d istributed s ystems comp9243 lecture 9 security
play

D ISTRIBUTED S YSTEMS [COMP9243] Lecture 9: Security T HE C AST - PowerPoint PPT Presentation

D ISTRIBUTED S YSTEMS [COMP9243] Lecture 9: Security T HE C AST Slide 1 Slide 3 Introduction Cryptography Secure protocols and communication Authentication Authorisation S ECURITY IN D ISTRIBUTED S YSTEMS Confidentiality:


  1. D ISTRIBUTED S YSTEMS [COMP9243] Lecture 9: Security T HE C AST Slide 1 Slide 3 ➀ Introduction ➁ Cryptography ➂ Secure protocols and communication ➃ Authentication ➄ Authorisation S ECURITY IN D ISTRIBUTED S YSTEMS Confidentiality: information disclosed/services provided only to authorised parties Slide 2 Slide 4 Integrity: alterations can only be made in an authorised way Availability: system is ready to be used by authorised parties T HE C AST 1 T HE C AST 2

  2. S ECURITY P OLICY Security is a question of tradeoffs The Good Guys: Security Policy: ➜ Alice, Bob ➜ A statement of security requirements ➜ Want to communicate securely ➜ Describes which actions entities in a system are allowed to take and which ones are prohibited The Bad Guys: Slide 5 Slide 7 • Entities: users, services, data, machines, etc. ➜ Eve • Operations: read, write, send, start, stop, etc. ➜ The eavesdropper — tries to thwart Alice and Bob’s plans Example: The Alice and Bob After Dinner Speech: ➜ Everyone (staff and students) has an account ➜ google it for more about Alice and Bob ➜ Access to course accounts must be approved ➜ Only course accounts can modify grades Anything missing? B REAKING S ECURITY Vulnerability: A UTHORISED A CTIONS A vulnerability is a weakness in the system that could Security is about making sure that only authorised potentially be exercised (accidentally triggered or actions are performed in the system. intentionally exploited) to cause a breach or violation Example Actions: of the system’s security policy. ➜ Reading data Slide 6 Slide 8 Threat: ➜ Modifying data (writing, creating, deleting) ➜ Using a service A threat is a possible breach of security policy (the ➜ Managing a service potential for an attack). A concrete threat consists of All of these could be abused if performed in a threat-source and an exercisable vulnerability. unauthorised ways. Attack: Examples? When a vulnerability is exercised we call this an attack . S ECURITY P OLICY 3 C LASSES OF S ECURITY T HREATS 4

  3. C LASSES OF S ECURITY T HREATS P ROTECTING A D ISTRIBUTED S YSTEM Interception: unauthorised party has gained access to a Controls: service or data Authentication: verify the claimed identity of an entity Interruption: service or data become unavailable, unusable, destroyed, etc. Authorisation: determine what actions an authenticated Slide 9 Slide 11 entity is authorised to perform Modification: unauthorised changing of data or tampering Auditing: trace which entities access what with a service (so that it no longer adheres to its specifications) Message Confidentiality: secret communication Fabrication: additional data or activity are generated that Message Integrity: tamperproof messages would normally not exist S ECURITY M ECHANISMS A TTACKING A D ISTRIBUTED S YSTEM Good Mechanisms: Attacking the Communication Channel: Encryption: transform data into something an attacker ➜ Eavesdropping cannot understand ➜ Masquerading • A means to implement confidentiality ➜ Message tampering ➜ Denial of service • Support for integrity checks (check if data has been modified) Slide 10 Slide 12 Attacking the Interfaces: Signatures and Digests support for integrity, authentication ➜ Unauthorised access ➜ Denial of Service Secure Protocols support for authentication, authorisation Attacking the Systems: Secure Communication support confidentiality and integrity ➜ Applications Security Architecture based on sound principles such as: ➜ OS small TCB, Principle of Least Privilege, support for ➜ Hardware authorisation P ROTECTING A D ISTRIBUTED S YSTEM 5 S ECURITY M ECHANISMS 6

  4. H OW T O M AKE I T E ASIER Distribution of Mechanisms: ➜ Trusted Computing Base (TCB): those parts of the system that Less Good Mechanisms: are able to compromise security ➜ The smaller the TCB the better. Obscurity: count on system details being unknown Slide 13 Slide 15 ➜ May have to implement key services yourself Intimidation: count on fear to keep you safe � Physically separate security services from other services Simplicity: ➜ Simplicity contributes to trust ➜ Very difficult to make a simple secure system W HY S ECURITY IS H ARD Weakest Link: ➜ Security of a system is only as strong as its weakest link ➜ Need to make sure all weak links are removed F OUNDATIONS ➜ One bug is enough ➜ Cryptography ➜ People are often the weakest link • Ciphers Complexity: • Signatures and Digests Slide 14 Slide 16 ➜ Security involves many separate subsystems • Secure Communication ➜ Complex to set up and use • Security Protocols ➜ People won’t use complex systems ➜ Authentication Pervasiveness: ➜ Authorisation ➜ Application level ➜ Middleware level ➜ Network level ➜ OS level, Hardware Level H OW T O M AKE I T E ASIER 7 C RYPTOGRAPHY 8

  5. C RYPTOGRAPHY E NCRYPTION The Basic Idea: The essence of encryption functions: Passive intruder Active intruder Active intruder only listens to C can alter messages can insert messages Find a function E that is easy to compute, but for which it is hard to compute T from { T } K E without a matching decryption key K D for K E . ➜ “Hard to compute” means that it must take at least hundreds of Slide 17 Slide 19 Encryption Decryption years to reverse E without knowledge of K D or to compute K D Ciphertext Plaintext, P Plaintext method C = E (P) method K ➜ Such functions are known as one-way functions. Encryption Decryption key, E key, D Cipher must be resilient to: Receiver Sender K K ➜ Ciphertext only attacks ➜ Map cleartext (or plaintext) T to ciphertext (or cryptogram ) C ➜ Known plaintext attacks ➜ Mapping is by a well-known function parameterised by a key K ➜ Chosen plaintext attacks ➜ T infeasible to reconstruct from C without knowledge of key ➜ Brute-force attacks ➜ E ( K E , T ) = { T } K E ; D ( K D , C ) = { C } K D ; {{ T } K E } K D = T What properties should a good cipher possess? ➜ Confusion and Diffusion Cryptographer: ➜ Confusion : every bit of key influences large number of ➜ Uses cryptography to convert plaintext into ciphertext ciphertext bits ➜ Diffusion : every bit of plaintext influences large number of Cryptanalyst: ciphertext bits Slide 18 Slide 20 ➜ Uses cryptanalysis to attempt to turn ciphertext back into ➜ Fast to compute, ideally in hardware. Is this always good? plaintext ➜ Not critically depend on users selecting “good” keys ➜ Cryptanalysis: the science of making encrypted data ➜ Have been heavily scrutinised by experts unencrypted ➜ Based on operations which are provably “hard” to invert ➜ Easy to use E NCRYPTION 9 E NCRYPTION 10

  6. S YMMETRIC CIPHERS Encrypt In practice, keys are of finite length. Consequences? Cipher ➜ Finite key space ⇒ susceptible to exhaustive search K Plaintext text ➜ Longer keys ⇒ more time needed for brute-force attack • Time to guess a key is exponential in the number of bits of Slide 21 Slide 23 Decrypt the key � Longer keys also make E and D more expensive ➜ Cipher must be secure against any systematic attack ➜ Secret key: K E = K D significantly faster than exhaustive search of key space � fast ⇒ suited for large data volumes � Secure channel is needed to establish the shared, secret key ➜ How many keys needed for N agents? ➼ For any two agents, one key is needed B ASIC C IPHERS Substitution Ciphers: ➜ Each plaintext character replaced by a ciphertext character T INY E NCRYPTION A LGORITHM (TEA) ➜ Caesar cipher: shift alphabet x positions • Easy to break using statistical properties of language Symmetric encryption algorithm by Wheeler & Needham: ➜ Book cipher: replace words by location of word in book ➜ Encode a 64-bit block ( text ) consisting of two 32-bit integers • Knowledge of book is the key ➜ Using a 128-bit key ( k ) represented by four 32-bit integers Slide 22 Slide 24 ➜ Despite its simplicity, TEA is a secure and reasonably fast One Time Pads: encryption algorithm ➜ Random string XORed with plaintext ➜ Can easily be implemented in hardware ➜ Information theoretically secure ➜ Approximately three times as fast as DES ➜ Random string must: ➜ Achieves complete diffusion • Have no pattern or be predictable • Not be reused • Not be known by cryptanalyst ➜ Key distribution problem S YMMETRIC CIPHERS 11 T INY E NCRYPTION A LGORITHM (TEA) 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend