Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography Basic (cont)
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography 101 Frank Hecker
Chapter 31 Network Security
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Secure Electronic Transaction (SET)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Network Security Celia Li Computer Science and Engineering York University.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
The Secure Sockets Layer (SSL) Protocol
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
K E Y Plain text Cipher text Encryption Decryption
Public Key Infrastructure
The Secure Sockets Layer (SSL) Protocol
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Electronic Payment Security Technologies
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki Information_Security/001

Information Security Fundamentals Information_Security/002 Software programs are running two physically separated host computers Network Program A Program B Assumptions throughout this discussions Client Server Two assumptions  Unreliable message transmissions  Possible hijack of network resources

Information Security Fundamentals Information_Security/003 Assumptions throughout this discussions Software programs communicate through insecure public networks Network Program A Program B  Unreliable message transmissions (a) Messages you transmit may not reach a destination. (b) Messages you transmit may be duplicated. (c) Messages you transmit may reach a destination out of order.

Information Security Fundamentals Information_Security/004 Assumptions throughout this discussions Software programs communicate through insecure public networks  Possible hijack of network resources Routers store your messages in them, and they forward. Someone else can access (read) contents in your message. Network Program A Program B Someone has illegal access to this router Router

Information Security Fundamentals Information_Security/005 Assumptions throughout this discussions Software programs communicate through insecure public networks Network Program A Program B  Possible hijack of network resources Routers store your messages in them, and they forward. Someone else can modify the contents in your message.

Information Security Fundamentals Information_Security/006 Major Known Information Security Problems  Release of message contents  Modification of message contents  Masquerading the identity of information sender and receiver  Repudiation of message transmission and/or receiving  Denial of services  Traffic analysis  Message-replays

Information Security Fundamentals Information_Security/007 Major Known Information Security Problems and Their Solutions  Release of message contents  Modification of message contents  Masquerading the identity of information sender and receiver Cryptography Message Digest Digital Signature

Information Security Fundamentals Information_Security/008 A Original information A’ Encrypted information f Encryption mathematical function = E.g., ‘A’ (ASCII ‘A’) E.g., + E.g., ‘B’ (ASCII ‘B’) 1 Encryption key A’ E.g., - 1 Encryption key A Original information Sender Receiver Internet Public Network (Internet) f ’ Decryption  Cryptography This type of cryptography is called “symmetric cryptography”

Information Security Fundamentals Information_Security/009  Cryptography (to prevent release of message contents) Three important issues in cryptography: (1) Encryption must be hard to break (time, computer resources) (2) Encryption key must be safely transferred over a network (3) Encryption must be scalable in the number of users you deal with A solution that satisfies all the above requirements “Asymmetric-Key Cryptography” Different keys can be used for encryption and decryption. The two big problems of symmetric cryptography

Information Security Fundamentals Information_Security/010  Cryptography (to prevent release of message contents) Network S R S P Encryption keys are always made as a pair of two keys One of the two keys is called “secret (private) key” while the other is is called “open (public) key”. You must keep your private key always secret (= never transfer it to anywhere) You can give your public key to any people you would like to securely communicate P (anyone should be able to get the public key)

Information Security Fundamentals Information_Security/011  Cryptography (to prevent release of message contents) Network S R S P Two most important properties in asymmetric-key cryptography: (1) If a message is encrypted by a public key, the encrypted message can be decrypted only by its private key. (2) If a message is encrypted by a private key, the encrypted message can be decrypted only by its public key. P Plain Message X P

Information Security Fundamentals Information_Security/012  Cryptography (to prevent release of message contents) Network S R S P Two most important properties in asymmetric-key cryptography: (1) If a message is encrypted by a public key, the encrypted message can be decrypted only by its pair secret key. (2) If a message is encrypted by a secret key, the encrypted message can be decrypted only by its pair public key. P X P Plain Message

Information Security Fundamentals Information_Security/013  Cryptography (to prevent release of message contents) Three important issues in cryptography: (1) Encryption must be hard to break (time, computer resources) (2) Encryption key must be safely transferred over a network (3) Encryption must be scalable in the number of users you deal with Solved !!

Information Security Fundamentals Information_Security/014  Message digests (to prevent modification of message contents) Network S R Message (2) Attach the digest to the message (1) Calculate a message digest H el lo Wo r l d! ASCII Code: (8 mod (total)) = This methods has two problems!

Message 193 Message 193 Information Security Fundamentals Information_Security/015 Network S R  Message digests (to prevent modification of message contents) Message 193 How can we prevent this problem? 249

Information Security Fundamentals Information_Security/016 Network S R Message (1) Calculate a message digest 193 S P (2) Encrypt the digest using the private key  Message digests (to prevent modification of message contents) (3) Attach the encrypted digest to the message (4) The whole message is transferred (5) R downloads the public key of S (6) R decrypts the digest from S (7) R calculates the digest on its own and compares it with the digest from S P Message 193

Information Security Fundamentals Information_Security/017  Message digests (to prevent modification of message contents) Network S R Message (2) Attach the digest to the message (1) Calculate a message digest H el lo Wo r l d! ASCII Code: (8 mod (total)) = If we have 8 bits for a digest, what is the probability of the digest accidentally match? It’s 1/256!

Certificate Authority Merchant’s host (server) Client’s host (browser)  CA creates a certificate for this merchant S1S1 P1P1  Digital Certificate S2S2 P2P2 P2P2 HASH  CA encrypts this certificate using its PRIVATE key Encrypt  CA issues (transmits) this certificates to the merchant  The merchant sends its certificate to you HASH Compare P2P2 P1P1 Decrypt (hash) digest of the server’s certificate  A client contacts this merchant for business Digital signature of this certificate Extracted Digital Signature of the CA Re-Constructed Digital Signature of the CA Initiate the hybrid encryption with this server  Request for issuing a certificate for this merchant (must pay $$$) Information Security Fundamentals Information_Security/018

Digital Certificate Certificate: Data: Version: 3 (0x2) Serial Number: 7 (0x7) Signature Algorithm: md5WithRSAEncryption Issuer: C=JP, ST=Aichi-Ken, L=Nagoya, O=NIT, OU=TEST depth, CN=ailab second Validity Not Before: Sep 22 05:31: GMT Not After : Sep 22 05:31: GMT Subject: C=JP, ST=Aichi-Ken, O=nitech.ac.jp, OU=ailab, Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (512 bit) Modulus (512 bit): 00:bd:06:2b:bc:35:55:0b:d7:c4:d6:09:a5:b7:5c: 57:2a:0a:e5:7d:8c:2e:ed:8f:df:c3:ca:37:63:bb: ae:b1:ac:94:54:40:da:7b:71:16:ff:e7:68:5e:00: 49:54:43:70:b7:a1:35:0a:e3:53:4d:4c:86:d2:90: e8:18:39:55:2b Exponent: (0x10001) X509v3 extensions: Netscape CA Revocation URL:.# Netscape Comment:..This is a comment Netscape Cert Signature Algorithm: md5WithRSAEncryption e7:04:71:f0:9a:d5:da:5e:50:c5:13:20:97:8c:ff:69:fa:18: 2a:9d:b8:75:22:d7:f4:d5:87:4a:7c:c4:3a:7f:b7:72:0f:a3: f3:f4:82:60:8e:e0:f8:10:36:9f:d9:a8:c3:b2:83:50:3d:dd: 5c:b8:29:b7:79:49:03:13:6d:83 Declare the beginning of a certificate ITU-T X.509 Version 3 certificate format Unique Certificate Serial # Which hash and encryption are used for the signature Name of the CA who issued this certificate Name of the server this certificate is issued to This is the public-key information for the server! This is the digital signature signed by this CA (not by this server) Encryption algorithm you need to use when you talk to this server CS 548 Network Security Information_Security/019

Certificate Authority Merchant’s host (server) Client’s host (browser) S1S1 P1P1 S2S2 P2P2  CA issues (transmits) this certificates to the merchant P1P1  Request for issuing a certificate for this merchant (must pay $$$) How can you be sure that this CA is a legitimate CA? When (or how) did you get the public-key of this CA? If you are going to get the public-key through the network, how you are sure this key is from the CA?  Digital Certificate Information Security Fundamentals Information_Security/020

Certificate Authority Merchant’s host (server) S2S2 P2P2 Certificate for this CA  Request for the certificate issued to this CA  This CA sends its certificate to this merchant This is the certificate for this merchant HASH Compare Decrypt Extracted Digital Signature of the CA Re-Constructed Digital Signature of the CA P We need the public key for this decryption S P You can (should) not get the public-key from this CA  Digital Certificate Information Security Fundamentals Information_Security/021

Certificate Authority Merchant’s host (server) S1S1 P1P1 S2S2 P2P2  Request for the certificate issued to this CA  This CA sends its certificate to this merchant This is the certificate for this merchant HASH Compare Decrypt Extracted Digital Signature of the CA Re-Constructed Digital Signature of the CA Another Certificate Authority S3S3 P3P3 P3P3 P3P3 How can this merchant be sure that P 3 is from Y? X Y CA X requests Y to issue a certificate for X! Certificate for this CA  Digital Certificate Information Security Fundamentals Information_Security/022

R Merchant’s host (server) Root CA The CA who does not have the parent CA Digital Certificate (a)Your browser must have the pre-installed certificate of the root CA (b) If your browser does not have the certificate of the root CA, you must make your own decision of you accept (trust) the certificate of not X Y Z Information Security Fundamentals Information_Security/023

Information Security Fundamentals Information_Security/024  Repudiation of message transmission of receiving Network S R Message S transmits a message to R R received this message from S Non-Repudiation (a) S can not deny that it transmitted this message to R. (b) R can not deny that it received this message from S.

Information Security Fundamentals Information_Security/025  Repudiation of message transmission of receiving Network S R Message I did not transmit this message to S I did not receive this message from S Non-Repudiation (a) S can not deny that it transmitted this message to R. (b) R can not deny that it received this message from S. This situation is NOT repudiation (because message transfer did not occur)

Information Security Fundamentals Information_Security/026  How to prevent repudiation? Homework: Develop an algorithm that prevents the two types of repudiations Use the information security solutions we discussed so far We still assume an insecure network environment (especially message losses and message duplications) Hints: Like digital certificate, combine multiple security solutions It should be “algorithm” (which contains “if – else” structures)