Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23



Similar documents
CSE/EE 461 Lecture 23

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

CRYPTOGRAPHY IN NETWORK SECURITY

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Chapter 7: Network security

Lecture 9: Application of Cryptography

CSCE 465 Computer & Network Security

CS 758: Cryptography / Network Security

SECURITY IN NETWORKS

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Public-Key Cryptography

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. HIT Shimrit Tzur-David

Lukasz Pater CMMS Administrator and Developer

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

What is network security?

7! Cryptographic Techniques! A Brief Introduction

Lecture 9 - Network Security TDTS (ht1)

Chapter 10. Network Security

An Introduction to Cryptography as Applied to the Smart Grid

Principles of Network Security

An Introduction to Cryptography and Digital Signatures

Message authentication and. digital signatures

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Content Teaching Academy at James Madison University

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Application Layer (1)

Properties of Secure Network Communication

Module 7 Security CS655! 7-1!

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Cryptography & Digital Signatures

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

Public Key Cryptography Overview

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

The Mathematics of the RSA Public-Key Cryptosystem

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

Overview. SSL Cryptography Overview CHAPTER 1

Cryptography and Network Security

Computer Security: Principles and Practice

Software Tool for Implementing RSA Algorithm

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Lecture 6 - Cryptography

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

SFWR ENG 4C03 - Computer Networks & Computer Security

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Information Security

Symmetric Key cryptosystem

Client Server Registration Protocol

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Cryptography and Network Security Chapter 9

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

CPSC 467b: Cryptography and Computer Security

Network Security Technology Network Management

IT Networks & Security CERT Luncheon Series: Cryptography

Chap. 1: Introduction

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Authentication Application

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Public Key (asymmetric) Cryptography

Savitribai Phule Pune University

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

How To Encrypt Data With Encryption

Compter Networks Chapter 9: Network Security

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Message Authentication Codes

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Network Security. Omer Rana

Security and Authentication Primer

Cryptography: Authentication, Blind Signatures, and Digital Cash

Security vulnerabilities in the Internet and possible solutions

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

A SOFTWARE COMPARISON OF RSA AND ECC

Cryptography & Network Security

Public Key Cryptography and RSA. Review: Number Theory Basics

Cryptography and Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Transcription:

Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23

Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest Public Key Cryptography Security Protocols Authentication Algorithms Message Integrity Protocols Remaining Issues HKU SPACE CC CN Lecture 08 2/23

Introduction Some expected network security services: Secrecy (or confidentiality): Prevent others from reading information shared between two participants. Authentication: Verifying someone s identity. Message integrity: Assure that the message received has not be altered after it was generated. Nonrepudiation: A sender should not be able to falsely deny later that he sent a message. Most of the security services require cryptographic tools as building blocks. Regarding the usage of cryptographic tools, there are two approaches: Keep the cryptographic algorithm (method) secret. (The preferred one) The cryptographic algorithm is not a secret, but the key is. HKU SPACE CC CN Lecture 08 3/23

Introduction (Cont d) The scope of the security issues (from networking point of view): Concern mainly the communication between two parties. Concern attacks against protocols, not those against cryptographic algorithms or cryptographic techniques used to implement the algorithms. Types of attacks against protocols: Passive attacks (eavesdropping), e.g., ciphertext-only attacks Active attacks, e.g., pretend to be someone else, introduce new messages in the protocol, delete existing messages, substituting one message for another, replay old messages, etc. HKU SPACE CC CN Lecture 08 4/23

Cryptography Algorithms One kind of cryptography algorithms is to process original data into some unintelligible form. The process is called encryption and the recovery of the original data is called decryption. The idea of encryption plaintext encryption ciphertext decryption plaintext Another kind of cryptography algorithms is to produce a unique piece data (signature) based on some given data. HKU SPACE CC CN Lecture 08 5/23

Cryptography Algorithms (Cont d) Requirements of the algorithms are: to keep the key secret is enough to ensure the privacy of the data; to be able to prevent the attacker from deducing the key, either by making the algorithm complicated (DES) making the algorithm be one-way (MD5) Common cryptography algorithms are: Secret key algorithms: Data Encryption Standard (DES) International Data Encryption Algorithm (IDEA) Public key algorithm: RSA Message digest: MD5 (also call cryptographic checksum) HKU SPACE CC CN Lecture 08 6/23

Secret Key (Symmetric) Cryptography Given: Alice and Bob agree on a cryptosystem. Alice and Bob agree on a key (secret). Encryption and decryption using the key. M E K (M) D K (E K (M)) M Problems: Keys must be distributed in secret. Compromising of keys means compromising all aspects of security. Number of keys is not scalable to the user population size. HKU SPACE CC CN Lecture 08 7/23

Secret Key (Symmetric) Cryptography (Cont d) Example: an 64-bit DES (Data Encryption Standard) Alice and Bob use the same algorithm and the same key to encrypt and decrypt. The only approach to attack is to search the entire key space. When more than 64 bits are required, use a cipher block chaining (CBC). The ciphertext for block i is XORed with the plaintext for block i+1 before running it through DES. An initialization vector (IV) is used in lieu of the nonexisting block 0. This number is randomly generated by a sender and it is sent along with the encrypted message. Triple-DES, i.e., encrypt the data three times. HKU SPACE CC CN Lecture 08 8/23

Secret Key (Symmetric) Cryptography (Cont d) Figure: Outline of DES. HKU SPACE CC CN Lecture 08 9/23

Secret Key (Symmetric) Cryptography (Cont d) Figure: CBC for large messages. HKU SPACE CC CN Lecture 08 10/23

Message Digest (Cryptographic Checksum) Message digest is a technique which can be used to verify whether a message has been malicious changed during the transmission (integrity). Message digest uses one-way hash functions as its fundamental building block. One-way functions are relatively easy to compute (given x, compute f (x)), but significantly harder to reverse (given f (x), compute x) For example, given integers x and y, it is easy to compute the product of x and y but hard to factorize a large integer. Given a cryptographic checksum for a message, it is not computationally feasible to find two messages that hash to the same cryptographic checksum. Example: MD5 HKU SPACE CC CN Lecture 08 11/23

Message Digest (Cryptographic Checksum) (Cont d) Figure: Outline of MD5. HKU SPACE CC CN Lecture 08 12/23

Public Key (Asymmetric) Cryptography In this method, two keys are used: a private key and a public key. It is computationally hard to deduce the private key from the public key. In the secrecy service, the encryption is done by using the public key and the decryption is done by using the private key. M E pub (M) D pri (E pub (M)) M Mathematically, the process bases on one-way functions. The public-key algorithm is slow. Symmetric algorithms are at least 1000 times faster. HKU SPACE CC CN Lecture 08 13/23

Public Key Cryptography - RSA RSA stands for Rivest, Shamir and Adleman. They are the inventors of the algorithm. The algorithm s outline goes as follows: Choose two large prime numbers p and q. Multiply p and q together to get n. Choose the encryption key e, such that e and (p 1) (q 1) are relatively prime. Compute decryption key d such that d =e 1 mod ((p 1) (q 1)). Construct private key as (e, n). Construct public key as (d, n). Discard (do not disclose) original primes p and q. To encrypt: c = m e mod n. To decrypt: m = c d mod n. Example: p = 3, q = 5, and plaintext = 9. HKU SPACE CC CN Lecture 08 14/23

Security Protocols Using the cryptography algorithms, we can design protocols to provide different security services. For the secrecy service, the secret key and the public key algorithms can be used. For the authentication service, we introduce here three protocols: two based on secret key algorithms and the other on public key algorithms. For the integrity, we also introduce three protocols. Besides the permanent keys, in a protocol, sometimes, the two participants may also establish session keys for ensuring the privacy between their communication. HKU SPACE CC CN Lecture 08 15/23

Authentication Algorithm (1) Assumption: both client and server already share a secret key. Approach: Each side generate a random number encrypted with the secret key. See whether the other side can decrypt it. Successful if CHK = SHK (client and server handshaking keys) SK: Session key HKU SPACE CC CN Lecture 08 16/23

Authentication Algorithm (1) Figure: Three-way handshake. HKU SPACE CC CN Lecture 08 17/23

Authentication Algorithm (2) This approach is based on a trusted third party (authentication server). Assumptions: A shares a secret key with S, and so is B with S. Notations in the messages: A, B: The participants identities T: Timestamp L: Lifetime K: Session key for A and B KA, KB: A s secret key shared with S and B s secret key shared with S, respectively. HKU SPACE CC CN Lecture 08 18/23

Authentication Algorithm (2) Figure: Trusted third party. HKU SPACE CC CN Lecture 08 19/23

Authentication Algorithm (3) Assumptions: Public key algorithm is used. A picks a random number and encrypts it with B s public key. B does the same to A. Figure: Public key authentication. HKU SPACE CC CN Lecture 08 20/23

Message Integrity Protocols Digital Signature Using RSA special case of a message integrity where the code can only have been generated by one participant, compute signature with private key and verify with public key. Keyed MD5 sender: m + MD5(m + k) + E(k, private); receiver: recovers random key using the sender s public key then applies MD5 to the concatenation of this random key message. MD5 with RSA signature sender: m + E(MD5(m), private); receiver: decrypts signature with sender s public key then compares result with MD5 checksum sent with message. HKU SPACE CC CN Lecture 08 21/23

Remaining Issues For the private key approach, how does a pair of participants generates and manages their shared secret key? Use RSA key exchange with digital signatures. Diffie-Hellman key exchange For the public key approach, how can one obtain another s true public key or how can one reliably advertise one s public key to others? Digital certificates Certification authority (a trusted third party approach) HKU SPACE CC CN Lecture 08 22/23

Acknowledgments Part of this slide set is referenced, prepared or/and extracted from the books: Computer Networks - A Systems Approach and the book Routing in the Internet. Also, some images and information are sourced from the Internet. This set of slides is for teaching purpose only. HKU SPACE CC CN Lecture 08 23/23