CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Cryptography and Network Security Chapter 16
Web security: SSL and TLS
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Lecture 6: Web security: SSL
Cryptography and Network Security
Secure Socket Layer.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 22: Internet Security Protocols and.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 22 Internet Security Protocols and Standards
Cryptography and Network Security Chapter 17
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Chapter 8 Web Security.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
IP Security: Security Across the Protocol Stack
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Cryptography and Network Security (SSL)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Chapter 22 Internet Security Protocols and Standards.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Certificates, SSL, and One time passwords Fall 2010 David Brumley.
IP Securty 1. Overview 2. Architecture 3. Authentication Header 4. Encapsulating Security Payload 5. Combining security Associations 6. Internet Key Exchange.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats – integrity – confidentiality.
Gold Coast Campus School of Information Technology 2003/16216/3112INT Network Security 1Copyright © Griffith University, INT / 3112INT Network.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
Cryptography CSS 329 Lecture 13:SSL.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Computer and Network Security
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
Cryptography and Network Security
UNIT.4 IP Security.
CSCE 715: Network Systems Security
BINF 711 Amr El Mougy Sherif Ismail
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
Public-Key Cryptography
Cryptography and Network Security
Cryptography and Network Security Chapter 16
Cryptography and Network Security
SSL (Secure Socket Layer)
Cryptography and Network Security Chapter 16
Cryptography and Network Security
Cryptography and Network Security
Presentation transcript:

CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi

Lecture (9) Internet Security

Internet Security Protocols and Standards  Secure Sockets Layer (SSL) / Transport Layer Security (TLS)  IPv4 and IPv6 Security

Secure Sockets Layer (SSL)  Transport layer security service originally developed by Netscape version 3 designed with public input  Subsequently became Internet standard RFC2246: Transport Layer Security (TLS)  Use TCP to provide a reliable end-to-end service  May be provided in underlying protocol suite  Or embedded in specific packages

SSL Protocol Stack

SSL Record Protocol Services  Message integrity using a MAC with shared secret key  Confidentiality using symmetric encryption with a shared secret key defined by Handshake Protocol AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128 message is compressed before encryption

SSL Record Protocol Operation

Change Cipher Spec Protocol  One of 3 SSL specific protocols which use the SSL Record protocol  A single message  Causes pending state to become current  Hence updating the cipher suite in use

SSL Alert Protocol  Conveys SSL-related alerts to peer entity  Severity warning or fatal  Specific alert fatal: unexpected message, bad record mac, decompression failure, handshake failure, illegal parameter warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown  Compressed & encrypted like all SSL data

SSL Handshake Protocol  Allows server & client to: authenticate each other to negotiate encryption & MAC algorithms to negotiate cryptographic keys to be used  Comprises a series of messages in phases 1.Establish Security Capabilities 2.Server Authentication and Key Exchange 3.Client Authentication and Key Exchange 4.Finish

SSL Handshake Protocol

IP Security  Various application security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS  Security concerns cross protocol layers  Hence would like security implemented by the network for all applications  Authentication & encryption security features included in next-generation IPv6  Also usable in existing IPv4

IPSec  General IP Security mechanisms  Provides authentication confidentiality key management  Applicable to use over LANs, across public & private WANs, & for the Internet

IPSec Uses

IP Security Architecture  Mandatory in IPv6, optional in IPv4  Have two security header extensions: Authentication Header (AH) Encapsulating Security Payload (ESP) Key Exchange function  VPNs want both authentication/encryption hence usually use ESP  Specification is quite complex numerous RFC’s 2401/2402/2406/2408

IP Security Associations  A one-way relationship between sender & receiver that affords security for traffic flow  Defined by 3 parameters: Security Parameters Index (SPI) IP Destination Address Security Protocol Identifier  Has a number of other parameters seq no, AH & EH info, lifetime etc.  Have a database of Security Associations

Authentication Header (AH)  Provides support for data integrity & authentication of IP packets end system/router can authenticate user/app prevents address spoofing attacks by tracking sequence numbers  Based on use of a MAC  Parties must share a secret key

Authentication Header (AH)

Encapsulating Security Payload (ESP)

Whatsapp End-to-End Encryption Link encryption: data is visible to the server End-to-end encryption: data is encrypted in the server

Whatsapp End-to-End Encryption  New encryption system supports regular and group chats, images, videos, voice messages, files, and voice calls  At the center of this system is the new “Signal Protocol” developed by Open Whisper Systems  Even if a user’s key is physically compromised from a device, an attacker cannot decrypt previously encrypted messages

The Signal Protocol: Keys  Each user has three types of public keys: Long-term identity key generated at installation Medium-term key generated at installation and rotated periodically. The medium-term key is signed by the identity key One-time key: generated as needed  In addition, there are three types of session keys: Root key: 32-byte value used to create chain keys Chain key: 32-byte value used to create message keys Message key: 80-byte value used to encrypt messages. Out of these 80 bytes, 32 are used for AES 256, another 32 are used for HMAC-SHA256, and 16 bytes IV

The Signal Protocol: Operation  At registration time, the client sends the public identity key, public medium-term key (signed by the private identity key), and a set of one-time keys  The private keys are never sent  To chat with someone you need to establish a session (any open whatsapp chat is a session)  A session does not need to be re-established unless the app is re-installed

The Signal Protocol: Operation  To establish a session, the initiator requests the public keys of the recipient from the server (identity key, signed medium term key, and one of the stored one- time keys)  Once the server returns those keys, the initiator generates a new key and uses its own identity key in addition to the recipient’s public keys to calculate a master secret.  The master secret is then used to create a root key and a chain key (using an algorithm similar to Diffie Hellman)

The Signal Protocol: Operation  Now, the initiator can start sending messages to the recipient, even if he/she is offline  To establish the session at the receiving end, the initiator inserts all values necessary for the receiver to calculate the root and chain keys in the header of all messages  The receiver uses this information together with its own private keys to calculate the master secret  The master secret is used as input to the key-derivation function to calculate the root and chain keys

The Signal Protocol: Operation  Each message is encrypted with a message key that includes AES256 encryption and HMAC-SHA256 for integrity and authentication  Each time a new message needs to be sent, a new message key is derived from the chain key  The message key cannot be derived from the message  The chain key is also rotated every time a message is sent

The Signal Protocol: Special Functions  To transmit media, the sender first saves it in an encrypted cloud store  The sender then sends an encrypted pointer to the receiver to download the media  Group messages in whatsapp are disseminated using server-side fan out (message is copied N times)  Pairwise sessions are created between all members of the group  Each of these session has a different chain key used to create message keys  Thus, the sender encrypts the message N times (one for each member) and the server sends them  Calls are established using encrypted RTP