CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring - - PowerPoint PPT Presentation

cs cs 683 683 se securi rity and pri rivacy sp spri ring
SMART_READER_LITE
LIVE PREVIEW

CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring - - PowerPoint PPT Presentation

CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring 2018 2018 Instr Ins truc uctor: Ka Karim El Elde defr frawy http://www.cs.usfca.edu/~keldefrawy/teaching/spring20 18/cs683/cs683_main.htm (https://goo.gl/t396Fw) 1 Ou


slide-1
SLIDE 1

1

CS CS 683 683 - Se Securi rity and Pri rivacy Sp Spri ring 2018 2018 Ins Instr truc uctor: Ka Karim El Elde defr frawy

http://www.cs.usfca.edu/~keldefrawy/teaching/spring20 18/cs683/cs683_main.htm (https://goo.gl/t396Fw)

slide-2
SLIDE 2

2

Ou Outline

  • The players/actors
  • Terminology
  • Attacks, services and mechanisms
  • Security attacks
  • Security services
  • Methods of defense
  • A model for network security
slide-3
SLIDE 3

3

Attacker or Adversary Your Computer/Phone/Tablet

Co Comp mputer r Se Securi rity: y: Th The Ca Cast of

  • f C

Characters

Can be: individuals,

  • rganizations, nations …

Your data: financial, health records, intellectual property …

slide-4
SLIDE 4

4

Eve(sdropper)

communication channel

Ne Network S Secu curity: Th The Cast of

  • f Ch

Characters

Alice Bob

slide-5
SLIDE 5

5

Te Terminology (Cr (Cryp yptogr graphy) y)

  • Cryptology, Cryptography, Cryptanalysis
  • Cipher, Cryptosystem, Encryption scheme
  • Encryption/Decryption, Encipher/Decipher
  • Privacy/Confidentiality, Authentication, Identification
  • Integrity
  • Non-repudiation
  • Freshness, Timeliness, Causality
  • Intruder, Adversary, Interloper, Attacker
  • Anonymity, Unlinkability/Untraceability
slide-6
SLIDE 6

6

Te Terminology (S (Security) )

  • Access Control & Authorization
  • Accountability
  • Intrusion Detection
  • Physical Security
  • Tamper-Resistance
  • Certification & Revocation
slide-7
SLIDE 7

7

At Attacks, Services and Mechanisms

  • Security Attack: Any action (or event) that aims to

compromise (undermine) the security of information

  • Security Mechanism: A measure (technique or method)

designed to detect, prevent, or recover from, a security attack

  • Security Service: something that enhances the security of

data processing systems and information transfers. A “security service” makes use of one or more “security mechanisms”

  • Example:

– Security Attack: Eavesdropping (Interception) – Security Mechanism: Encryption – Security Service: Confidentiality

slide-8
SLIDE 8

8

So Some me Cl Classes of Se Securi rity Attacks

slide-9
SLIDE 9

9

Se Securi rity Attacks

  • Interruption: attack on availability
  • Interception: attack on confidentiality
  • Modification: attack on integrity
  • Fabrication: attack on authenticity
slide-10
SLIDE 10

10

Ma Main Se Securi rity Goals

Integrity Confidentiality Availability Authenticity

slide-11
SLIDE 11

11

Security Th Threats: Th Threat vs Attack?

By Injection By Deletion

slide-12
SLIDE 12

12

Ex Exampl ple Secur urity y Services

  • Confidentiality: to assure information privacy and secrecy
  • Authentication: to assert who created or sent data
  • Integrity: to show that data has not been altered
  • Access control: to prevent misuse of resources
  • Availability: to offer access to resources, permanence, non-

erasure Examples of attacks on Availability: – Denial of Service (DoS) Attacks

  • e.g., against a name server

– Malware that deletes or encrypts files

slide-13
SLIDE 13

13

Attacker/Adversary

Alice Bob

slide-14
SLIDE 14

14

So Some me Me Methods of Defense

  • Cryptography à confidentiality, authentication, identification,

integrity, etc.

  • Software Controls (e.g., in databases, operating systems) à

protect users from each other

  • Hardware Controls (e.g., smartcards, badges) à authenticate

holders (users)

  • Policies (e.g., frequent password changes, separations of duty)

à prevent insider attacks

  • Physical Controls (doors, guards, etc.) à control physical

access

slide-15
SLIDE 15

15

Cr Cryp yptography: His History an and Sim imple le Enc Encryp yption Me Methods an and Pr Preliminaries

slide-16
SLIDE 16

16

The word cryptography comes from the Greek words κρυπτός (hidden or secret) and γράφειν (writing). So historically cryptography has been the “art of secret writing.” Most of cryptography is currently well grounded in mathematics and it can be debated whether there’s still an “art” aspect to it.

Cr Cryp yptography

slide-17
SLIDE 17

17

Cr Cryp yptography y can be use sed at di differ eren ent level els

  • Algorithms: encryption, signatures, hashing,

Random Number Generator (RNG)

  • Protocols (2 or more parties): key distribution,

authentication, identification, login, payment, etc.

  • Systems: electronic cash, secure filesystems,

smartcards, VPNs, e-voting, etc.

  • Attacks: on all the above
slide-18
SLIDE 18

18

So Some me Applications of Cr Cryptography

  • Network, operating system security
  • Protect Internet, phone, space communication
  • Electronic payments (e-commerce)
  • Database security
  • Software/content piracy protection
  • Pay TV (e.g., satellite)
  • Military communications
  • Voting
slide-19
SLIDE 19

19

Op Open vs.

  • s. Cl

Close sed Desi sign gn Model

  • Open design: algorithm, protocol, system design

(and even possible plaintext) are public information. Only key(s) are kept secret.

  • Closed design: as much information as possible is

kept secret.

slide-20
SLIDE 20

20

Co Core Issu ssue in Network rk Se Securi rity y : How to to Com

  • mmunicate S

Securely?

Looks simple … But, the devil is in the details Note: even storage is a form of communication

Alice Eve(sdropper) Bob

slide-21
SLIDE 21

21

Th The Biggest “Headache” is that…

Good security must be

Effective

Yet

Unobtrusive

Because security is not a service in and of itself, but a burden!

slide-22
SLIDE 22

22

Cr Cryp yptography y is s Ol Old …

  • Most sub-fields in CS are fairly new (20-30 years):

– Graphics, compilers, software, OS, architecture

  • And, a few are quite old (more than several

decades):

– Cryptography, database, networking

slide-23
SLIDE 23

23

So Some me History: : Ca Caesar’s Ci Cipher

Homo Hominem Lupus! Krpr Krplqhp Oxsxv!

slide-24
SLIDE 24

24

So Some me History: : Rosetta St Stone

slide-25
SLIDE 25

25

So Some me History: : Enigma ma

Alan Turing (1912-1954)

slide-26
SLIDE 26

26

His Historic ical al (Prim imitiv itive) e) Cipher iphers

  • Shift (e.g., Caesar): Enck(x) = x+k mod 26
  • Affine: Enck1,k2(x) = k1 *x + k2 mod 26
  • Substitution: Encperm(x) = perm(x)
  • Vigenere: EncK(x) = ( X[0]+K[0], X[1]+K[1], … )
  • Vernam: One-Time Pad (OTP)
slide-27
SLIDE 27

27

Sh Shift (Ca Caesar) r) Ci Cipher r

Example:

W E W I L L M E E T A T M I D N I G H T 22 4 22 8 11 11 12 4 4 19 0 19 12 8 3 13 8 6 7 19 7 15 7 19 22 22 23 15 15 4 11 4 23 19 14 24 19 17 18 4 H P H T W W X P P E L E X T O Y T R S E

K=11

  • How many keys are there?
  • How many trials are needed to find the key?
slide-28
SLIDE 28

28

Su Substitution Ci Cipher r

Example:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z X N Y A H P O G Z Q W B T S F L R C V M U E K J D I

W E W I L L M E E T A T M I D N I G H T K H K Z B B T H H M X M T Z A S Z O G M

KEY

  • How many keys are there?
  • How many trials are needed to find the key?
slide-29
SLIDE 29

29

Su Substitution Ci Cipher r

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.082 0.015 0.028 0.043 0.127 0.022 0.02 0.061 0.07 0.002 0.008 0.04 0.024 0.067 0.075 0.019 0.001 0.06 0.063 0.091 0.028 0.01 0.023 0.001 0.02 0.001

Probabilities of Occurrence

Cryptanalysis

slide-30
SLIDE 30

30

Su Substitution Ci Cipher r

AN AT ED EN ER ES HE IN ON OR RE ST TE TH TI 0.5 1 1.5 2 2.5 3 3.5 1.81 1.51 1.32 1.53 2.13 1.36 3.05 2.3 1.83 1.28 1.9 1.22 1.3 3.21 1.28

Frequency of some common digram

Cryptanalysis

s

slide-31
SLIDE 31

31

VE VERNAM One-Ti Time Pad (OTP TP): Wo World’s Best Cipher

n i

  • tp

p c where c c

  • tp
  • tp

p p

i i i n n n

< < " Å = = = =

  • :

} ,..., { Ciphertext } ,..., { stream pad time

  • One

} ,..., { Plaintext

1 1 1

C A B C B A = Å Å =

slide-32
SLIDE 32

32

VE VERNAM One-Ti Time Pad (OTP TP): Wo World’s Best Cipher

  • Vernam offers perfect information-theoretic

security, but:

  • How long does the OTP keystream need to be?
  • How do Alice and Bob exchange the keystream?
slide-33
SLIDE 33

33

  • A cryptosystem has (at least) five ingredients:

– Plaintext – Secret Key – Ciphertext – Encryption Algorithm – Decryption Algorithm

  • Security usually depends on the secrecy of the

key, not the secrecy of the algorithms

Enc Encryp yption n Princ ncipl ples

slide-34
SLIDE 34

34

Cr Cryp ypto Ba Basi sics

slide-35
SLIDE 35

35

Average Ti Time Required fo for Exha Exhaus ustive Ke Key Sear earch (f (for Bru Brute Fo Force Atta ttacks) )

Key Size (bits) Number of Alternative Keys Time required at 106 Decr/µs 32 232 = 4.3 x 109 2.15 milliseconds 56 256 = 7.2 x 1016 10 hours 128 2128 = 3.4 x 1038 5.4 x 1018 years 168 2168 = 3.7 x 1050 5.9 x 1030 years

slide-36
SLIDE 36

36

Ty Types of Attainable Security

  • Perfect, unconditional or “information theoretic”: the security

is evident free of any (computational/hardness) assumptions

  • Reducible or “provable”: security can be shown to be based on

some common (often unproven) assumptions, e.g., the conjectured difficulty of factoring large integers

  • Ad hoc: the security seems good often -> “snake oil”…

Take a look at:

http://www.ciphersbyritter.com/GLOSSARY.HTM

slide-37
SLIDE 37

37

Co Comp mputational Se Securi rity

  • Encryption scheme is computationally secure if

– cost of breaking it (via brute force) exceeds the value of the encrypted information; or – time required to break it exceeds useful lifetime of the encrypted information

  • Most modern schemes we will see are considered

computationally secure

– Usually rely on very large key-space, impregnable to brute force

  • Most advanced schemes rely on lack of knowledge of effective

algorithms for certain hard problems, not on a proven inexistence of such algorithms (reducible security)!

– Such as: factorization, discrete logarithms, etc.

slide-38
SLIDE 38

38

Complexity Reminder/Re-cap

  • P: problems that can be solved in polynomial time, i.e., problems that can be

solved/decided “efficiently”

  • NP: broad set of problems that includes P;
  • answers can be verified “efficiently” (in polynomial time);
  • solutions cannot always be efficiently found (as far as we know).
  • NP-complete: the believed-to-be-hard decision problems in NP, they appear

to have no efficient solution; answers are efficiently verifiable, solution to one is never much harder than a solution to another

  • NP-hard: hardest; some of them may not be solved by a non-deterministic
  • TM. Many computational version of NP-complete problems are NP-hard.
  • Examples:
  • Factoring, discrete log are in NP, not know if NP-complete or in P
  • Primality testing was recently (2002) shown to be in P
  • Knapsack is NP-complete

For more info, see: https://www.nist.gov/dads//

slide-39
SLIDE 39

39

P vs NP

slide-40
SLIDE 40

40

Cryptosystems

Classified along three dimensions:

  • Type of operations used for transforming plaintext into

ciphertext

– Binary arithmetic: shifts, XORs, ANDs, etc.

  • Typical for conventional encryption

– Integer arithmetic

  • Typical for public key encryption
  • Number of keys used

– Symmetric or conventional (single key used) – Asymmetric or public-key (2 keys: 1 to encrypt, 1 to decrypt)

  • How plaintext is processed:

– One bit at a time – A string of any length – A block of bits

slide-41
SLIDE 41

41

Conventional Encryption Principles

slide-42
SLIDE 42

Co Conventional (S (Symme ymmetri ric) ) Cr Cryp yptography

  • Alice and Bob share a key KAB which they somehow agree

upon (how?)

  • key distribution / key management problem
  • ciphertext is roughly as long as plaintext
  • examples: Substitution, Vernam OTP, DES, AES

42

plaintext ciphertext

K AB

encryption algorithm decryption algorithm

K AB

plaintext m K (m)

AB

K (m)

AB

m = K (

)

AB

slide-43
SLIDE 43

Us Uses es of Conven entio tional al Cryptograp aphy

  • Message transmission (confidentiality):
  • Communication over insecure channels
  • Secure storage: crypt on Unix
  • Strong authentication: proving knowledge of a secret

without revealing it:

  • See next slide
  • Eve can obtain chosen <plaintext, ciphertext> pair
  • Challenge should be chosen from a large pool
  • Integrity checking: fixed-length checksum for message via

secret key cryptography

  • Send MAC along with the message MAC=H(m,K)

43

slide-44
SLIDE 44

Ch Challenge-Re Response Authentication Ex Exampl ple

44

K AB

challenge

K AB

ra KAB(ra)

challenge reply

rb KAB(rb)

challenge challenge reply

slide-45
SLIDE 45

45

Co Conventional Cr Cryp yptography

Ø Advantages

l high data throughput l relatively short key size l primitives to construct various cryptographic

mechanisms

Ø Disadvantages

l key must remain secret at both ends l key must be distributed securely and efficiently l relatively short key lifetime

slide-46
SLIDE 46
  • Asymmetric cryptography
  • Invented in 1974-1978 (Diffie-Hellman and Rivest-Shamir-Adleman)
  • Two keys: private (SK), public (PK)
  • Encryption: with public key;
  • Decryption: with private key
  • Digital Signatures: Signing by private key; Verification by public key. i.e.,

“encrypt” message digest/hash -- h(m) -- with private key

  • Authorship (authentication)
  • Integrity: Similar to MAC
  • Non-repudiation: can’t do with secret key cryptography
  • Much slower than conventional cryptography
  • Often used together with conventional cryptography, e.g., to encrypt session keys

46

Pu Public Key Crypto tography

slide-47
SLIDE 47

Pu Public Key Crypto tography

47

plaintext message, m ciphertext encryption algorithm decryption algorithm

Bob’s public key

plaintext message PK (m)

B

PK

B

Bob’s private key

SK

B

m = SK (PK (m))

B B

slide-48
SLIDE 48

Us Uses es of Public lic Key Cryptograp aphy

  • Data transmission (confidentiality):
  • Alice encrypts ma using PKB, Bob decrypts it to obtain ma using

SKb.

  • Secure Storage: encrypt with own public key, later

decrypt with own private key

  • Authentication:
  • No need to store secrets, only need public keys.
  • Secret key cryptography: need to share secret key for every

person one communicates with

  • Digital Signatures (authentication, integrity, non-

repudiation)

48

slide-49
SLIDE 49

49

Ø Advantages

l only the private key must be kept secret l relatively long life time of the key l more security services l relatively efficient digital signatures mechanisms

Ø Disadvantages

l low data throughput l much larger key sizes l distribution/revocation of public keys l security based on conjectured hardness of certain

computational problems

Pu Public Key Crypto tography

slide-50
SLIDE 50

50

Ø Public key

l encryption, signatures (esp., non-repudiation) and key

management

Ø Conventional

l encryption and some data integrity applications

Ø Key sizes

l Keys in public key crypto must be larger (e.g., 2048 bits for RSA)

than those in conventional crypto (e.g., 112 bits for 3-DES or 256

bits for AES)

  • most attacks on “good” conventional cryptosystems are exhaustive key

search (brute force)

  • public key cryptosystems are subject to “short-cut” attacks (e.g.,

factoring large numbers in RSA)

Co Comp mpari riso son Su Summa mmary

slide-51
SLIDE 51

51

Su Suggested Re Readings:

Chapters 1 and 2 in KPS book Optional: Ch 1 in Stinson Don't forget to check the website! Did you do it before this lecture?