i mport ance of net work securit y
play

I mport ance of Net work Securit y? Think about The most pr - PDF document

I mport ance of Net work Securit y? Think about The most pr ivat e, embar r assing or valuable 15: piece of inf or mat ion youve ever st or ed on a comput er Net work Securit y Basics How much you r ely on comput er


  1. I mport ance of Net work Securit y? � Think about … � The most pr ivat e, embar r assing or valuable 15: piece of inf or mat ion you’ve ever st or ed on a comput er Net work Securit y Basics � How much you r ely on comput er syst ems t o be available when you need t hem � The degr ee t o which you quest ion whet her a piece of email r eally came f r om t he per son Last Modif ied: list ed in t he Fr om f ield 4/ 21/ 2003 8:30:27 PM � How convenient it is t o be able t o access pr ivat e inf or mat ion online (e.g. buy wit hout ent er ing all dat a, look up your t r anscr ipt wit hout r equest ing a copy,… ) 7: Net wor k Secur it y 1 7: Net wor k Secur it y 2 I mport ance of Net work Types of at t acks Securit y � Societ y is becoming increasingly reliant on � What ar e we wor r ied about ? t he correct and secure f unct ioning of � P assive: comput er syst ems � I nterception : at t acks conf ident ialit y. a.k.a., eavesdropping, “man- in- t he- middle” at t acks. � Medical r ecor ds, f inancial t r ansact ions, et c. � Traf f ic Analysis: at t acks conf ident ialit y, or anonymit y. � I t is our j obs as prof essional comput er Can includet raceback on a net work, CRT radiat ion. scient ist s: � Act ive: � To evaluat e t he syst ems we use t o under st and � I nterruption : at t acks availabilit y. t heir weaknesses (a.k.a., denial- of- service at t acks � To educat e our selves and ot her s t o be wise � Modif ication : at t acks int egrit y. net wor k consumer s � Fabrication : at t acks aut hent icit y. � To design net wor ked syst ems t hat ar e secur e 7: Net wor k Secur it y 3 7: Net wor k Secur it y 4 Fundament als of Def ense Crypt ography � The most widely used t ool f or secur ing � What can we do about it ? inf or mat ion and ser vices is cr ypt ogr aphy. � Rest rict ed Access � Cr ypt ogr aphy r elies on cipher s: mat hemat ical � Rest r ict physical access, close net wor k por t s, f unct ions used f or encr ypt ion and decr ypt ion of a isolat e f r om t he I nt er net , f ir ewalls, NAT message. gat eways, swit ched net wor ks � Encrypt ion : t he process of disguising a message in such a � Monit or ing way as t o hide it s subst ance. � Know what nor mal is and wat ch f or deviat ions � Ciphert ext : an encrypt ed message � Het erogeneit y/ Randomness � Decrypt ion: t he process of ret urning an encrypt ed message back int o plaint ext . � Var iet y of I mplement at ions, Random sequence number s, Random por t number s Or iginal Plaint ext Cipher t ext Plaint ext � Crypt ography… … Encr ypt ion Decr ypt ion 7: Net wor k Secur it y 7: Net wor k Secur it y 5 6 1

  2. What makes a good cipher? Ciphers subst it ut ion cipher : subst it ut ing one t hing f or anot her � The secur it y of a cipher (like a subst it ut ion � monoalphabet ic cipher: subst it ut e one let t er f or anot her cipher ) may r est in t he secr ecy of it s r est r ict ed algor it hm. plaintext: abcdefghijklmnopqrstuvwxyz � Whenever a user leaves a group, t he algorit hm must change. ciphertext: mnbvcxzasdfghjklpoiuytrewq � Can’t be scrut inized by people smart er t han you. � But , secrecy is a popular approach :( E.g.: Plaintext: bob. i love you. alice � Moder n cr ypt ogr aphy r elies on secr et keys, a select ed value f r om a lar ge set (a keyspace), e.g., a ciphertext: nkn. s gktc wky. mgsbc 1024 -bit number . 2 1024 values! � Securit y is based on secrecy of t he key, not t he det ails Q: How har d t o br eak t his simple cipher ?: of t he algorit hm. •br ut e f or ce (how har d?) � Change of aut horized part icipant s requires only a change •ot her? in key. 7: Net wor k Secur it y 7 7: Net wor k Secur it y 8 Keys: Symmet ric vs Assymet ric Session Keys � The most common cr ypt ogr aphic t ools ar e � Symmet r ic key algor it hms ar e f ast er t han � Symmet ric key ciphers asymmet r ic key algor it hms • Use same key t o encr ypt and decr ypt � Of t en asymmet r ic key cr ypt ogr aphy used t o • One key shar ed and kept secr et exchange a shar ed secr et key • DES, 3DES, AES, Blowf ish, Twof ish, I DEA � This key called a symmet r ic session key is t hen • Fast and simple (based on addit ion, masks, and shif t s) used t o encr ypt t his conver sat ion wit h symmet r ic • Typical key lengt hs are 40, 128, 256, 512 key crypt ograhy � Asymmet ric key ciphers • Pair of keys: one encr ypt s and anot her decrpyt s � Each new conver sat ion would use a dif f er ent • One key (t he privat e key) must be kept secret ; t he ot her session key key (t he public key) can be f r eely disclosed � Ot her benef it s (I n addit ion t o ef f iciency) • RSA, El Gamal � session keys also reduce t he key exposure or amount of • Slow, but versat ile (usually requires exponent iat ion) encrypt ed t ext t hat could be collect ed t o aid in analysis • Typical key lengt hs are 512, 1024, 2048 � I f session key compromised only get inf o in t he last session 7: Net wor k Secur it y 9 7: Net wor k Secur it y 10 Symmet ric key crypt o: DES Public key encrypt ion algorit hms DES: Dat a Encr ypt ion St andar d Two int er-relat ed requirement s: � US encr ypt ion st andar d [NI ST 1993] � 56-bit symmet r ic key, 64 bit plaint ext input . . need a decr ypt ion f unct ion d B ( ) and an 1 � init ial permut at ion encr ypt ion f unct ion e B ( ) such t hat � 16 ident ical “rounds” of f unct ion applicat ion, each using dif f erent 48 bit s of key d (e (m)) = m e (d (m)) = m � f inal permut at ion B B B B � How secure is DES? 2 need public and pr ivat e keys . . � DES Challenge: 56- bit -key- encrypt ed phrase decrypt ed f or d B ( ) and e B ( ) (brut e f orce) in a lit t le over 22 hours (1999 DES Challenge I I I ) � no known “backdoor” decrypt ion approach � making DES mor e secur e � use t hree keys sequent ially (3- DES) on each dat um � use cipher - block chaining 7: Net wor k Secur it y 7: Net wor k Secur it y 11 12 2

  3. RSA RSA in a nut shell 1. Choose t wo large prime numbers p, q. � Ronald L. Rivest, Adi Shamir and Leonard (e.g., 1024 bit s each) M. Adleman 2. Comput e n = pq, z = (p-1)(q-1 ) � Won 2002 Tur ing awar d f or t his wor k! � Want a f unct ion e B t hat is easy t o do, but 3. Choose e ( wit h e< n) t hat has no common f act or s hard t o undo wit hout a special decrypt ion wit h z. ( e, z ar e “r elat ively pr ime”). key 4. Choose d such t hat ed-1 is exact ly divisible by z . � Based on t he dif f icult y of f act oring large (in ot her wor ds: ed mod z = 1 ). numbers (especially ones t hat have only 5. Public key is (n,e). Pr ivat e key is (n,d). large prime f act ors) Why? (Will hint at) How? (Won’t discuss) 7: Net wor k Secur it y 13 7: Net wor k Secur it y 14 RSA: Encrypt ion, decrypt ion RSA: small example Bob chooses p=5, q=7 . Then n=35, z=24 . 0. Given ( n,e ) and ( n,d ) as comput ed above e=5 (so e, z r elat ively pr ime). d=29 (so ed-1 exact ly divisible by z. 1. To encr ypt bit pat t er n (message), m , comput e e e c = m mod n (i.e., r emainder when m is divided by n ) me e let t er m c = m mod n 2. To decr ypt r eceived bit pat t er n, c , comput e encrypt : d l 1524832 17 d 12 (i.e., r emainder when c is divided by n ) m = c mod n cd d c m = c mod n let t er decrypt : Magic d e m = (m mod n) mod n 17 481968572106750915091411825223072000 12 l happens! 7: Net wor k Secur it y 15 7: Net wor k Secur it y 16 Reversible e d RSA: Why? m = (m ) mod n Number t heor y r esult : I f p,q prime, n = pq, t hen � What t he privat e key encrypt s t he public y mod (p-1)(q-1) y x mod n = x mod n key decrypt s � What t he public key encrypt s t he privat e d e ed mod n = m mod n (m ) key decrypt s ed mod (p-1)(q-1) = m mod n I f it wer e easy (using number t heory result above) t o f act or n int o p and q t hen we 1 = m mod n would be in (since we chose ed t o be divisible by t rouble! (p- 1)(q-1) wit h remainder 1 ) = m 7: Net wor k Secur it y 7: Net wor k Secur it y 17 18 3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend