CS 453 Computer Networks Lecture 25 Introduction to Network Security.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Comnet 2010 Communication Networks Recitation 11 Security.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
8: Network Security Security. 8: Network Security8-2 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
1 ITC242 – Introduction to Data Communications Week 11 Topic 17 Chapter 18 Network Security.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
CSE401n:Computer Networks
Network Security – Part 1 Spring 2005 V.T. Raja, Ph.D., Oregon State University.
Network Security understand principles of network security:
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
1-1 1DT066 Distributed Information System Chapter 8 Network Security.
Lecture 17 Network Security CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Encryption Coursepak little bit in chap 10 of reed.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Public-Key Cryptography CS110 Fall Conventional Encryption.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 8, slide: 1 ECE/CS 372 – introduction to computer networks Lecture 18 Announcements: r Final exam will take place August 13 th,2012 r HW4 and Lab5.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 1: Principles of cryptography.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 11 Network Security (1)
1-1 1DT066 Distributed Information System Chapter 8 Network Security.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Network Security – Special Topic on Skype Security.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
 Last Class  Chapter 7 on Data Presentation Formatting and Compression  This Class  Chapter 8.1. and 8.2.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
K. Salah1 Security Protocols in the Internet IPSec.
Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
What is network security?
Network Security Basics
Presentation transcript:

CS 453 Computer Networks Lecture 25 Introduction to Network Security

Network Security Data networks have become the core communication conduit for local, regional and global communications Once the esoteric domain of computer scientists… …no longer… Now data communications network are primary means of communications worldwide

Network Security Data communications networks carry Medical records Critical health care data Banking and financial information National security secrets …. …and of course, Youtube and our

Network Security The point – data networks are critical Lives, livelihoods, economy and countries depend on them Not only must they be present and operational,.. But the must be secure …and this is not just about people to people, organization to organization communications, but The network itself

Network Security So what do we mean by secure? Confidential communications – some messages should only be read by the intended receiver Authentication – we want to have confidence that a message come from who we thought it came from Integrity and nonrepudiation – that the message received is the one sent, it has not been altered or tampered with Availability and access control – make network resilient to security threats and only let agents use the network that should be using the network and… …and only in the way they are authorized to use it

Network Security In part, network security means protecting the network Building in safeguards and protections Monitoring for attacks and intrusions… And responding to these threats and intrusions with newer better protections

Network Security Confidentiality – Encryption If we want to make sure that only the intended recipient of a message can understand the message, we need to disguise it –..That is encryption

Network Security Encryptions basics – Imagine Alice and Bob They are two routers in a network And they need to send messages to each other

Network Security Encryptions basics – Alice send a message “Bob, I Love You, Alice” to Bob The message as is is referred to as “cleartext” But Alice will encrypt it – The encrypted form is called “ciphertext”

Network Security Encryptions basics – Alice will use a key Ka to encrypt the message m… Bob will use another (possibly the same) key Kbto unencrypt the message m Alice sends Ka(m) to Bob… Bob processes the ciphertext with Kb(Ka(m))=m

Network Security Encryptions basics – Symmetric key encryption – both keys are identical and secret Public Key encryption – A pair of keys are used one known to everyone – And one known only to the receiver (or sender) but not both

Network Security Encryptions basics – Caesar ciper – encode text using an offset in the alphabet … For example, if K=3, then A=D, B=E, … …or I Love You = l oryh brx Easy to crack, crack one symbol and you crack the code

Network Security Encryptions basics – Monoalphabetic cipher – define an arbitrary mapping between cleartext symbols and ciphertext symbols So, something like a b c d e f … m n b v c x … So, maybe “I Love You” i s “s gktc wky” Caesar cipher – key has 26 possible values Monoalphabetic cipher key has 26! possible values Harder to crack… But not that hard Why?

Network Security Encryptions basics – Polyalphabetic cipher Use multiple monoalphabetic ciphers And use them in repeating sequences to encrypt a message Suppose we have two cipher c1 and c2 We could use the sequece c1, c1, c2, c1, c1 That is, encrypt the first symbol with c1, then second symbol with c1, third symbol with c2, … Its getting harder to crack

Network Security Data Encryption Standard (DES) NIST – 1993 Symmetric key for commercial and nonclassified use Encrypt messages in 64 bit pieces using 56 bit keys Involves multiple “shuffles” and permutions of the data… See Kaufman (1995) for details

Network Security Data Encryption Standard (DES) Is it good? RSA challenge to break DES encryption Group of internet volunteers – Cracked the code in less than 4 month And earn $10k In 1999 – another group of internet volunteers Cracked the code in 22 hours

Network Security Data Encryption Standard (DES) 2001 NIST proposed a successor to DES – Advanced Encryption Standard (AES) Encrypts 128 bit blocks Uses 128, 192, 256 bit keys NIST estimates that if a computer could crack a 56 DES code in one second… It would that the same computer 149 trillion years to crack a 128 bit AES key

Network Security Data Encryption Standard (DES) 2001 NIST proposed a successor to DES – Advanced Encryption Standard (AES) Encrypts 128 bit blocks Uses 128, 192, 256 bit keys NIST estimates that if a computer could crack a 56 DES code in one second… It would that the same computer 149 trillion years to crack a 128 bit AES key

Network Security Symmetric Key Encryption Requires sender and receiver both to have a key, … And the sender and receiver key have to be identical But how to they get these keys They can’t transmit them The can’t encrypt them then transmit them

Network Security Public Key Encryption Imagine – Bob has two keys One (Kb-pub) is a public which he will share with anyone One (Kb-pri) is private and not shared with anyone A message encrypted with Bob’s Kb-pub can only be decrypted with Bob’s Kb-pri Kb-pri(Kb-pub(m)) = m

Network Security Public Key Encryption Bob has two keys So, if Alice wants to send Bob an encrypted message… She must first request a copy of Bob’s public key – Kb-pub Alice then encrypts the message using Kb-pub and an agreed upon encryption algorithm… … and send the message Bob receives the message, and… Decrypts is using his private key Kb-pri

Network Security Public Key Encryption Takes care of confidentiality Recall that in symmetric key encryption— the keys were secret, so Under normal circumstances you can assume that if a message arrived that had been encrypted with that key, it came from the source that you think it came from… Unless it was stolen (that’s what spies are for)

Network Security Public Key Encryption …but with Public Key Encryption anyone can get the public key, so you don’t know if the message really came from Alice, even it is says it did. i.e. can’t do authentication

Network Security Public Key Encryption Algorithms RSA Public Key Encryption –widely used Choose two large prime numbers p and q Compute n = pq and z=(p-1)(q-1) Choose a number e, less than n- has no common factors (except 1)with z Find a number d, where ed-1 is evenly divisible by z Public key Kpub =(n,e) Private key Kpri = (n,d)

Network Security Public Key Encryption Algorithms RSA Public Key Encryption Then for a message m, we encrypt C = m e mod n And decrypt – M = c d mod n Remember Alice has e And only Bob has d

Network Security Public Key Encryption Algorithms RSA Public Key Encryption Suppose Bob picks p=5 and q=7 n=35 and z=24 Choose e=5 since 5(e) and 24(z) have no common factors Choose d=29 since ed-1 mod z = 0 (5*29)-1 mod 24 =0 Bob give Alice his Kpub which is e Alice encrypts the message “hi” and sends to Bob

Network Security RSA Public Key Encryption CleartextNumeric valuememe C=m e mod n h i Ccdcd M=c d mod ncleartext E13 68 h E4469i Bob decrypts with d=29, n=35 Alice encrypts with e=5, n=29

Network Security Authentication – is it really who we think it is? Host-based authentication Message have IP address of source So, authenicate based on IP address in message header Easy to fake, IP spoofing

Network Security Authentication Password authentication Use a password in a message … Or to establish a connection Easy to capture password, especially if cleartext Sniffing

Network Security Authentication Encrypted Password authentication Encrypt a password and use it in a message Or to establish a connection Still can capture encrypted password… And play it back when password needed Playback attack

Network Security Authentication Public Key authentication Just like data stream encryption we can use Public Keys to encrypt password for authentication Alice wants to send a message to Bob… Bob send Alice his public key Alice encrypts her password with Bob’s public key, and transmit SSH

Network Security Public Key authentication Man-in-the-middle attack Bob wants to send a message to Alice Carol sends Bob her public key saying it is from Alice, Carol also obtains Alice’s public key (it is public) Bob sends a message to Alice using Carol’s public key and Carol intercepts it Carol decrypts and reads the message Carol encrypts the message with Alice’s public key And sends it to Alice saying it is from Bob …and no one is the wiser

Network Security Data integrity – is really the right data We need some way to assure the receiver that the message contents are really the message contents that were sent In the paper world we sign reports, expense accounts statements, etc. to vouch for the accuracy (integrity) of the information in the reports or statements …so

Network Security Data integrity Digital signatures Encrypt a document using a private key What? BTW, public/private keys are two way If I encrypt with my private key, since it is not public, I had to be the one that encrypted it (my signature)

Network Security Data integrity Digital signatures Note: it the message is altered after it is digitally signed. Kpub(Kpri(M)) will not result in m i.e. it will not decrypt

Network Security Data integrity Message digests Digital signatures are expensive Alternative Create a message digest Use Hash function – like CRC, Checksum Then digitally sign the message digest MD5

Network Security Data integrity Message digests Original message is sent in cleartext… Along with digitally signed message digest Receiver computes second message digest on received message If two message digests match, message is good

Network Security Access control Firewalls Packet Filtering IP source or destination address TCP or UDP port numbers ICMP message types Connect initiation datagrams using SYN and ACK bits

Network Security Access control Firewalls Packet Filtering Controlled by rules Permit this, deny that Order of evaluation of rules important

Network Security Access control Firewalls Application Gateways Sometimes packet filtering is not enough Maybe you want certain authenticated users to be able to use a service from specific IP addresses but not others Application Gateways are intermediate services – connect to gateway, the gateway connects to the service of interest

Network Security Access control Firewalls Application Gateways For example, suppose you want to let certain users telnet out of the network, but not everyone User wanting to Telnet out, telnets to telnet gateway User authenticates to gateway User provide gateway with telnet destination Gateway telnets to destination Gateway relays telnet packet between user and service

Network Security Threats Mapping – port scanning Packet sniffing Spoofing Denial of Service Attacks See:

“That’s all I have to say about that.” Forest Gump