ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Lecture 10: Mediated Authentication
Chapter 10 Real world security protocols
Chapter 14 – Authentication Applications
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
ECE454/CS594 Computer and Network Security
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
COS 461 Fall 1997 Todays Lecture u intro to security in networking –confidentiality –integrity –authentication –authorization u orientation for assignment.
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 Digital Signatures Authentication.
L8. Reviews Rocky K. C. Chang, May Foci of this course 2 Rocky K. C. Chang  Understand the 3 fundamental cryptographic functions and how they are.
CSC 474 Information Systems Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Security & Authentication (continued) CS-4513 D-term Security and Authentication (continued) CS-4513 Distributed Computing Systems (Slides include.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Security and Authentication CS-4513, D-Term Security and Authentication (continued) CS-4513 D-Term 2007 (Slides include materials from Operating.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Strong Password Protocols
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 2. Network Security Protocols
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Lecture 11: Strong Passwords
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Digital Signatures, Message Digest and Authentication Week-9.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
1 Example security systems n Kerberos n Secure shell.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Security Handshake Pitfalls. Client Server Hello (K)
Reviews Rocky K. C. Chang 20 April 2007.
Computer Communication & Networks
CS480 Cryptography and Information Security
Tutorial on Creating Certificates SSH Kerberos
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
AIT 682: Network and Systems Security
Presentation transcript:

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall

Security Handshake Pitfalls Login only Mutual authentication Integrity/encryption after authentication Nonce types Picking random numbers 2

Security Protocol An agreement between communication parties about the process and the format of security bootstrap, authentication, key establishment, encryption/hashing algorithm and parameter negotiation, etc. Typically include: - Authentication handshake - Session key negotiation, algorithm/parameter negotiation - Data encryption and/or integrity protection 3

Security Bootstrap Shared secret: Password (for human users) Pre-shared key (between firewalls) Ticket by KDC (among a large number of participates) Public key: Manually configured Certificate by CA 4

Login Only: A Bad Idea Alice sends name and password in clear (across network) to Bob Bob verifies name and password and communication proceeds 5

Login Only: A Better Idea Using Shared Secret (1) f(K,R) can be K{R} or h(K,R) Authentication is one way: impersonation of Bob, offline password guessing, database reading How to encrypt subsequent conversation? 6

Login Only: A Better Idea Using Shared Secret (2) Problems: same as the previous one Requires reversible cryptography (hash will not work) If R is a recognizable number, this protocol does mutual authentication Can make R recognizable but with limited lifetime, e.g., timestamp. It however requires clock synchronization 7

Login Only: A Better Idea Using Shared Secret (3) Advantages: It can be easily added to an existing protocol More efficient: it saves two message exchanges Bob is stateless Problems: Replay attack (single server, multiple servers) Reset clock attack 8

Login Only: A Better Idea Using Shared Secret (4) Same as the previous one, but using a hash Why transmit timestamp in the clear? 9

Login Only: A Better Idea Using PKC (1) Implications: Compromise of Bob's database will not allow attacker to impersonate Alice Attacker may be able to trick Alice into signing anything 10

Login Only: A Better Idea Using PKC (2) Implications: Compromise of Bob's database will not allow attacker to impersonate Alice Attacker may be able to trick Alice into decrypting anything 11

Mutual Authentication (1) Problem: inefficient 12

Mutual Authentication (2) – Optimized Implications: More efficient Subject to reflection attack: easy to obtain chosen plaintext 13

Reflection Attack Trudy opens 1st session to Bob Trudy opens 2nd session to Bob in order to get information needed to complete 1st session 14

Reflection Attack (Cont’d) Solution: Alice and Bob should not do exactly the same thing: different keys, different challenges Different keys: have Bob encrypt with K Alice-Bob and Alice encrypt with K Alice-Bob +1, etc. Different challenges: initiator (Alice) sends odd R, responder (Bob) sends even R, etc. 15

Mutual Authentication (3) – Less Optimized Implications: One "extra" message and Trudy cannot obtain chosen plaintext Rule: the initiator should be the first to prove its identity (the assumption is that the initiator is more likely the bad guy) 16

Mutual Authentication (4) Implications: How to obtain public keys? Store Bob’s public key encrypted with Alice’s password Store Bob’s public key certificate signed by Alice 17

Mutual Authentication (5) Implications: Can be easily added to existing challenge/response protocols Alice and Bob must encrypt different things Clock synchronization: time is now security-critical Reflection attack 18

Integrity/Encryption After Authentication How to establish a session key during authentication? By shared secret By two-way public key By one-way public key 19

Shared Secret After this authentication: Can we use K{R+1} as the shared session key? How about K XOR R, K{K+R}, K+K{R}, h{K|R}? In general, a good session key is different for each session unguessable by attacker 20

Two Way Public Key Alice and Bob each has a public/private key pair How about Alice picks a random R, and sends {R} Bob to Bob - Trudy can impersonate Alice How about Alice sends [{R} Bob ] Alice to Bob - Trudy can obtain R by overrunning Bob and decrypt old messages Alice sends Bob [{R 1 } Bob ] Alice, Bob sends Alice [{R 2 } Bob ] Alice, and the session key is R = R 1 XOR R 2 - Trudy needs to overrun both Alice and Bob Diffie-Hellman key establishment: Alice sends Bob [g R1 mod p] Alice, Bob sends Alice [g R2 mod p] Bob, and the session key is R = g R1R2 mod p - Doesn’t help even if Trudy overruns both Alice and Bob 21

One Way Public Key Only Server Bob has a public/private key pair, Client Alice won’t bother having keys and certificate: SSL Alice picks a random R, and sends {R} Bob to Bob - Trudy can decrypt old messages by overrunning Bob Diffie-Hellman key establishment: Alice sends Bob g R1 mod p, Bob sends Alice [g R2 mod p] Bob, and the session key is R = g R1R2 mod p Trudy can impersonate Alice in either case 22

Nonce Types Nonce: a quantity used only once - Large random number: unguessable, unpredictable, non-reuse w.h.p., makes the best nonce - Timestamp: requires clock synchronization - Sequence number: needs to maintain state 23 unpredictability is important unpredictability is not required

Picking Random Numbers Different applications require different types of random numbers A common approach for cryptographic operations: pseudorandom number generator - seed value is critical - common mistakes: seed is from a small space, hashing the current time when a random value is needed, divulging the seed value 24

Authentication Protocol Checklist Authentication protocols protect against eavesdropping impersonation database reading message modification combinations of the above 25

Reading Assignment 26 [Kaufman] Chapter 11