In-Flight Encryption. Jim Theodoras. Feb 2014



Similar documents
Crypto WDM Surprise! Ari Salomaa, ADVA June 9, 2014

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Client Server Registration Protocol

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 5. Data Communication And Internet Technology

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

High Performance VPN Solutions Over Satellite Networks

How To Secure My Data

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

LAYER 1 & LAYER 2 ENCRYPTION WHY: ONE SIZE DOES NOT FIT ALL

Security vulnerabilities in the Internet and possible solutions

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Wireless Encryption Protection

CSE/EE 461 Lecture 23

Cornerstones of Security

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

CRYPTOGRAPHY IN NETWORK SECURITY

Chapter 10. Network Security

Network Security Part II: Standards

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Overview. SSL Cryptography Overview CHAPTER 1

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Protocol Rollback and Network Security

Security for 802 Access Networks: A Problem Statement

Recommended Wireless Local Area Network Architecture

SFWR ENG 4C03 - Computer Networks & Computer Security

Chapter 9. IP Secure

The OSI and TCP/IP Models. Lesson 2

Chapter 7 Transport-Level Security

EXAM questions for the course TTM Information Security May Part 1

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

How To Write A Transport Layer Protocol For Wireless Networks

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Compter Networks Chapter 9: Network Security

CCNA Security 1.1 Instructional Resource

SecureCom Mobile s mission is to help people keep their private communication private.

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Lecture 17 - Network Security

What is network security?

1.Context What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4

VOICE OVER IP SECURITY

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

SSL DOES NOT MEAN SOL What if you don t have the server keys?

IP SECURITY (IPSEC) PROTOCOLS

Layer 2 Encryption Fortifying data transport

BIG DATA TRANSPORT. Innovative Data Center Connectivity

Network Simulation Traffic, Paths and Impairment

Communication Systems SSL

CS 758: Cryptography / Network Security

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Chapter 6 CDMA/802.11i

VPN Lesson 2: VPN Implementation. Summary

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

High Speed Encryption Made in Germany

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Chapter 17. Transport-Level Security

CS5008: Internet Computing

Wireless Networks. Welcome to Wireless

The next generation of knowledge and expertise Wireless Security Basics

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri sd&m

Data Communication Networks and Converged Networks

Chapter 7: Network security

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

COSC 472 Network Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

As enterprises conduct more and more

CPSC 467b: Cryptography and Computer Security

Chapter 8. Network Security

24 th IEEE Annual Computer Communications Workshop (CCW)

1.264 Lecture 37. Telecom: Enterprise networks, VPN

High speed Ethernet WAN: Is encryption compromising your network?

IPsec Details 1 / 43. IPsec Details

Chapter 3. Network Domain Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Chapter 37. Secure Networks

Group Encryption. The key to protecting data in motion BLACK BOX blackbox.com

Virtual Private Networks

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Transcription:

In-Flight Encryption Jim Theodoras Feb 2014

OSI Model 7 6 5 Top of Stack Application Presentation Session Data 4 Transport Layer TCP, UDP Segments 3 Network Layer IP/MPLS Packets 2 Data Link MAC Frames 1 Physical PHY Bits Bottom of stack 2

Getting from Point A to Point B 7 6 5 4 Application Presentation Session Transport Layer TCP, UDP Application Presentation Session Transport Layer TCP, UDP 3 2 Network Layer IP/MPLS Data Link MAC IPsec IPsec Network Layer IP/MPLS Data Link MAC 1 Physical PHY Physical PHY 3

Home Security Analogy Single layer of security a locked front door Key left under front door mat Neighbor given the key Lock not re-keyed Yard not gated Multiple layers of security Lockbox for key for maid Re-keyed before move in Yard gated Alarm - Intrusion detection 4

Secure End-to-End Data Transport 7 Application Presentation Session 6 5 4 3 2 Transport Layer TCP, UDP Network Layer IP/MPLS Data Link MAC 1 Physical PHY IPsec Proper key management Multiple layers of security Intrusion detection Application Presentation Session Transport Layer TCP, UDP Network Layer IP/MPLS Data Link MAC Physical PHY IPsec 5

Layers of Security Layered security is not just a Hollywood plot device. Layered and tiered security works. 6

Sideways Attacks 7

Mathematical Sleight-of-Hand 64,000 possible combinations A sideways attack reduces that to 100 possible combinations. A backdoor renders the lock useless. 8

Examples of Sideways Attacks Copying Encryption Keys If stored in DRAM Freeze spray slows down decay Unplug adjacent linecard Put on probe Freeze DRAM Unplug/Replug linecard Read encryption keys 9

Examples of Sideways Attacks (not so) Random Number Generation Hardware Random Number generation is great, but slow Random number only used for seed Seed then used for pseudorandom number generation Knowing details of process reduces possible solution set lack of entropy in pseudorandom number 10

Sidewaysing a Brute Force Attack Brute Forcing is using a HPC to go through every combination. You do not have to go through every permutation, just every reasonable guess. Relational data greatly reduces number of potential guesses. Example: AES-256 A supercomputer that could check 10 18 keys/sec would require 10 51 years to exhaust 256 bit key space. A typical mining rig can brute force 30 billion passwords/sec, cracking all eight-character passwords in just a few hours. Relational data reduces this to mere minutes. F2o<fa!7S7052C5JavW%G.@uQc/0JymD>CA:lsLZ"P+fU3Js6l@]ie9<A{$L3Nh 11

Cryptographic Goals 12

Cryptographic Goals Confidentiality Nobody can read content of message ("Encryption") Integrity Modification of message will be detected ("Checksum") Authenticity Verify that I am really connected to whom I expected. 13

Encryption Basics Cryptographic Goals Eve Alice Bob Alice Eve Bob Alice wants to send Bob a message. Eve is either listening or is directly intercepting the line and can manipulate all messages to Bob. 14

Encryption Basics Cryptographic Goals Eve Alice Bob Alice Confidentiality (privacy) - "Encryption" Eve cannot understand message from Alice Eve Eve could manipulate message to Bob. - Encryption does not protect against manipulation. Example: Alice sends message "transfer 10 to Bob's bank account". When Eve knows the position in the message, where the value is located, she can change the value without knowing anything else. Bob 15

Encryption Basics Cryptographic Goals message chk message' chk Alice Eve Bob Integrity - "Cryptographic Checksum" Eve cannot manipulate message from Alice, because this will be detected by Bob. Cryptographic Checksums add latency, because message must be stored and verified on receiving side. 16

Encryption Basics Cryptographic Goals Eve Alice Bob Alice Eve Authenticity - "Authentication" Alice and Bob can detect, whether they are connected. 17

Encryption Basics 18

Encryption Basics Symmetric Encryption Symmetric Encryption: Alice and Bob use the same algorithm Alice and Bob use the same secret key secret key secret key exchange key original original message Encryption encrypted ("secure") message Decryption message Disadvantage Alice and Bob must exchange the secret key and must keep it secret 19

Encryption Basics Symmetric Encryption with AES 14 rounds for AES 256 key 128 Bit = 16 Byte data input 128 Bit + + + + + + + + + + + + + + + + round key AES key 128, 192 or 256 Bit S S S S S S S S S S S S S S S S output 128 Bit Mix Mix Mix Mix 20

Encryption Basics Asymmetric Encryption Asymmetric Encryption: Alice and Bob generate a key-pair with public and private key. The private key must be kept secret, but the public key can be distributed everywhere. A priv A pub send public key to everyone B priv Alice can encrypt message with Bob's public key. B pub Only Bob can decrypt the message, because only he has his private key. Disadvantage: Asymmetric Encryption is very slow. 21

Encryption Basics Asymmetric Encryption within Diffie Hellman algorithm Assumption: multiplying is much simpler as calculating logarithm g is a common number, known to Alice, Bob and Eve public key g ra random number r A public key g rb random number r B g ra g rb (g rb ) ra = g (ra rb) (g ra ) rb = g (ra rb) Eve must 1x calculate logarithm to get the same result 22

Encryption Basics Symmetric vs. Asymmetric Encryption Requires secure channel for key-exchange Asymmetric Encryption No Symmetric Encryption Yes Is very slow Yes No Can be implemented in hardware (FPGA) Encrypt large amount of data No (only partially) No Yes Yes Combine both methods? Hybrid approach uses asymmetric method for generation of encryption key ("Diffie-Hellman") and symmetric method for encryption ("AES") 23

Encryption Methods 24

Optical transmission security Principles of encryption IPsec / MACsec Encryption Router Site A Site B Router Appliance based Encryption xwdm based Encryption FC switch Router FC switch Router WDM-transport TDM Site A Site A WAN WAN WAN Site B WDM-transport TDM Site B FC switch Router FC switch Router Speed, throughput and simplicity FC switch WDM-transport WDM-transport FC switch 25

Encryption Method vs Layer How many of these are encrypted, just authenticated, or only plain text? How big is this? How much is actually encrypted? Is this included? Layered Packet Headers Encryption Header Payload Checksum Overlay Transport Virtualization (OTV) Traditionally used for VPN services 82 Bytes overhead Only select Bytes in header encrypted and authenticated. MACsec/TrustSec Point-to-Point Ethernet encryption 32/40 Bytes overhead, respectively Only select Bytes in header encrypted and authenticated. Traditional Transport Point-to-point and multipoint Zero bytes overhead, so no loss of throughput with shorter packets. Only select Bytes in header encrypted and authenticated. Bulk Transport Encryption Point-to-point Zero bytes overhead, so no loss of throughput with shorter packets. Protocol/ I/F agnostic (Ethernet, FC, IB, Sonet/SDH) All Bytes in header and checksum are encrypted with payload. 26

Maximum Throughput Comparison Throughput Max. MTU-Size? Transport Encryption MACsec TrustSec IPsec OTV Max. Throughput? Framesize / Bytes 27

Encryption from 10Gb/s to 100Gb/s White Noise for key generation Applying an AES256 w/ dynamic key exchange to a 10Gb/s line signal of a WDM card generates a multi-protocol encryption solution With DC services moving to 16GFC and 40GE/100GE Encryption on 100G WDM technology becomes key Complete DC service coverage through combination of 10Gb/s and 100Gb/s WDM solutions 28

100GbE 100G Encryption Live Demo Sender Receiver Video GbE Cu XG210 GbE to 10GbE Converter GbE to 10GbE Converter XG210 GbE Cu Video 10GbE FO 100GbE Fiber Tap 100GbE 10GbE FO encrypted encrypted Intruder non-encrypted GbE to 10GbE Converter 10GbE FO XG210 GbE Cu Video? 29

Quantum Key Distribution? So why the continuing interest in QKD? Transmission of key is non-breakable, as the key is not actually transmitted! Intrusion detection: Reading the key changes it. Often overlooked: Key is truly random, preventing sidewaysing. ADVA will be announcing QKD real-world field results at OFC. 30

Recent Vulnerabilities Exposed 31

Balancing Act Encryption too easy to break Threats have access to all data Encryption too hard to break Threats have total anonymity 32

The Reality of Cloud Connectivity While in our heads, we envision connecting to the cloud in one way, the reality is much different. Cloud User 33

IPsec Compromised from Day 1 From Gilmore threads: Same initialization vector used throughout a session. null encryption 56-bit DES 768-bit Diffie-Hellman FreeS/WAN Linux implementation not secure Given processing power at the time, there was legitimate concern that undesirables would have total anonymity. Problem: Given today s processing power, the club of entities that can decipher at will has grown too large. 34

OSI Model Where Vulnerabilities Exist Top of Stack 7 6 5 Application Presentation Session Data Fed mandated backdoors Cookies Malware 4 Transport Layer TCP, UDP Segments Non-random numbers Key intercept 3 Network Layer IP/MPLS Packets Fed mandated access Vulnerabilities inserted into IPsec 2 1 Data Link MAC Physical PHY Bits Bottom of stack Frames Co-location Inline spoofing Replication Fiber Optic Cable Taps Undersea Taps Coastal Gateways 35

Secure End-to-End Data Transport Secure Facilities Secure Facilities 7 6 5 Application Presentation Session Application Presentation Session 4 Transport Layer TCP, UDP Transport Layer TCP, UDP 3 2 Network Layer IP/MPLS Data Link MAC IPsec IPSEC Network Layer IP/MPLS Data Link MAC 1 Physical PHY MACsec MACsec Physical PHY In-Flight Intrusion Detection In-Flight 36

Recommendations Layer your security Encrypt at every layer, when possible Encrypt all transport (not client) links, inside and outside of private network. If someone else is carrying your traffic, have them encrypt and you keep the keys. Encrypt, encrypt, encrypt, but don t only rely on IPsec. Confidentiality Integrity Authenticity Intrusion Detection Secure facilities (RF shielding) Secure hardware and supply chain Physical layer monitoring Focus on prevention of sideways attacks 37

Thank you info@advaoptical.com