18-1 Last time Internet Application Security and Privacy  Transport-layer security and privacy: TLS / SSL, Tor The Nymity Slider  Application-layer security.

Slides:



Advertisements
Similar presentations
Oct 28, 2004WPES Off-the-Record Communication, or, Why Not to Use PGP Nikita Borisov Ian Goldberg Eric Brewer.
Advertisements

Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Off-the-Record Communication, or, Why Not To Use PGP
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
PGP Overview 2004/11/30 Information-Center meeting peterkim.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Class on Security Raghu. Current state of Security Cracks appear all the time Band Aid solutions Applications are not designed properly OS designs are.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security Jonathan Calazan December 12, 2005.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
1 Lecture 18: Security issues specific to security key management services –privacy –integrity/authentication –nonrepudiation/plausible deniability.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Privacy and Anonymity CS432 - Security in Computing Copyright © 2005, 2006 by Scott Orr and the Trustees of Indiana University.
25-1 Last time □ Firewalls □ Attacks and countermeasures □ Security in many layers ♦ PGP ♦ SSL ♦ IPSec.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Masud Hasan Secue VS Hushmail Project 2.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Linux Networking and Security Chapter 8 Making Data Secure.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Pertemuan-13 Enkripsi and Authentication. Symmetric-key Cryptography  Data encrypted and decrypted with same key  Classical examples: Caesar cipher,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
Private key
A PC Wakes Up A STORY BY VICTOR NORMAN. Once upon a time…  a PC (we’ll call him “H”) is connected to a network and turned on. Aside: The network looks.
Lecture 5 Page 1 Advanced Network Security Review of Cryptography: Cryptographic Keys Advanced Network Security Peter Reiher August, 2014.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
17- 1 Last time ● Internet Application Security and Privacy ● Link-layer security: WEP, WPA, WPA2 ● Network-layer security: VPN, IPSec.
25-1 Last time □ Firewalls □ Attacks and countermeasures □ Security in many layers ♦ PGP ♦ SSL ♦ IPSec.
Key management issues in PGP
KERBEROS.
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

18-1 Last time Internet Application Security and Privacy  Transport-layer security and privacy: TLS / SSL, Tor The Nymity Slider  Application-layer security and privacy: ssh

18-2 This time Internet Application Security and Privacy  Application-layer security and privacy: r ers, PGP/gpg, OTR

Anonymity for r ers Tor allows you to anonymously communicate over the Internet in real time What about (non-interactive) ? This is actually an easier problem, and was implemented much earlier than Tor Anonymous r ers allow you to send without revealing your own address Of course, it's hard to have a conversation that way Pseudonymity is useful in the context of Nymity Slider

Type 0 r ers In the 1990s, there were very simple (“type 0”) r ing services, the best known being anon.penet.fi How it worked: Send to anon.penet.fi It is forwarded to your intended recipient Your “From” address is changed to (but your original address is stored in a table)‏ Replies to the anon address get mapped back to your real address and delivered to you

anon.penet.fi This works, as long as: No one's watching the net connections to or from anon.penet.fi The operator of anon.penet.fi and the machine itself remain trustworthy and uncompromised The mapping of anon addresses to real addresses is kept secret Unfortunately, a lawsuit forced Julf (the operator) to turn over parts of the list, and he shut down the whole thing, since he could no longer legally protect it

Type I r ers Cypherpunk (type I) r ers removed the central point of trust Messages are now sent through a “chain” of several r ers, with dozens to choose from Each step in the chain is encrypted to avoid observers following the messages through the chain; r ers also delay and reorder messages Support for pseudonymity is dropped: no replies!

Type II r ers Mixmaster (type II) r ers appeared in the late 1990s Constant-length messages to avoid an observer watching “that big file” travel through the network Protections against replay attacks Improved message reordering But! Requires a special client to construct the message fragments pr (a drop-in wrapper for sendmail) makes it easy

Nym servers Recovering pseudonymity: “nym servers” mapped pseudonyms to “reply blocks” that contained a nested encrypted chain of type I r ers. Attaching your message to the end of one of these reply blocks would cause it to be sent through the chain, eventually being delivered to the nym owner But remember that there were significant privacy issues with the type I r er system Easier recipient anonymity: alt.anonymous.messages

Type III r ers Type II r ers were the state of the art until recently Mixminion (type III) r er Native (and much improved) support for pseudonymity No longer reliant on type I reply blocks Improved protection against replay and key compromise attacks But it's not very well deployed or mature “You shouldn't trust Mixminion with your anonymity yet”

18-10 Pretty Good Privacy The first popular implementation of public-key cryptography. Originally made by Phil Zimmerman in 1991  He got in a lot of trouble for it, since cryptography was highly controlled at the time.  But that's a whole 'nother story. :-)‏ Today, there are many (more-or-less) compatible programs  GNU Privacy Guard (gpg), Hushmail, etc.

18-11 Pretty Good Privacy What does it do?  Its primary use is to protect the contents of messages How does it work?  Uses public-key cryptography to provide: Encryption of messages Digital signatures on messages

18-12 Recall In order to use public-key encryption and digital signatures, Alice and Bob must each have:  A public encryption key  A private decryption key  A private signature key  A public verification key

18-13 Sending a message To send a message to Bob, Alice will:  Write a message  Sign it with her own signature key  Encrypt both the message and the signature with Bob's public encryption key Bob receives this, and:  Decrypts it using his private decryption key to yield the message and the signature  Uses Alice's verification key to check the signature

18-14 Back to PGP PGP's main functions:  Create these four kinds of keys encryption, decryption, signature, verification  Encrypt messages using someone else's encryption key  Decrypt messages using your own decryption key  Sign messages using your own signature key  Verify signatures using someone else's verification key  Sign other people's keys using your own signature key

18-15 Obtaining keys Earlier, we said that Alice needs to get a copy of Bob's public key in order to send him an encrypted message. How does she do this?  In a secure way? Bob could put a copy of his public key on his webpage, but this isn't good enough to be really secure!  Why?

18-16 Verifying public keys If Alice knows Bob personally, she could:  Download the key from Bob's web page  Phone up Bob, and verify she's got the right key  Problem: keys are big and unwieldy! mQGiBDi5qEURBADitpDzvvzW+9lj/zYgK78G3D76hvvvIT6gpTIlwg6WIJNLKJat 01yNpMIYNvpwi7EUd/lSNl6t1/A022p7s7bDbE4T5NJda0IOAgWeOZ/plIJC4+o2 tD2RNuSkwDQcxzm8KUNZOJla4LvgRkm/oUubxyeY5omus7hcfNrBOwjC1wCg4Jnt m7s3eNfMu72Cv+6FzBgFog8EANirkNdC1Q8oSMDihWj1ogiWbBz4s6HMxzAaqNf/ rCJ9qoK5SLFeoB/r5ksRWty9QKV4VdhhCIy1U2B9tSTlEPYXJHQPZ3mwCxUnJpGD 8UgFM5uKXaEq2pwpArTm367k0tTpMQgXAN2HwiZv//ahQXH4ov30kBBVL5VFxMUL UJ+yA/4r5HLTpP2SbbqtPWdeW7uDwhe2dTqffAGuf0kuCpHwCTAHr83ivXzT/7OM

18-17 Fingerprints Luckily, there's a better way! A fingerprint is a cryptographic hash of a key. This, of course, is much shorter:  B DFF9 83C3 042B C699 EB5A 896A BF5 Remember: there's no (known) way to make two different keys that have the same fingerprint.

18-18 Fingerprints So now we can try this:  Alice downloads Bob's key from his webpage  Alice's software calculates the fingerprint  Alice phones up Bob, and asks him to read his key's actual fingerprint to her  If they match, Alice knows she's got an authentic copy of Bob's key That's great for Alice, but what about Carol, who doesn't know Bob  At least not well enough to phone him

18-19 Signing keys Once Alice has verified Bob's key, she uses her signature key to sign Bob's key. This is effectively the same as Alice signing a message which says “I have verified that the key with fingerprint B DFF9 83C3 042B C699 EB5A 896A BF5 really belongs to Bob.” Bob can attach Alice's signature to the key on his webpage.

18-20 Web of Trust Now Alice can act as an introducer for Bob. If Carol doesn't know Bob, but does know Alice (and has already verified Alice's key, and trusts her to introduce other people):  she downloads Bob's key from his website  she sees Alice's signature on it  she is able to use Bob's key without having to check with Bob personally This is called the Web of Trust, and the PGP software handles it mostly automatically.

18-21 So, great! So if Alice and Bob want to have a private conversation by  They each create their sets of keys  They exchange public encryption keys and verification keys  They send signed and encrypted messages back and forth Pretty Good, no?

18-22 Plot Twist Bob's computer is stolen by “bad guys”  Criminals  Competitors  Subpoenaed by the RCMP Or just broken into  Virus, trojan, spyware All of Bob's key material is discovered  Oh, no!

18-23 The Bad Guys Can... Decrypt past messages Learn their content Learn that Alice sent them And have a mathematical proof they can show to anyone else! How private is that?

18-24 What went wrong? Bob's computer got stolen? How many of you have never...  Left your laptop unattended?  Not installed the latest patches?  Run software with a remotely exploitable bug? What about your friends?

18-25 What Really Went Wrong PGP creates lots of incriminating records:  Key material that decrypts data sent over the public Internet  Signatures with proofs of who said what Alice had better watch what she says!  Her privacy depends on Bob's actions

18-26 Casual Conversations Alice and Bob talk in a room No one else can hear  Unless being recorded No one else knows what they say  Unless Alice or Bob tells them No one can prove what was said  Not even Alice or Bob These conversations are “off-the-record”

18-27 We Like Off-the-Record Conversations Legal support for having them  Illegal to record conversations without notification We can have them over the phone  Illegal to tap phone lines But what about over the Internet?

18-28 Crypto Tools We have the tools to do this  We've just been using the wrong ones  (when we've been using crypto at all) We want perfect forward secrecy We want deniable authentication

18-29 Perfect Forward Secrecy Future key compromises should not reveal past communication Use a short-lived encryption key Discard it after use  Securely erase it from memory Use long-term keys to help distribute and authenticate the short-lived key Q: Why do these new long-term keys not have the very same forward secrecy problem?

18-30 Recap Internet Application Security and Privacy  Application-layer security and privacy: r ers, PGP/gpg, OTR

18-31 Next time Finish OTR Database Security  Introduction to Databases  Security Requirements  Integrity  Auditability, Access Control, and Availability  Data Inference  Statistical Inference  Controls against Inference