Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Lecture 23 Internet Authentication Applications
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapter 5 Network Security Protocols in Practice Part I
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Introduction to Cryptography
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Guide to Network Defense and Countermeasures Second Edition
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
PUBLIC KEY INFRASTRUTURE Don Sheehy
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Lecture 22 Internet Security Protocols and Standards
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Module 9: Fundamentals of Securing Network Communication.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Security fundamentals Topic 5 Using a Public Key Infrastructure.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Understand Internet Security LESSON Security Fundamentals.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Chapter 12 Advanced Cryptography
Security+ Guide to Network Security Fundamentals, Fifth Edition
Chapter 5 Network Security Protocols in Practice Part I
Virtual Private Networks
IS3230 Access Security Unit 9 PKI and Encryption
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Networks (VPN)
Presentation transcript:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition Objectives Define digital certificates List the various types of digital certificates and how they are used Describe the components of Public Key Infrastructure (PKI) List the tasks associated with key management Describe the different cryptographic transport protocols 2

Security+ Guide to Network Security Fundamentals, Third Edition Digital Certificates Using digital certificates involves: –Understanding their purpose –Knowing how they are authorized, stored, and revoked –Determining which type of digital certificate is appropriate for different situations 3

Security+ Guide to Network Security Fundamentals, Third Edition Defining Digital Certificates Digital certificate –Can be used to associate or “bind” a user’s identity to a public key –The user’s public key that has itself been “digitally signed” by a reputable source entrusted to sign it Digital certificates make it possible for Alice to verify Bob’s claim that the key belongs to him When Bob sends a message to Alice he does not ask her to retrieve his public key from a central site –Instead, Bob attaches the digital certificate to the message 4

Security+ Guide to Network Security Fundamentals, Third Edition5

Defining Digital Certificates (continued) A digital certificate typically contains the following information: –Owner’s name or alias –Owner’s public key –Name of the issuer –Digital signature of the issuer –Serial number of the digital certificate –Expiration date of the public key 6

Security+ Guide to Network Security Fundamentals, Third Edition Authorizing, Storing, and Revoking Digital Certificates Certificate Authority (CA) –An entity that issues digital certificates for others –A user provides information to a CA that verifies her identity –The user generates public and private keys and sends the public key to the CA –The CA inserts this public key into the certificate Registration Authority (RA) –Handles some CA tasks such as processing certificate requests and authenticating users 7

Security+ Guide to Network Security Fundamentals, Third Edition Authorizing, Storing, and Revoking Digital Certificates (continued) Certificate Revocation List (CRL) –Lists revoked certificates –Can be accessed to check the certificate status of other users –Most CRLs can either be viewed or downloaded directly into the user’s Web browser Certificate Repository (CR) –A publicly accessible directory that contains the certificates and CRLs published by a CA –CRs are often available to all users through a Web browser interface 8

Security+ Guide to Network Security Fundamentals, Third Edition9

Authorizing, Storing, and Revoking Digital Certificates (continued) 10

Security+ Guide to Network Security Fundamentals, Third Edition Types of Digital Certificates Digital certificates can also be used to: –Encrypt channels to provide secure communication –Encrypt messages for secure Internet communication –Verify the identity of clients and servers on the Web –Verify the source and integrity of signed executable code Categories of digital certificates –Personal digital certificates –Server digital certificates –Software publisher digital certificates 11

Security+ Guide to Network Security Fundamentals, Third Edition12

Security+ Guide to Network Security Fundamentals, Third Edition Types of Digital Certificates (continued) Single-sided certificate –When Bob sends one digital certificate to Alice along with his message Dual-sided certificates –Certificates in which the functionality is split between two certificates Signing certificate Encryption certificate 13

Security+ Guide to Network Security Fundamentals, Third Edition Types of Digital Certificates (continued) Dual-sided certificate advantages: –Reduce the need for storing multiple copies of the signing certificate –Facilitate certificate handling in organizations X.509 Digital Certificates –The most widely accepted format for digital certificates 14

Security+ Guide to Network Security Fundamentals, Third Edition15 Types of Digital Certificates (continued)

Security+ Guide to Network Security Fundamentals, Third Edition16

Security+ Guide to Network Security Fundamentals, Third Edition17

Security+ Guide to Network Security Fundamentals, Third Edition Public Key Infrastructure (PKI) Public key infrastructure involves public-key cryptography standards, trust models, and key management 18

Security+ Guide to Network Security Fundamentals, Third Edition What Is Public Key Infrastructure (PKI)? Public key infrastructure (PKI) –A framework for all of the entities involved in digital certificates to create, store, distribute, and revoke digital certificates Includes hardware, software, people, policies and procedures PKI is digital certificate management 19

Security+ Guide to Network Security Fundamentals, Third Edition Public-Key Cryptographic Standards (PKCS) Public-key cryptography standards (PKCS) –A numbered set of PKI standards that have been defined by the RSA Corporation –These standards are based on the RSA public-key algorithm 20

Security+ Guide to Network Security Fundamentals, Third Edition21

Security+ Guide to Network Security Fundamentals, Third Edition22

Security+ Guide to Network Security Fundamentals, Third Edition23

Security+ Guide to Network Security Fundamentals, Third Edition Trust Models Trust may be defined as confidence in or reliance on another person or entity Trust model –Refers to the type of trusting relationship that can exist between individuals or entities Direct trust –A relationship exists between two individuals because one person knows the other person Third party trust –Refers to a situation in which two individuals trust each other because each trusts a third party 24

Security+ Guide to Network Security Fundamentals, Third Edition Trust Models (continued) Direct trust is not feasible when dealing with multiple users who each have digital certificates Three PKI trust models that use a CA –Hierarchical trust model –Distributed trust model –Bridge trust model 25

Security+ Guide to Network Security Fundamentals, Third Edition26 Trust Models (continued)

Security+ Guide to Network Security Fundamentals, Third Edition27 Trust Models (continued)

Security+ Guide to Network Security Fundamentals, Third Edition28

Security+ Guide to Network Security Fundamentals, Third Edition Managing PKI Certificate policy (CP) –A published set of rules that govern the operation of a PKI –Provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components Certificate practice statement (CPS) –Describes in detail how the CA uses and manages certificates –A more technical document than a CP 29

Managing PKI (continued) Certificate life cycle –Creation –Suspension –Revocation –Expiration Security+ Guide to Network Security Fundamentals30

Security+ Guide to Network Security Fundamentals, Third Edition Key Management Proper key management includes key storage, key usage, and key handling procedures 31

Security+ Guide to Network Security Fundamentals, Third Edition Key Storage Public keys can be stored by embedding them within digital certificates –While private keys can be stored on the user’s local system The drawback to software-based storage is that it may leave keys open to attacks Storing keys in hardware is an alternative to software-based storage Private keys can be stored on smart cards or in tokens 32

Security+ Guide to Network Security Fundamentals, Third Edition Key Usage If more security is needed than a single set of public and private keys –Then multiple pairs of dual keys can be created One pair of keys may be used to encrypt information –The public key could be backed up to another location The second pair would be used only for digital signatures –The public key in that pair would never be backed up 33

Security+ Guide to Network Security Fundamentals, Third Edition Key Handling Procedures Procedures include: –Escrow –Expiration –Renewal –Revocation –Recovery Key recovery agent (KRA) M-of-N control –Suspension –Destruction 34

Security+ Guide to Network Security Fundamentals, Third Edition35

Security+ Guide to Network Security Fundamentals, Third Edition Cryptographic Transport Protocols Cryptographic transport protocols can be categorized by the applications that they are commonly used for: –File transfer, Web, VPN, and 36

Security+ Guide to Network Security Fundamentals, Third Edition File Transfer Protocols File Transfer Protocol (FTP) –Part of the TCP/IP suite –Used to connect to an FTP server Vulnerabilities –Usernames, passwords, and files being transferred are in cleartext –Files being transferred by FTP are vulnerable to man- in-the-middle attacks One of the ways to reduce the risk of attack is to use encrypted Secure FTP (SFTP) 37

Security+ Guide to Network Security Fundamentals, Third Edition File Transfer Protocols (continued) Secure Sockets Layer (SSL) –A protocol developed by Netscape for securely transmitting documents over the Internet –Uses a public key to encrypt data that is transferred over the SSL connection Transport Layer Security (TLS) –A protocol that guarantees privacy and data integrity between applications communicating over the Internet –An extension of SSL Are often referred to as SSL/TLS or TLS/SSL 38

Security+ Guide to Network Security Fundamentals, Third Edition File Transfer Protocols (continued) A second protocol that can be used with SFTP is Secure Shell (SSH) –Also called SFTP/SSH SSH –A UNIX-based command interface and protocol for securely accessing a remote computer –Suite of three utilities: slogin, scp, and ssh –Both the client and server ends of the connection are authenticated using a digital certificate Passwords are protected by being encrypted 39

Security+ Guide to Network Security Fundamentals, Third Edition40 File Transfer Protocols (continued)

Security+ Guide to Network Security Fundamentals, Third Edition Web Protocols Another use of SSL is to secure Web HTTP communications between a browser and a Web server Hypertext Transport Protocol over Secure Sockets Layer –“Plain” HTTP sent over SSL/TLS Secure Hypertext Transport Protocol –Allows clients and the server to negotiate independently encryption, authentication, and digital signature methods, in any combination, in both directions 41

Security+ Guide to Network Security Fundamentals, Third Edition VPN Protocols Point-to-Point Tunneling Protocol (PPTP) –Most widely deployed tunneling protocol –Allows IP traffic to be encrypted and then encapsulated in an IP header to be sent across a public IP network such as the Internet –Based on the Point-to-Point Protocol (PPP) Point-to-Point Protocol over Ethernet (PPPoE) –Another variation of PPP that is used by broadband Internet providers with DSL or cable modem connections 42

Security+ Guide to Network Security Fundamentals, Third Edition43 VPN Protocols (continued)

Security+ Guide to Network Security Fundamentals, Third Edition VPN Protocols (continued) Layer 2 Tunneling Protocol (L2TP) –Merges the features of PPTP with Cisco’s Layer 2 Forwarding Protocol (L2F) –L2TP is not limited to working with TCP/IP-based networks, but supports a wide array of protocols –An industry-standard tunneling protocol that allows IP traffic to be encrypted And then transmitted over any medium that supports point-to-point delivery 44

Security+ Guide to Network Security Fundamentals, Third Edition VPN Protocols (continued) IP Security (IPsec) –A set of protocols developed to support the secure exchange of packets Because it operates at a low level in the OSI model –IPsec is considered to be a transparent security protocol for applications, users, and software IPsec provides three areas of protection: –Authentication, confidentiality, and key management 45

Security+ Guide to Network Security Fundamentals, Third Edition46

Security+ Guide to Network Security Fundamentals, Third Edition VPN Protocols (continued) IPsec supports two encryption modes: –Transport mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted –Tunnel mode encrypts both the header and the data portion Both AH and ESP can be used with transport or tunnel mode –Creating four possible transport mechanisms 47

Security+ Guide to Network Security Fundamentals, Third Edition48

Security+ Guide to Network Security Fundamentals, Third Edition49

Security+ Guide to Network Security Fundamentals, Third Edition50 VPN Protocols (continued)

Security+ Guide to Network Security Fundamentals, Third Edition Transport Protocol S/MIME (Secure/Multipurpose Internet Mail Extensions) –One of the most common transport protocols –Uses digital certificates to protect the messages S/MIME functionality is built into the vast majority of modern software and interoperates between them 51

Security+ Guide to Network Security Fundamentals, Third Edition Summary Digital certificates can be used to associate a user’s identity to a public key An entity that issues digital certificates for others is known as a Certificate Authority (CA) Types of certificates –Personal, server, and software publisher certificates PKI is digital certificate management One of the principal foundations of PKI is that of trust 52

Security+ Guide to Network Security Fundamentals, Third Edition Summary (continued) An organization that uses multiple digital certificates on a regular basis needs to properly manage those digital certificates One cryptographic transport protocol for FTP is Secure Sockets Layer (SSL) A secure version for Web communications is HTTP sent over SSL/TLS and is called HTTPS (Hypertext Transport Protocol over Secure Sockets Layer) There are several “tunneling” protocols (when a packet is enclosed within another packet) that can be used for VPN transmissions 53