02 - Introduction to Security
With material from Dave Levin, Mike Hicks
02 - Introduction to Security With material from Dave Levin, Mike - - PowerPoint PPT Presentation
02 - Introduction to Security With material from Dave Levin, Mike Hicks Ad: Joe Bonneau tomorrow Comments on the reading Defining security properties Threat modeling Defensive strategies Intro to encryption Defining
With material from Dave Levin, Mike Hicks
balance) known only to the account owner
Bob’s bank balance to Alice
based on shorter delay on login failure
https://www.youtube.com/watch?v=Nlf7YM71k5U Secrecy vs. Privacy?
browse the bank site without being tracked
account holders as possible adversaries
unauthorized parties or computations
withdrawals from her account
confusing the system into doing it
for balance queries or withdrawals
compromise availability
provided by a system to enforce its requirements
authorization mechanism
should be authenticated
identity
factors are called multi-factor authentication
account, but not Alice’s account
be authorized
circumstances of a breach or misbehavior (or establish one did not occur)
locally and mirrored at a separate site
system will be wrong
can’t) do, how can you know whether your design will repel that attacker?
denial of service
memory
credentials/secrets)
you can infer application state
implementations could eventually reveal an SSL secret key
stronger adversary?
attacker only once
type-safe language, like Java
https://en.wikipedia.org/wiki/File:Bletchley_Park_Bombe4.jpg
Alice Bob
message m: “curiouser and curiouser!”
Eve
Public channel
Powerful adversary: say, any polynomial-time algorithm
Bob D
Alice
message m: “curiouser and curiouser!”
Eve
Public channel
Eve should not be able to learn m. Not even one bit!
E
Bob D
Alice
message m: “curiouser and curiouser!”
Eve
Public channel
Eve should not be able to alter m without detection.
E
message m’: “curious and curious?” ERROR!
Works regardless of whether Eve knows the contents of m!
Bob D
Alice Eve
Public channel
Eve should not be able to forge messages as Alice
E
“Why is a raven like a writing desk?” signed, Alice ERROR!
Bob D
Alice
Public channel
E
Bob D
Alice
Public channel
E
Bob V
Alice
Public channel
S
s = Sign(m, ks)
Verify(m,s,kv) ?= true Only someone who knows ks could have sent the message!
Symmetric trust model Asymmetric trust model Privacy Private-key encryption
Public-key encryption Authenticity, Integrity Hashes, MACs, authenticated encryption Signatures, PKI, certificates, SSL/TLS, user authentication
Everyone shares the same secret k Every party has her
Assumptions: (1) All algorithms public, (2) security based only on key size
TTP
U1 U2 U3 U4 k1 k2 k3 k4
(Symmetric)
TTP
Used for Kerberos
Bob Alice
“Bob”
kAT
KAB, Ticket “Hi”
kAB
Ticket
Ticket = E(KBT, “Alice||Bob||kAB”) (fresh kAB)
TTP
U1 U2 PK1 PK2
Trusted directory service
PK2 PK1
Alice
TTP
Bob
PKT PKT PKA plus verification Alice owns PKA. Signed, PKT S(SKA, E(PKB, m)) + cert
Bob: Verify cert with PKT, verify message with PKA Certificates
Alice Bob Cookie Donald
trusts vouches for vouches for sends message to
belief that Cookie is equally vigilant
http://randomrock.com.br/randomrock/rock-n-movies-20-watchmen/
Microsoft Corporation
DigiNotar
substantiate security concerns”
http://arstechnica.com/security/2015/02/lenovo-pcs-ship-with-man-in-the-middle-adware-that-breaks-https-connections/
http://www.sainteldaily.com/archives/11400
https://www.eff.org/observatory https://www.eff.org/sovereign-keys