Network Security (2) CPSC 441 Department of Computer Science University of Calgary



Similar documents
SECURITY IN NETWORKS

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Network Security. HIT Shimrit Tzur-David

Chapter 7: Network security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

What is network security?

Chapter 8 Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Principles of Network Security

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

TELE 301 Network Management. Lecture 18: Network Security

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Telematics Chapter 11: Network Security Beispielbild User watching video clip

Lukasz Pater CMMS Administrator and Developer

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Getting the most from Apple Mail

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Security in Computer Networks

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Application Layer (1)

Lecture 9: Application of Cryptography

Overview of Network Security

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Chapter 8 Network Security

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Security: Focus of Control. Authentication

Chapter 8. Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April Thanks and enjoy!

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Computer Security: Principles and Practice

CSCE 465 Computer & Network Security

What is network security?

System and Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Client Server Registration Protocol

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Security in Computer Networks

Data Communications & Networks. Session 11 Main Theme Network Security. Dr. Jean-Claude Franchitti

24. Principles of Network Security/ Internet Attacks and Defenses

Introduction to Computer Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Overview. SSL Cryptography Overview CHAPTER 1

CSE/EE 461 Lecture 23

Message authentication and. digital signatures

Network Security Technology Network Management

Properties of Secure Network Communication

Content Teaching Academy at James Madison University

Information Security

Authentication requirement Authentication function MAC Hash function Security of

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Practice Questions. CS161 Computer Security, Fall 2008

7! Cryptographic Techniques! A Brief Introduction

Public Key Cryptography Overview

Cryptography & Digital Signatures

Chapter 6 CDMA/802.11i

SSL/TLS: The Ugly Truth

Savitribai Phule Pune University

Network Security. Network Security. Security in Computer Networks

Netzwerksicherheit: Anwendungen

Authentication, digital signatures, PRNG

The Misuse of RC4 in Microsoft Word and Excel

Chapter 7 Transport-Level Security

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

How To Encrypt Data With Encryption

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

An Introduction to Cryptography as Applied to the Smart Grid

Message Authentication

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Public Key (asymmetric) Cryptography

Module 7 Security CS655! 7-1!

Authenticity of Public Keys

Introduction to Cryptography CS 355

COSC 472 Network Security

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

CRYPTOGRAPHY IN NETWORK SECURITY

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cryptographic Hash Functions Message Authentication Digital Signatures

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Chapter 10. Network Security

Transport Level Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Introduction to Cryptography

Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings

CS 758: Cryptography / Network Security

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

CS 665: Computer System Security. Crypto Services. Hashing. Cryptographic Hash Functions. Information Assurance Module

Transcription:

Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1

Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate securely Trudy (intruder) may intercept, delete, add messages Alice channel data, control messages Bob data secure sender secure receiver data Trudy

Goals of Cryptography Confidentiality: only sender, intended receiver should understand message contents sender encrypts message receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and availability: services must be accessible and available to users

There are bad guys (and girls) out there! Q: What can a bad guy do? A: A lot! eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: take over ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources)

The language of cryptography K A Alice s encryption key Bob s decryption K B key plaintext encryption algorithm ciphertext decryption algorithm plaintext m plaintext message K A (m) ciphertext, encrypted with key K A m = K B (K A (m)) 5

Simple encryption scheme substitution cipher: substituting one thing for another monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq E.g.: Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc Key: the mapping from the set of 26 letters to the set of 26 letters 6

Breaking an encryption scheme Cipher-text only attack: Trudy has ciphertext that she can analyze Two approaches: Search through all keys: must be able to differentiate resulting plaintext from gibberish Statistical analysis Known-plaintext attack: trudy has some plaintext corresponding to some ciphertext eg, in monoalphabetic cipher, trudy determines pairings for a,l,i,c,e,b,o, Chosen-plaintext attack: trudy can get the cyphertext for some chosen plaintext 7

Types of Cryptography Crypto often uses keys: Algorithm is known to everyone Only keys are secret Public key cryptography Involves the use of two keys Symmetric key cryptography Involves the use one key Hash functions Involves the use of no keys Nothing secret: How can this be useful? 8

Symmetric key cryptography K S K S plaintext message, m encryption algorithm ciphertext K S (m) decryption algorithm plaintext m = K S (K S (m)) symmetric key crypto: Bob and Alice share same (symmetric) key: K S e.g., key is knowing substitution pattern in mono alphabetic substitution cipher Q: how do Bob and Alice agree on key value? 9

Public Key Cryptography symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if never met )? public key cryptography radically different approach [Diffie- Hellman76, RSA78] sender, receiver do not share secret key public encryption key known to all private decryption key known only to receiver 10

Public key cryptography + K B - K B Bob s public key Bob s private key plaintext message, m encryption algorithm ciphertext + K (m) B decryption algorithm plaintext message - + m = K (K (m)) B B 11

Public key encryption algorithms Requirements: 1 2.. + - B - + B need K ( ) and K ( ) such that K (K (m)) = m B B given public key K B, it should be impossible to compute private - key K B + RSA: Rivest, Shamir, Adelson algorithm 12

Message Integrity Allows communicating parties to verify that received messages are authentic. Content of message has not been altered Source of message is who/what you think it is Message has not been replayed Sequence of messages is maintained Let s first talk about message digests 13

Message Digests Function H( ) that takes as input an arbitrary length message and outputs a fixed-length string: message signature Note that H( ) is a manyto-1 function H( ) is often called a hash function large message m Desirable properties: Easy to calculate H: Hash Function H(m) Irreversibility: Can t determine m from H(m) Collision resistance: Computationally difficult to produce m and m such that H(m) = H(m ) Seemingly random output 14

Internet checksum: poor message digest Internet checksum has some properties of hash function: produces fixed length digest (16-bit sum) of input is many-to-one But given message with given hash value, it is easy to find another message with same hash value. Example: Simplified checksum: add 4-byte chunks at a time: message ASCII format message ASCII format I O U 1! 0 0. 9! 9 B O B! 49 4F 55 31! 30 30 2E 39! 39 42 D2 42! I O U 9! 0 0. 1! 9 B O B! 49 4F 55 39! 30 30 2E 31! 39 42 D2 42! B2 C1 D2 AC! different messages but identical checksums! B2 C1 D2 AC! 15

Hash Function Algorithms MD5 hash function widely used (RFC 1321) computes 128-bit message digest in 4-step process. SHA-1 is also used. US standard [NIST, FIPS PUB 180-1] 160-bit message digest 16

Message Authentication Code (MAC) s s = shared secret message message s message H( ) H( ) compare Authenticates sender Verifies message integrity No encryption! Also called keyed hash Notation: MD m = H(s m) ; send m MD m 17

End-point authentication Want to be sure of the originator of the message end-point authentication. Assuming Alice and Bob have a shared secret, will MAC provide end-point authentication. We do know that Alice created the message. But did she send it? 18

Playback attack MAC = f(msg,s) Transfer $1M from Bill to Trudy MAC Transfer $1M from Bill to Trudy MAC

Defending against playback attack: nonce I am Alice R MAC = f(msg,s,r) Transfer $1M from Bill to Susan MAC

Digital Signatures Cryptographic technique analogous to handwritten signatures. sender (Bob) digitally signs document, establishing he is document owner/creator. Goal is similar to that of a MAC, except now use public-key cryptography verifiable, nonforgeable: recipient (Alice) can prove to someone that Bob, and no one else (including Alice), must have signed document 21

Digital signature = encrypted message digest Bob sends digitally signed message: large message m + Bob s private key H: Hash function - K B H(m) digital signature (encrypt) encrypted msg digest - K B (H(m)) Alice verifies signature and integrity of digitally signed message: large message m H: Hash function H(m) Bob s public key + K B equal? encrypted msg digest - K B (H(m)) digital signature (decrypt) H(m) 22

Digital Signatures (more) Suppose Alice receives msg m, digital signature K B (m) Alice verifies m signed by Bob by applying Bob s public key K B to K B (m) then checks K B (K B (m) ) = m. If K B (K B (m) ) = m, whoever signed m must have used Bob s private key. Alice thus verifies that: Bob signed m. No one else signed m. Bob signed m and not m. Non-repudiation: Alice can take m, and signature K B (m) to court and prove that Bob signed m. 23

Certification Authorities Certification authority (CA): binds public key to particular entity, E. E (person, router) registers its public key with CA. E provides proof of identity to CA. CA creates certificate binding E to its public key. certificate containing E s public key digitally signed by CA CA says this is E s public key Bob s identifying information Bob s public + key K B digital signature (encrypt) CA private key K - CA + K B certificate for Bob s public key, signed by CA 24

Certification Authorities (CA) When Alice wants Bob s public key: gets Bob s certificate (Bob or elsewhere). apply CA s public key to Bob s certificate, get Bob s public key + K B digital signature (decrypt) + K B Bob s public key CA public key K + CA 25

DigiNotar CA Breach Story: A hacker (or a group of hackers) hacked the DigiNotar CA servers and issued more than 500 fraudulent certificates. The certificates has been later used to spy on some 300,000 Iranians. DigiNotar filed for bankruptcy in a Netherland court. 26

DigiNotar CA Breach Dutch government announced that because of the breach, "it could not guarantee the security of its own Web sites. The list of fraudulent certificates contains Google, Skype, Microsoft, Mozilla, yahoo, tor as well as the CIA, Israel s Mossad and the UK s MI6. All of the major browser makers -- Apple, Google, Microsoft, Mozilla and Opera -- issued updates and considered DigiNotar issued certificates invalid. 27

DigiNotar CA Breach The Fox-IT report states that: The most critical servers contain malicious software that can normally be detected by anti-virus software CA-servers, although physically very securely placed, were accessible over the network from the management LAN. The password was not very strong and could easily be brute-forced. All CA servers were members of one Windows domain, i.e. they were accessible using one obtained user/pass combination. 28

Most of the slides are taken from the slides of the following book, Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.