@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Electronic mail security -- Pretty Good Privacy.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
@Yuan Xue Network Security Review and Beyond Network Security.
Electronic mail security. Outline Pretty good privacy S/MIME.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
1 Firewalls. 2 What is a firewall? Device that provides secure connectivity between networks (internal/external; varying levels of trust) Used to implement.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
Pretty Good Privacy (PGP) Security for Electronic .
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
SECURITY – Chapter 15 SECURITY – Chapter 15 ….for authentication and confidentiality PGP 1.Uses best algorithms as building blocks 2.General.
NETWORK SECURITY.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Security is one of the most widely used and regarded network services
Security Pretty Good Privacy (PGP)
Chapter 8 Network Security.
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Lecture 5: Transport layer (TLS / SSL) and Security ( PGP )
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Unit 8 Network Security.
Cryptography and Network Security
….for authentication and confidentiality PGP
Presentation transcript:

@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of licenses Alice Bob

@Yuan Xue Security Requirements Alice wants Authentication of Bob Confidentiality and integrity of the order information Prevention of order replay Bob wants Non-repudiation of the order Confidentiality and integrity of the licenses Integrity of the software Other Issues DoS (message lost) Attacks to the host Alice Bob

@Yuan Xue Security Mechanisms What do we need/how we get them? Authentication (of Bob)/Key distribution  Certificate  Public key  Public key  Secret session key Confidentiality (order/license)  Symmetric cipher encryption based on secret key  E.g. AES Message Integrity Protection (software)  Message authentication code based on secret key  E.g. HMAC-SHA1 Non-repudiation (order)  Digital signature Defense against replay attack  Usage of Timestamp

@Yuan Xue Questions Where these security functions should be implemented? Who should implement them? Application developer? (BatLab.com) Application service developer? (Apache/Mazilla) System developer? (Microsoft) Network service provider? (Sprint) Etc.. If it is not a single person’s job, what security protocols/services are available? How they are designed?

@Yuan Xue Network Design Network Stack/Layer Link Network (IP) Network (IP) Transport (TCP) Application (HTTP) Link Network (IP) Transport (TCP) Application (HTTP) Link Network (IP) Link … Internet network End host

@Yuan Xue Placement of Security Function What to encrypt/protect Message format Where the security function should be located? Network stack Link vs. End-to-end Where each layer is located and how it may get attacked Aspects to consider Message security (which fields in the packet are protected) Number of keys required Number of encryption/decryptions Transparency to users/end hosts

@Yuan Xue Link vs. End-to-End Encryption

@Yuan Xue Big Picture Application-specific solutions Web security End-host-based solutions Secure network-based applications  PGP, application layer solution  SSL, transportation layer solution Network-based solutions Secure network + support for application  IPsec  Internet Security  Wireless Security IEEE security Link Network Transport Application SSL Connection-oriented vs. connectionless IPSec WPA PGP BGP Web security

@Yuan Xue Our Goal Learn these important security protocols so that we can use them Learn how they are designed and use similar design in our system Many pitfalls exist in secure networking system design Home-brew security solutions usually have many weaknesses The correct usage of cryptography is crucial Following conventions is very important

@Yuan Xue CS 285 Network Security PGP Fall 2012 Yuan Xue

@Yuan Xue Pretty Good Privacy Overview Phil Zimmermann in 1991 Phil Zimmermann Open PGP  Open Standard followed by PGP, GnuPG PGP vs. GnuPG  PGP goes commercial in 1996  GnuPG is a free replacement for PGP Basics Build a general-purpose security application that is independent of OS Select the existing cryptographic algorithms as building blocks Operations Encryption Signature Key management More info:

@Yuan Xue Overview Key Generation public and privacy key pair/session keys Key Storage Key Distribution Import/export Fingerprint Web of Trust Security Operations Encryption Message Authentication Signature and Verification Start with

@Yuan Xue Operation -- Authentication ZIP SHA-1 DSS/RSA

@Yuan Xue Operation -- Encryption CAST-128/IDEA/3DES in CFB mode one-time session key ElGamal/RSA

@Yuan Xue Operation – Put two together

@Yuan Xue Details Compression Signature before compression  Convenience of future verification  Flexibility in compression algorithm/implementation choice Message encryption after compression  Less redundancy in plaintext strengthen cryptographic security Capability Usage of ASCII in Converting 8-bit binary code to ASCII characters Radix-64 conversion  3 octets of binary code (3*8 = 24 bits)  4 ASCII characters (4*8 = 32 bits) why?  33% expansion  compression offset

@Yuan Xue Keys Types Public and private key pair One-time session symmetric key Issues Key generation Key storage Key management (distribution)

@Yuan Xue Key Identifier A user may have multiple keys Need an ID Unique to user ID with very high probability Key ID of KU a = KU a mod 2 64

@Yuan Xue Key Generation Session Key Generation Generating unpredictable session keys E.g., 128-bit CAST key Two 64-bit blocks encrypted by a 128-bit key in CFB mode  two 64-bit ciphertext as the 128-bit session key Two 64-bit blocks from a 128-bit random stream based on keystroke input from the user Previous session key and the random stream forms the 128-bit key input 64-bit block CAST-128 in CFB mode 64-bit block User input Previous Session key + Key input New session key

@Yuan Xue PGP Message Format Plaintext copy of the first two octets. -Enable the recipient to determine if the correct public key was used to decrypt the message digest -Error detection for the message Time the signature is made Time the message is made keys are needed for the recipient to identify the keys to -decrypt the key (KU b ) -Verify the signature(KU a )

@Yuan Xue Key Storage Pubic and Private Key Ring Secure the private key with passphrase Passphrase  hash code via SHA-1 Encrypt the private key via CAST-128/IDEA/3DES with the hash code as the key Store the encrypted private key

@Yuan Xue Put Things Together

@Yuan Xue Key management Direct Verification Physical delivery Fingerprint Trusted Third Party Signed certificate of a key Web of Trust A self-organized trust management mechanism Revoke Public Key Key revocation certificate

@Yuan Xue Web of Trust 1.Directly signed by you A,B,…,F (first tier) 2.By the ones you trust to sign (D, E, F, L) L,M,N, O (2nd tier), P, Q (3 rd tier) 3.By getting enough signatures from partially trusted parties (A,B) H