Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Similar presentations


Presentation on theme: "Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system."— Presentation transcript:

1 Secure communications Week 10 – Lecture 2

2 To summarise yesterday Security is a system issue Technology and security specialists are part of the system Users from inside the organisation are usually the biggest risk – they have the motivation As systems architect – you are responsible The system has to be designed to protect itself – user profiles, database views etc.

3 Are Networks a risk? Yes Two main areas where an intruder can listen passively Within a collision zone on the LAN – a “sniffer” can look at all datagrams passing the NIC not just datagrams addressed to it At a router – much more difficult Internet More difficult to read – sniff Easier to write – spoof - pretend to be someone else

4 Firewalls Routers as packet filters Application level firewalls - proxy Internal Network Outside world Router Application Firewalls But there may be other connections to the outside world

5 Routers as Firewalls A Router is usually the connection to the outside world Routers can check all packets Source & destination addresses Protocol – eg TCP UDP Port number – application eg Telnet Little intelligence – work quickly Use NAT to hide topology of the internal network

6 Application firewalls Mail servers & Internet proxy servers are examples Higher level of intelligence Can implement most security policies e.g. could limit WEB requests from Purchasing to between 8:00am and 6:00pm Has logging & auditing capabilities Slows throughput but as a caching device can also speed up WEB access Application specific

7 Secure communications Secrecy – only the two parties should understand the messages Authentication – each party should know the messages are from the right person Message integrity – the messages must not be able to be changed

8 Secrecy - encryption Encryption has been around for centuries It used to be reliant on keeping the algorithm secret But computers make it easier to encrypt and to break the code Early computer development was made by code breakers during WW2 – Enigma - Turing at Bletchley Park

9 Four elements to encryption The Original or plain text An Encryption method – the algorithm is common and normally well known – a transformation method The Key – many locks are the same but the key is different. The key must be secret to the parties. The Encrypted text

10 So keeping the key secret is the requirement Secret Secure So how do you share keys?

11 Attacks on algorithms Brute force is too difficult Plain text attacks is more useful if you know –The algorithm –The encrypted text and the –Plain text (remember Enigma)

12 Common security protocols IPsec for IP traffic across the Internet – VPNs SSL – Secure Socket Layer – secures WWW connections PGP – Pretty Good Privacy and S/MIME secure email SET secures Internet financial transactions These protocols may use different algorithms for encryption and Digital signatures

13 Protocols use 6 basic tools Symmetric encryption Public key encryption One way hash codes Message authentication schemes Digital signature schemes Random number generators

14 Two types of key Symmetric key – each party has the same key and thus must be kept secret Asymmetric or public keys – the writer uses a public key to encrypt, but this cannot decrypt, thus it can be public knowledge The reader has a private key to decrypt. This must be kept secret

15 Bob generates two keys - he gives the public key to any one who wants it - Bob keeps the private key Alice et al Alice sends Bob a message Encrypted with HIS public key No one can decrypt the Message with the public key Bob however is the only Person to have the private Key, and thus only he can Decrypt the message Bob

16 DES – Data Encryption Standard Symmetric key Developed by US National Bureau of Standards Uses a 56 bit key (triple DES 112 bits) In 2000 it took a network of computers 22 hours to break the key Good enough for most of us.

17 RSA Algorithm Asymmetric key method Recommends a key length of 768 bits or greater Asymmetric encryption takes 1000 more CPU time Usually used in combination with DES Alice wants to talk to Bob Alice sends a DES key for the session to Bob, encrypted using his public RSA key Only Bob can decrypt the session key It is then used for the session Kurose page 571 for details on these methods

18 Using the hybrid approach is usual It is normal in all security protocols –PGP –S/MIME –Etc The protocol generates a session key using a random number generator This is encrypted using the receiver’s public key and sent to the other party The symmetric key is then used to encrypt the session

19 Authentication If Alice sends a message to Bob, how does he know it is Alice? Alice’s IP address – but can be spoofed Use a special password – but even if encrypted it can be used in playback mode Use of a random number or nonce

20 Authentication by Nonce Alice sends Hi to Bob Bob sends back a “nonce” in plain text Alice encrypts the nonce with their symmetric key Bob decrypts and compares it to the number he sent

21 Message integrity The digital world need some way of knowing that a message came from the specified person, has not been changed, and that the writer cannot repudiate the message One characteristic of the RSA method is that it also works in reverse. If Bob encrypts a message using his private key, then it can be decrypted by a person having the public key Thus one knows It came from Bob It has not been changed

22 Message Digest Use of the RSA key might be overkill for large documents Can calculate a fingerprint (like a hash total) that will prove the message has not been changed This fingerprint is then encrypted with the author’s private key Holders of the author’s public key can then know that the message came from the author and has not been changed

23 Key Distribution Centres Trusted intermediary - Verisign Can be authorised to distribute shared private keys, or a person’s public key

24 VPN – Virtual Private Network Over a shared network infrastructure, usually the Internet Through an encrypted connection –Tunneling – set of predetermined router hops –Encryption of the packet contents –Packet and user authentication Most private WANs will soon be VPNs – 30 to 0% cheaper


Download ppt "Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system."

Similar presentations


Ads by Google