2009-2010. SSL Firewalls



Similar documents
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

IT Networks & Security CERT Luncheon Series: Cryptography

CS 758: Cryptography / Network Security

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

EXAM questions for the course TTM Information Security May Part 1

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

NETWORK ADMINISTRATION AND SECURITY

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Chapter 8. Network Security

SECURITY IN NETWORKS

Lecture 9 - Network Security TDTS (ht1)

VALLIAMMAI ENGINEERING COLLEGE

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Lecture 4 Data Encryption Standard (DES)

Chapter 7: Network security

Authentication requirement Authentication function MAC Hash function Security of

Network Security Technology Network Management

Computer Security CS 426. CS426 Fall 2010/Lecture 40 1

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

How To Understand And Understand The History Of Cryptography

Weighted Total Mark. Weighted Exam Mark

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Chapter 15: Security

lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security

Network Security - ISA 656 Introduction to Cryptography

Security for Computer Networks

Cryptographic Hash Functions Message Authentication Digital Signatures

AC76/AT76 CRYPTOGRAPHY & NETWORK SECURITY DEC 2014

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Network Security. HIT Shimrit Tzur-David

Table of Contents. Bibliografische Informationen digitalisiert durch

Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings

7! Cryptographic Techniques! A Brief Introduction

SCP - Strategic Infrastructure Security

Properties of Secure Network Communication

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Chapter 10. Network Security

Message authentication and. digital signatures

Overview of Symmetric Encryption

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Principles of Network Security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CSE/EE 461 Lecture 23

Message Authentication

The Misuse of RC4 in Microsoft Word and Excel

Chapter 18: System Security

Public Key Cryptography Overview

What is network security?

CIS433/533 - Computer and Network Security Cryptography

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

1 Data Encryption Algorithm

A Comparative Study of Security Features in FreeBSD and OpenBSD

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security. Modes of Operation. Steven M. Bellovin February 3,

The Encryption Technology of Automatic Teller Machine Networks

Client Server Registration Protocol

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

CRYPTOGRAPHY IN NETWORK SECURITY

Hash Functions. Integrity checks

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

How To Encrypt Data With Encryption

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Network Security. Omer Rana

Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:

Network Security. Outline of the Tutorial

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Cryptography & Network Security

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

CSCI 454/554 Computer and Network Security. Final Exam Review

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

Modes of Operation of Block Ciphers

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CS155. Cryptography Overview

Massachusetts Institute of Technology Handout : Network and Computer Security October 9, 2003 Professor Ronald L. Rivest.

Introduction to Cryptography CS 355

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Content Teaching Academy at James Madison University

CrypTool Claudia Eckert / Thorsten Clausius Bernd Esslinger / Jörg Schneider / Henrik Koy

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS Final Exam

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Security in Computer Networks

Information Security

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Waspmote Encryption Libraries. Programming guide

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Transcription:

& 2009-2010 & ( ) SSL Firewalls :. :.. byte 0x01 : 1,. 1

, :,, : ( ) ). : : (Confidentiality) (Integrity) (Availability) :.,,. :. :...,,. :,,. 2

(Identification) (Authentication).,,, )... (Authorization) (Accountability) (Non-repudiation)..... ;. Hackers- :. ( ) ; ; :. : (, ).. :.. 3

(Vulnerability),,,. (Threat). : : :. :,. :. (risk). (attack). (Countermeasures). :. :. :. :,. :. :.. :. :. :. 4

(, ): ( ). : (, ). :.. ) 5

. : : (,, ), ). : ( ). : (MAC):. (unilateral authentication):. (mutual authentication):. Password ( ) PIN (challenge-response). Security token (password generator) Smart card, magnetic stripe card - Passwords string x. passwords:.. dictionary attacks. ( ) password checkers password.. www.passwordmeter.com/ Passwords password: dictionary attacks. passwords,,. passwords. default passwords. 6

.. : ( ). :. Crossover Error Rate:.. ( ) : :. :.,,. :. :. :.. :.. :. 7

: (MAC):.,.,,. ( ). (one-way hash function). ( ) (hash value) (message digest). : m, f(m). f(m), m. m m f(m) = f(m )..,.. 8

. (, ). : (access). (subject),,. (object).,,,,. :. : : (observe): (alter):. :. : : :,. (execute): (delete - windows): (change ownership - windows): ( ) :. : (discretionaryaccess control DAC): ( ),. ( manager ).. DAC ACLs (Access Control Lists ). 9

( ) (mandatoryaccess control MAC):.... (security clearance) secret, top secret, confidential, (classified) secret, top secret, confidential.. security clearance.. ( ) (role based access control RBAC) (Nondiscretionary access control):.. :,. RBAC.. ( ) : ( ) (access control matrix):. (DAC).. : ( capabilities) ( access control lists) ( ) (capabilities):,... : alpha.exe: execute; beta.com: execute, read : delta.doc: read, write; alpha.exe: execute; beta.com: execute DAC.. : ( administrator).... 10

( ) (Access control list ACL):. ACL.. ACL alpha.exe: A: execute, : execute. (groups). ACLs.... (Bell-LaPadula), (Biba, Clark-Wilson). :.. :. :.. (Bell-LaPadula).,. Bell-LaPadula.. (subject s security clearance) (data classification):. 11

(Bell-LaPadula) Bell- LaPadula: (Simple security rule):. (no read up). *- (*-property rule): (no write down). :.,... (Biba) Bell-LaPadula.. : (no write up):. (no read down). (Clark-Wilson).. (separation of duties):.. 12

,,. :, : : :. :. :. :. :. Plaintext:. Ciphertext:. 1/3 - ( -GSM) (cryptophones) ( ) ( ) 2/3 (, ) 13

3/3 (VPN) Word Wide Web ( ) (Hipperlan, bluetooth, 802.11x) (VOIP) (1900. 1900.) 4000... 400.,. 2000 ( ) Caesar cipher. (1900. 1900.), (1900. 1950.) Enigma., 1908 14

(1950. - ) ClaudeShannon 1949, (Communication Theory of Secrecy Systems). 17 1975 DES (Data Encryption Standard) 17 1975. DES AES 2001 NIST FIPS 197. This is plaintext ) - &cw*4l %$?e} ) - This is plaintext ) : k k,., k = k.. 15

:... This is plaintext k - &cw*4l %$?e} k - This is plaintext X = k ) Y X = k (Y) X.. m...,,.. : 16

,,.. : : ).. : ). :.,. :. Block ciphers (blocks) t blocks. Stream ciphers block ciphers block 1 bit. bits. 17

Stream ciphers stream cipher bit byte bit byte. stream ciphers. Stream ciphers stream cipher :.. 1 0. bit,. Stream ciphers Vernam : t m 1 m 2 m t k 1 k 2 k t c 1 c 2 c t : c i = m i k i, 1 i t. : 100111010100 : 010001101001 : 110110111101 Stream ciphers Vernam cipher onetime-pad. O one-time-pad... 18

Symmetric-key block ciphers block cipher n-bit n-bit. k-bit. : C = E K (P) : P = D K (C) : ECB, CBC, CFB, OFB. (Electronic CodeBook Mode; ECB mode) : : k-bit K; n-bit x 1,x 2,,x t. : c 1,c 2,,c t : 1 j t, c j E K ( x j ). : 1 j t, x j D K ( c j ). k x j x j / n / n E D k / n / n c j c j x jxj (Electronic CodeBook Mode; ECB). ECB: ).. : bits. :. (Cipher Block Chaining mode; CBC) : : k-bit K; n-bit IV; n-bit x 1,x 2,,x t. : c 1,c 2,,c t : 1 j t, c j E K (c j-1 x j ). : 1 j t, x j c j-1 D K ( c j ). 19

(Cipher Block Chaining mode; CBC) CBC:., IV,. c j x j.. (Cipher Block Chaining mode; CBC) CBC: : bit c j c j c j+1 x j c j c j-1 ) : CBC selfsynchronizing c j c j+1, c j+2 x j+2. IV,. E(x) = E K2 (E K1 (x)) K1 2 E(x) = Y K3 (Y K2 (Y K1 (x))). Y. E(x) = K3 (D K2 (E K1 (x))). K1= 3. K1= 2= 3; Symmetric-key Block Ciphers : (substitution) ( ) ( ). Caesar cipher 3 : plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: defghijklmnopqrstuvwxyzabc Caesar cipher k. k. 20

Caesar Chipher : : : : C = (M + 3) mod 24 ( ) : M = (C 3) mod 24 (C 3), 24,., mod 24, mod 26. Symmetric-key Block Ciphers : (substitution),,,.. plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: rivnsojltzkgaqsmwvbyex (26!=4x10 26 )... Symmetric-key Block Ciphers : (substitution) Vigenere) tk 1 k 2 k t. m=m 1 m 2 m 3 c=c 1 c 2 c 3 c 1 = m 1 + k t mod s s. t. : : : :, 6,, 3,, 9, (6 + 3) mod 24 = 9., 17,, 5,, (17 + 5) mod 24 = 22.,. 21

Vigenere Vigenere, «cryptography». : C R Y P T O G R AP H Y C R Y P T O G R A P H Y C R Y : N E W D I R E C T I O N S I N C R Y P T O G R A P H Y : : «P» «V». Symmetric-key Block Ciphers : (transposition). t, t, e 1 t... t = 6 e = (641352).. d = (364251). 22

: 3 ( ) : : : Symmetric-key Block Ciphers (Product cipher):... block cipher (iterated block cipher): block cipher (round function). Symmetric-key Block Ciphers Feistel: 2t-bit (L 0, R 0 ), t-bit L 0 R 0, (R r, L r ) r r 1. 1 i r L i = R i-1, R i = L i-1 f(r i-1, K i ) K i f. r 3. DES O Data Encryption Standard (DES) block cipher. FIPS 46-2. n = 64bits 64bits. 64bits 8 (8,16,...,64) bits (parity)., Feistel. 23

DES : 16. K 16 48-bit,,. 64-bit. 2 32-bit L 0 R 0. 16 32-bit L i-1 R i-1 32-bit L i R i : L i = R i-1 ; R i = L i-1 f(r i-1, K i ) f ( S-boxes). 8 S-boxes DES.. DES 16 ( 16 1 ). DES DES: x ( (x))=x DES: 1, 2, 1 ( 2 (x))=x. DES 4 -. 3-DES (E-D-E). AES DES. Rijndael. NIST (National Institute of Standards and Technology). 128bits 128, 192, 256 bits. DES. : DES ~10 12 keys / sec DES. ES ~10 16 keys / sec ES ~150,000,000,000.. DES.. 24

AES bytes ( States) 4x4, (10 AES-128, 12 AES-192, 14 AES-256).. : bytes S-box XOR. e d., d e. e e, D d. m e e c = e (m). d D d m = D d (c). 2, 2 m.... 25

.. ( )... RSA ( n n). A (n, e), n modulus e, d. :. m ( [0, n-1]) c = m e mod n. c. RSA modulusn. 512, 768, 1024, 2048, 4096. RSA p q n= pq. : p q,. n = pq = (p -1)(q -1). e, 1<e<, gcd(e, ) = 1. d (1< d ed = 1 (mod ). (n, e d. e e=3 e=2 16 +1, (session keys). ( ). 26

., K,, E (K),, D (E (K)) = K..,,.. m S : s = S (m). (m, s). s m. s m, : V A. u = V A (m, s)., u = true u = false. K., L. :,, m s V A (m, s) = true. :,. :. 27

.... : TTP.. (one-way hash function) MD5 hash, H(M),, M,, h. h = H(M), h m : M, h. M,, M, H(M) = H(M ). h, M, h = H(M)., (collision resistance)., M M, H(M) = H(M ).. (key distribution centers) (key translation centers) :.. :. TTP n. TTP. TTP. :,. TTP. TTP: TTP. TTP. : TTP. 28

Trusted Third Parties (TTPs). TTP. : In-line:. On-line: ( ).. Off-line:. TTPs :. Registration Authority ( ):. Key Generator ( ):,. Certificate Directory ( ):. Key server ( ):.. Timestamp Agent:. Notary Agent:. Key Escrow Agent:...,,.. ( ) ): TTP.. 29

(public-key certificates):,,. (identity certificates):. (attribute certificates): (, ).. : ( ). (. ) (. ), ),,,.,,,,,.,,,,.. : (repository) 30

... :.,,,,,... :. () ( ). (certificate revocation list). CRL.. (Registration Authority):,,... :. (certificate directory):. (, ).. ( ),. 31

:.. ( ).. ( ).. ( )... ( )...,. :,.. 32

,, : : (selfreplicating)..,. (Trojan Horses):.... (Transient virus):. (Resident Virus):. (Terminate-stayresident). (logic bomb): (. ). (Worm):. e-mail, TCP/IP.... ( ) : :. IBM : ROM. ROM (master boot sector) ( ). (sector) 0, (track) 1, (side) 0. (partition table) ( bootable).. DOS (DOS boot sector). 33

( ) DOS (DOS boot sector): (file allocation table FAT). O FAT. (linked list) (clusters). : IO.SYS, BIOS SYSINIT. To SYSINIT MSDOS.SYS. DOS (COMMAND.COM) AUTOEXEC.BAT. COMMAND.COM. ( ). DOS, BIOS.. : New Zealand : DOS. IO.SYS COMMAND.COM. ( ). (parasitic virus),.com.exe,.,..,,..,. ( ) (companion virus).. DOS, DOS.COM.EXE,.BAT..EXE,.COM ( ).COM. 34

(Macro ) macros Word Basic, Visual Basic, VBScript Microsoft Office. macro.. macro Microsoft Office. ) (stealth virus):., antivirus.. antivirus. ( ), ) antivirus )... : :. :. :.. : (scanners): ( ).,. (cryptographic checksum):.,. 35