New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.

Slides:



Advertisements
Similar presentations
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Advertisements

SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
Sri Lanka Institute of Information Technology
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Key Management in Cryptography
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
SSH Secure Login Connections over the Internet
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Secure Electronic Transaction (SET)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
COEN 351 E-Commerce Security Essentials of Cryptography.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Network Security Jiuqin Wang June, 2000 Security & Operating system To protect the system, we must take security measures at two levels: Physical level:
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Secure Active Network Prototypes Sandra Murphy TIS Labs at Network Associates March 16,1999.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
COEN 351 E-Commerce Security
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Key Management and Distribution Anand Seetharam CST 312.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Network Security Confidentiality Using Symmetric Encryption Chapter 7.
Cryptography: an overview
Cryptography: an overview
IT443 – Network Security Administration Instructor: Bo Sheng
NET 311 Information Security
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Presentation transcript:

New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999

New Crypto Techniques Goal: Investigate existing, extended, new and AN enabled cryptographic techniques needed for the unique Active Network security challenges for: –security associations –authorizations

Approach: Review the requirements of active networks Review the constraints imposed by the active network environment Survey existing techniques for usefulness Generate new specifications for new or extended crypto techniques

Work completed and in progress Review of authorization, integrity, and confidentiality requirements of active code, node and active packet Study constraints imposed on cryptographic solutions by active network environment Consider mobile agent/ mobile code research Compare requirements and constraints to existing techniques

Constraints: Packets can be modified in transit Round trip paths are frequently asymmetric Participants in communication not always known before communication begins –current techniques: participants are a pair or an amorphous group –AN: participants are learned in sequence in real-time Timeliness and scalability are requirements

Requirements: Authentication Source authentication will be crucial Authentication of code author could be important (e.g., PLAN Switchlets) Authentication of code attributes could be important (e.g., evaluation) Authentication of packet change history could be important

Requirements: Packet Integrity Active code can change its own active packet –e.g., WebTV demo EE (or another service installed in EE) can change packet –e.g., TTL-like resources, Protocol Boosters NodeOS can change active packet An active node is like a Super NAT box!

Requirements: EE and Node Integrity If API permits change, then integrity is subject to compromise The EE’s and the Nodes can protect themselves through the policies they enforce

Requirements: Confidentiality The Node protects its own confidentiality by enforcing its own policy The EE must trust the Node to keep confidentiality, but it may protect itself from Active Code or other EE’s The Active Code must trust both the Node and the EE to keep confidentiality, but it may protect itself from other Active Code

Scenarios Identified characteristics of various AN scenarios affecting the cryptographic requirements Network search by traffic content Information Gathering Scout/Settler (FBAR) Active Firewall others

Scout/Settler Checks Source authorized to create flow Source authorized to resource usage request Scout source matches ID of saved state Settler matches source that owns flow Settler matches scout that created flow Settler sent by destination Data authorized by source of scout Data within flow authorization

Characteristics were: path dynamicsaccess control data secrecy payload entities involved in cryptographic associations duration of cryptographic associations trust granted to node and EE persistent state left in node

Scout/Settler Characteristics dynamic path,public data variable payload, packets, all nodes on path, user, flows involved associations last for duration of scout-led flow persistent state left in node nodes are trusted

Confidentiality of data (0) If data is not needed in interior, –if destination is known, use public key encryption –if destination is not known, create a key, encrypt the data, send the key later to destination - could use team or threshold cryptography to respond

Confidentiality of data (1) Encrypt hop-by-hop –Trust problems: trust all nodes or identify and avoid untrusted nodes (2) Choose encryption key EK, encrypt data, encrypt EK hop-by-hop –Trust problems: trust all nodes or identify and avoid untrusted nodes –no PFS

Confidentiality of data (3) Pre-distribute encryption key EK (group key distribution), encrypt data –no need to check nodes for trust –group key management difficult and costly, reasonable only for long duration of association –group unknown in general –PFS depends on group key distribution technique

Confidentiality of data (4) Agree on an encryption key EK among the group of nodes involved in path, encrypt data –no need to check nodes for trust –group agreement techniques of N 2 cost –group unknown –but extensions to group agreement technique may be suitable for use while a flow is established –PFS provided

Confidentiality of data (5) Encrypt data in key specific to each node on the path –in general the nodes are not known ahead of time

Confidentiality of code Cannot use (0), but can use (1) - (5) (6) Use encrypted execution techniques (7) Use environmental key - computable by code in the clear

Authentication of data (1) Authenticate hop-by-hop –no source authentication unless all nodes are trusted (2a) Sign with private key, authenticate everywhere –gives source authentication, but slow

Authentication of data (2b) MAC with symmetric key, encrypt symmetric key hop-by-hop –all nodes trusted or –identify and avoid untrusted nodes (3) Create group key and distribute, use for MAC or signature –group authentication –authentication only at trusted nodes –plus problems of group key distribution

Authentication of data (4) Agree on symmetric key and use MAC –group agreement costly –group unknown –extensions for flows may be useful (5) MAC with separate symmetric key for each node in path –but path not generally known

Authentication of changed data (0) Accept all changes, as long as the authentication on original packet is valid (1) Send private signing key along with packet, using some “confidentiality of data” technique to keep it confidential, use to resign as packet changes (2) Nest changes and signatures as addendum on packet

Authentication of changed data (3) Establish trust relationships with modifiers –if large number of modifiers, no better than (2)

Directions Crypto hash-chaining USC/ISI work (CLIQUE) and authenticated group D-H Considering a variant of some group D-H for flows Investigating separation of forward and back channels