Information System Security Đại học Quốc Gia TPHCM – Đại học Bách Khoa Khoa Khoa học và Kỹ thuật Máy Tính.

Slides:



Advertisements
Similar presentations
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Advertisements

Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Lecture 10: Mediated Authentication
Chapter 10 Real world security protocols
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Akshat Sharma Samarth Shah
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
Authentication & Kerberos
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
KerberSim CMPT 495 Fall 2004 Jerry Frederick. Project Goals Become familiar with Kerberos flow Create a simple Kerberos simulation.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesn’t scale Using public key cryptography (possible)
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Biometrics Part 2  Access Control 1.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Lecture 11: Strong Passwords
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Chapter 9 Simple Authentication Protocols
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
Computer and Network Security - Message Digests, Kerberos, PKI –
Authentication What you know? What you have? What you are?
Network Security and It’s Issues Presenter Prosanta Gope Advisor Prof. Tzonelih Hwang Quantum Information and Network Security Lab, NCKU,2015.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
Chapter 9 Simple Authentication Protocols Simple Security Protocol Authentication Protocols Authentication and TCP Chapter 9 Simple Authentication protocols.
KERBEROS SYSTEM Kumar Madugula.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Chapter eight: Authentication Protocols 2013 Term 2.
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
1 Example security systems n Kerberos n Secure shell.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Network Security and It’s Issues
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
COEN 351 Authentication.
AIT 682: Network and Systems Security
Presentation transcript:

Information System Security Đại học Quốc Gia TPHCM – Đại học Bách Khoa Khoa Khoa học và Kỹ thuật Máy Tính

Information System Security Đại học Quốc Gia TPHCM – Đại học Bách Khoa Khoa Khoa học và Kỹ thuật Máy Tính Thành viên :  Huỳnh Lưu Triết  Nguyễn Hoàng Tùng

Information System Security AUTHENTICATION METHODS  Something you know  Something you have  Something you are AUTHENTICATION PROTOCOLS  Simple authentication protocols  Real-world security protocols

 Something you know  Something you have  Something you are Information System Security : Password : Smartcard : Fingerprint, Iris Scan

 Identification  Authentication Information System Security ~ Who is someone ? ~ Is something genuine ?

 Something you know  Something you have  Something you are Information System Security

Password Group AGroup BGroup C >= 6 charactersPassphrases8 randomly characters

 Password verification  Other password issues Information System Security

 Password verification Compare with the correct password Password x  y = h(x)  store y  verify z  h(z)  compare h(z) with y Crack : Trudy has “dictionary”  h(x 0,x 1,…x N- 1 )  compare each with y Salt value (s)  y = h(x, s)  store (s, y)  verify z  h(z, s)  compare h(z, s) with y from (s, y)

 Other password issues Information System Security Social engineering Keystroke logging software and spyware Number password Cracking tools

 Something you know  Something you have  Something you are Information System Security

Like credit card, includes a small amount of memory and computing resources

 Something you know  Something you have  Something you are Information System Security

 Types of errors  Biometric examples  Biometric error rates  Biometric conclusions Information System Security

 Types of errors Fraud rate Insult rate Information System Security

 Types of errors Information System Security Alice Fraud rate

 Types of errors Information System Security Not Alice Insult rate

 Biometrics Examples Fingerprints Information System Security - Used in ancient China , J. C. Mayer  fingerprints may unique , Purkinje  nine “fingerprint patterns” , Mark Twain  “Life on the Mississippi” , Sir Francis Galton  “minutia” systems

 Biometric examples Fingerprints Information System Security

 Biometric examples Hand geometry Information System Security - The width and length of the hand and fingers - Hand geometry is easy and quick to measure

 Biometric examples Hand geometry Information System Security

 Biometric examples Iris scan Information System Security - The best for authentication , Frank Burch suggest using it - The 1980s, resurfaced in James Bond films , John Daugman - a researcher at Cambridge University, patented  iris scan - A black and white photo of the eye  transform  a 256-byte (2048 bit) “iris code”

 Biometric examples Iris scan Information System Security - Alice : x ; iris scan stored : y - d(x, y) = non-match bits/bits compared. - d(x, y), same is 0.08 and difference is A match : d (x, y) <= How to attack ? - Picture of Alice  How to prevent ???

 Biometric examples Iris scan Information System Security

 Biometric error rates Fraud rate = Insult rate Fingerprints (5%) Hand geometry (0.1%) Iris scan (0.001%) Information System Security

 Biometric conclusions Difficult to attack Expensive Information System Security

 Difficult to attack ~ Expensive  Attack : Biometrics < Smartcard < Password  Cost : Password < Smartcard < Biometrics

AUTHENTICATION PROTOCOLS I.SIMPLE AUTHENTICATION PROTOCOLS II.REAL-WORLD SECURITY PROTOCOLS

Information System Security SIMPLE AUTHENTICATIONPROTOCOLS 1. Introduction 2. Simple Security Protocols 3. Authentication Protocols Authentication Using Symmetric Keys Session Keys Timestamps

SIMPLE AUTHENTICATION PROTOCOLS 1. Introduction  What is Protocol?  Security Protocol?  Differences between Authentication Method and Authentication Protocol  A seemingly innocuous change can make a significant difference in a protocol  Security protocol must meet the specified security requirements Information System Security

SIMPLE AUTHENTICATION PROTOCOLS 2.Simple Security Protocols Entering into a secure facility, such as the National SecurityAgency Withdraw money from an ATM machine Identify Friend or Foe, or IFF Information System Security

Identify Friend or Foe, or IFF SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocols ◦ Efficient?  Trudy can later replay the messages  Alice’s password is sent in the clear  Bob must know Alice’s password SIMPLE AUTHENTICATION PROTOCOLS Information System Security

How to solve? SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocols SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol Authentication Using Symmetric Keys  Encrypting plaintext P with key K to obtain ciphertext C is C = E(P,K)  Decrypting ciphertext C with key K to recover the plaintext P is P = D(C,K).  Alice and Bob share symmetric key K AB SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol Authentication Using Symmetric Keys SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol Authentication Using Symmetric Keys Is subject to a man-in-the-middle attacks. SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  Authentication Using Symmetric Keys Man in the Middle SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol Authentication Using Symmetric Keys  Conclusion:  One-way authentication protocol may not be secure for mutual Authentication.  Protocols and attacks on protocols can be subtle.  “Obvious” changes to protocols can raise serious security issues SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol Authentication Using Symmetric Keys Lesson:  Don’t have the two sides do exactly the same thing  Small changes to a protocol can result in big changes in security SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  Session Keys  Encrypt data within each connection  Limits the data encrypted with one particular key  Limits the damage if one session key is compromised  Used for confidentiality or integrity protection. SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  Session Keys SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  Session Keys SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  Session Keys  Sign and Encrypt Mutual Authentication SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  Session Keys  Is Sign and Encrypt Mutual Authentication better? SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  TimeStamp  Contains the current time  Timestamp can be used in place of a nonce  Benefit: don’t need to waste any messages exchanging nonces  Used in many real-world security protocols, such as Kerberos  Timestamps create some security concerns SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  TimeStamp  Reduced the number of messages by a third  Using timestamp with the sign and encrypt is secure  What about encrypt and sign? SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3.Authentication Protocol  TimeStamp Unfortunately, the protocol is subject to attack SIMPLE AUTHENTICATION PROTOCOLS Information System Security

3. Authentication Protocol  TimeStamp  Timestamp with the sign and encrypt is secure  Timestamp with encrypt and sign is not  So we can never take anything for granted SIMPLE AUTHENTICATION PROTOCOLS Information System Security

REAL-WORLD SECURITY PROTOCOLS KERBEROS  Kerberized Login  Kerberos Ticket  Kerberos Security

Information System Security REAL-WORLD SECURITY PROTOCOLS KERBEROS  An authentication system that uses symmetric key cryptography  Designed for smaller scale use, such as on a local area network  With N users:  Public key cryptography: requires N key pairs  Symmetric keys: requires N 2 keys  Kerberos: requires N keys

Information System Security REAL-WORLD SECURITY PROTOCOLS KERBEROS Relying on a trusted third party, or TTP. Employs a Key Distribution Center, or KDC, that acts as the TTP The KDC has a master key K KDC, known only to the KDC KDC issues various types of tickets: Ticket- Granting Ticket, or TGT TGT is encrypted with K KDC sending to the recipient TGT can only be read by the KDC

Information System Security REAL-WORLD SECURITY PROTOCOLS KERBEROS  Kerberized Login TGT = E(“Alice”,S A ;K KDC ).

Information System Security REAL-WORLD SECURITY PROTOCOLS KERBEROS  Kerberos Ticket  REQUEST = (TGT, authenticator)  authenticator = E(timestamp,S A )  REPLY = E(“Bob”,K AB, ticket to Bob; S A )  ticket to Bob = E(“Alice”,K AB ;K B )

Information System Security REAL-WORLD SECURITY PROTOCOLS KERBEROS  Kerberos Security  Minor Flaw: KDC sends E(S A,TGT;K A ), Where TGT = E(“Alice”,S A ;K KDC ).  KDC does not need to know who is making the REQUEST  why is “ticket to Bob” sent to Alice?  how does Kerberos prevent replay attacks?

Information System Security