RRSIG:“I certify that this DNS record set is correct” Problem: how to certify a negative response, i.e. that a record doesn’t exist? NSEC:“I certify that.

Slides:



Advertisements
Similar presentations
DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
Advertisements

Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
CSC 774 Advanced Network Security
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security
Digital Signatures and Hash Functions. Digital Signatures.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Attacks on Digital Signature Algorithm: RSA
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Introduction to Modern Cryptography Homework assignments.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Algorithms 4/17/2017 M. Chatterjee.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Bob can sign a message using a digital signature generation algorithm
The RSA Algorithm Rocky K. C. Chang, March
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Public-Key Encryption
1 Public-Key Cryptography and Message Authentication.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Security in DNS(DNSSEC) Yalda Edalat Pramodh Pallapothu.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
DIGITAL SIGNATURE IMPLEMENTATION
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
Breaking Cryptosystems Joshua Langford University of Texas at Tyler Fall 2007 Advisor: Dr. Ramona Ranalli Alger.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptographic Hash Function
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 9 Security 9.1 The security environment
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
One Time Signature.
Introduction to Cryptography
Presentation transcript:

RRSIG:“I certify that this DNS record set is correct” Problem: how to certify a negative response, i.e. that a record doesn’t exist? NSEC:“I certify that there are no DNS records (of type X) whose record name lies between A and B ” Problem: NSEC records enable zones to be enumerated NSEC3: “I certify that there are no DNS records (of type X) whose record name hash lies between A’ and B’ ”

Authoritative Server New record R Compute hash of R (call this R’) Insert into pre- sorted list of record name hashes (say Q’, R’, S’) Sign new NSEC3 records for intervals (Q’, R’) and (R’, S’) Delete old NSEC3 record for interval (Q’, S’) Authoritative Server Query Q received, no match found Compute hash of Q (call this Q’) Find range (R’, S’) containing Q’ in sorted list of pre- computed NSEC3 records Return NSEC3 for (R’, S’) Validating Server Query record Q, receive negative response + NSEC3 for interval (R’, S’) Compute hash of Q (call this Q’ ) Verify Q’ lies in interval (R’, S’) Verify authenticity of (R’, S’) in usual way— signature checks, etc Attacker Make random queries to build a database of NSEC3 records Brute-force search for records whose hashes match the endpoints in the NSEC3 Search space for DNS is typically small

A cryptographic (one-way) hash is used, so record names cannot be computed directly from hashes. This hash is iterated to increase the computational load for an attacker. However (from RFC5155): More iterations result in greater resiliency of the hash value against dictionary attacks, but at a higher computational cost for both the server and resolver…[it] affects the zone owner's cost of signing and serving the zone as well as the validator's cost of verifying responses…a high number of iterations also introduces an additional denial-of-service opportunity against servers Current mitigation: Iterations are limited by RFC5155 to have similar computational cost of verifying the signature on the NSEC3 RR (e.g. max 500 SHA1 iterations for a 2048-bit RSA signature) This presentation proposes an alternative approach (patent pending)

Set up Pick 2 large primes, p and q Compute N = pq Pick public key e Compute private key d such that ed =1 mod (p-1)(q-1) Encrypt: message M, cryptogram C = M e mod N Decrypt: cryptogram C, message M = C d mod N Sign: message (hash) H, signature S = H d mod N Verify: signature S, message hash H = S e mod N

Fixed effort for private key holder, arbitrarily large effort for public key holders Set up Pick p, q, N as per RSA algorithm Choose iterations t Compute private key d = 2 t mod (p-1)(q-1) Task: Compute H 2 t mod N for given input H Public key holders require t mod-N squarings of H (time proportional to t) Private key holders have short-cut: H 2 t mod N = H d mod N (fixed time)

Create a hash based on a time-lock puzzle: Public hash parameters t, N; private parameters p, q, d Hash input M Compute conventional hash H of M Compute H’ = H 2 t mod N (or H’ = H d mod N if you have the private key) Truncate H’ to desired length (or apply conventional hash again)

Set up: Choose hash parameters p, q, t Compute N and d Publish N and t (e.g. as a new variant of a DNSKEY record) Use private key d to compute H’ when creating NSEC3 records No increase in effort over today’s NSEC3 records (based on iterated hash equivalent to verifying an RSA signature) No increase in NSEC3 record size Attacker’s task can be made arbitrarily difficult by increasing the value of t

Problem: Increasing t also increases computational burden on validating servers Possible solutions: Restrict t. We still have a potential gain for the authoritative server Rate-limit NSEC3 validations Off-load hash computation to the Client Requires additional logic in ‘stub’ resolver, but not necessarily full DNSSEC validation Could be done selectively as part of a rate-limiting scheme