-
CSE543 - Introduction to Computer and Network Security Page
CSE543 Computer and Network Security Module: Network Security
Professor Trent Jaeger
1
Thursday, October 31, 13
CSE543 Computer and Network Security Module: Network Security - - PowerPoint PPT Presentation
CSE543 - Introduction to Computer and Network Security Page
1
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
2
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
3
key?” answer: Bind a public key to an identity securely on internet scale. System cannot protect private key from compromise.
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
4
monitor guarantees? Specify the conditions under which it is necessary to weaken (reduce) the permissions available to a capability. answer: If a capability can be forged, then a process can create its own permissions to any object that it can name. This would circumvent the tamperproofing of system policies, and nothing would be verifiable. We must weaken a capability when a high secrecy subject fetches a capability from a low secrecy
permission to low secrecy objects. Since this would violate the *-property, such capabilities must be weakened to remove the write permission.
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
5
Assume XOR for encryption/decryption. In the NH protocol, the initiating party, we will call A, forwards the conversation key CK in a message encrypted by the authentication server AS for the verifying party B. Suppose A’s identity is represented by the 4-bit quantity 0001 and the key shared between B and the AS is 0101. (a) (2pts) If the message forwarded from A to B is 11010100, then what is the conversation key? (Hint: Use the format of the conversation key message in the NH protocol. Note that the key is 4 bits long).
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
6
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
7
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
8
Thursday, October 31, 13
CMPSC443 - Introduction to Computer and Network Security Page
9
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
10
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
11
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
SMTP FTP
HTTP
12
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
13
Header Payload Header Payload
encrypted MACed
Header
Header Payload Header Payload
encrypted MACed
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
14
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
15
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
16
IP Header AH Header MAC Payload
AH Packet Encrypted Authenticated
IP Header Payload
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
17
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
18
IP Header ESP Header Payload ESP Trailer MAC
ESP Packet Encrypted Authenticated
IP Header Payload
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
19
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
20
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
21
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
22
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
and send to server
that key
23
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
24
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
25
Thursday, October 31, 13
CSE543 - Introduction to Computer and Network Security Page
26
Thursday, October 31, 13
CSE543 - Computer and Network Security Page
27 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
28 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
Participants: Alice/A (client) and Bob/B (server) Crypto Elements : Random R, Certificate C, k+
i Public Key (of i)
Crypto Functions : Hash function H(x), Encryption E(k, d), Decryption D(k, d), Keyed MAC HMAC(k, d) 1. Alice → Bob RA 2. Bob → Alice RB, CB Alice pick pre-master secret S Alice calculate master secret K = H(S, RA, RB) 3. Alice → Bob E(k+
B, S), HMAC(K,0 CLNT 0 + [#1, #2])
Bob recover pre-master secret S = D(k
B, E(k+ B, S))
Bob calculate master secret K = H(S, RA, RB) 4. Bob → Alice HMAC(K,0 SRV R0 + [#1, #2]) Note: Alice and Bob : IV Keys, Encryption Keys, and Integrity Keys 6 keys,where each key ki = gi(K, RA, RB), and gi is key generator function.
29 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
30 Thursday, October 31, 13
CSE543 - Computer and Network Security Page
31 Thursday, October 31, 13