Cryptographic Protocols and Network Security



Similar documents
Network Security and Surveillance

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

CPSC 467b: Cryptography and Computer Security

Client Server Registration Protocol

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Content Teaching Academy at James Madison University

Chap. 1: Introduction

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Information Security

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Authentication requirement Authentication function MAC Hash function Security of

Notes on Network Security - Introduction

Module 7 Security CS655! 7-1!

Cryptography and Network Security

Q: Why security protocols?

Weighted Total Mark. Weighted Exam Mark

SFWR ENG 4C03 - Computer Networks & Computer Security

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

CSC 474 Information Systems Security

CRYPTOGRAPHY AND NETWORK SECURITY

COSC 472 Network Security

Information Security Basic Concepts

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CRYPTOG NETWORK SECURITY

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

CSCE 465 Computer & Network Security

CPSC 467: Cryptography and Computer Security

Security Goals Services

VoteID 2011 Internet Voting System with Cast as Intended Verification

Overview of computer and communications security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

Introduction to Security

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

e-code Academy Information Security Diploma Training Discerption

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Chapter 10. Network Security

Compter Networks Chapter 9: Network Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Security vulnerabilities in the Internet and possible solutions

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Cryptography and Network Security

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Network Security Essentials:

How To Use A College Computer System Safely

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

Introduction to Information Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

IY2760/CS3760: Part 6. IY2760: Part 6

Cryptography and Key Management Basics

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri sd&m

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

ISM/ISC Middleware Module

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

SECURITY ISSUES INTERNET WORLD WIDE WEB FOR THE AND THE

CSCI 4541/6541: NETWORK SECURITY

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Sync Security and Privacy Brief

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Cryptography and Network Security

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Chapter 16: Authentication in Distributed System

CNT4406/5412 Network Security Introduction

Penetration Testing Service. By Comsec Information Security Consulting

VoIP Security Threats and Vulnerabilities

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

E-COMMERCE and SECURITY - 1DL018

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Transcription:

G. Sivakumar Computer Science and Engineering IIT Bombay siva@iitb.ac.in 1 Some Puzzles 2 Internet Security Overview 3 Need For Formal Methods

Exchanging Secrets Goal A and B to agree on a secret number. But, C can listen to all their conversation. Solution? A tells B: I ll send you 3 numbers. Let s use their LCM as the key.

Exchanging Secrets Goal A and B to agree on a secret number. But, C can listen to all their conversation. Solution? A tells B: I ll send you 3 numbers. Let s use their LCM as the key.

Mutual Authentication Goal A and B to verify that both know the same secret number. No third party (intruder or umpire!) Solution? A tells B: I ll tell you first 2 digits, you tell me the last two...

Mutual Authentication Goal A and B to verify that both know the same secret number. No third party (intruder or umpire!) Solution? A tells B: I ll tell you first 2 digits, you tell me the last two...

Zero-Knowledge Proofs Goal A to prove to B that she knows how to solve the cube. Without actually revealing the solution! Solution? A tells B: Close your eyes, let me solve it...

Zero-Knowledge Proofs Goal A to prove to B that she knows how to solve the cube. Without actually revealing the solution! Solution? A tells B: Close your eyes, let me solve it...

Paper, Scissors, Rock Game Goal How to play over Internet? Using email, say? Solution? You mail me your choice. I ll reply with mine. Coin Toss Simpler Version of problem?

Paper, Scissors, Rock Game Goal How to play over Internet? Using email, say? Solution? You mail me your choice. I ll reply with mine. Coin Toss Simpler Version of problem?

Paper, Scissors, Rock Game Goal How to play over Internet? Using email, say? Solution? You mail me your choice. I ll reply with mine. Coin Toss Simpler Version of problem?

Sharing a Dosa Goal All should get equal share of dosa. No envy factor. No trusted umpire. Solution? 2 people case is easy- you cut, i choose!

Sharing a Dosa Goal All should get equal share of dosa. No envy factor. No trusted umpire. Solution? 2 people case is easy- you cut, i choose!

Sharing a Secret Safety in numbers. Do not trust any one (or few) person(s). Real World Examples Pirates sharing a treasure map. Who can authorize launching a missile? From Computer Domain Secure Storage (Archival) Distributed storage of Logs

Online Voting Protocols Are we ready for elections via Internet? George Bush (Nov 2000, dimpled chads) Pervez Musharaf (April 2002) Maharashtra (Oct 13, 2004) E-Voting Protocols Requirements No loss of votes already cast (reliability) No forging of votes (authentication) No modification of votes cast (integrity) No multiple voting No vote secrecy violation (privacy) No vulnerability to vote coercion No vulnerability to vote selling or trading protocols (voter is an adversary) No loss of ability to cast and accept more votes (availability, no denial of service)

Other Desirable Properties must not only be correct and secure, but also be seen to be so by skeptical (but educated and honest) outsiders. Auditability: Failure or procedural error can be detected and corrected, especially the loss of votes. Verifiability: Should be able to prove My vote was counted All boothes were counted The number of votes in each booth is the same as the number of people who voted No one I know who is ineligible to vote did so No one voted twice... without violating anonymity, privacy etc. Zero Knowledge Proofs

Security Requirements Informal statements (formal is much harder) Confidentiality Protection from disclosure to unauthorized persons Integrity Assurance that information has not been modified unauthorizedly. Authentication Assurance of identity of originator of information. Non-Repudiation Originator cannot deny sending the message. Availability Not able to use system or communicate when desired. Anonymity/Pseudonomity For applications like voting, instructor evaluation. Traffic Analysis Should not even know who is communicating with whom. Why? Emerging Applications Online Voting, Auctions (more later) And all this with postcards (IP datagrams)!

Internet s Growth and Charter Information AnyTime, AnyWhere, AnyForm, AnyDevice,... WebTone like DialTone

Internet s Dream Why should a fridge be on Internet? Will security considerations make this a nightmare?

What are Cyber crimes? Against People Cyber Stalking and Harrassment (Child) Pornography Against Property Cracking Virus and Spam Software/Entertainment Piracy Cyber Terrorism!

Security Concerns Match the following! Problems Attackers Highly contagious viruses Unintended blunders Defacing web pages Disgruntled employees or customers Credit card number theft Organized crime On-line scams Foreign espionage agents Intellectual property theft Hackers driven by technical challenge Wiping out data Petty criminals Denial of service Organized terror groups Spam E-mails Information warfare Reading private files... Surveillance... Crackers vs. Hackers Note how much resources available to attackers.

Cyber Terrorism? Some examples from http://cybercrimes.net/ 1989: Legion of Doom group took over the BellSouth telephone system, tapped phone lines, re-routed calls,... 1996: A white supremacist movement took out a Massachusetts internet service provider 1997: A cracker disabled the computer system of an airport control tower at the Worcester, Mass. Airport. 1997: a hacker in Sweden jammed the 911 emergency telephone system all throughout west-central Florida. 1998: NASA, Navy, and Defence Department computers were attacked. 2000: in Maroochy Shire, Australia, a disgruntled consultant hacked into a waste management control system and released millions of gallons of raw sewage on the town. 2001: Two post-graduate students cracked a bank system used by banks and credit card companies to secure the personal identification numbers of their customers accounts. [38]

Emergency Response: http://www.cert-in.org.in/

Internet Attacks Timeline From training material at http://www.cert-in.org.in/

Internet Attack Trends From training material at http://www.cert-in.org.in/

Indian IT Act 2000 Basic Legal Framework Electronic documents, signatures as evidence Cyber Crimes & Punishments Secn 43: Damage to Computers/Network Secn 65: Tampering source code Secn 66: Hacking (cracking) Secn 67: Obscenity (bazee.com!) Secn 69: Interception Several Initiatives (PKI, CERT-IN, Cyber cells,...)

Security Mechanisms System Security: Nothing bad happens to my computers and equipment virus, trojan-horse, logic/time-bombs,... Network Security: Authentication Mechanisms you are who you say you are Access Control Firewalls, Proxies who can do what Data Security: for your eyes only Encryption, Digests, Signatures,...

Security Mechanisms System Security: Nothing bad happens to my computers and equipment virus, trojan-horse, logic/time-bombs,... Network Security: Authentication Mechanisms you are who you say you are Access Control Firewalls, Proxies who can do what Data Security: for your eyes only Encryption, Digests, Signatures,...

Security Mechanisms System Security: Nothing bad happens to my computers and equipment virus, trojan-horse, logic/time-bombs,... Network Security: Authentication Mechanisms you are who you say you are Access Control Firewalls, Proxies who can do what Data Security: for your eyes only Encryption, Digests, Signatures,...

Cryptography and Data Security sine qua non [without this nothing :-] Historically who used first? (L & M) Code Language in joint families!

One way Functions Mathematical Equivalents Factoring large numbers (product of 2 large primes) Discrete Logarithms

One-way Functions Computing f(x) = y is easy. Eg. y = 4 x mod 13 (If x is 3, y is?) n 4 n mod 13 10 n mod 13 1 4 10 2 3 9 3 12 12 4 9 3 5 10 4 6 1 1 7 4 10... Note: need not work with numbers bigger than 13 at all! But given y = 11, finding suitable x is not easy! Can do by brute-force (try all possibilities!) No method that is much better known yet!

Network Security Mechanism Layers Cryptograhphic Protocols underly all security mechanisms. Real Challenge to design good ones for key establishment, mutual authentication etc.

Motivation for Session keys Combine Symmetric (fast) and Asymmetric (very slow) Methods using session (ephemeral) keys for the following additional reasons. Limit available cipher text (under a fixed key) for cryptanalytic attack; Limit exposure with respect to both time period and quantity of data, in the event of (session) key compromise; Avoid long-term storage of a large number of distinct secret keys (in the case where one terminal communicates with a large number of others), by creating keys only when actually required; Create independence across communications sessions or applications. No replay attacks. How to establish session keys over insecure medium where adversary is listening to everything? Can be done even without any public key! Randomization to rescue (like in CSMA/CD of Ethernet).

Diffie-Hellman Key Establishment Protocol

Man-in-the-middle attack Authentication was missing! Can be solved if Kasparov and Anand know each other s public key (Needham-Schroeder). Yes, but different attack possible.

Needham-Schroeder Protocol

Attack by Lowe (1995)

Why Are Security Protocols Often Wrong? They are trivial programs built from simple primitives, BUT, they are complicated by concurrency a hostile environment a bad user controls the network Concern: active attacks masquerading, replay, man-in-middle, etc. vague specifications we have to guess what is wanted Ill-defined concepts Protocol flaws rather than cryptosystem weaknesses Formal Methods needed!

Need for Formal Methods Countermeasure: formal design and analysis Formal Modelling and Specification of Protocol Abstract encryption model, formal specification Specification of Required Properties Verification of Properties Inductive proofs, state-space search, authentication logics Generation of Counter-Example Analysis can find flaws, suggest improvements, prove conditional correctness

Formal Approaches Overview Why so many approaches? When all you have is a hammer, everything looks like a nail!

Specification of Protocol Common Authentication Protocol Specification Language http://www.csl.sri.com/users/millen/capsl/ High-level message-list based language with abstract encryption operators A -> B: {A}K Declarations: strong typing and abstract data type extensions initialization, named expressions security goals Actions between messages: tests, assignments

Emerging Picture

Tools for Security Analysis and Verification

References Books TCP/IP Illustrated by Richard Stevens, Vols 1-3, Addison-Wesley. Applied Cryptography - Protocols, Algorithms, and Source Code in C by Bruce Schneier, Jon Wiley & Sons, Inc. 1996 Cryptography and Network Security: Principles and Practice by William Stallings (2nd Edition), Prentice Hall Press; 1998. Practical Unix and Internet Security, Simson Garfinkel and Gene Spafford, O Reilly and Associates, ISBN 1-56592-148-8. Web sites www.cerias.purdue.edu (Centre for Education and Research in Information Assurance and Security) www.sans.org (System Administration, Audit, Network Security) cve.mitre.org (Common Vulnerabilities and Exposures) csrc.nist.gov (Computer Security Resources Clearinghouse) www.vtcif.telstra.com.au/info/security.html