Web Browsing, Cryptography, VPN, PGP Week 5 Frank Chen | Spring - - PowerPoint PPT Presentation

web browsing cryptography vpn pgp
SMART_READER_LITE
LIVE PREVIEW

Web Browsing, Cryptography, VPN, PGP Week 5 Frank Chen | Spring - - PowerPoint PPT Presentation

Keybase, a company that strives to provide everyone with GPG CS 88S Web Browsing, Cryptography, VPN, PGP Week 5 Frank Chen | Spring 2017 Frank Chen | Spring 2017 Agenda Review last weeks material How the Internet Works, abridged


slide-1
SLIDE 1

Frank Chen | Spring 2017 Frank Chen | Spring 2017

CS 88S

Web Browsing, Cryptography, VPN, PGP

Week 5

Keybase, a company that strives to provide everyone with GPG

slide-2
SLIDE 2

Frank Chen | Spring 2017

Agenda

  • Review last week’s material
  • How the Internet Works, abridged
  • Cryptography/PGP
  • How does a VPN Work?
  • What is Proxy Browsing?
  • Wireshark Demo
slide-3
SLIDE 3

Frank Chen | Spring 2017

Mid-Quarter Feedback & Final Project

slide-4
SLIDE 4

Frank Chen | Spring 2017

Agenda

  • Review last week’s material
  • How the Internet Works, abridged
  • Cryptography/PGP
  • How does a VPN Work?
  • What is Proxy Browsing?
  • Wireshark Demo
slide-5
SLIDE 5

Frank Chen | Spring 2017

A typical Authentication Session

LOGIN SCREEN

Username: fc1995 Password: earl123

PASSWORD STORED ONLINE (SHA-1 HASH)

fc1995: 4cf39465730e75ebbec21 c67facaba7a08d82f0f

AUTHENTICATED!

Proceed to your personal information/profile

Hash the Input Password Do the two match? If YES

DENIED!

Try again.

If NO

slide-6
SLIDE 6

Frank Chen | Spring 2017

A typical Dictionary Attack

PASSWORD FROM DICTIONARY

...Dog, Dogs, Dogcatcher, Dogcatchers, Dogberry, Dogberries, Dogma, Dogmatic, Dogmatized,

  • Dog1. Dog2, Dog3, Dog4...

PASSWORD File (SHA-1 HASH)

fc1995: 4cf39465730e75ebbec21 c67facaba7a08d82f0f

RETRIEVED THE PASSWORD

Proceed to use the password to login to your account

Hash the Input Password Do the two hashes match? If YES

CONTINUE!

Dictionary Attacks can submit up to 1000 attempts per minute

If NO

slide-7
SLIDE 7

Frank Chen | Spring 2017

Password Managers

slide-8
SLIDE 8

Frank Chen | Spring 2017

Agenda

  • Review last week’s material
  • How the Internet Works, abridged
  • Cryptography/PGP
  • How does a VPN Work?
  • What is Proxy Browsing?
  • Wireshark Demo
slide-9
SLIDE 9

Frank Chen | Spring 2017

What happens when you type www.google.com?

slide-10
SLIDE 10

Frank Chen | Spring 2017

1 2 3 4 5 6 7

What happens when you type www.google.com?

slide-11
SLIDE 11

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Using a Browser

Def: A Program installed on your computer that allows you to visit websites.

Source: http://bit.ly/2oX9Gwr

slide-12
SLIDE 12

Frank Chen | Spring 2017

1 2 3 4 5 6 7

There are many Browsers

slide-13
SLIDE 13

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser checks cache

Def: The browser cache is a temporary storage location on your computer for files downloaded by your browser to display websites.

slide-14
SLIDE 14

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser checks cache

slide-15
SLIDE 15

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser asks OS for IP Address

Def: Operating System (OS) is the software that supports a computer's basic functions

slide-16
SLIDE 16

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser asks OS for IP Address

Def: Internet Protocol (IP) Address is a unique string of numbers separated by periods that identifies each computer

  • Ex. 172.217.11.78 (Google's IP Address)
slide-17
SLIDE 17

Frank Chen | Spring 2017

1 2 3 4 5 6 7

OS makes DNS Lookup for IP

Def: Domain Name System (DNS) Lookup translates the domain name into an IP address your browser can use

Video: http://bit.ly/1jld0uV

slide-18
SLIDE 18

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser sends HTTP request

Def: The Hypertext Transfer Protocol (HTTP) is the foundation of data communication for the World Wide Web Note: OSI Model-related subjects, TCP and UDP are out

  • f scope for this course.
slide-19
SLIDE 19

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser reads response from server

Def: Client/Server Model - A server host runs programs to share resource with clients. A client does not share resources, but requests a server's content or service function.

slide-20
SLIDE 20

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser reads response from server

Def: The server's Response to the client includes the status code, such as 404 Not Found, or 200 Successful.

List of HTTP Status Code: http://bit.ly/2ptqwnG

slide-21
SLIDE 21

Frank Chen | Spring 2017

1 2 3 4 5 6 7

List of HTTP Status Code: http://bit.ly/2ptqwnG

slide-22
SLIDE 22

Frank Chen | Spring 2017

1 2 3 4 5 6 7

Browser renders page to display

Def: The response from server contains HTML, CSS, Javascript, images, and all resources needed to render a webpage for the client.

slide-23
SLIDE 23

Frank Chen | Spring 2017

1 2 3 4 5 6 7

slide-24
SLIDE 24

Frank Chen | Spring 2017

Agenda

  • Review last week’s material
  • How the Internet Works, abridged
  • Cryptography/PGP
  • How does a VPN Work?
  • What is Proxy Browsing?
  • Wireshark Demo
slide-25
SLIDE 25

Frank Chen | Spring 2017

Cryptography

Def: Constructing and analyzing protocols that prevent third parties

  • r the public from reading private

messages

slide-26
SLIDE 26

Frank Chen | Spring 2017

Symmetric Key Cryptography

Def: Algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext

Source: http://bit.ly/2ppmeiW

slide-27
SLIDE 27

Frank Chen | Spring 2017

The Key Exchange Problem

slide-28
SLIDE 28

Frank Chen | Spring 2017

The Trust Problem

slide-29
SLIDE 29

Frank Chen | Spring 2017

Scalability

slide-30
SLIDE 30

Frank Chen | Spring 2017

Public Key Cryptography

Def: Cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

slide-31
SLIDE 31

Frank Chen | Spring 2017

Public Key Cryptography

Authentication Public key is used to verify that a holder of the paired private key sent the message Encryption whereby only the holder of the paired private key can decrypt the message encrypted with the public key

slide-32
SLIDE 32

Frank Chen | Spring 2017

Symmetric Key

Source: http://bit.ly/1I2YUeS

Key used to unlock and lock the drawer

slide-33
SLIDE 33

Frank Chen | Spring 2017

Public/Private Key

Image Source: http://bit.ly/1I2YUeS

Private Key turns

  • nly clockwise

Public Key turns only counter-clockwise

slide-34
SLIDE 34

Frank Chen | Spring 2017

How do you verify someone

  • n the Internet?
slide-35
SLIDE 35

Frank Chen | Spring 2017

Pretty Good Privacy (PGP)

Def: PGP is a program used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications GnuPG is the free version of PGP

Source: http://bit.ly/2pCWEp7

slide-36
SLIDE 36

Frank Chen | Spring 2017

Source: http://bit.ly/2qrJgDs

Demo

slide-37
SLIDE 37

Frank Chen | Spring 2017

Agenda

  • Review last week’s material
  • How the Internet Works, abridged
  • Cryptography/PGP
  • How does a VPN Work?
  • What is Proxy Browsing?
  • Wireshark Demo
slide-38
SLIDE 38

Frank Chen | Spring 2017

Virtual Private Network (VPN)

Def: VPNs allow users to securely access a private network and share data remotely through public networks. Much like a firewall protects your data on your computer, VPNs protect it online.

slide-39
SLIDE 39

Frank Chen | Spring 2017

Virtual Private Network (VPN)

You

Internet Service Provider (ISP) Websites, Resources

slide-40
SLIDE 40

Frank Chen | Spring 2017

Virtual Private Network (VPN)

You

Internet Service Provider (ISP) Websites, Resources

VPN Tunnel

Source: http://bit.ly/2qBrNZh

slide-41
SLIDE 41

Frank Chen | Spring 2017

UCLA VPN Demo

slide-42
SLIDE 42

Frank Chen | Spring 2017

Should you use a VPN?

slide-43
SLIDE 43

Frank Chen | Spring 2017

Pro

  • ISPs cannot track you
  • Good for protection in

public Wi-Fi setting

  • Network traffic

always encrypted

Con

  • Ads on free VPNs
  • VPNs still log your

activity

  • Slow Internet Traffic

Source: http://bit.ly/2qyFTuD

slide-44
SLIDE 44

Frank Chen | Spring 2017

Agenda

  • Review last week’s material
  • How the Internet Works, abridged
  • Cryptography/PGP
  • How does a VPN Work?
  • What is Proxy Browsing?
  • Wireshark Demo
slide-45
SLIDE 45

Frank Chen | Spring 2017

Proxy Server

Def: A server set up as intermediary for the client and server Using a Proxy can allow a user to spoof their IP address

slide-46
SLIDE 46

Frank Chen | Spring 2017

Hide My Ass Demo

Source: https://www.hidemyass.com/proxy

slide-47
SLIDE 47

Frank Chen | Spring 2017

Difference between Proxy and VPN?

Source: http://bit.ly/2pS9liS

slide-48
SLIDE 48

Frank Chen | Spring 2017

Agenda

  • Review last week’s material
  • How the Internet Works, abridged
  • Cryptography/PGP
  • How does a VPN Work?
  • What is Proxy Browsing?
  • Wireshark Demo
slide-49
SLIDE 49

Frank Chen | Spring 2017

Wireshark

slide-50
SLIDE 50

Frank Chen | Spring 2017

Sf C T

Always use HTTPS or VPN

Source: https://www.eff.org/ https-everywhere Source: http://bit.ly/2p5R4KX

slide-51
SLIDE 51

Frank Chen | Spring 2017

Authy, a 2-Factor Authentication Application

Next Week...