1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Secure Mobile IP Communication
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
1 CCSDS Security Architecture Key Management 13 th April 2005 Athens.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Security at the Network Layer: IPSec
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
7.3 Network Security Controls 1Network Security / G.Steffen.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
8/13/20151 Computer Security Authentication in Distributed Systems.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
SSH Secure Login Connections over the Internet
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Internet Security - Farkas1 CSCE 813 Midterm Topics Overview.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
Protocols Part 3  Protocols 1.
Network Security Essentials Chapter 5
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
Cryptography and Network Security (SSL)
Key Agreement Guilin Wang School of Computer Science 12 Nov
Chapter 21 Distributed System Security Copyright © 2008.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Karlstad University IP security Ge Zhang
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Password-based user authentication and key distribution protocols for client-server applications Authors: Her-Tyan Yeh and Hung-Min Sun Sources: The Journal.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
1 Authentication Protocols Rocky K. C. Chang 9 March 2007.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Chapter 3 Basic Protocols. 3.1 Key Exchange n Session Key - Why? n Key Exchange with Symmetric Cryp. KDC request E KA (K AB ), E KB (K AB ) E KB (K AB.
Cryptography CSS 329 Lecture 13:SSL.
1 Cryptography CSS 329 Lecture 12: Key Establishment, IPSec.
Chapter 5 Network Security Protocols in Practice Part I
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography

2 Basic Authentication Techniques  Challenge-Response Mechanisms

3 Manipulation Detection Code

4 Applying Asymmetric Cryptographic Technique Nonce Importance:

5 Standardization of the Challenge- Response Mechanism Unilateral entity authentication ISO Two-Pass Unilateral Authentication Protocol

6 Using a Cryptography Check Function (CCF)

7 ISO Public Key Two-Pass Unilateral Authentication Protocol

8 Timestamp Mechanism

9 Using MDC

10 Applying Asymmetric Cryptographic Techniques

11 Standardization of Timestamp Mechanism ISO Symmetric Key One-Pass Unilateral Authentication Protocol

12 CCF & Public Key Techniques

13 Non-standard Mechanisms

14 Mutual Authentication

15 Wiener ’ s Attack

16 Involving Trusted Third Party The Woo-Lam Protocol

17 Password-based Authentication

18 Needham ’ s Password Protocol

19 A One-time Password Scheme

20 Attack of S/KEY: Man-in-the- Middle Attack  Page 371

21 Encrypted Key Exchange (EKE) (1) Off-line Dictionary Attack

22 Encrypted Key Exchange (EKE) (2)

23 Authenticated Key Exchange  The Station-to-Station (STS) Protocol Mutual Entity Authentication Mutually Authenticated Key Agreement Mutual Key Confirmation Perfect Forward Secrecy (PFS) *Anonymity (Deniability)

24 STS Protocol

25 A Flaw in a Simplified STS protocol (1)

26 A Flaw in a Simplified STS protocol (2)

27 A minor Flaw of the STS Protocol Perfect denial of service attack

28 Typical Attacks on Authentication Protocols  Message Replay Attack (page 43,44)

29 Message Replay Attack

30 Parallel Session Attack (1)

31 Parallel Session Attack (2)

32 Reflection Attack

33 Attack Due to Type Flaw (1)

34 Attack Due to Type Flaw (2)

35 Attack Due to Name Omission

36 Attack Due to Misuse of Cryptographic Services  Attack due to absence of data-integrity protection  Confidentiality failure due to absence of “ semantic security ” protection

37 A Minor Variation of the Otway- Rees Protocol

38 An Attack

39 Authentication Protocols for Internet Security  Internet Protocol Security (IPSec)

40 Confidentiality Protection in IPSec  Encapsulating Security Payload (ESP)

41 The Internet Key Exchange (IKE) Protocol (1)

42 The Internet Key Exchange (IKE) Protocol (2)

43 Authentication Failure

44 Signature-based IKE Phase 1 Aggressive Mode

45 A Plausible Deniability Feature in IKE Plausible Deniability: Permit an entity to deny “plausibly” the existence of a connection with a Communication partner

46 The Secure Shell (SSH) Remote Login Protocol (1)  The SSH Architecture The SSH Transport Layer Protocol  Unilaterally authenticated secure channel from the server to the client The SSH User Authentication Protocol  Unilateral authentication protocols to achieve entity authentication from a client-side user to the server The SSH Connection protocol

47 The Secure Shell (SSH) Remote Login Protocol (2)

48 The Secure Shell (SSH) Remote Login Protocol (3)

49 The Secure Shell (SSH) Remote Login Protocol (4)