ Ã Ë ÌÙÖÖ Ã 3. 4. : ÌÙÖÖ Ã The exchanges 1-2 and 3-4 followed a common pattern: wants to talk to. andëshare a keyã Ëfor ¾.

A S1 S2 S3 Somewhat similar to hierarchical PKI... B

AS TGS Server 1 2 3 4 5 6 Client Source of the name Kerberos.

TLS consists of Handshake protocol Typical public-key protocol Client sends server a secret value encrypted with server s public encryption key. The keys are derived from this secret value. The public keys are found from certificates. Record protocol

Record protocol encapsulates the payloads. A payload Åis translated to whereô is used to make the length of the argument of ÁÎ Å MACÃÑ ÕÒÓ Åµ Ô Ã Òµ the encryption a multiple of block length. LetÐbe the length ofô in bytes. and the bytes inô are all equal toð ½. Then½ Ð ¾ well as encryption and tagging algo- à ÒandÃÑ, as rithms have been agreed in the handshake protocol.

If a party receives an encrypted packet from the other party, then he Decrypts the packet. Checks that the padding is correct (at leastðlast bytes have valueð the ½forÐ ½). If the check fails, then sends an error message, otherwise... Checks the MAC. If the check fails then sends an error message. Otherwise proceeds.

This party may be implementing an oracle that tells whether the padding was correct. Error message due to incorrect padding and error message due to incorrect MAC may take different amount of time to compute. Access to such an oracle allows us to decrypt. Hence the implementation must make sure to insert delays as appropriate.

CBC-mode: Let us be interested in the value ½ D µ. ½ E ÁÎ Ô½µ ½ Ô µ E ofô LetÖbe a random block. SendÖ to the oracle. If it answers padding OK then most probably Exercise. How many tries? How to verify that equation? We have foundð µ. This tells usð Ô µ. Ð Ö D µµ ¼½½ LetÖ¼ Ö ¼ ½. ThenÐ Ö¼ D µµ ¼¾½. VaryÖ¼(except last 8 bits), until the second last byte of Ö¼ D µequals¼¾½. Etc. Third, fourth, etc. byte...