CSE 30264 Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 23 – April 6, 2010.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
7: Network Security1 Chapter 7: Network security Foundations: r what is security? r cryptography r authentication r message integrity Security in practice:
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
7: Network Security1 Chapter 7: Network security – Author? Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
CSE401n:Computer Networks
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
CSCI 6962: Server-side Design and Programming
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network Security7-1 Today r Collect Ch6 HW r Assign Ch7 HW m Ch7 #2,3,4,5,7,9,10,12 m Due Wednesday Nov 19 r Continue with Chapter 7 (Security)
7: Network Security1 Chapter 7: Network security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Internet and Intranet Protocols and Applications Lecture 10 Network (Internet) Security April 3, 2002 Joseph Conron Computer Science Department New York.
CSS432 Network Security Textbook Ch8
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Linux Networking and Security Chapter 8 Making Data Secure.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security David Lazăr.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
NETWORK SECURITY.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
1 Some Backgrounds on Network Security Rocky K. C. Chang 12 February 2003.
ClientServer ClientID, E(x, CHK) E(x+1, SHK), E(y, SHK) E(y+1, CHK) E(SK, SHK) Three-way handshake Authentication Protocols CHK, SHK are keys known by.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
CSE Operating System Principles Security. CSE – Operating System Principles2 Security The Security Problem Program Threats System and Network.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Security Outline Encryption Algorithms Authentication Protocols
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
What is network security?
Message Digest Cryptographic checksum One-way function Relevance
Network Security Basics
Security Outline Homework 1, selected solutions Encryption Algorithms
Advanced Computer Networks
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

CSE Computer Networks Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 23 – April 6, 2010

Today’s Lecture Security – Part 1 –Encryption Spring 2010CSE Physical Data Network Transport Application

Spring 2009CSE Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Spring 2010CSE Friends and Enemies Bob, Alice want to communicate “securely” Trudy, the “intruder” may intercept, delete, add messages Figure 7.1 goes here

Why do we need encryption? Wired –Physically tap / snoop on the wire –Hub  Easy –Switch  Harder Wireless –Omni-directional –Easy to sniff –Go to the Huddle Spring 2010CSE

Security Principles CIA –Confidentiality –Integrity –Availability Encryption is one tool –Confidentiality  keep messages secret –Integrity  who sent the message, did it change? Spring 2010CSE

Spring 2010CSE Overview Cryptography functions –Pre-shared key (e.g. DES) Symmetric Secret key –Public key (e.g. RSA) PKI – Public Key Infrastructure Digital / site certificates –Message digest (e.g., MD5)

Spring 2010CSE Symmetric Cipher (DES) Share the key in advance, i.e. pre-shared key (PSK) Examples: WPA-PSK (Wireless)

Spring 2010CSE Symmetric Key Substitution cipher: substituting one thing for another –Monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc E.g.:

Symmetric Key Polyalphabetic cipher –Use a rotating phrase to shift over letters –IRISH Spring 2010CSE See example on board

One-Time Pad Polyalphabetic++ –Use a book or rotating pad (use once / remove) Spring 2010CSE

Spring 2009CSE bit key (56-bits + 8-bit parity) 16 rounds Each Round + F L i─ 1 R i─ 1 R i K i L i DES – Data Encryption Standard

Spring 2009CSE Repeat for larger messages

Spring 2009CSE Public Key (RSA) Encryption & Decryption c = m e mod n m = c d mod n

Spring 2009CSE RSA (cont) Choose two large prime numbers p and q (each 256 bits) Multiply p and q together to get n Choose the encryption key e, such that e and (p - 1) x (q - 1) are relatively prime. Two numbers are relatively prime if they have no common factor greater than one Compute decryption key d such that d*e = 1 mod ((p - 1) x (q - 1)) Construct public key as (e, n) Construct private key as (d, n) Discard (do not disclose) original primes p and q

Spring 2009CSE RSA Example Bob chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z). letter m m e c = m mod n e l c m = c mod n d c d letter l encrypt: decrypt:

Spring 2009CSE Message Digest Cryptographic checksum –just as a regular checksum protects the receiver from accidental changes to the message, a cryptographic checksum protects the receiver from malicious changes to the message. One-way function –given a cryptographic checksum for a message, it is virtually impossible to figure out what message produced that checksum; it is not computationally feasible to find two messages that hash to the same cryptographic checksum. Relevance –if you are given a checksum for a message and you are able to compute exactly the same checksum for that message, then it is highly likely this message produced the checksum you were given.

Spring 2009CSE Authentication Protocols Three-way handshake ClientServer ClientId, E (, CHK) E( y +, CHK) E(SK, SHK) Y

Spring 2009CSE Trusted third party (Kerberos)

Spring 2009CSE Public key authentication AB E ( x, Public B ) x

Spring 2009CSE Message Integrity Protocols Digital signature using RSA –special case of a message integrity where the code can only have been generated by one participant –compute signature with private key and verify with public key Keyed MD5 –sender: m + MD5(m + k) + E(E(k,rcv_public), snd_private) –receiver recovers random key using the sender’s public key applies MD5 to the concatenation of this random key message MD5 with RSA signature –sender: m + E(MD5(m), private) –receiver decrypts signature with sender’s public key compares result with MD5 checksum sent with message

Spring 2009CSE Public Key Distribution Certificate –special type of digitally signed document: “I certify that the public key in this document belongs to the entity named in this document, signed X.” –the name of the entity being certified –the public key of the entity –the name of the certification authority –a digital signature Certification Authority (CA) –administrative entity that issues certificates –useful only to someone that already holds the CA’s public key.

Spring 2009CSE Key Distribution (cont) Chain of Trust –if X certifies that a certain public key belongs to Y, and Y certifies that another public key belongs to Z, then there exists a chain of certificates from X to Z –someone that wants to verify Z’s public key has to know X’s public key and follow the chain Certificate Revocation List

Spring 2009CSE Certificate Serial number (unique to issuer) info about certificate owner, including algorithm and key value itself (not shown)  info about certificate issuer  valid dates  digital signature by issuer

Spring 2009CSE Pretty Good Privacy (PGP) PGP designed by Phillip Zimmerman for electronic mail Uses three known techniques: –IDEA for encrypting message International Data Exchange Algorithm block cipher with 64-bit blocks similar in concept but different in details from DES uses 128-bit keys patented, but free for non-commercial use

Spring 2009CSE Pretty Good Privacy (PGP) RSA public key encryption permits keys up to 2,047 bits in length –Digital signatures use MD5 or SHA-1 PGP generates a random 128-bit symmetric key, used by IDEA for each message PGP generates its own public/private key pairs Keys are stored locally using a hashed pass phrase PGP does not use conventional certificates (too expensive) Instead, –users generate and distribute their own public keys –sign each other’s public keys –save trusted public keys on public-key ring –users build a web of trust –users determine how much to trust

Spring 2009CSE Pretty Good Privacy (PGP) Encryption and authentication for .

Spring 2009CSE PGP (cont) Decrypt message using DES with secret keyk DecryptE(k) using RSA with my private keyk Convert ASCII message Encrypt k using RSA with recipient‘ s public key Encode message + E(k) in ASCII for transmission Encrypt message using DES with secret keyk Create a random secret key k Original message Transmitted message

Spring 2009CSE GPG: Gnu Privacy Guard GPG is primarily meant for securing –can also use it to encrypt/decrypt/sign any message... –free alternative to PGP – Allows you to: –create public/private key pairs –encrypt/decrypt messages –sign/check messages

Spring 2009CSE GPG Create your own public/private key pair: gpg --gen-keys –you will be asked several questions: which kind of key you want, which size, how long it will stay valid, username, address, etc. (keep default values) –then it will ask you for a passphrase: type any passphrase (e.g., “I like rabbits very much”) your private key will be encrypted with the passphrase before storing on disk GPG will ask you for your passphrase each time it needs to access your private key

Spring 2009CSE Distributing Your Public Key You can give it to anyone: –people who may want to communicate with you using GPG –never hand out your private key What’s my public key? gpg --export --armor You can add somebody else’s public key to your keyring: gpg --import You can list the keys in your keyring: gpg --list-keys

Spring 2009CSE Encryption/Decryption with GPG Encryption: –must specify the destination of your message, message will be encrypted with the recipient’s public key (key must be in key ring) gpg --armor --encrypt -r Decryption: –GPG will use your private key to decrypt a received file, you will be asked for your passphrase gpg --decrypt

Spring 2009CSE Signatures with GPG Sign a message (you will be asked for your passphrase): gpg --output --clearsign –message and signature will be written to output_file Check a signature: gpg --verify You can encrypt and sign a document: gpg --armor --sign --encrypt -r < To decrypt and check: gpg --decrypt

Spring 2009CSE Secure Shell (SSH) Remote login service (replaces telnet and rlogin). Provides authentication, integrity, and confidentiality. SSH version 2: SSH-TRANS, SSH-AUTH, SSH-CONN.

Spring 2009CSE Transport Layer Security (TLS) Secure Socket Layer (SSL). Secure HTTP (HTTPS). Handshake protocol and record protocol.

Spring 2009CSE Firewalls Filter-Based Solution –example ( , 1234, , 80 ) (*,*, , 80 ) –default: forward or not forward? –how dynamic?

Spring 2009CSE Proxy-Based Firewalls Problem: complex policy Example: web server Solution: proxy Design: transparent vs. classical Limitations: attacks from within

Spring 2009CSE Denial of Service –flood of maliciously generated packets “swamp” receiver –Distributed DOS (DDOS): multiple coordinated sources swamp receiver –e.g., C and remote host SYN-attack A A B C SYN

Spring 2009CSE Packet Sniffing –broadcast media –promiscuous NIC reads all packets passing by –can read all unencrypted data (e.g. passwords) –e.g.: C sniffs B’s packets A B C src:B dest:A payload

Spring 2009CSE IP Spoofing –can generate “raw” IP packets directly from application, putting any value into IP source address field –receiver can’t tell if source is spoofed –e.g.: C pretends to be B A B C src:B dest:A payload