Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized.

Similar presentations


Presentation on theme: "Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized."— Presentation transcript:

1 Network Security

2 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

3 3 What are the Security metrics?  Confidentiality: can a 3rd party see it?  Authentication: Am I talking to the person I intend to?  Non-repudiation: can you claim you didn’t send it even if you really did?  Integrity: was it altered before I got it?  Authorization: Are you allowed to perform the action (method)?

4 4 Security Tools  Cryptography/Encryption:  Encode a message in a way that only the communicating parties can interpret it  Used for secrecy and authentication

5 5 Cryptography  Encoding a message in a way that only the communicating parties can interpret it Encryption Plaintext (P)Ciphertext (C) Key (K) Notation: Encryption: C=E K (P) Decryption: P = D K (C)

6 6 Rules for Encryption  Encryption requires:  Algorithm: Public, known to all –Inspires trust that the algorithm works  Keys: Long enough to prevent easy breaking of the encryption Short enough to keep algorithm efficient Typical key lengths: 56-bit, 128-bit, 256-bit, 512-bit

7 7 Types of Encryption Algorithms  Substitution Ciphers  Every letter (or group of letters) is replaced by another letter (or group of letters)  Example: Caesar cipher: –a/D, b/E, c/F, d/G, …, z/C Monoalphabetic cipher: –a/Q, b/W, c/E, …  Easy to break by analyzing statistical properties of written language

8 8 Types of Encryption (cont’d)  Transposition Ciphers  Instead of substituting letters in the plaintext, we change their order A N D R E W 1 4 2 5 3 6 t h i s i s a m e s s a g e i w o u l d l i k e t o e n c r y p t n o w Key = ANDREW Plaintext = thisisamessageiwould liketoencryptnow Ciphertext = tagltyieiletisokco hmedopsswinnsauerw

9 9 Transposition Cipher Decryption  The following message has been encrypted using transposition. The transposition key is “SKYBLUE”.  SRMTISHEAGIIETHNASGSIOLE  Give the plaintext message?

10 10 Types of Encryption (cont’d)  Most actual encryption algorithms use a complex combination of substitution and transposition  Examples:  Data Encryption Standard (DES) Multiple iterations of substitution and transposition using a 56-bit key designed by IBM with input from the NSA  DES chaining Multiple stages of DES coding, in which the input of each stage is the output of previous stages  International Data Encryption Algorithm (IDEA) uses a 128-bit key

11 11 Symmetric Encryption  Problem with all the cryptography algorithms used so far? How to communicate the shared key safely

12 12 Public Key Cryptography symmetric key crypto  requires sender, receiver know shared secret key public key cryptography  sender, receiver do not share secret key  public encryption key known to all  private decryption key known only to receiver

13 13 Public key cryptography plaintext message, m ciphertext encryption algorithm decryption algorithm Bob’s public key plaintext message K (m) B + K B + Bob’s private key K B - m = K ( K (m) ) B + B - Messages to Bob are encrypted using Bob’s public key. Bob decrypts all received messages using his private key.

14 14 Public key encryption algorithms need K ( ) and K ( ) such that BB.. given public key K it should be impossible to compute private key K B B Requirements: 1 2 RSA: Rivest, Shamir, Adelson algorithm +- K (K (m)) = m B B - + + -

15 15 RSA: Choosing keys 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1) 3. Choose e (with e<n) that has no common factors with z. (e, z are “relatively prime”). 4. Choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ). 5. Public key is (n,e). Private key is (n,d). K B + K B -

16 16 RSA: Encryption, decryption 0. Given (n,e) and (n,d) as computed above 1. To encrypt bit pattern, m, compute c = m mod n e (i.e., remainder when m is divided by n) e 2. To decrypt received bit pattern, c, compute m = c mod n d (i.e., remainder when c is divided by n) d m = (m mod n) e mod n d Magic happens! c

17 17 RSA example: Bob chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z. letter m m e c = m mod n e l 12 1524832 17 c m = c mod n d 17 481968572106750915091411825223071697 12 c d letter l encrypt: decrypt:

18 18 RSA: Why is that m = (m mod n) e mod n d (m mod n) e mod n = m mod n d ed Useful number theory result: If p,q prime and n = pq, then: x mod n = x mod n yy mod (p-1)(q-1) = m mod n ed mod (p-1)(q-1) = m mod n 1 = m (using number theory result above) (since we chose ed to be divisible by (p-1)(q-1) with remainder 1 )

19 19 RSA: another important property The following property will be very useful later: K ( K (m) ) = m B B - + K ( K (m) ) B B + - = use public key first, followed by private key use private key first, followed by public key Result is the same!

20 20 Cryptography question  Suppose N people want to communicate with each of N-1 other people. All communication between any two people, i and j is visible to all other people in the group and security is guaranteed by the encryption scheme.  With symmetric key encryption, how many keys are required in the system as a whole? Express you answer in terms of N.  How many keys are required (total) using public/private key cryptography. Express your answer in terms of N.

21 21 What are the Security metrics?  Confidentiality: can a 3rd party see it?  Authentication: Am I talking to the person I intend to?  Non-repudiation: can you claim you didn’t send it even if you really did?  Integrity: was it altered before I got it?  Authorization: Are you allowed to perform the action (method)?

22 22 Authentication Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”

23 23 Authentication Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” in a network, Bob can not “see” Alice, so Trudy simply declares herself to be Alice “I am Alice”

24 24 Authentication: another try Protocol ap2.0: Alice says “I am Alice” in an IP packet containing her source IP address Failure scenario?? “I am Alice” Alice’s IP address

25 25 Authentication: another try Protocol ap2.0: Alice says “I am Alice” in an IP packet containing her source IP address Trudy can create a packet “spoofing” Alice’s address “I am Alice” Alice’s IP address

26 26 Authentication: another try Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it. Failure scenario?? “I’m Alice” Alice’s IP addr Alice’s password OK Alice’s IP addr

27 27 Authentication: another try Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it. playback attack: Trudy records Alice’s packet and later plays it back to Bob “I’m Alice” Alice’s IP addr Alice’s password OK Alice’s IP addr “I’m Alice” Alice’s IP addr Alice’s password

28 28 Authentication: yet another try Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. Failure scenario?? “I’m Alice” Alice’s IP addr encrypted password OK Alice’s IP addr

29 29 Authentication: another try Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. record and playback still works! “I’m Alice” Alice’s IP addr encrypted password OK Alice’s IP addr “I’m Alice” Alice’s IP addr encrypted password

30 30 Authentication: yet another try Goal: avoid playback attack Failures, drawbacks? Nonce: number (R) used only once –in-a-lifetime ap4.0: to prove Alice “live”, Bob sends Alice nonce, R. Alice must return R, encrypted with shared secret key “I am Alice” R K (R) A-B Alice is live, and only Alice knows key to encrypt nonce, so it must be Alice!

31 31 Authentication: ap5.0 ap4.0 requires shared symmetric key  can we authenticate using public key techniques? ap5.0: use nonce, public key cryptography “I am Alice” R Bob computes K (R) A - “send me your public key” K A + (K (R)) = R A - K A + and knows only Alice could have the private key, that encrypted R such that (K (R)) = R A - K A +

32 32 ap5.0: security hole Man (woman) in the middle attack: Trudy poses as Alice (to Bob) and as Bob (to Alice) I am Alice R T K (R) - Send me your public key T K + A K (R) - Send me your public key A K + T K (m) + T m = K (K (m)) + T - Trudy gets sends m to Alice encrypted with Alice’s public key A K (m) + A m = K (K (m)) + A - R

33 33 ap5.0: security hole Man (woman) in the middle attack: Trudy poses as Alice (to Bob) and as Bob (to Alice) Difficult to detect:  Bob receives everything that Alice sends, and vice versa. (e.g., so Bob, Alice can meet one week later and recall conversation)  problem is that Trudy receives all messages as well! Problem to solve: key distribution

34 34 Distribution: key distribution center (for symmetric key) Key Distribution Center

35 35 Distribution: Public key certification (for public key) Encryption algorithm CA’s private key K CA - Alice ’ s CA-signed certificate containing her public key Certification Authority K A + (, Alice)

36 36 What are the Security metrics?  Confidentiality: can a 3rd party see it?  Authentication: Am I talking to the person I intend to?  Non-repudiation: can you claim you didn’t send it even if you really did?  Integrity: was it altered before I got it?  Authorization: Are you allowed to perform the action (method)?

37 37 Digital Signatures Cryptographic technique analogous to hand- written signatures.  sender (Bob) digitally signs document, establishing he is document owner/creator.  verifiable, nonforgeable: recipient (Alice) can prove to someone that Bob, and no one else (including Alice), must have signed document

38 38 Digital Signatures Simple digital signature for message m:  Bob signs m by encrypting with his private key K B, creating “signed” message, K B (m) - - Dear Alice Oh, how I have missed you. …(blah blah blah) Bob Bob’s message, m Public key encryption algorithm Bob’s private key K B - Bob’s message, m, signed (encrypted) with his private key K B - (m)

39 39 Digital Signatures (more)  If K B (K B (m) ) = m, whoever signed m must have used Bob’s private key. - + Non-repudiation: Alice can take m, and signature K B (m) to court and prove that Bob signed m.

40 40 Message Digests Computationally expensive to public-key-encrypt long messages Goal: fixed-length, easy- to-compute digital “fingerprint”  apply hash function H to m, get fixed size message digest, H(m).

41 41 Message Digests Hash function properties:  many-to-1  produces fixed-size msg digest (fingerprint)  given message digest x, computationally infeasible to find m such that x = H(m) large message m H: Hash Function H(m)

42 42 large message m H: Hash function H(m) digital signature (encrypt) Bob’s private key K B - + Bob sends digitally signed message: Alice verifies signature and integrity of digitally signed message: K B (H(m)) - encrypted msg digest K B (H(m)) - encrypted msg digest large message m H: Hash function H(m) digital signature (decrypt) H(m) Bob’s public key K B + equal ? Digital signature = signed message digest

43 43 Hash Function Algorithms  MD5 hash function widely used (RFC 1321)  computes 128-bit message digest in 4-step process.  arbitrary 128-bit string x, appears difficult to construct msg m whose MD5 hash is equal to x.  SHA-1 is also used.  US standard [ NIST, FIPS PUB 180-1]  160-bit message digest

44 44 What are the Security metrics?  Confidentiality: can a 3rd party see it?  Authentication: Am I talking to the person I intend to?  Non-repudiation: can you claim you didn’t send it even if you really did?  Integrity: was it altered before I got it?  Authorization: Are you allowed to perform the action (method)?

45 45 Firewalls isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. firewall

46 46 Firewalls allow only authorized access to inside network (set of authenticated users/hosts) two types of firewalls:  packet-filtering  application-level

47 47 Packet Filtering  internal network connected to Internet via router firewall  router filters packet-by-packet, decision to forward/drop packet based on:  source IP address, destination IP address  TCP/UDP source and destination port numbers  ICMP message type  TCP SYN and ACK bits Should arriving packet be allowed in? Departing packet let out?

48 48 Packet Filtering  Example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or dest port = 23.  All incoming and outgoing UDP flows and telnet connections are blocked.  Example 2: Block inbound TCP segments with ACK=0.  Prevents external clients from making TCP connections with internal clients, but allows internal clients to connect to outside.

49 49 Application gateways  Filters packets on application data.  Example: allow select internal users to telnet outside. host-to-gateway telnet session gateway-to-remote host telnet session application gateway router and filter 1. Require all telnet users to telnet through gateway. 2. For authorized users, gateway sets up telnet connection to dest host. Gateway relays data between 2 connections 3. Router filter blocks all telnet connections not originating from gateway.

50 50 Limitations of firewalls and gateways  IP spoofing: router can’t know if data “really” comes from claimed source  if multiple app’s. need special treatment, each has own app. gateway.  client software must know how to contact gateway.  e.g., must set IP address of proxy in Web browser  filters often use all or nothing policy for UDP.  tradeoff: degree of communication with outside world, level of security  many highly protected sites still suffer from attacks.

51 A little more on Internet Security Threat Examples

52 52 Internet security threats Packet sniffing:  broadcast media  promiscuous NIC reads all packets passing by  can read all unencrypted data (e.g. passwords)  e.g.: C sniffs B’s packets A B C src:B dest:A payload Countermeasures?

53 53 Internet security threats Packet sniffing: countermeasures  all hosts in organization run software that checks periodically if host interface in promiscuous mode.  one host per segment of broadcast media (switched Ethernet at hub) A B C src:B dest:A payload

54 54 Internet security threats IP Spoofing:  can generate “raw” IP packets directly from application, putting any value into IP source address field  receiver can’t tell if source is spoofed  e.g.: C pretends to be B A B C src:B dest:A payload Countermeasures?

55 55 Internet security threats IP Spoofing: egress filtering  routers should not forward outgoing packets with invalid source addresses (e.g., datagram source address not in router’s network)  great, but egress filtering can not be mandated for all networks A B C src:B dest:A payload

56 56 Internet security threats Denial of service (DOS):  flood of maliciously generated packets “swamp” receiver  Distributed DOS (DDOS): multiple coordinated sources swamp receiver  e.g., C and remote host SYN-attack A A B C SYN Countermeasures?

57 57 Internet security threats Denial of service (DOS): countermeasures  filter out flooded packets (e.g., SYN) before reaching host: throw out good with bad  traceback to source of floods (most likely an innocent, compromised machine) A B C SYN

58 58 SSL and TLS Secure Sockets Layer (SSL) is a different approach - a new layer is added that provides a secure channel over a TCP only link. TLS is Transport Layer Security (IETF standard based on SSL).

59 59 SSL layer Application SSL TCP IP Application SSL TCP IP

60 60 Advantages of SSL/TLS Independent of application layer Includes support for negotiated encryption techniques.  easy to add new techniques. Possible to switch encryption algorithms in the middle of a session.

61 61 HTTPS Usage HTTPS is HTTP running over SSL.  used for most secure web transactions.  HTTPS server usually runs on port 443.  Include notion of verification of server via a certificate.  Central trusted source of certificates.


Download ppt "Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized."

Similar presentations


Ads by Google