what is network security
play

What is network security? Friends and enemies: Alice, Bob, Trudy - PDF document

Network security Network security Foundations: what is security? cryptography Network Security Network Security authentication message integrity key distribution and certification Security in practice: Srinidhi Varadarajan


  1. Network security Network security Foundations: � what is security? � cryptography Network Security Network Security � authentication � message integrity � key distribution and certification Security in practice: Srinidhi Varadarajan � application layer: secure e-mail � transport layer: Internet commerce, SSL, SET 2 What is network security? Friends and enemies: Alice, Bob, Trudy What is network security? Friends and enemies: Alice, Bob, Trudy Secrecy: only sender, intended receiver should “understand” msg contents – sender encrypts msg – receiver decrypts msg Figure 7.1 goes here Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or � well-known in network security world afterwards) without detection � Bob, Alice want to communicate “securely” � Trudy, the “intruder” may intercept, delete, add messages 3 4 Internet security threats Internet security threats Internet security threats Internet security threats Packet sniffing: IP Spoofing: – broadcast media – can generate “raw” IP packets directly from application, putting any value into IP source address field – promiscuous NIC reads all packets passing by – receiver can’t tell if source is spoofed – can read all unencrypted data (e.g. passwords) – e.g.: C pretends to be B – e.g.: C sniffs B’s packets C A A C src:B dest:A payload src:B dest:A payload B B 5 6 Application Layer 1

  2. Internet security threats Internet security threats The language of cryptography The language of cryptography Denial of service (DOS): K B plaint ext K plaint ext – flood of maliciously generated packets “swamp” A receiver ciphert ext – Distributed DOS (DDOS): multiple coordinated sources swamp receiver Figure 7.3 goes here – e.g., C and remote host SYN-attack A C A SYN SYN symmetric key crypto: sender, receiver keys identical SYN SYN SYN B public-key crypto: encrypt key public , decrypt key SYN secret SYN 7 8 Symmetric key cryptography Symmetric key cryptography Symmetric key crypto: DES Symmetric key crypto: DES DES: Data Encryption Standard substitution cipher: substituting one thing for another � US encryption standard [NIST 1993] – monoalphabetic cipher: substitute one letter for another � 56-bit symmetric key, 64 bit plaintext input plaintext: abcdefghijklmnopqrstuvwxyz � How secure is DES? – DES Challenge: 56-bit-key-encrypted phrase (“Strong ciphertext: mnbvcxzasdfghjklpoiuytrewq cryptography makes the world a safer place”) decrypted (brute force) in 4 months E.g.: Plaintext: bob. i love you. alice – no known “backdoor” decryption approach ciphertext: nkn. s gktc wky. mgsbc � making DES more secure – use three keys sequentially (3-DES) on each datum Q: How har d t o break t his simple cipher?: – use cipher-block chaining •br ut e f orce (how har d?) •ot her ? 9 10 Public Key Cryptography Public Key Cryptography Symmetric key Symmetric key symmetric key crypto crypto: DES crypto: DES public key � requires sender, DES operat ion receiver know cryptography shared secret key � radically different initial permutation approach [Diffie- � Q: how to agree on 16 identical “rounds” Hellman76, RSA78] of function key in first place application, each (particularly if never � sender, receiver do using different 48 “met”)? not share secret key bits of key � encryption key final permutation public (known to all) � decryption key private (known only to receiver) 11 12 Application Layer 2

  3. Public key cryptography Public key cryptography Public key encryption algorithms Public key encryption algorithms Two int er-relat ed r equir ement s: need d ( ) and e ( ) such that . . Figure 7.7 goes here 1 B B d (e (m)) = m B B 2 need public and private keys . . for d ( ) and e ( ) B B RSA: Rivest , Shamir, Adelson algorit hm 13 14 Authentication Authentication Authentication: another try Authentication: another try Goal: Bob wants Alice to “prove” her P r ot ocol ap2.0: Alice says “I am Alice” and sends her I P identity to him addr ess along t o “pr ove” it . P r ot ocol ap1.0: Alice says “I am Alice” Failur e scenar io?? Failur e scenar io?? 15 16 Authentication: another try Authentication: another try Authentication: yet another try Authentication: yet another try P r ot ocol ap3.1: Alice says “I am Alice” and sends her P r ot ocol ap3.0: Alice says “I am Alice” and sends her encrypt ed secr et passwor d t o “prove” it . secr et passwor d t o “prove” it . I am Alice encr ypt (passwor d) Failur e scenar io? Failur e scenar io? 17 18 Application Layer 3

  4. Authentication: yet another try Authentication: yet another try Authentication: ap5.0 Authentication: ap5.0 Goal: avoid playback at t ack ap4.0 requires shared symmetric key Nonce: number (R) used onlyonce in a lif et ime – problem: how do Bob, Alice agree on key – can we authenticate using public key techniques? ap4.0: t o prove Alice “live”, Bob sends Alice nonce, R. Alice ap5.0: use nonce, public key cryptography must ret ur n R, encr ypt ed wit h shared secr et key Figure 7.11 goes here Figure 7.12 goes here Failur es, drawbacks? 19 20 ap5.0: security hole ap5.0: security hole Digital Signatures Digital Signatures Man (woman) in the middle attack: Trudy Cryptographic technique Simple digital signature analogous to hand- poses as Alice (to Bob) and as Bob (to Alice) for message m: written signatures. � Bob encrypts m with his � Sender (Bob) digitally private key d B , creating signs document, signed message, d B (m). establishing he is Figure 7.14 goes here � Bob sends m and d B (m) to document owner/creator. Alice. � Verifiable, nonforgeable: recipient (Alice) can verify that Bob, and no one else, signed document. Need “cert if ied” public keys (more lat er … ) 21 22 Digital Signatures (more) Digital Signatures (more) Message Digests Message Digests � Suppose Alice Alice thus verifies that: receives msg m , and – Bob signed m . Computationally expensive to digital signature d B (m) public-key-encrypt long – No one else signed m . Hash function properties: � Alice verifies m messages � Many-to-1 – Bob signed m and not Goal: fixed-length,easy to signed by Bob by � Produces fixed-size msg m’ . compute digital signature, digest (fingerprint) applying Bob’s public “fingerprint” Non-repudiation: � Given message digest x, key e B to d B (m) then computationally infeasible � apply hash function H to m , – Alice can take m , and checks e B (d B (m) ) = m. to find m such that x = get fixed size message signature d B (m) to H(m) � If e B (d B (m) ) = m , digest, H(m). court and prove that � computationally infeasible whoever signed m to find any two messages Bob signed m . must have used Bob’s m and m’ such that H(m) = private key. H(m’). 23 24 Application Layer 4

  5. Hash Function Algorithms Hash Function Algorithms Digital signature = Signed message digest Digital signature = Signed message digest Bob sends digitally signed Alice verifies signature and � MD5 hash function widely � Internet checksum message: integrity of digitally signed used. would make a poor message: – Computes 128-bit message digest. message digest in 4-step – Too easy to find process. two messages with – arbitrary 128-bit string x, same checksum. appears difficult to construct msg m whose MD5 hash is equal to x. � SHA-1 is also used. – US standard – 160-bit message digest 25 26 Key Distribution Center (KDC) Key Distribution Center (KDC) Trusted Intermediaries Trusted Intermediaries Problem: Problem: � Alice,Bob need shared symmetric – How do two entities – When Alice obtains key. establish shared Bob’s public key secret key over (from web site, e- � KDC: server shares network? mail, diskette), how different secret key does she know it is with each registered Solution: Bob’s public key, user. – trusted key � Alice communicates with not Trudy’s? � Alice, Bob know own distribution center KDC, gets session key R1, Solution: symmetric keys, K A- (KDC) acting as and K B-KDC (A,R1) KDC K B-KDC , for intermediary – trusted certification � Alice sends Bob communicating with between entities authority (CA) K B-KDC (A,R1), Bob extracts R1 KDC . � Alice, Bob now share the symmetric key R1. 27 28 Certification Authorities Secure e Secure e- -mail mail Certification Authorities � Certification authority (CA) • Alice want s t o send secr et e-mail message, m, t o Bob. binds public key to particular entity. � Entity (person, router, etc.) can register its public key with CA. – Entity provides “proof of identity” to CA. – CA creates certificate � When Alice wants Bob’s binding entity to public public key: • generat es random symmet ric privat e key, K S . key. � gets Bob’s certificate (Bob or • encr ypt s message wit h K S – Certificate digitally elsewhere). signed by CA. • also encr ypt s K S wit h Bob’s public key. � Apply CA’s public key to • sends bot h K S (m) and e B (K S ) t o Bob. Bob’s certificate, get Bob’s public key 29 30 Application Layer 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend