Presentation is loading. Please wait.

Presentation is loading. Please wait.

Conclusion 1 Conclusion Conclusion 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis  Access.

Similar presentations


Presentation on theme: "Conclusion 1 Conclusion Conclusion 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis  Access."— Presentation transcript:

1

2 Conclusion 1 Conclusion

3 Conclusion 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis  Access Control o Authentication, authorization, firewalls, IDS  Protocols o Simplified authentication protocols o Real-World protocols  Software o Flaws, malware, SRE, development, trusted OS

4 Conclusion 3 Crypto Basics  Terminology  Classic ciphers o Simple substitution o Double transposition o Codebook o One-time pad  Basic cryptanalysis

5 Conclusion 4 Symmetric Key  Stream ciphers o A5/1 o RC4  Block ciphers o DES o AES, TEA, etc. o Modes of operation  Data integrity (MAC)

6 Conclusion 5 Public Key  Knapsack (insecure)  RSA  Diffie-Hellman  Elliptic curve crypto (ECC)  Digital signatures and non-repudiation  PKI

7 Conclusion 6 Hashing and Other  Birthday problem  Tiger Hash  HMAC  Clever uses (online bids, spam reduction, …)  Other topics o Secret sharing o Random numbers o Information hiding (stego, watermarking)

8 Conclusion 7 Advanced Cryptanalysis  Enigma  RC4 (as used in WEP)  Linear and differential cryptanalysis  Knapsack attack (lattice reduction)  RSA timing attacks

9 Conclusion 8 Authentication  Passwords o Verification and storage (salt, etc.) o Cracking (math)  Biometrics o Fingerprint, hand geometry, iris scan, etc. o Error rates  Two-factor, single sign on, Web cookies

10 Conclusion 9 Authorization  History/system certification  ACLs and capabilities  Multilevel security (MLS) o BLP, Biba, compartments, covert channel, inference control  CAPTCHA  Firewalls  IDS

11 Conclusion 10 Simple Protocols  Authentication o Using symmetric key o Using public key o Session key o Perfect forward secrecy (PFS) o Timestamps  Zero knowledge proof (Fiat-Shamir)

12 Conclusion 11 Real-World Protocols  SSH  SSL  IPSec o IKE o ESP/AH, tunnel/transport modes, …  Kerberos  Wireless: WEP & GSM

13 Conclusion 12 Software Flaws and Malware  Flaws o Buffer overflow o Incomplete mediation, race condition, etc.  Malware o Brain, Morris Worm, Code Red, Slammer o Malware detection o Future of malware, botnets, etc.  Other software-based attacks o Salami, linearization, etc.

14 Conclusion 13 Insecurity in Software  Software reverse engineering (SRE) o Software protection  Digital rights management (DRM)  Software development o Open vs closed source o Finding flaws (do the math)

15 Conclusion 14 Operating Systems  OS security functions o Separation o Memory protection, access control  Trusted OS o MAC, DAC, trusted path, TCB, etc.  NGSCB o Technical issues o Criticisms

16 Conclusion 15 Crystal Ball  Cryptography o Well-established field o Don’t expect major changes o But some systems will be broken o ECC is a major “growth” area o Quantum crypto may prove worthwhile… o …but for now it’s mostly (all?) hype

17 Conclusion 16 Crystal Ball  Authentication o Passwords will continue to be a problem o Biometrics should become more widely used o Smartcard/tokens will be used more  Authorization o ACLs, etc., well-established areas o CAPTCHA’s interesting new topic o IDS is a very hot topic

18 Conclusion 17 Crystal Ball  Protocols are challenging  Difficult to get protocols right  Protocol development often haphazard o “Kerckhoffs’ Principle” for protocols? o Would it help?  Protocols will continue to be a source of subtle problem

19 Conclusion 18 Crystal Ball  Software is a huge security problem today o Buffer overflows are on the decline… o …but race condition attacks might increase  Virus writers are getting smarter o Botnets o Polymorphic, metamorphic, sophisticated attacks, … o Future of malware detection?  Malware will continue to be a BIG problem

20 Conclusion 19 Crystal Ball  Other software issues o Reverse engineering will not go away o Secure development will remain hard o Open source is not a panacea  OS issues o NGSCB (or similar) might change things… o …but, for better or for worse?

21 Conclusion 20 The Bottom Line  Security knowledge is needed today…  …and it will be needed in the future  Necessary to understand technical issues o The focus of this class  But technical knowledge is not enough o Human nature, legal issues, business issues,... o As with anything, experience is helpful

22 Conclusion 21 A True Story  The names have been changed…  “Bob” took my information security class  Bob then got an intern position o At a major company that does lots of security  One meeting, an important customer asked o “Why do we need signed certificates?” o “After all, they cost money!”  The silence was deafening

23 Conclusion 22 A True Story  Bob’s boss remembered that Bob had taken a security class o So he asked Bob, the lowly intern, to answer o Bob mentioned man-in-the-middle attack on SSL  Customer wanted to hear more o So, Bob explained MiM attack in some detail  The next day, “Bob the lowly intern” became “Bob the fulltime employee”


Download ppt "Conclusion 1 Conclusion Conclusion 2 Course Summary  Crypto o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis  Access."

Similar presentations


Ads by Google