SlideShare uma empresa Scribd logo
1 de 54
Security
• In most systems security is an important
  concern
     – Communications should be secure against
       eavesdropping and tampering
     – Servers/clients should be able to verify the
       identity of their clients/servers
     – The originator of a message should be
       verifiable after the message has been delivered

04/29/12               ICSS420 - Security                1
Policy vs. Mechanism
• Security policies
     – Who can access what resource
     – Defines the appropriate levels of security
• Security Mechanisms
     – Techniques used to implement the security
       policies



04/29/12               ICSS420 - Security           2
Principal
• The agents accessing the information or resources
     – Human beings
     – Servers
     – Applications
• Principals with the same access rights are often
  collected together in groups
• Each principal has a unique user identifier
  associated with it

04/29/12               ICSS420 - Security             3
Threats
• Security threats common to computer
  systems fall into four broad classes
     – Leakage
           • Acquisition of information by unauthorized parties
     – Tampering
           • The unauthorized alteration of information
     – Resource Stealing
     – Vandalism
04/29/12                    ICSS420 - Security                    4
Methods of Attack
• Some common methods of attack include
     – Eavesdropping
           • Information in transit
           • Information in storage
     – Masquerading
           • Sending/receiving messages using the identity of another user
     – Message Tampering
     – Replaying
           • Storing messages and sending them at a later date
     – Denial of Service

04/29/12                        ICSS420 - Security                           5
Infiltration
• Attacker must have access to the system in
  order to attack
     – Password cracking
     – Virus
           • Attaches itself to an existing program
     – Worm
           • Standalone program
           • Not always nasty!!
     – Trojan Horse
04/29/12                     ICSS420 - Security       6
Morris Worm
                         rsh attack

                       finger attack
 Grappling hook
                      sendmail attack


                          Request for worm




                         Worm sent
           Worm                                Worm

    Target System                            Target System


04/29/12               ICSS420 - Security                    7
Security in a Network
• In a networked system
     – The principal threats to security come from the
       openness of communication channels
     – Potential violators are not easily identifiable, so
       we must not assume trust. Assume
       untrustworthy until proven otherwise
     – The mechanisms used to implement security
       must be validated to a high standard

04/29/12                ICSS420 - Security               8
Techniques
• Security mechanisms are based on three
  techniques
     – Cryptography
           • Used to conceal information
           • Used in support of authentication
           • Used to implement digital signatures
     – Authentication
           • Validate the identity of the sender
     – Access Control
           • Allow resources to access only by authorized individuals
04/29/12                        ICSS420 - Security                      9
Cryptography
• Information can be encoded using a key
  when it is written (or transferred)
     – encryption
• It is then decoded using a key when it is
  read (or received)
     – decryption
• Very widely used for secure network
  transmission
04/29/12            ICSS420 - Security        10
More on Cryptography


                    encryption
plaintext                                ciphertext
                    decryption




  04/29/12          ICSS420 - Security       11
More on Cryptography

               Ke                              Kd


                       C = EKe(plaintext)
plaintext    Encrypt                         Decrypt   plaintext




  04/29/12              ICSS420 - Security                 12
More on Cryptography
                 Ke                                  Kd


                            C = EKe(plaintext)
plaintext      Encrypt                            Decrypt     plaintext




         Side information        Invader          plaintext


                             Cryptanalysis

  04/29/12                   ICSS420 - Security                    13
Cryptographic Systems
                        Cryptographic Systems



     Conventional Systems                    Modern Systems

      •Ke and Kd are
      essentially the       Private Key                 Public Key
      same
                        •Ke and Kd are                •Ke is public
                        private                       •Kd is private


04/29/12                    ICSS420 - Security                         14
Private Key Systems
• In private key systems, such as the US Federal
  Data Encryption Standard (DES), a single key is
  used for both encryption and decryption
• This means that both parties must know the key(s)
  before communication can take place
     – write it down ahead of time
     – have some sort of physical key
     – exchange key(s) via secure channels


04/29/12                 ICSS420 - Security       15
Block Ciphers
• Many commonly used ciphers are block
  ciphers.
     – This means that they take a fixed-size block of
       data (usually 64 bits)
     – Transform it to another 64 bit block using a
       function selected by the key.



04/29/12               ICSS420 - Security                16
Block Cipher Modes
• If the same block is encrypted twice with the same
  key, the resulting ciphertext blocks are the same
     – It is desirable to make identical plaintext blocks encrypt
       to different ciphertext blocks.
• Two methods are commonly used for this:
     – CFB mode: a ciphertext block is obtained by
       encrypting the previous ciphertext block, and xoring
       the resulting value with the plaintext.
     – CBC mode: a ciphertext block is obtained by first
       xoring the plaintext block with the previous ciphertext
       block, and encrypting the resulting value.
04/29/12                   ICSS420 - Security                    17
Secret Key Systems
• DES
     – Developed in the 1970s adopted as a standard by the
       US government
     – DES is a block cipher with 64-bit block size. It uses 56-
       bit keys.
     – This makes it fairly easy to break with modern
       computers or
     – A variant of DES, Triple-DES or 3DES is based on
       using DES three times (normally in an encrypt-decrypt-
       encrypt sequence with three different, unrelated keys).
04/29/12                  ICSS420 - Security                  18
Secret Key Systems
• Blowfish
     – An algorithm developed by Bruce Schneier.
     – It is a block cipher with 64-bit block size and variable
       length keys (up to 448 bits).
     – No attacks are known against it.
• IDEA (International Data Encryption Algorithm)
     – Developed at ETH Zurich in Switzerland.
     – Uses a 128 bit key, and is considered to be very secure.
     – No practical attacks on it have been published despite
       numerous attempts to analyze it.
04/29/12                   ICSS420 - Security                     19
Secret Key Systems
• RC4
     – The algorithm is very fast.
     – Its security is unknown, but breaking it does not seem
       trivial either.
• SAFER
     – Developed by J. L. Massey (a developer of IDEA).
     – It is claimed to provide secure/fast encryption
• Enigma
     – The cipher used by the Germans in World War II.
     – This cipher is used by the unix crypt(1) program
04/29/12                  ICSS420 - Security                    20
Public Key Systems
• In public key cryptosystems, everyone has two
  related complementary keys, a publicly revealed
  key and a secret key
• Each key unlocks the code that the other key
  makes. Knowing the public key does not help you
  deduce the corresponding secret key
• The public key can be published and widely
  disseminated across a communications network
• This protocol provides security without the need
  to reveal the private key
04/29/12            ICSS420 - Security           21
Public Key Systems
                             Public Key
                              Database



               Kpublic                               Kprivate


                         C = EKpublic(plaintext)
plaintext    Encrypt                               Decrypt      plaintext




  04/29/12                 ICSS420 - Security                        22
RSA
• Rivest, Shamir and Adelman (RSA)
     – To find a key pair e and d:
           • Chose two large prime numbers, P and Q (each
             greater than 10100), and form
              – N=PxQ
              – Z = (P-1) x (Q-1)
           • For d chose any number relatively prime to Z
           • To find e solve the equation
              – e x d = 1 mod Z

04/29/12                      ICSS420 - Security            23
Comparison
• Secret and public key systems
     – With suitable keys both are secure enough
     – Public-key systems are more convenient to
       implement because they do not require a secure
       channel to exchange keys
     – Secret-key systems are faster



04/29/12               ICSS420 - Security           24
Establishing a Shared Key
• In order for a symmetrical system to work,
  both parties need to know a shared key
• Is it possible for two parties to safely use
  the network to agree on a shared key?
     – To put this another way, can two machines
       agree on a common number such that anyone
       who listens to that conversation can determine
       the number?
04/29/12               ICSS420 - Security               25
Diffie-Hellman Key Exchange
     n and g, both are prime, public and special. A picks x
     in private, B picks y in private


                              n, g, gx mod n


      A                           gy mod n                               B


           Compute (gy mod n)x mod n =     Compute (gx mod n)y mod n =
           gxy mod n                       gxy mod n


04/29/12                        ICSS420 - Security                           26
It Works!!
• n=47, g=3
• I’ll pick a small x, you pick a small y
• I send to you
     – (47, 3, 9)
• You send to me
     – 3y mod 47 (call it z)
• I compute zx mod 47
• You compute 9y mod 47
04/29/12                   ICSS420 - Security   27
To Break it
• You know
     – n = 47, g = 3
• You also know
     – gx mod n = 9
     – gy mod n = z
• You need to solve the equation
     – zx mod 47 = 9y mod 47

04/29/12               ICSS420 - Security   28
Bucket Brigade
                                                     Also known as the person in
                                                     the middle attack
               n, g, gx mod n



                gq mod n
A                                      X                                            B
                                                        n, g, gq mod n


                                                           gy mod n

                Session key S                              Session key R

    04/29/12                    ICSS420 - Security                                 29
Key Distribution Center
• With the previous example, you would need n
  different keys to talk to n different people
     – Perhaps the same key could be used for an entire
       session
• An alternative approach is to use a key distribution
  center (KDC)
     – The KDC stores a single key for each user
     – Authentication and session key management goes
       through the KDC

04/29/12                  ICSS420 - Security              30
KDC

               A, KA(B,KS)                        KB(A,KS)
                                  KDC
               A, KA(C,KS)                        KC(A,KS)    B
A
                             KS(message1)


                                                              C
                             KS(message2)

    04/29/12                 ICSS420 - Security              31
Analysis
• Authentication comes for free
     – The KDC knows the message came from A
     – B knows the first message came from the KDC
     – B knows the third message came from A




04/29/12              ICSS420 - Security         32
Replay Attack

               A, KA(B,KS)
                                  KDC
                                                   KB(A,KS)


A                            KS(message)                         B

                                                   KB(A,KS)
                                    C
                                                  KS(message)


    04/29/12                 ICSS420 - Security                 33
Solutions
• Timestamp messages
     – Obsolete messages are discarded
     – Clocks cannot be perfectly synchronized
     – So timestamps are valid for an interval
• Unique message numbers (nonce)
     – Each party remembers all previous nonces
     – Messages with used nonces are rejected
     – Nonces have to be remembered forever

04/29/12              ICSS420 - Security          34
Needham-Schroeder
                                      RA, A, B
                                                                            KDC
                KA(RA, B, KS, KB(A,KS))
                       Not a replay     Who the          Ticket
                                        ticket is for




A               Challenge B                             KB(A,KS), KS(RA2)                      B
               Must be B, Challenge A                       KS(RA2-1), RB

                                                                  KS(RB-1)        Must be A




                                                             KS(message)

    04/29/12                                                 ICSS420 - Security               35
Attack
                    Obtains an old
                    session key
                                        Replays old message (RA2 could
                                        be different)



X               Challenge B             KB(A,KS), KS(RA2)                             B
               Must be B, Challenge A      KS(RA2-1), RB

                                              KS(RB-1)                   Must be A




                                            KS(message)

    04/29/12                                ICSS420 - Security                       36
Otway-Rees
                       A, B, R, KA(A,B,R,RA)

                                                A, KA(A,B,R,RA),
                                                B, KB(A,B,R,RB)
A                                                                   B
                                 KDC               KB(RB,KS)

               KA(RA,KS)



    04/29/12               ICSS420 - Security                      37
Kerberos
    Authentication
       Server



                                      Client

Trusted server, repository of
keys, protected by a nasty three-
headed dog (Kerberos of Greek
mytholodgy)                                               Server


  04/29/12                           ICSS420 - Security            38
Kerberos
 Authentication                                 Encrypted for client
    Server                                      Encrypted for server

    Ticket
      Client ID             Client
     Session Key

     Session Key   After message arrives,
                   user is prompted for
                   password which is used       Server
                   to decrypt the message



04/29/12                   ICSS420 - Security                 39
Kerberos
 Authentication                                Encrypted for client
    Server                                     Encrypted for server



           Session Key     Client

           Ticket
            Client ID
           Session Key                         Server


04/29/12                  ICSS420 - Security                 40
Kerberos
 Authentication                                Encrypted for client
    Server                                     Encrypted for server



           Session Key
                            Client


                         Ticket
                          Client ID            Server
                         Session Key


04/29/12                  ICSS420 - Security                 41
Kerberos
 Authentication                                 Encrypted for client
    Server                                      Encrypted for server



           Session Key
                           Client




                                                Server
                                   Client ID
                                  Session Key

04/29/12                  ICSS420 - Security                  42
Kerberos
 Authentication                         Encrypted for client
    Server                              Encrypted for server
                                        Encrypted for session

                    Client

                      Message

                                        Server


04/29/12           ICSS420 - Security                 43
Authentication
• User/process authentication
     – Is this user/process who it claims to be?
           • Passwords
           • More sophisticated mechanisms
• Authentication in networks
     – Is this computer who it claims to be?
           • File downloading
           • Obtaining network services

04/29/12                    ICSS420 - Security     44
Public-Key Authentication

                             PublicB(A,RA)



            A   Must be B   PublicA(RA,RB, KS)                  B



                                  KS(RB)            Must be A




04/29/12                       ICSS420 - Security                   45
Challenge Response
                       A
                      RB

                   KAB(RB)
      A                               B
                      RA

                    KAB(RA)

                KAB(Message)


04/29/12         ICSS420 - Security       46
Challenge Response
                   A, RA




      A          RB, KAB(RA)          B



                    KAB(RB)


04/29/12         ICSS420 - Security       47
Reflection Attack
                              A, RX

                           RB, KAB(RX)
           Needs KAB(RB)

      X                         A, RB           B

                           RB2, KAB(RB)

                              KAB(RB)


04/29/12                   ICSS420 - Security       48
The Lesson
• Designing a correct authentication protocol
  is harder than it looks
• General rules
     – Have the initiator prove who they are before the
       responder has to
     – Have the initiator and responder use different
       keys for proof
     – Have the initiator and challenger draw their
       challenges from different sets
04/29/12               ICSS420 - Security            49
Digital Signatures
• Public key systems can also be used to provide
  message authentication:
     – The sender’s secret key can be used to encrypt a
       message, thereby signing it
     – This creates a digital signature of a message, which the
       recipient (or anyone else) can check by using the
       sender's public key to decrypt it.
     – This proves that the sender was the true originator of
       the message, and that the message has not been
       subsequently altered by anyone else
04/29/12                  ICSS420 - Security                  50
Secure Shell
• Secure Shell (ssh/ssh2) is a tool for improving
  Internet security by providing
     – Strong authentication
     – All communications are automatically and
       transparently encrypted
     – X11 connection forwarding provides secure X11
       sessions
     – Arbitrary TCP/IP ports can be redirected over the
       encrypted channel in both directions.
     – The client RSA-authenticates the server machine in the
       beginning of every connection
04/29/12                  ICSS420 - Security                51
How It Works
• SSH uses both authentication and
  encryption
     – Authentication is done using RSA
       public/private keys
     – Encryption can be done using a variety of
       algorithms
           • IDEA (default)
           • DES
           • 3DES
           • Blowfish

04/29/12                      ICSS420 - Security   52
SSH in Action

                   Random string encrypted with
                   public key for mordor                     Public/private keys
                                                             stored on mordor




                   Mordor returns unencrypted string
                   If the string matches what was sent,
                   mordor has been authenticated
Public key for
mordor available
on laptop

                      Both hosts authenticate themselves!!

 04/29/12                        ICSS420 - Security                      53
User Authentication
• User name and password sent to remote
  host encrypted with host’s public key
• Host sends random session key encrypted
  with user’s public key
• Session key is decrypted
• User is authenticated
• Rest of conversation is encrypted using
  IDEA
04/29/12         ICSS420 - Security         54

Mais conteúdo relacionado

Mais procurados

BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniShellmates
 
Overflowing attack potential, scoring defence in-depth
Overflowing attack potential, scoring defence in-depthOverflowing attack potential, scoring defence in-depth
Overflowing attack potential, scoring defence in-depthJavier Tallón
 
Network Security
Network SecurityNetwork Security
Network Securityhj43us
 
NetExplorer security leaflet
NetExplorer security leafletNetExplorer security leaflet
NetExplorer security leafletNetExplorer
 
Linux Network Security
Linux Network SecurityLinux Network Security
Linux Network SecurityAmr Ali
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementStuart Marsh
 
CarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and NowCarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and NowTyler Shields
 
2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinux2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinuxShawn Wells
 
Secure Multicast Conferencing
Secure Multicast ConferencingSecure Multicast Conferencing
Secure Multicast Conferencingblogzilla
 
Security in Data Communication and Networking
Security in Data Communication and NetworkingSecurity in Data Communication and Networking
Security in Data Communication and NetworkingZahidul Hossain
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...Shawn Wells
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgEric Vanderburg
 
Towards secure & dependable storage services in cloud
Towards secure & dependable storage services in cloudTowards secure & dependable storage services in cloud
Towards secure & dependable storage services in cloudRahid Abdul Kalam
 

Mais procurados (17)

BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
 
Security framework
Security frameworkSecurity framework
Security framework
 
Overflowing attack potential, scoring defence in-depth
Overflowing attack potential, scoring defence in-depthOverflowing attack potential, scoring defence in-depth
Overflowing attack potential, scoring defence in-depth
 
Network Security
Network SecurityNetwork Security
Network Security
 
NetExplorer security leaflet
NetExplorer security leafletNetExplorer security leaflet
NetExplorer security leaflet
 
Linux Network Security
Linux Network SecurityLinux Network Security
Linux Network Security
 
Crypto academy
Crypto academyCrypto academy
Crypto academy
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
CarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and NowCarolinaCon 2008 Rootkits Then and Now
CarolinaCon 2008 Rootkits Then and Now
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinux2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinux
 
Secure Multicast Conferencing
Secure Multicast ConferencingSecure Multicast Conferencing
Secure Multicast Conferencing
 
Security in Data Communication and Networking
Security in Data Communication and NetworkingSecurity in Data Communication and Networking
Security in Data Communication and Networking
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
Cryptppt1
Cryptppt1Cryptppt1
Cryptppt1
 
Towards secure & dependable storage services in cloud
Towards secure & dependable storage services in cloudTowards secure & dependable storage services in cloud
Towards secure & dependable storage services in cloud
 

Destaque

Ff university oct 2015
Ff university oct 2015Ff university oct 2015
Ff university oct 2015douglaslyon
 
Ci venture engineering deans
Ci venture engineering deansCi venture engineering deans
Ci venture engineering deansdouglaslyon
 
The bahamas1
The bahamas1The bahamas1
The bahamas1finlhan17
 
Jamaica
JamaicaJamaica
JamaicaMrDude
 
2010 Working Together for Student Success
2010 Working Together for Student Success2010 Working Together for Student Success
2010 Working Together for Student SuccessWCET
 
2010 Stein pk
2010 Stein pk2010 Stein pk
2010 Stein pkWCET
 
2010 E portfolios
2010 E portfolios2010 E portfolios
2010 E portfoliosWCET
 
2010 Bringing Life to Asynchronous Education
2010 Bringing Life to Asynchronous Education2010 Bringing Life to Asynchronous Education
2010 Bringing Life to Asynchronous EducationWCET
 
Infrastructure for digital_integration
Infrastructure for digital_integrationInfrastructure for digital_integration
Infrastructure for digital_integrationWCET
 
cfactor Social Business Solutions
cfactor Social Business Solutionscfactor Social Business Solutions
cfactor Social Business Solutionsggivan
 
2011State authorization 3
2011State authorization 32011State authorization 3
2011State authorization 3WCET
 
2010 Developing high quality online doctoral programs2
2010 Developing high quality online doctoral programs22010 Developing high quality online doctoral programs2
2010 Developing high quality online doctoral programs2WCET
 

Destaque (20)

Option
OptionOption
Option
 
Ff university oct 2015
Ff university oct 2015Ff university oct 2015
Ff university oct 2015
 
Ci venture engineering deans
Ci venture engineering deansCi venture engineering deans
Ci venture engineering deans
 
The bahamas
The bahamasThe bahamas
The bahamas
 
Richest 2012
Richest 2012Richest 2012
Richest 2012
 
The bahamas
The bahamasThe bahamas
The bahamas
 
The bahamas1
The bahamas1The bahamas1
The bahamas1
 
RADAR X band
RADAR X bandRADAR X band
RADAR X band
 
The bahamas
The bahamasThe bahamas
The bahamas
 
Jamaica
JamaicaJamaica
Jamaica
 
NiceShirtPitch
NiceShirtPitchNiceShirtPitch
NiceShirtPitch
 
2010 Working Together for Student Success
2010 Working Together for Student Success2010 Working Together for Student Success
2010 Working Together for Student Success
 
2010 Stein pk
2010 Stein pk2010 Stein pk
2010 Stein pk
 
2010 E portfolios
2010 E portfolios2010 E portfolios
2010 E portfolios
 
Ozono
OzonoOzono
Ozono
 
2010 Bringing Life to Asynchronous Education
2010 Bringing Life to Asynchronous Education2010 Bringing Life to Asynchronous Education
2010 Bringing Life to Asynchronous Education
 
Infrastructure for digital_integration
Infrastructure for digital_integrationInfrastructure for digital_integration
Infrastructure for digital_integration
 
cfactor Social Business Solutions
cfactor Social Business Solutionscfactor Social Business Solutions
cfactor Social Business Solutions
 
2011State authorization 3
2011State authorization 32011State authorization 3
2011State authorization 3
 
2010 Developing high quality online doctoral programs2
2010 Developing high quality online doctoral programs22010 Developing high quality online doctoral programs2
2010 Developing high quality online doctoral programs2
 

Semelhante a 07security

MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppthalosidiq1
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017FRSecure
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subjectdeepan v
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryptionrajakhurram
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.pptPandiya Rajan
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 

Semelhante a 07security (20)

MyTutorialON Cryptography.ppt
MyTutorialON Cryptography.pptMyTutorialON Cryptography.ppt
MyTutorialON Cryptography.ppt
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
cryptography deepan fav subject
cryptography deepan fav subjectcryptography deepan fav subject
cryptography deepan fav subject
 
chapter 8.ppt
chapter 8.pptchapter 8.ppt
chapter 8.ppt
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
 
Lect19
Lect19Lect19
Lect19
 
DGRZETICH_TDC531_Presentation
DGRZETICH_TDC531_PresentationDGRZETICH_TDC531_Presentation
DGRZETICH_TDC531_Presentation
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
ch15.pdf
ch15.pdfch15.pdf
ch15.pdf
 

Último

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Último (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

07security

  • 1. Security • In most systems security is an important concern – Communications should be secure against eavesdropping and tampering – Servers/clients should be able to verify the identity of their clients/servers – The originator of a message should be verifiable after the message has been delivered 04/29/12 ICSS420 - Security 1
  • 2. Policy vs. Mechanism • Security policies – Who can access what resource – Defines the appropriate levels of security • Security Mechanisms – Techniques used to implement the security policies 04/29/12 ICSS420 - Security 2
  • 3. Principal • The agents accessing the information or resources – Human beings – Servers – Applications • Principals with the same access rights are often collected together in groups • Each principal has a unique user identifier associated with it 04/29/12 ICSS420 - Security 3
  • 4. Threats • Security threats common to computer systems fall into four broad classes – Leakage • Acquisition of information by unauthorized parties – Tampering • The unauthorized alteration of information – Resource Stealing – Vandalism 04/29/12 ICSS420 - Security 4
  • 5. Methods of Attack • Some common methods of attack include – Eavesdropping • Information in transit • Information in storage – Masquerading • Sending/receiving messages using the identity of another user – Message Tampering – Replaying • Storing messages and sending them at a later date – Denial of Service 04/29/12 ICSS420 - Security 5
  • 6. Infiltration • Attacker must have access to the system in order to attack – Password cracking – Virus • Attaches itself to an existing program – Worm • Standalone program • Not always nasty!! – Trojan Horse 04/29/12 ICSS420 - Security 6
  • 7. Morris Worm rsh attack finger attack Grappling hook sendmail attack Request for worm Worm sent Worm Worm Target System Target System 04/29/12 ICSS420 - Security 7
  • 8. Security in a Network • In a networked system – The principal threats to security come from the openness of communication channels – Potential violators are not easily identifiable, so we must not assume trust. Assume untrustworthy until proven otherwise – The mechanisms used to implement security must be validated to a high standard 04/29/12 ICSS420 - Security 8
  • 9. Techniques • Security mechanisms are based on three techniques – Cryptography • Used to conceal information • Used in support of authentication • Used to implement digital signatures – Authentication • Validate the identity of the sender – Access Control • Allow resources to access only by authorized individuals 04/29/12 ICSS420 - Security 9
  • 10. Cryptography • Information can be encoded using a key when it is written (or transferred) – encryption • It is then decoded using a key when it is read (or received) – decryption • Very widely used for secure network transmission 04/29/12 ICSS420 - Security 10
  • 11. More on Cryptography encryption plaintext ciphertext decryption 04/29/12 ICSS420 - Security 11
  • 12. More on Cryptography Ke Kd C = EKe(plaintext) plaintext Encrypt Decrypt plaintext 04/29/12 ICSS420 - Security 12
  • 13. More on Cryptography Ke Kd C = EKe(plaintext) plaintext Encrypt Decrypt plaintext Side information Invader plaintext Cryptanalysis 04/29/12 ICSS420 - Security 13
  • 14. Cryptographic Systems Cryptographic Systems Conventional Systems Modern Systems •Ke and Kd are essentially the Private Key Public Key same •Ke and Kd are •Ke is public private •Kd is private 04/29/12 ICSS420 - Security 14
  • 15. Private Key Systems • In private key systems, such as the US Federal Data Encryption Standard (DES), a single key is used for both encryption and decryption • This means that both parties must know the key(s) before communication can take place – write it down ahead of time – have some sort of physical key – exchange key(s) via secure channels 04/29/12 ICSS420 - Security 15
  • 16. Block Ciphers • Many commonly used ciphers are block ciphers. – This means that they take a fixed-size block of data (usually 64 bits) – Transform it to another 64 bit block using a function selected by the key. 04/29/12 ICSS420 - Security 16
  • 17. Block Cipher Modes • If the same block is encrypted twice with the same key, the resulting ciphertext blocks are the same – It is desirable to make identical plaintext blocks encrypt to different ciphertext blocks. • Two methods are commonly used for this: – CFB mode: a ciphertext block is obtained by encrypting the previous ciphertext block, and xoring the resulting value with the plaintext. – CBC mode: a ciphertext block is obtained by first xoring the plaintext block with the previous ciphertext block, and encrypting the resulting value. 04/29/12 ICSS420 - Security 17
  • 18. Secret Key Systems • DES – Developed in the 1970s adopted as a standard by the US government – DES is a block cipher with 64-bit block size. It uses 56- bit keys. – This makes it fairly easy to break with modern computers or – A variant of DES, Triple-DES or 3DES is based on using DES three times (normally in an encrypt-decrypt- encrypt sequence with three different, unrelated keys). 04/29/12 ICSS420 - Security 18
  • 19. Secret Key Systems • Blowfish – An algorithm developed by Bruce Schneier. – It is a block cipher with 64-bit block size and variable length keys (up to 448 bits). – No attacks are known against it. • IDEA (International Data Encryption Algorithm) – Developed at ETH Zurich in Switzerland. – Uses a 128 bit key, and is considered to be very secure. – No practical attacks on it have been published despite numerous attempts to analyze it. 04/29/12 ICSS420 - Security 19
  • 20. Secret Key Systems • RC4 – The algorithm is very fast. – Its security is unknown, but breaking it does not seem trivial either. • SAFER – Developed by J. L. Massey (a developer of IDEA). – It is claimed to provide secure/fast encryption • Enigma – The cipher used by the Germans in World War II. – This cipher is used by the unix crypt(1) program 04/29/12 ICSS420 - Security 20
  • 21. Public Key Systems • In public key cryptosystems, everyone has two related complementary keys, a publicly revealed key and a secret key • Each key unlocks the code that the other key makes. Knowing the public key does not help you deduce the corresponding secret key • The public key can be published and widely disseminated across a communications network • This protocol provides security without the need to reveal the private key 04/29/12 ICSS420 - Security 21
  • 22. Public Key Systems Public Key Database Kpublic Kprivate C = EKpublic(plaintext) plaintext Encrypt Decrypt plaintext 04/29/12 ICSS420 - Security 22
  • 23. RSA • Rivest, Shamir and Adelman (RSA) – To find a key pair e and d: • Chose two large prime numbers, P and Q (each greater than 10100), and form – N=PxQ – Z = (P-1) x (Q-1) • For d chose any number relatively prime to Z • To find e solve the equation – e x d = 1 mod Z 04/29/12 ICSS420 - Security 23
  • 24. Comparison • Secret and public key systems – With suitable keys both are secure enough – Public-key systems are more convenient to implement because they do not require a secure channel to exchange keys – Secret-key systems are faster 04/29/12 ICSS420 - Security 24
  • 25. Establishing a Shared Key • In order for a symmetrical system to work, both parties need to know a shared key • Is it possible for two parties to safely use the network to agree on a shared key? – To put this another way, can two machines agree on a common number such that anyone who listens to that conversation can determine the number? 04/29/12 ICSS420 - Security 25
  • 26. Diffie-Hellman Key Exchange n and g, both are prime, public and special. A picks x in private, B picks y in private n, g, gx mod n A gy mod n B Compute (gy mod n)x mod n = Compute (gx mod n)y mod n = gxy mod n gxy mod n 04/29/12 ICSS420 - Security 26
  • 27. It Works!! • n=47, g=3 • I’ll pick a small x, you pick a small y • I send to you – (47, 3, 9) • You send to me – 3y mod 47 (call it z) • I compute zx mod 47 • You compute 9y mod 47 04/29/12 ICSS420 - Security 27
  • 28. To Break it • You know – n = 47, g = 3 • You also know – gx mod n = 9 – gy mod n = z • You need to solve the equation – zx mod 47 = 9y mod 47 04/29/12 ICSS420 - Security 28
  • 29. Bucket Brigade Also known as the person in the middle attack n, g, gx mod n gq mod n A X B n, g, gq mod n gy mod n Session key S Session key R 04/29/12 ICSS420 - Security 29
  • 30. Key Distribution Center • With the previous example, you would need n different keys to talk to n different people – Perhaps the same key could be used for an entire session • An alternative approach is to use a key distribution center (KDC) – The KDC stores a single key for each user – Authentication and session key management goes through the KDC 04/29/12 ICSS420 - Security 30
  • 31. KDC A, KA(B,KS) KB(A,KS) KDC A, KA(C,KS) KC(A,KS) B A KS(message1) C KS(message2) 04/29/12 ICSS420 - Security 31
  • 32. Analysis • Authentication comes for free – The KDC knows the message came from A – B knows the first message came from the KDC – B knows the third message came from A 04/29/12 ICSS420 - Security 32
  • 33. Replay Attack A, KA(B,KS) KDC KB(A,KS) A KS(message) B KB(A,KS) C KS(message) 04/29/12 ICSS420 - Security 33
  • 34. Solutions • Timestamp messages – Obsolete messages are discarded – Clocks cannot be perfectly synchronized – So timestamps are valid for an interval • Unique message numbers (nonce) – Each party remembers all previous nonces – Messages with used nonces are rejected – Nonces have to be remembered forever 04/29/12 ICSS420 - Security 34
  • 35. Needham-Schroeder RA, A, B KDC KA(RA, B, KS, KB(A,KS)) Not a replay Who the Ticket ticket is for A Challenge B KB(A,KS), KS(RA2) B Must be B, Challenge A KS(RA2-1), RB KS(RB-1) Must be A KS(message) 04/29/12 ICSS420 - Security 35
  • 36. Attack Obtains an old session key Replays old message (RA2 could be different) X Challenge B KB(A,KS), KS(RA2) B Must be B, Challenge A KS(RA2-1), RB KS(RB-1) Must be A KS(message) 04/29/12 ICSS420 - Security 36
  • 37. Otway-Rees A, B, R, KA(A,B,R,RA) A, KA(A,B,R,RA), B, KB(A,B,R,RB) A B KDC KB(RB,KS) KA(RA,KS) 04/29/12 ICSS420 - Security 37
  • 38. Kerberos Authentication Server Client Trusted server, repository of keys, protected by a nasty three- headed dog (Kerberos of Greek mytholodgy) Server 04/29/12 ICSS420 - Security 38
  • 39. Kerberos Authentication Encrypted for client Server Encrypted for server Ticket Client ID Client Session Key Session Key After message arrives, user is prompted for password which is used Server to decrypt the message 04/29/12 ICSS420 - Security 39
  • 40. Kerberos Authentication Encrypted for client Server Encrypted for server Session Key Client Ticket Client ID Session Key Server 04/29/12 ICSS420 - Security 40
  • 41. Kerberos Authentication Encrypted for client Server Encrypted for server Session Key Client Ticket Client ID Server Session Key 04/29/12 ICSS420 - Security 41
  • 42. Kerberos Authentication Encrypted for client Server Encrypted for server Session Key Client Server Client ID Session Key 04/29/12 ICSS420 - Security 42
  • 43. Kerberos Authentication Encrypted for client Server Encrypted for server Encrypted for session Client Message Server 04/29/12 ICSS420 - Security 43
  • 44. Authentication • User/process authentication – Is this user/process who it claims to be? • Passwords • More sophisticated mechanisms • Authentication in networks – Is this computer who it claims to be? • File downloading • Obtaining network services 04/29/12 ICSS420 - Security 44
  • 45. Public-Key Authentication PublicB(A,RA) A Must be B PublicA(RA,RB, KS) B KS(RB) Must be A 04/29/12 ICSS420 - Security 45
  • 46. Challenge Response A RB KAB(RB) A B RA KAB(RA) KAB(Message) 04/29/12 ICSS420 - Security 46
  • 47. Challenge Response A, RA A RB, KAB(RA) B KAB(RB) 04/29/12 ICSS420 - Security 47
  • 48. Reflection Attack A, RX RB, KAB(RX) Needs KAB(RB) X A, RB B RB2, KAB(RB) KAB(RB) 04/29/12 ICSS420 - Security 48
  • 49. The Lesson • Designing a correct authentication protocol is harder than it looks • General rules – Have the initiator prove who they are before the responder has to – Have the initiator and responder use different keys for proof – Have the initiator and challenger draw their challenges from different sets 04/29/12 ICSS420 - Security 49
  • 50. Digital Signatures • Public key systems can also be used to provide message authentication: – The sender’s secret key can be used to encrypt a message, thereby signing it – This creates a digital signature of a message, which the recipient (or anyone else) can check by using the sender's public key to decrypt it. – This proves that the sender was the true originator of the message, and that the message has not been subsequently altered by anyone else 04/29/12 ICSS420 - Security 50
  • 51. Secure Shell • Secure Shell (ssh/ssh2) is a tool for improving Internet security by providing – Strong authentication – All communications are automatically and transparently encrypted – X11 connection forwarding provides secure X11 sessions – Arbitrary TCP/IP ports can be redirected over the encrypted channel in both directions. – The client RSA-authenticates the server machine in the beginning of every connection 04/29/12 ICSS420 - Security 51
  • 52. How It Works • SSH uses both authentication and encryption – Authentication is done using RSA public/private keys – Encryption can be done using a variety of algorithms • IDEA (default) • DES • 3DES • Blowfish 04/29/12 ICSS420 - Security 52
  • 53. SSH in Action Random string encrypted with public key for mordor Public/private keys stored on mordor Mordor returns unencrypted string If the string matches what was sent, mordor has been authenticated Public key for mordor available on laptop Both hosts authenticate themselves!! 04/29/12 ICSS420 - Security 53
  • 54. User Authentication • User name and password sent to remote host encrypted with host’s public key • Host sends random session key encrypted with user’s public key • Session key is decrypted • User is authenticated • Rest of conversation is encrypted using IDEA 04/29/12 ICSS420 - Security 54