SlideShare a Scribd company logo
Data Security & Cryptology 
http://sohamsironline.weeby.com 8-1 
Monday, October 13, 2014
Data & Network Security 
Chapter goals: 
 understand principles of network security: 
 cryptography and its many uses beyond 
“confidentiality” 
 authentication 
 message integrity 
 key distribution 
http://sohamsironline.weeby.com 8-2 
 security in practice: 
 firewalls 
 security in application, transport, network, link 
layers 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-3 
Our roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Integrity 
8.5 Key Distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
Monday, October 13, 2014
What is network security? 
Confidentiality: only sender, intended receiver 
should “understand” message contents 
http://sohamsironline.weeby.com 8-4 
 sender encrypts message 
 receiver decrypts message 
Authentication: sender, receiver want to confirm 
identity of each other 
Message Integrity: sender, receiver want to ensure 
message not altered (in transit, or afterwards) 
without detection 
Access and Availability: services must be accessible 
and available to users 
Monday, October 13, 2014
Friends and enemies: Alice, Bob, Trudy 
 well-known in network security world 
 Bob, Alice (Friends) want to communicate “securely” 
 Trudy (intruder) may intercept, delete, add messages 
Alice Bob 
http://sohamsironline.weeby.com 8-5 
secure 
sender 
secure 
receiver 
channel data, control 
messages 
data data 
Trudy 
Monday, October 13, 2014
Who might Bob, Alice be? 
 … well, real-life Bobs and Alices! 
 Web browser/server for electronic 
transactions (e.g., on-line purchases) 
 on-line banking client/server 
 DNS servers 
 routers exchanging routing table updates 
 other examples? 
http://sohamsironline.weeby.com 8-6 
Monday, October 13, 2014
There are bad guys (and girls) out there! 
Q: What can a “bad guy” do? 
A: a lot! 
 eavesdrop: intercept messages 
 actively insert messages into connection 
 impersonation: can fake (spoof) source address 
in packet (or any field in packet) 
 hijacking: “take over” ongoing connection by 
removing sender or receiver, inserting himself 
in place 
 denial of service: prevent service from being 
used by others (e.g., by overloading resources) 
http://sohamsironline.weeby.com 8-7 
more on this later …… 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-8 
Our roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Integrity 
8.5 Key Distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
Monday, October 13, 2014
The language of cryptography 
plaintext ciphertext plaintext 
symmetric key crypto: sender, receiver keys identical 
public-key crypto: encryption key public, decryption key 
secret (private) 
http://sohamsironline.weeby.com 8-9 
KA 
encryption 
algorithm 
decryption 
algorithm 
Alice’s 
encryption 
key 
Bob’s 
decryption 
key 
KB 
Monday, October 13, 2014
Symmetric key cryptography 
ceasar cipher: substitute w/ offset of k 
plaintext: abcdefghijklmnopqrstuvwxyz 
plaintext: uvwxyzabcdefghijklmnopqrst 
Plaintext: bob. i love india. 
ciphertext: viv. c fipy chxcu 
http://sohamsironline.weeby.com 8-10 
E.g.: 
Q: How hard to break this simple cipher?: 
 brute force (how hard?) 
 other? 
Monday, October 13, 2014
Symmetric key cryptography 
substitution cipher: substituting one thing for another 
 monoalphabetic cipher: substitute one letter for another 
plaintext: abcdefghijklmnopqrstuvwxyz 
ciphertext: mnbvcxzasdfghjklpoiuytrewq 
Plaintext: bob. i love you. alice 
ciphertext: nkn. s gktc wky. mgsbc 
http://sohamsironline.weeby.com 8-11 
E.g.: 
Q: How hard to break this simple cipher?: 
 brute force (how hard?) 
 other? 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-12 
Puzzle 
 64! = 1.2680e+89 
 Come up with a cryptographic scheme that 
has 64!^2 possible keys 
 64^4? 
 How long will it take to crack these, in 
days, if it you can test 1 key per second? 
 1.6*10^178/86400 
 1.6*10^356/86400 
Monday, October 13, 2014
Symmetric key cryptography 
ciphertext plaintext 
symmetric key crypto: Bob and Alice share same 
(symmetric) key: K 
 e.g., key is knowing substitution pattern in mono 
alphabetic substitution cipher 
 Question!: how do Bob and Alice agree on key value? 
http://sohamsironline.weeby.com 8-13 
KA-B 
encryption 
algorithm 
decryption 
algorithm 
A-B 
KA-B 
plaintext 
message, m 
K (m) A-B K (m) m = K ( A - B ) A-B 
Monday, October 13, 2014
Symmetric key crypto: DES 
DES: Data Encryption Standard 
 US encryption standard [NIST 1993] 
 56-bit symmetric key, 64-bit plaintext input 
 How secure is DES? 
 DES Challenge: 56-bit-key-encrypted phrase 
(“Strong cryptography makes the world a safer 
place”) decrypted (brute force) in 4 months 
 no known “backdoor” decryption approach 
http://sohamsironline.weeby.com 8-14 
 making DES more secure: 
 use three keys sequentially (3-DES) on each datum 
 use cipher-block chaining 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-15 
Public Key Cryptography 
symmetric key crypto 
 requires sender, 
receiver know shared 
secret key 
 Q: how to agree on key 
in first place 
(particularly if never 
“met”)? 
public key cryptography 
 radically different 
approach [Diffie- 
Hellman76, RSA78] 
 sender, receiver do 
not share secret key 
 public encryption key 
known to all 
 private decryption 
key known only to 
receiver 
Monday, October 13, 2014
Bob’s public 
key 
K B + 
Bob’s private 
key 
K B - 
+ 
B - 
http://sohamsironline.weeby.com 8-16 
Public key cryptography 
plaintext 
message, m 
encryption ciphertext 
algorithm 
decryption 
algorithm 
plaintext 
K (m) message B + 
m = K (K (m)) B 
Monday, October 13, 2014
Public key encryption algorithms 
need K ( B ) and K B ( ) such that . . 
+ - 
K - (K + 
(m)) = m B B 
+ 
given public key K , it should be impossible to compute private key K 
http://sohamsironline.weeby.com 8-17 
- 
B 
B 
Requirements: 
1 
2 
RSA: Rivest, Shamir, Adelson algorithm 
Monday, October 13, 2014
RSA: Encryption, decryption 
Assume m = (m e mod n)d mod n 
1. To encrypt bit pattern, m, compute 
c = m e mod n (i.e., remainder when me is divided by n) 
2. To decrypt received bit pattern, c, compute 
m = c d mod n (i.e., remainder when cd is divided by n) 
http://sohamsironline.weeby.com 8-18 
c 
Monday, October 13, 2014
RSA: How? m = (m e mod n)d mod n 
Useful number theory result: If p,q prime and 
n = pq, then: 
x y mod n = x y m o d ( p - 1 ) ( q - 1 ) mod n 
(using number theory result above) 
(So we choose ed to be divisible by 
http://sohamsironline.weeby.com 8-19 
(m e mod n) d mod n = m e d mod n 
= m e d m o d ( p - 1 ) ( q - 1 ) mod n 
= m 1 mod n 
= m 
(p-1)(q-1) with remainder 1 ) 
Monday, October 13, 2014
RSA: Choosing keys 
1. Choose two large prime numbers p, q. 
(e.g., 1024 bits each) 
2. Compute n = pq, z = (p-1)(q-1) 
3. Choose e (with en) that has no common factors 
with z. (e, z are “relatively prime”). 
4. Choose d such that ed-1 is exactly divisible by z. 
(in other words: ed mod z = 1 ). 
5. Public key is (n,e). Private key is (n,d). 
http://sohamsironline.weeby.com 8-20 
K B + 
K B - 
Monday, October 13, 2014
RSA example: 
Bob chooses p=5, q=7. Then n=35, z=24. 
e=5 (so e, z relatively prime). 
d=29 (so ed-1 exactly divisible by z. 
letter m me c = me mod n 
l 12 1524832 17 
cd letter 
c m = cd mod n 
17 481968572106750915091411825223071697 12 
l 
http://sohamsironline.weeby.com 8-21 
encrypt: 
decrypt: 
Monday, October 13, 2014
RSA: another important property 
The following property will be very useful later: 
- + K B (K B (m)) 
http://sohamsironline.weeby.com 8-22 
K B (KB (m)) = m 
+ - 
= 
use public key 
first, followed 
by private key 
use private key 
first, followed 
by public key 
Result is the same! 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-23 
Our roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Integrity 
8.5 Key Distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
Monday, October 13, 2014
Authentication 
Goal: Bob wants Alice to “prove” her identity 
to him 
Protocol ap1.0: Alice says “I am Alice” 
Failure scenario?? 
http://sohamsironline.weeby.com 8-24 
“I am Alice” 
Monday, October 13, 2014
Authentication 
Goal: Bob wants Alice to “prove” her identity 
to him 
Protocol ap1.0: Alice says “I am Alice” 
in a network, 
Bob can not “see” 
Alice, so Trudy simply 
declares 
herself to be Alice 
http://sohamsironline.weeby.com 8-25 
“I am Alice” 
Monday, October 13, 2014
Authentication: another try 
Protocol ap2.0: Alice says “I am Alice” in an IP packet 
containing her source IP address 
Failure scenario?? 
http://sohamsironline.weeby.com 8-26 
Alice’s “I am Alice” 
IP address 
Monday, October 13, 2014
Authentication: another try 
Protocol ap2.0: Alice says “I am Alice” in an IP packet 
containing her source IP address 
Trudy can create 
a packet 
“spoofing” 
Alice’s “I am Alice” Alice’s address 
IP address 
http://sohamsironline.weeby.com 8-27 
Monday, October 13, 2014
Authentication: another try 
Protocol ap3.0: Alice says “I am Alice” and sends her 
secret password to “prove” it. 
Failure scenario?? 
http://sohamsironline.weeby.com 8-28 
Alice’s 
password 
Alice’s “I’m Alice” 
IP addr 
Alice’s OK 
IP addr 
Monday, October 13, 2014
Authentication: another try 
Protocol ap3.0: Alice says “I am Alice” and sends her 
secret password to “prove” it. 
playback attack: Trudy 
records Alice’s packet 
and later 
plays it back to Bob 
http://sohamsironline.weeby.com 8-29 
Alice’s 
password 
Alice’s “I’m Alice” 
IP addr 
Alice’s OK 
IP addr 
Alice’s 
password 
Alice’s “I’m Alice” 
IP addr 
Monday, October 13, 2014
Authentication: yet another try 
Protocol ap3.1: Alice says “I am Alice” and sends her 
encrypted secret password to “prove” it. 
Failure scenario?? 
http://sohamsironline.weeby.com 8-30 
encrypted 
password 
Alice’s “I’m Alice” 
IP addr 
Alice’s OK 
IP addr 
Monday, October 13, 2014
Authentication: another try 
Protocol ap3.1: Alice says “I am Alice” and sends her 
encrypted secret password to “prove” it. 
record 
and 
playback 
still works! 
http://sohamsironline.weeby.com 8-31 
encrypted 
password 
Alice’s “I’m Alice” 
IP addr 
Alice’s OK 
IP addr 
encrypted 
password 
Alice’s “I’m Alice” 
IP addr 
Monday, October 13, 2014
Authentication: yet another try 
Goal: avoid playback attack 
Nonce: number (R) used only once –in-a-lifetime 
ap4.0: to prove Alice “live”, Bob sends Alice nonce, R. 
http://sohamsironline.weeby.com 8-32 
Failures, drawbacks? 
Alice 
must return R, encrypted with shared secret key 
“I am Alice” 
R 
K (R) A-B 
Alice is live, and 
only Alice knows 
key to encrypt 
nonce, so it must 
be Alice! 
Monday, October 13, 2014
Authentication: ap5.0 
ap4.0 requires shared symmetric key 
 can we authenticate using public key techniques? 
ap5.0: use nonce, public key cryptography 
KA 
+ 
- http://sohamsironline.weeby.com 8-33 
“I am Alice” 
R 
Bob computes 
K (R) A - 
“send me your public key” 
+ 
KA 
(K A (R)) = R 
and knows only Alice 
could have the private 
key, that encrypted R 
such - 
that 
(KA (R)) = R 
K A + 
Monday, October 13, 2014
ap5.0: security hole 
Man (woman) in the middle attack: Trudy poses as 
Alice (to Bob) and as Bob (to Alice) 
I am Alice I am Alice 
K - (R) 
+ 
+ 
http://sohamsironline.weeby.com 8-34 
R 
T 
Send me your public key 
K T 
K - (R) 
A 
Send me your public key 
+ 
K A 
K T (m) 
Trudy gets 
T 
+m = K - 
(K (m)) sends T 
m to Alice 
encrypted with 
Alice’s public key 
+ 
KA (m) 
A 
m = K - 
(K (m)) A 
+R 
Monday, October 13, 2014
ap5.0: security hole 
Man (woman) in the middle attack: Trudy poses as 
Alice (to Bob) and as Bob (to Alice) 
Difficult to detect: 
 Bob receives everything that Alice sends, and vice 
versa. (e.g., so Bob, Alice can meet one week later and 
recall conversation) 
 problem is that Trudy receives all messages as well! 
http://sohamsironline.weeby.com 8-35 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-36 
Updated roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Message integrity 
8.5 Key Distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-37 
Digital Signatures 
Cryptographic technique analogous to hand-written 
signatures. 
 sender (Bob) digitally signs document, 
establishing he is document owner/creator. 
 verifiable, nonforgeable: recipient (Alice) can 
prove to someone that Bob, and no one else 
(including Alice), must have signed document 
Monday, October 13, 2014
Digital Signatures 
Simple digital signature for message m: 
 Bob signs m by encrypting with his private key 
KB, creating “signed” message, KB - (-m) 
Bob’s private 
key K B - 
K B - 
(m) 
http://sohamsironline.weeby.com 8-38 
Bob’s message, m 
Dear Alice 
Oh, how I have missed 
you. I think of you all the 
time! …(blah blah blah) 
Bob 
Public key 
encryption 
algorithm 
Bob’s message, 
m, signed 
(encrypted) with 
his private key 
Monday, October 13, 2014
- 
http://sohamsironline.weeby.com 8-39 
Digital Signatures (more) 
 Suppose Alice receives msg m, digital signature K(m) 
B Alice verifies m signed by Bob by applying Bob’s 
+ public key Kto K(m) then checks K(+ 
K(m) ) = m. 
- 
B BBB If K(K(m) ) = m, whoever signed m must have used 
BBBob’s private key. 
- 
- - 
+ 
Alice thus verifies that: 
 Bob signed m. 
 No one else signed m. 
 Bob signed m and not m’. 
Non-repudiation: 
 Alice can take m, and signature KB(m) to 
court and prove that Bob signed m. 
Monday, October 13, 2014
large 
message 
H: Hash 
Function 
H(m) 
http://sohamsironline.weeby.com 8-40 
Message Digests 
Computationally expensive 
to public-key-encrypt 
long messages 
Goal: fixed-length, easy-to- 
compute digital 
“fingerprint” 
 apply hash function H 
to m, get fixed size 
message digest, H(m). 
m 
Hash function properties: 
 many-to-1 
 produces fixed-size msg 
digest (fingerprint) 
 given message digest x, 
computationally 
infeasible to find m such 
that x = H(m) 
Monday, October 13, 2014
Internet checksum: poor crypto hash 
function 
Internet checksum has some properties of hash function: 
 produces fixed length digest (16-bit sum) of message 
 is many-to-one 
But given message with given hash value, it is easy to find 
another message with same hash value: 
message ASCII format 
http://sohamsironline.weeby.com 8-41 
message ASCII format 
I O U 1 
0 0 . 9 
9 B O B 
49 4F 55 31 
30 30 2E 39 
39 42 4F 42 
B2 C1 D2 AC 
I O U 9 
0 0 . 1 
9 B O B 
49 4F 55 39 
30 30 2E 31 
39 42 4F 42 
different messages B2 C1 D2 AC 
but identical checksums! 
Monday, October 13, 2014
Digital signature = signed message digest 
encrypted 
msg digest 
- 
http://sohamsironline.weeby.com 8-42 
Bob sends digitally signed 
message: 
large 
message 
m 
H: Hash 
function H(m) 
digital 
signature 
(encrypt) 
Bob’s 
private 
key K B - 
+ 
Alice verifies signature and 
integrity of digitally signed 
message: 
encrypted 
msg digest 
- 
KB(H(m)) 
KB(H(m)) 
large 
message 
m 
H: Hash 
function 
H(m) 
digital 
signature 
(decrypt) 
H(m) 
Bob’s 
public 
key K B + 
equal 
? 
Monday, October 13, 2014
Hash Function Algorithms 
 MD5 hash function widely used (RFC 1321) 
 computes 128-bit message digest in 4-step 
process. 
 arbitrary 128-bit string x, appears difficult to 
construct msg m whose MD5 hash is equal to x. 
http://sohamsironline.weeby.com 8-43 
 SHA-1 is also used. 
 US standard [NIST, FIPS PUB 180-1] 
 160-bit message digest 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-44 
Our roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Integrity 
8.5 Key distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-45 
Trusted Intermediaries 
Symmetric key problem: 
How do two entities 
establish shared secret 
key over network? 
Solution: 
trusted key distribution 
center (KDC) acting as 
intermediary between 
entities 
Public key problem: 
When Alice obtains 
Bob’s public key (from 
web site, e-mail, 
diskette), how does she 
know it is Bob’s public 
key, not Trudy’s? 
Solution: 
trusted certification 
authority (CA) 
Monday, October 13, 2014
Key Distribution Center (KDC) 
Alice, Bob need shared symmetric key. 
KDC: server shares different secret key with each 
registered user (many users) 
Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for 
communicating with KDC. 
KP-KDC 
KB-KDC 
KX-KDC 
KY-KDC 
KZ-KDC 
http://sohamsironline.weeby.com 8-46 
KB-KDC 
KA-KDC 
KA-KDC 
KP-KDC 
KDC 
Monday, October 13, 2014
Key Distribution Center (KDC) 
Q: How does KDC allow Bob, Alice to determine shared 
symmetric secret key to communicate with each other? 
KDC 
generates 
R1 
http://sohamsironline.weeby.com 8-47 
Alice 
knows 
R1 
Bob knows to 
use R1 to 
communicate 
with Alice 
KA-KDC(A,B) 
KA-KDC(R1, KB-KDC(A,R1) ) 
KB-KDC(A,R1) 
Alice and Bob communicate: using R1 as 
session key for shared symmetric encryption 
Monday, October 13, 2014
Certification Authorities 
Certification authority (CA): binds public key to 
particular entity, E. 
E (person, router) registers its public key with CA. 
E provides “proof of identity” to CA. 
CA creates certificate binding E to its public key. 
certificate containing E’s public key digitally signed by CA 
– CA says “this is E’s public key” 
http://sohamsironline.weeby.com 8-48 
Bob’s 
public 
key K B + 
Bob’s 
identifying 
information 
digital 
signature 
(encrypt) 
CA 
private 
- 
key K CA 
K B + 
certificate for 
Bob’s public key, 
signed by CA 
Monday, October 13, 2014
Certification Authorities 
When Alice wants Bob’s public key: 
gets Bob’s certificate (Bob or elsewhere). 
apply CA’s public key to Bob’s certificate, get 
Bob’s public key 
Bob’s 
public 
key K B + 
http://sohamsironline.weeby.com 8-49 
digital 
signature 
(decrypt) 
CA 
public 
K + 
key CA 
K B + 
Monday, October 13, 2014
A certificate contains: 
Serial number (unique to issuer) 
info about certificate owner, including algorithm 
and key value itself (not shown) info about certificate issuer 
valid dates 
digital signature by issuer 
http://sohamsironline.weeby.com 8-50 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-51 
Chapter 8 roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Integrity 
8.5 Key Distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-52 
Firewalls 
firewall 
isolates organization’s internal net from larger 
Internet, allowing some packets to pass, 
blocking others. 
administered 
network 
public 
Internet 
firewall 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-53 
Firewalls: Why 
prevent denial of service attacks: 
SYN flooding: attacker establishes many bogus TCP 
connections, no resources left for “real” connections. 
prevent illegal modification/access of internal data. 
e.g., attacker replaces CIA’s homepage with 
something else 
allow only authorized access to inside network (set of 
authenticated users/hosts) 
two types of firewalls: 
application-level 
packet-filtering 
Monday, October 13, 2014
Should arriving 
packet be allowed 
in? Departing packet 
let out? 
http://sohamsironline.weeby.com 8-54 
Packet Filtering 
internal network connected to Internet via 
router firewall 
router filters packet-by-packet, decision to 
forward/drop packet based on: 
source IP address, destination IP address 
TCP/UDP source and destination port numbers 
ICMP message type 
TCP SYN and ACK bits 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-55 
Packet Filtering 
Example 1: block incoming and outgoing 
datagrams with IP protocol field = 17 and with 
either source or dest port = 23. 
All incoming and outgoing UDP flows and telnet 
connections are blocked. 
Example 2: Block inbound TCP segments with 
ACK=0. 
Prevents external clients from making TCP 
connections with internal clients, but allows 
internal clients to connect to outside. 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-56 
Application gateways 
Filters packets on 
application data as well 
as on IP/TCP/UDP fields. 
Example: allow select 
internal users to telnet 
outside. 
host-to-gateway 
telnet session 
gateway-to-remote 
host telnet session 
application 
gateway 
router and filter 
1. Require all telnet users to telnet through gateway. 
2. For authorized users, gateway sets up telnet connection to 
dest host. Gateway relays data between 2 connections 
3. Router filter blocks all telnet connections not originating 
from gateway. 
Monday, October 13, 2014
Limitations of firewalls and gateways 
http://sohamsironline.weeby.com 8-57 
IP spoofing: router 
can’t know if data 
“really” comes from 
claimed source 
if multiple app’s. need 
special treatment, each 
has own app. gateway. 
client software must 
know how to contact 
gateway. 
e.g., must set IP address 
of proxy in Web 
browser 
filters often use all or 
nothing policy for UDP. 
tradeoff: degree of 
communication with 
outside world, level of 
security 
many highly protected 
sites still suffer from 
attacks. 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-58 
Our roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Integrity 
8.5 Key Distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
Monday, October 13, 2014
Internet security threats 
Mapping: 
before attacking: “case the joint” – find out 
what services are implemented on network 
Use ping to determine what hosts have 
addresses on network 
Port-scanning: try to establish TCP connection 
to each port in sequence (see what happens) 
nmap (http://www.insecure.org/nmap/) mapper: 
“network exploration and security auditing” 
Countermeasures? 
http://sohamsironline.weeby.com 8-59 
Monday, October 13, 2014
Internet security threats 
Mapping: countermeasures 
record traffic entering network 
look for suspicious activity (IP addresses, ports 
being scanned sequentially) 
http://sohamsironline.weeby.com 8-60 
Monday, October 13, 2014
Internet security threats 
Packet sniffing: 
broadcast media 
promiscuous NIC reads all packets passing by 
can read all unencrypted data (e.g. passwords) 
e.g.: C sniffs B’s packets 
http://sohamsironline.weeby.com 8-61 
A 
B 
C 
src:B dest:A payload 
Countermeasures? 
Monday, October 13, 2014
Internet security threats 
Packet sniffing: countermeasures 
all hosts in organization run software that 
checks periodically if host interface in 
promiscuous mode. 
one host per segment of broadcast media 
(switched Ethernet at hub) 
encryption 
http://sohamsironline.weeby.com 8-62 
A 
B 
C 
src:B dest:A payload 
Monday, October 13, 2014
Internet security threats 
IP Spoofing: 
can generate “raw” IP packets directly from 
application, putting any value into IP source 
address field 
receiver can’t tell if source is spoofed 
e.g.: C pretends to be B 
http://sohamsironline.weeby.com 8-63 
A 
B 
C 
src:B dest:A payload 
Countermeasures? 
Monday, October 13, 2014
Internet security threats 
IP Spoofing: ingress filtering 
routers should not forward outgoing packets 
with invalid source addresses (e.g., datagram 
source address not in router’s network) 
great, but ingress filtering can not be mandated 
for all networks 
http://sohamsironline.weeby.com 8-64 
A 
B 
C 
src:B dest:A payload 
Monday, October 13, 2014
Internet security threats 
Denial of service (DOS): 
flood of maliciously generated packets “swamp” 
receiver 
Distributed DOS (DDOS): multiple coordinated 
sources swamp receiver 
e.g., C and remote host SYN-attack A 
http://sohamsironline.weeby.com 8-65 
A 
B 
C 
SYN 
SYN SYN SYN 
SYN 
SYN 
SYN 
Countermeasures? 
Monday, October 13, 2014
Internet security threats 
Denial of service (DOS): countermeasures 
filter out flooded packets (e.g., SYN) before 
reaching host: throw out good with bad 
traceback to source of floods (most likely an 
innocent, compromised machine) 
http://sohamsironline.weeby.com 8-66 
A 
B 
C 
SYN 
SYN SYN SYN 
SYN 
SYN 
SYN 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-67 
Chapter 8 roadmap 
8.1 What is network security? 
8.2 Principles of cryptography 
8.3 Authentication 
8.4 Integrity 
8.5 Key Distribution and certification 
8.6 Access control: firewalls 
8.7 Attacks and counter measures 
8.8 Security in many layers 
8.8.1. Secure email 
8.8.2. Secure sockets 
8.8.3. IPsec 
8.8.4. Security in 802.11 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-68 
Secure e-mail 
 Alice wants to send confidential e-mail, m, to Bob. 
Monday, October 13, 2014
 Alice wants to send confidential e-mail, m, to Bob. 
KS(m ) 
+ - 
+ 
http://sohamsironline.weeby.com 8-69 
Secure e-mail 
KS( ) . 
KB( ) + . 
+ 
KB(KS ) 
m 
+ 
Alice: 
 generates random symmetric private key, KS. 
 encrypts message with KS (for efficiency) 
 also encrypts KS with Bob’s public key. 
 sends both KS(m) and KB(KS) to Bob. 
KS 
KS 
KB 
Internet 
KS( ) . 
- . 
KB( ) KB 
- 
KS 
KS(m ) m 
KB(KS ) 
Monday, October 13, 2014
 Alice wants to send confidential e-mail, m, to Bob. 
KS(m ) 
+ - 
+ 
http://sohamsironline.weeby.com 8-70 
Secure e-mail 
KS( ) . 
KB( ) + . 
+ 
KB(KS ) 
m 
+ 
Bob: 
 uses his private key to decrypt and recover KS 
 uses KS to decrypt KS(m) to recover m 
KS 
KS 
KB 
Internet 
KS( ) . 
- . 
KB( ) KB 
- 
KS 
KS(m ) m 
KB(KS ) 
Monday, October 13, 2014
Secure e-mail (continued) 
• Alice wants to provide sender authentication 
message integrity. 
- 
+ 
KA 
- 
KA(H(m)) H(m ) 
compare 
• Alice digitally signs message. 
• sends both message (in the clear) and digital signature. 
http://sohamsironline.weeby.com 8-71 
H(. ) KA( ) - . 
+ - 
m 
KA - 
Internet 
m 
KA( ) + . 
KA(H(m)) 
m 
H(. ) H(m ) 
Monday, October 13, 2014
Internet 
http://sohamsironline.weeby.com 8-72 
Secure e-mail (continued) 
• Alice wants to provide secrecy, sender authentication, 
message integrity. 
KA - 
H(. ) KA( ) - . 
- 
KA(H(m)) 
+ 
m 
m 
KS( ) . 
KB( ) + . 
+ 
+ 
KS 
KB(KS ) 
KB + 
KS 
Alice uses three keys: her private key, Bob’s public 
key, newly created symmetric key 
Monday, October 13, 2014
Pretty good privacy (PGP) 
A PGP signed message: 
http://sohamsironline.weeby.com 8-73 
Internet e-mail encryption 
scheme, de-facto standard. 
uses symmetric key 
cryptography, public key 
cryptography, hash 
function, and digital 
signature as described. 
provides secrecy, sender 
authentication, integrity. 
inventor, Phil Zimmerman, 
was target of 3-year 
federal investigation. 
---BEGIN PGP SIGNED MESSAGE--- 
Hash: SHA1 
Bob:My husband is out of town 
tonight.Passionately yours, 
Alice 
---BEGIN PGP SIGNATURE--- 
Version: PGP 5.0 
Charset: noconv 
yhHJRHhGJGhgg/12EpJ+lo8gE4vB3mqJ 
hFEvZP9t6n7G6m5Gw2 
---END PGP SIGNATURE--- 
Monday, October 13, 2014
Secure sockets layer (SSL) 
http://sohamsironline.weeby.com 8-74 
transport layer 
security to any TCP-based 
app using SSL 
services. 
used between Web 
browsers, servers for 
e-commerce (shttp). 
security services: 
server authentication 
data encryption 
client authentication 
(optional) 
server authentication: 
SSL-enabled browser 
includes public keys for 
trusted CAs. 
Browser requests 
server certificate, 
issued by trusted CA. 
Browser uses CA’s 
public key to extract 
server’s public key from 
certificate. 
check your browser’s 
security menu to see 
its trusted CAs. 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-75 
SSL (continued) 
Encrypted SSL session: 
Browser generates 
symmetric session key, 
encrypts it with server’s 
public key, sends 
encrypted key to server. 
Using private key, server 
decrypts session key. 
Browser, server know 
session key 
All data sent into TCP 
socket (by client or server) 
encrypted with session key. 
SSL: basis of IETF 
Transport Layer 
Security (TLS). 
SSL can be used for 
non-Web applications, 
e.g., IMAP. 
Client authentication 
can be done with client 
certificates. 
Monday, October 13, 2014
IPsec: Network Layer Security 
http://sohamsironline.weeby.com 8-76 
Network-layer secrecy: 
sending host encrypts the 
data in IP datagram 
TCP and UDP segments; 
ICMP and SNMP 
messages. 
Network-layer authentication 
destination host can 
authenticate source IP 
address 
Two principle protocols: 
authentication header 
(AH) protocol 
encapsulation security 
payload (ESP) protocol 
For both AH and ESP, source, 
destination handshake: 
create network-layer 
logical channel called a 
security association (SA) 
Each SA unidirectional. 
Uniquely determined by: 
security protocol (AH or 
ESP) 
source IP address 
32-bit connection ID 
Monday, October 13, 2014
Authentication Header (AH) Protocol 
http://sohamsironline.weeby.com 8-77 
provides source 
authentication, data 
integrity, no 
confidentiality 
AH header inserted 
between IP header, 
data field. 
protocol field: 51 
intermediate routers 
process datagrams as 
usual 
AH header includes: 
connection identifier 
authentication data: 
source- signed message 
digest calculated over 
original IP datagram. 
next header field: 
specifies type of data 
(e.g., TCP, UDP, ICMP) 
IP header data (e.g AH header ., TCP, UDP segment) 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-78 
ESP Protocol 
provides secrecy, host 
authentication, data 
integrity. 
data, ESP trailer 
encrypted. 
next header field is in ESP 
trailer. 
ESP authentication 
field is similar to AH 
authentication field. 
Protocol = 50. 
authenticated 
IP header ESP TCP/UDP segment 
header 
ESP 
trailer 
ESP 
authent. 
encrypted 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-79 
IEEE 802.11 security 
War-driving: drive around Bay area, see what 802.11 
networks available? 
More than 9000 accessible from public roadways 
85% use no encryption/authentication 
packet-sniffing and various attacks easy! 
Securing 802.11 
encryption, authentication 
first attempt at 802.11 security: Wired Equivalent 
Privacy (WEP): a failure 
current attempt: 802.11i 
Monday, October 13, 2014
Wired Equivalent Privacy (WEP): 
authentication as in protocol ap4.0 
host requests authentication from access point 
access point sends 128 bit nonce 
host encrypts nonce using shared symmetric key 
access point decrypts nonce, authenticates host 
no key distribution mechanism 
authentication: knowing the shared key is enough 
http://sohamsironline.weeby.com 8-80 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-81 
WEP data encryption 
Host/AP share 40 bit symmetric key (semi-permanent) 
Host appends 24-bit initialization vector (IV) to 
create 64-bit key 
64 bit key used to generate stream of keys, kIV 
i 
ki 
IV used to encrypt ith byte, di, in frame: 
ci = di XOR ki 
IV 
IV and encrypted bytes, ci sent in frame 
Monday, October 13, 2014
http://sohamsironline.weeby.com 8-82 
802.11 WEP encryption 
IV 
(per frame) 
KS: 40-bit 
secret 
symmetric 
IV k2 
key k1 
IV k3 
IV … kN 
IV kN+1 
IV… kN+1 
IV 
d1 
d2 d3 … dN 
CRC1 … CRC4 
c1 
c2 c3 … cN 
cN+1 … cN+4 
plaintext 
frame data 
plus CRC 
key sequence generator 
( for given KS, IV) 
802.11 
header IV 
WEP-encrypted data 
plus CRC 
Figure 7.8-new1: 802.11 Sender-side WEP e WnEcPr pyroptotciool n 
Monday, October 13, 2014
Breaking 802.11 WEP encryption 
Security hole: 
24-bit IV, one IV per frame, - IV’s eventually reused 
IV transmitted in plaintext - IV reuse detected 
Attack: 
Trudy causes Alice to encrypt known plaintext d1 d2 
d3 d4 … 
Trudy sees: ci = di XOR ki 
http://sohamsironline.weeby.com 8-83 
IV 
Trudy knows ci di, so can compute ki 
IV 
Trudy knows encrypting key sequence k1 
IV k2 
IV k3 
IV … 
Next time IV is used, Trudy can decrypt! Monday, October 13, 2014
802.11i: improved security 
numerous (stronger) forms of encryption 
possible 
provides key distribution 
uses authentication server separate from 
access point 
http://sohamsironline.weeby.com 8-84 
Monday, October 13, 2014
802.11i: four phases of operation 
AP: access point AS: 
Authentication 
server 
STA and AS mutually authenticate, together 
generate Master Key (MK). AP servers as “pass through” 
http://sohamsironline.weeby.com 8-85 
wired 
network 
STA: 
client station 
1 Discovery of 
security capabilities 
3 
2 
3 STA derives 
Pairwise Master 
Key (PMK) 
AS derives 
same PMK, 
sends to AP 
4 STA, AP use PMK to derive 
Temporal Key (TK) used for message 
Monday, October 13, 2014 
encryption, integrity
EAP: extensible authentication protocol 
EAP: end-end client (mobile) to authentication 
server protocol 
EAP sent over separate “links” 
mobile-to-AP (EAP over LAN) 
AP to authentication server (RADIUS over UDP) 
wired 
network 
http://sohamsironline.weeby.com 8-86 
EAP TLS 
EAP 
EAP over LAN (EAPoL) 
IEEE 802.11 
RADIUS 
UDP/IP 
Monday, October 13, 2014
Network Security (summary) 
Basic techniques…... 
cryptography (symmetric and public) 
authentication 
message integrity 
key distribution 
…. used in many different security scenarios 
http://sohamsironline.weeby.com 8-87 
secure email 
secure transport (SSL) 
IP sec 
802.11 
Monday, October 13, 2014

More Related Content

Similar to Sohams cryptography basics

Chapter8 27 nov_2010
Chapter8 27 nov_2010Chapter8 27 nov_2010
Chapter8 27 nov_2010Umang Gupta
 
Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR)
 Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR) Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR)
Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR)
Beat Signer
 
network security
network security network security
network security
SayantanRoy14
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
kicknit123
 
Chapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docxChapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docx
russelldayna
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
SurendraBasnet6
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
Alex Punnen
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
Kai Koenig
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
SherefHesham
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Harry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Young Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
David Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Tony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Luis Goldster
 

Similar to Sohams cryptography basics (20)

Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]
 
Chapter8 27 nov_2010
Chapter8 27 nov_2010Chapter8 27 nov_2010
Chapter8 27 nov_2010
 
security
securitysecurity
security
 
Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR)
 Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR) Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR)
Security, Privacy and Trust - Lecture 11 - Web Information Systems (4011474FNR)
 
network security
network security network security
network security
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
 
Chapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docxChapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docx
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Chapter 8 v6.0
Chapter 8 v6.0Chapter 8 v6.0
Chapter 8 v6.0
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

More from Soham Sengupta

Spring method-level-secuirty
Spring method-level-secuirtySpring method-level-secuirty
Spring method-level-secuirty
Soham Sengupta
 
Spring security mvc-1
Spring security mvc-1Spring security mvc-1
Spring security mvc-1
Soham Sengupta
 
JavaScript event handling assignment
JavaScript  event handling assignment JavaScript  event handling assignment
JavaScript event handling assignment
Soham Sengupta
 
Networking assignment 2
Networking assignment 2Networking assignment 2
Networking assignment 2
Soham Sengupta
 
Networking assignment 1
Networking assignment 1Networking assignment 1
Networking assignment 1
Soham Sengupta
 
Network programming1
Network programming1Network programming1
Network programming1
Soham Sengupta
 
JSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorialJSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorial
Soham Sengupta
 
Xmpp and java
Xmpp and javaXmpp and java
Xmpp and java
Soham Sengupta
 
Core java day2
Core java day2Core java day2
Core java day2
Soham Sengupta
 
Core java day1
Core java day1Core java day1
Core java day1
Soham Sengupta
 
Core java day4
Core java day4Core java day4
Core java day4
Soham Sengupta
 
Core java day5
Core java day5Core java day5
Core java day5
Soham Sengupta
 
Exceptions
ExceptionsExceptions
Exceptions
Soham Sengupta
 
Java.lang.object
Java.lang.objectJava.lang.object
Java.lang.object
Soham Sengupta
 
Jsp1
Jsp1Jsp1
Soham web security
Soham web securitySoham web security
Soham web security
Soham Sengupta
 
Html tables and_javascript
Html tables and_javascriptHtml tables and_javascript
Html tables and_javascript
Soham Sengupta
 
Html javascript
Html javascriptHtml javascript
Html javascript
Soham Sengupta
 
Java script
Java scriptJava script
Java script
Soham Sengupta
 
Sohamsg ajax
Sohamsg ajaxSohamsg ajax
Sohamsg ajax
Soham Sengupta
 

More from Soham Sengupta (20)

Spring method-level-secuirty
Spring method-level-secuirtySpring method-level-secuirty
Spring method-level-secuirty
 
Spring security mvc-1
Spring security mvc-1Spring security mvc-1
Spring security mvc-1
 
JavaScript event handling assignment
JavaScript  event handling assignment JavaScript  event handling assignment
JavaScript event handling assignment
 
Networking assignment 2
Networking assignment 2Networking assignment 2
Networking assignment 2
 
Networking assignment 1
Networking assignment 1Networking assignment 1
Networking assignment 1
 
Network programming1
Network programming1Network programming1
Network programming1
 
JSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorialJSR-82 Bluetooth tutorial
JSR-82 Bluetooth tutorial
 
Xmpp and java
Xmpp and javaXmpp and java
Xmpp and java
 
Core java day2
Core java day2Core java day2
Core java day2
 
Core java day1
Core java day1Core java day1
Core java day1
 
Core java day4
Core java day4Core java day4
Core java day4
 
Core java day5
Core java day5Core java day5
Core java day5
 
Exceptions
ExceptionsExceptions
Exceptions
 
Java.lang.object
Java.lang.objectJava.lang.object
Java.lang.object
 
Jsp1
Jsp1Jsp1
Jsp1
 
Soham web security
Soham web securitySoham web security
Soham web security
 
Html tables and_javascript
Html tables and_javascriptHtml tables and_javascript
Html tables and_javascript
 
Html javascript
Html javascriptHtml javascript
Html javascript
 
Java script
Java scriptJava script
Java script
 
Sohamsg ajax
Sohamsg ajaxSohamsg ajax
Sohamsg ajax
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Sohams cryptography basics

  • 1. Data Security & Cryptology http://sohamsironline.weeby.com 8-1 Monday, October 13, 2014
  • 2. Data & Network Security Chapter goals: understand principles of network security: cryptography and its many uses beyond “confidentiality” authentication message integrity key distribution http://sohamsironline.weeby.com 8-2 security in practice: firewalls security in application, transport, network, link layers Monday, October 13, 2014
  • 3. http://sohamsironline.weeby.com 8-3 Our roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers Monday, October 13, 2014
  • 4. What is network security? Confidentiality: only sender, intended receiver should “understand” message contents http://sohamsironline.weeby.com 8-4 sender encrypts message receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and Availability: services must be accessible and available to users Monday, October 13, 2014
  • 5. Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (Friends) want to communicate “securely” Trudy (intruder) may intercept, delete, add messages Alice Bob http://sohamsironline.weeby.com 8-5 secure sender secure receiver channel data, control messages data data Trudy Monday, October 13, 2014
  • 6. Who might Bob, Alice be? … well, real-life Bobs and Alices! Web browser/server for electronic transactions (e.g., on-line purchases) on-line banking client/server DNS servers routers exchanging routing table updates other examples? http://sohamsironline.weeby.com 8-6 Monday, October 13, 2014
  • 7. There are bad guys (and girls) out there! Q: What can a “bad guy” do? A: a lot! eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) http://sohamsironline.weeby.com 8-7 more on this later …… Monday, October 13, 2014
  • 8. http://sohamsironline.weeby.com 8-8 Our roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers Monday, October 13, 2014
  • 9. The language of cryptography plaintext ciphertext plaintext symmetric key crypto: sender, receiver keys identical public-key crypto: encryption key public, decryption key secret (private) http://sohamsironline.weeby.com 8-9 KA encryption algorithm decryption algorithm Alice’s encryption key Bob’s decryption key KB Monday, October 13, 2014
  • 10. Symmetric key cryptography ceasar cipher: substitute w/ offset of k plaintext: abcdefghijklmnopqrstuvwxyz plaintext: uvwxyzabcdefghijklmnopqrst Plaintext: bob. i love india. ciphertext: viv. c fipy chxcu http://sohamsironline.weeby.com 8-10 E.g.: Q: How hard to break this simple cipher?:  brute force (how hard?)  other? Monday, October 13, 2014
  • 11. Symmetric key cryptography substitution cipher: substituting one thing for another monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc http://sohamsironline.weeby.com 8-11 E.g.: Q: How hard to break this simple cipher?:  brute force (how hard?)  other? Monday, October 13, 2014
  • 12. http://sohamsironline.weeby.com 8-12 Puzzle 64! = 1.2680e+89 Come up with a cryptographic scheme that has 64!^2 possible keys 64^4? How long will it take to crack these, in days, if it you can test 1 key per second? 1.6*10^178/86400 1.6*10^356/86400 Monday, October 13, 2014
  • 13. Symmetric key cryptography ciphertext plaintext symmetric key crypto: Bob and Alice share same (symmetric) key: K e.g., key is knowing substitution pattern in mono alphabetic substitution cipher Question!: how do Bob and Alice agree on key value? http://sohamsironline.weeby.com 8-13 KA-B encryption algorithm decryption algorithm A-B KA-B plaintext message, m K (m) A-B K (m) m = K ( A - B ) A-B Monday, October 13, 2014
  • 14. Symmetric key crypto: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64-bit plaintext input How secure is DES? DES Challenge: 56-bit-key-encrypted phrase (“Strong cryptography makes the world a safer place”) decrypted (brute force) in 4 months no known “backdoor” decryption approach http://sohamsironline.weeby.com 8-14 making DES more secure: use three keys sequentially (3-DES) on each datum use cipher-block chaining Monday, October 13, 2014
  • 15. http://sohamsironline.weeby.com 8-15 Public Key Cryptography symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if never “met”)? public key cryptography radically different approach [Diffie- Hellman76, RSA78] sender, receiver do not share secret key public encryption key known to all private decryption key known only to receiver Monday, October 13, 2014
  • 16. Bob’s public key K B + Bob’s private key K B - + B - http://sohamsironline.weeby.com 8-16 Public key cryptography plaintext message, m encryption ciphertext algorithm decryption algorithm plaintext K (m) message B + m = K (K (m)) B Monday, October 13, 2014
  • 17. Public key encryption algorithms need K ( B ) and K B ( ) such that . . + - K - (K + (m)) = m B B + given public key K , it should be impossible to compute private key K http://sohamsironline.weeby.com 8-17 - B B Requirements: 1 2 RSA: Rivest, Shamir, Adelson algorithm Monday, October 13, 2014
  • 18. RSA: Encryption, decryption Assume m = (m e mod n)d mod n 1. To encrypt bit pattern, m, compute c = m e mod n (i.e., remainder when me is divided by n) 2. To decrypt received bit pattern, c, compute m = c d mod n (i.e., remainder when cd is divided by n) http://sohamsironline.weeby.com 8-18 c Monday, October 13, 2014
  • 19. RSA: How? m = (m e mod n)d mod n Useful number theory result: If p,q prime and n = pq, then: x y mod n = x y m o d ( p - 1 ) ( q - 1 ) mod n (using number theory result above) (So we choose ed to be divisible by http://sohamsironline.weeby.com 8-19 (m e mod n) d mod n = m e d mod n = m e d m o d ( p - 1 ) ( q - 1 ) mod n = m 1 mod n = m (p-1)(q-1) with remainder 1 ) Monday, October 13, 2014
  • 20. RSA: Choosing keys 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1) 3. Choose e (with en) that has no common factors with z. (e, z are “relatively prime”). 4. Choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ). 5. Public key is (n,e). Private key is (n,d). http://sohamsironline.weeby.com 8-20 K B + K B - Monday, October 13, 2014
  • 21. RSA example: Bob chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z. letter m me c = me mod n l 12 1524832 17 cd letter c m = cd mod n 17 481968572106750915091411825223071697 12 l http://sohamsironline.weeby.com 8-21 encrypt: decrypt: Monday, October 13, 2014
  • 22. RSA: another important property The following property will be very useful later: - + K B (K B (m)) http://sohamsironline.weeby.com 8-22 K B (KB (m)) = m + - = use public key first, followed by private key use private key first, followed by public key Result is the same! Monday, October 13, 2014
  • 23. http://sohamsironline.weeby.com 8-23 Our roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers Monday, October 13, 2014
  • 24. Authentication Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? http://sohamsironline.weeby.com 8-24 “I am Alice” Monday, October 13, 2014
  • 25. Authentication Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” in a network, Bob can not “see” Alice, so Trudy simply declares herself to be Alice http://sohamsironline.weeby.com 8-25 “I am Alice” Monday, October 13, 2014
  • 26. Authentication: another try Protocol ap2.0: Alice says “I am Alice” in an IP packet containing her source IP address Failure scenario?? http://sohamsironline.weeby.com 8-26 Alice’s “I am Alice” IP address Monday, October 13, 2014
  • 27. Authentication: another try Protocol ap2.0: Alice says “I am Alice” in an IP packet containing her source IP address Trudy can create a packet “spoofing” Alice’s “I am Alice” Alice’s address IP address http://sohamsironline.weeby.com 8-27 Monday, October 13, 2014
  • 28. Authentication: another try Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it. Failure scenario?? http://sohamsironline.weeby.com 8-28 Alice’s password Alice’s “I’m Alice” IP addr Alice’s OK IP addr Monday, October 13, 2014
  • 29. Authentication: another try Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it. playback attack: Trudy records Alice’s packet and later plays it back to Bob http://sohamsironline.weeby.com 8-29 Alice’s password Alice’s “I’m Alice” IP addr Alice’s OK IP addr Alice’s password Alice’s “I’m Alice” IP addr Monday, October 13, 2014
  • 30. Authentication: yet another try Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. Failure scenario?? http://sohamsironline.weeby.com 8-30 encrypted password Alice’s “I’m Alice” IP addr Alice’s OK IP addr Monday, October 13, 2014
  • 31. Authentication: another try Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. record and playback still works! http://sohamsironline.weeby.com 8-31 encrypted password Alice’s “I’m Alice” IP addr Alice’s OK IP addr encrypted password Alice’s “I’m Alice” IP addr Monday, October 13, 2014
  • 32. Authentication: yet another try Goal: avoid playback attack Nonce: number (R) used only once –in-a-lifetime ap4.0: to prove Alice “live”, Bob sends Alice nonce, R. http://sohamsironline.weeby.com 8-32 Failures, drawbacks? Alice must return R, encrypted with shared secret key “I am Alice” R K (R) A-B Alice is live, and only Alice knows key to encrypt nonce, so it must be Alice! Monday, October 13, 2014
  • 33. Authentication: ap5.0 ap4.0 requires shared symmetric key can we authenticate using public key techniques? ap5.0: use nonce, public key cryptography KA + - http://sohamsironline.weeby.com 8-33 “I am Alice” R Bob computes K (R) A - “send me your public key” + KA (K A (R)) = R and knows only Alice could have the private key, that encrypted R such - that (KA (R)) = R K A + Monday, October 13, 2014
  • 34. ap5.0: security hole Man (woman) in the middle attack: Trudy poses as Alice (to Bob) and as Bob (to Alice) I am Alice I am Alice K - (R) + + http://sohamsironline.weeby.com 8-34 R T Send me your public key K T K - (R) A Send me your public key + K A K T (m) Trudy gets T +m = K - (K (m)) sends T m to Alice encrypted with Alice’s public key + KA (m) A m = K - (K (m)) A +R Monday, October 13, 2014
  • 35. ap5.0: security hole Man (woman) in the middle attack: Trudy poses as Alice (to Bob) and as Bob (to Alice) Difficult to detect:  Bob receives everything that Alice sends, and vice versa. (e.g., so Bob, Alice can meet one week later and recall conversation)  problem is that Trudy receives all messages as well! http://sohamsironline.weeby.com 8-35 Monday, October 13, 2014
  • 36. http://sohamsironline.weeby.com 8-36 Updated roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Message integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers Monday, October 13, 2014
  • 37. http://sohamsironline.weeby.com 8-37 Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator. verifiable, nonforgeable: recipient (Alice) can prove to someone that Bob, and no one else (including Alice), must have signed document Monday, October 13, 2014
  • 38. Digital Signatures Simple digital signature for message m: Bob signs m by encrypting with his private key KB, creating “signed” message, KB - (-m) Bob’s private key K B - K B - (m) http://sohamsironline.weeby.com 8-38 Bob’s message, m Dear Alice Oh, how I have missed you. I think of you all the time! …(blah blah blah) Bob Public key encryption algorithm Bob’s message, m, signed (encrypted) with his private key Monday, October 13, 2014
  • 39. - http://sohamsironline.weeby.com 8-39 Digital Signatures (more) Suppose Alice receives msg m, digital signature K(m) B Alice verifies m signed by Bob by applying Bob’s + public key Kto K(m) then checks K(+ K(m) ) = m. - B BBB If K(K(m) ) = m, whoever signed m must have used BBBob’s private key. - - - + Alice thus verifies that: Bob signed m. No one else signed m. Bob signed m and not m’. Non-repudiation:  Alice can take m, and signature KB(m) to court and prove that Bob signed m. Monday, October 13, 2014
  • 40. large message H: Hash Function H(m) http://sohamsironline.weeby.com 8-40 Message Digests Computationally expensive to public-key-encrypt long messages Goal: fixed-length, easy-to- compute digital “fingerprint” apply hash function H to m, get fixed size message digest, H(m). m Hash function properties: many-to-1 produces fixed-size msg digest (fingerprint) given message digest x, computationally infeasible to find m such that x = H(m) Monday, October 13, 2014
  • 41. Internet checksum: poor crypto hash function Internet checksum has some properties of hash function: produces fixed length digest (16-bit sum) of message is many-to-one But given message with given hash value, it is easy to find another message with same hash value: message ASCII format http://sohamsironline.weeby.com 8-41 message ASCII format I O U 1 0 0 . 9 9 B O B 49 4F 55 31 30 30 2E 39 39 42 4F 42 B2 C1 D2 AC I O U 9 0 0 . 1 9 B O B 49 4F 55 39 30 30 2E 31 39 42 4F 42 different messages B2 C1 D2 AC but identical checksums! Monday, October 13, 2014
  • 42. Digital signature = signed message digest encrypted msg digest - http://sohamsironline.weeby.com 8-42 Bob sends digitally signed message: large message m H: Hash function H(m) digital signature (encrypt) Bob’s private key K B - + Alice verifies signature and integrity of digitally signed message: encrypted msg digest - KB(H(m)) KB(H(m)) large message m H: Hash function H(m) digital signature (decrypt) H(m) Bob’s public key K B + equal ? Monday, October 13, 2014
  • 43. Hash Function Algorithms MD5 hash function widely used (RFC 1321) computes 128-bit message digest in 4-step process. arbitrary 128-bit string x, appears difficult to construct msg m whose MD5 hash is equal to x. http://sohamsironline.weeby.com 8-43 SHA-1 is also used. US standard [NIST, FIPS PUB 180-1] 160-bit message digest Monday, October 13, 2014
  • 44. http://sohamsironline.weeby.com 8-44 Our roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers Monday, October 13, 2014
  • 45. http://sohamsironline.weeby.com 8-45 Trusted Intermediaries Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC) acting as intermediary between entities Public key problem: When Alice obtains Bob’s public key (from web site, e-mail, diskette), how does she know it is Bob’s public key, not Trudy’s? Solution: trusted certification authority (CA) Monday, October 13, 2014
  • 46. Key Distribution Center (KDC) Alice, Bob need shared symmetric key. KDC: server shares different secret key with each registered user (many users) Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for communicating with KDC. KP-KDC KB-KDC KX-KDC KY-KDC KZ-KDC http://sohamsironline.weeby.com 8-46 KB-KDC KA-KDC KA-KDC KP-KDC KDC Monday, October 13, 2014
  • 47. Key Distribution Center (KDC) Q: How does KDC allow Bob, Alice to determine shared symmetric secret key to communicate with each other? KDC generates R1 http://sohamsironline.weeby.com 8-47 Alice knows R1 Bob knows to use R1 to communicate with Alice KA-KDC(A,B) KA-KDC(R1, KB-KDC(A,R1) ) KB-KDC(A,R1) Alice and Bob communicate: using R1 as session key for shared symmetric encryption Monday, October 13, 2014
  • 48. Certification Authorities Certification authority (CA): binds public key to particular entity, E. E (person, router) registers its public key with CA. E provides “proof of identity” to CA. CA creates certificate binding E to its public key. certificate containing E’s public key digitally signed by CA – CA says “this is E’s public key” http://sohamsironline.weeby.com 8-48 Bob’s public key K B + Bob’s identifying information digital signature (encrypt) CA private - key K CA K B + certificate for Bob’s public key, signed by CA Monday, October 13, 2014
  • 49. Certification Authorities When Alice wants Bob’s public key: gets Bob’s certificate (Bob or elsewhere). apply CA’s public key to Bob’s certificate, get Bob’s public key Bob’s public key K B + http://sohamsironline.weeby.com 8-49 digital signature (decrypt) CA public K + key CA K B + Monday, October 13, 2014
  • 50. A certificate contains: Serial number (unique to issuer) info about certificate owner, including algorithm and key value itself (not shown) info about certificate issuer valid dates digital signature by issuer http://sohamsironline.weeby.com 8-50 Monday, October 13, 2014
  • 51. http://sohamsironline.weeby.com 8-51 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers Monday, October 13, 2014
  • 52. http://sohamsironline.weeby.com 8-52 Firewalls firewall isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. administered network public Internet firewall Monday, October 13, 2014
  • 53. http://sohamsironline.weeby.com 8-53 Firewalls: Why prevent denial of service attacks: SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections. prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with something else allow only authorized access to inside network (set of authenticated users/hosts) two types of firewalls: application-level packet-filtering Monday, October 13, 2014
  • 54. Should arriving packet be allowed in? Departing packet let out? http://sohamsironline.weeby.com 8-54 Packet Filtering internal network connected to Internet via router firewall router filters packet-by-packet, decision to forward/drop packet based on: source IP address, destination IP address TCP/UDP source and destination port numbers ICMP message type TCP SYN and ACK bits Monday, October 13, 2014
  • 55. http://sohamsironline.weeby.com 8-55 Packet Filtering Example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or dest port = 23. All incoming and outgoing UDP flows and telnet connections are blocked. Example 2: Block inbound TCP segments with ACK=0. Prevents external clients from making TCP connections with internal clients, but allows internal clients to connect to outside. Monday, October 13, 2014
  • 56. http://sohamsironline.weeby.com 8-56 Application gateways Filters packets on application data as well as on IP/TCP/UDP fields. Example: allow select internal users to telnet outside. host-to-gateway telnet session gateway-to-remote host telnet session application gateway router and filter 1. Require all telnet users to telnet through gateway. 2. For authorized users, gateway sets up telnet connection to dest host. Gateway relays data between 2 connections 3. Router filter blocks all telnet connections not originating from gateway. Monday, October 13, 2014
  • 57. Limitations of firewalls and gateways http://sohamsironline.weeby.com 8-57 IP spoofing: router can’t know if data “really” comes from claimed source if multiple app’s. need special treatment, each has own app. gateway. client software must know how to contact gateway. e.g., must set IP address of proxy in Web browser filters often use all or nothing policy for UDP. tradeoff: degree of communication with outside world, level of security many highly protected sites still suffer from attacks. Monday, October 13, 2014
  • 58. http://sohamsironline.weeby.com 8-58 Our roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers Monday, October 13, 2014
  • 59. Internet security threats Mapping: before attacking: “case the joint” – find out what services are implemented on network Use ping to determine what hosts have addresses on network Port-scanning: try to establish TCP connection to each port in sequence (see what happens) nmap (http://www.insecure.org/nmap/) mapper: “network exploration and security auditing” Countermeasures? http://sohamsironline.weeby.com 8-59 Monday, October 13, 2014
  • 60. Internet security threats Mapping: countermeasures record traffic entering network look for suspicious activity (IP addresses, ports being scanned sequentially) http://sohamsironline.weeby.com 8-60 Monday, October 13, 2014
  • 61. Internet security threats Packet sniffing: broadcast media promiscuous NIC reads all packets passing by can read all unencrypted data (e.g. passwords) e.g.: C sniffs B’s packets http://sohamsironline.weeby.com 8-61 A B C src:B dest:A payload Countermeasures? Monday, October 13, 2014
  • 62. Internet security threats Packet sniffing: countermeasures all hosts in organization run software that checks periodically if host interface in promiscuous mode. one host per segment of broadcast media (switched Ethernet at hub) encryption http://sohamsironline.weeby.com 8-62 A B C src:B dest:A payload Monday, October 13, 2014
  • 63. Internet security threats IP Spoofing: can generate “raw” IP packets directly from application, putting any value into IP source address field receiver can’t tell if source is spoofed e.g.: C pretends to be B http://sohamsironline.weeby.com 8-63 A B C src:B dest:A payload Countermeasures? Monday, October 13, 2014
  • 64. Internet security threats IP Spoofing: ingress filtering routers should not forward outgoing packets with invalid source addresses (e.g., datagram source address not in router’s network) great, but ingress filtering can not be mandated for all networks http://sohamsironline.weeby.com 8-64 A B C src:B dest:A payload Monday, October 13, 2014
  • 65. Internet security threats Denial of service (DOS): flood of maliciously generated packets “swamp” receiver Distributed DOS (DDOS): multiple coordinated sources swamp receiver e.g., C and remote host SYN-attack A http://sohamsironline.weeby.com 8-65 A B C SYN SYN SYN SYN SYN SYN SYN Countermeasures? Monday, October 13, 2014
  • 66. Internet security threats Denial of service (DOS): countermeasures filter out flooded packets (e.g., SYN) before reaching host: throw out good with bad traceback to source of floods (most likely an innocent, compromised machine) http://sohamsironline.weeby.com 8-66 A B C SYN SYN SYN SYN SYN SYN SYN Monday, October 13, 2014
  • 67. http://sohamsironline.weeby.com 8-67 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key Distribution and certification 8.6 Access control: firewalls 8.7 Attacks and counter measures 8.8 Security in many layers 8.8.1. Secure email 8.8.2. Secure sockets 8.8.3. IPsec 8.8.4. Security in 802.11 Monday, October 13, 2014
  • 68. http://sohamsironline.weeby.com 8-68 Secure e-mail  Alice wants to send confidential e-mail, m, to Bob. Monday, October 13, 2014
  • 69.  Alice wants to send confidential e-mail, m, to Bob. KS(m ) + - + http://sohamsironline.weeby.com 8-69 Secure e-mail KS( ) . KB( ) + . + KB(KS ) m + Alice:  generates random symmetric private key, KS.  encrypts message with KS (for efficiency)  also encrypts KS with Bob’s public key.  sends both KS(m) and KB(KS) to Bob. KS KS KB Internet KS( ) . - . KB( ) KB - KS KS(m ) m KB(KS ) Monday, October 13, 2014
  • 70.  Alice wants to send confidential e-mail, m, to Bob. KS(m ) + - + http://sohamsironline.weeby.com 8-70 Secure e-mail KS( ) . KB( ) + . + KB(KS ) m + Bob:  uses his private key to decrypt and recover KS  uses KS to decrypt KS(m) to recover m KS KS KB Internet KS( ) . - . KB( ) KB - KS KS(m ) m KB(KS ) Monday, October 13, 2014
  • 71. Secure e-mail (continued) • Alice wants to provide sender authentication message integrity. - + KA - KA(H(m)) H(m ) compare • Alice digitally signs message. • sends both message (in the clear) and digital signature. http://sohamsironline.weeby.com 8-71 H(. ) KA( ) - . + - m KA - Internet m KA( ) + . KA(H(m)) m H(. ) H(m ) Monday, October 13, 2014
  • 72. Internet http://sohamsironline.weeby.com 8-72 Secure e-mail (continued) • Alice wants to provide secrecy, sender authentication, message integrity. KA - H(. ) KA( ) - . - KA(H(m)) + m m KS( ) . KB( ) + . + + KS KB(KS ) KB + KS Alice uses three keys: her private key, Bob’s public key, newly created symmetric key Monday, October 13, 2014
  • 73. Pretty good privacy (PGP) A PGP signed message: http://sohamsironline.weeby.com 8-73 Internet e-mail encryption scheme, de-facto standard. uses symmetric key cryptography, public key cryptography, hash function, and digital signature as described. provides secrecy, sender authentication, integrity. inventor, Phil Zimmerman, was target of 3-year federal investigation. ---BEGIN PGP SIGNED MESSAGE--- Hash: SHA1 Bob:My husband is out of town tonight.Passionately yours, Alice ---BEGIN PGP SIGNATURE--- Version: PGP 5.0 Charset: noconv yhHJRHhGJGhgg/12EpJ+lo8gE4vB3mqJ hFEvZP9t6n7G6m5Gw2 ---END PGP SIGNATURE--- Monday, October 13, 2014
  • 74. Secure sockets layer (SSL) http://sohamsironline.weeby.com 8-74 transport layer security to any TCP-based app using SSL services. used between Web browsers, servers for e-commerce (shttp). security services: server authentication data encryption client authentication (optional) server authentication: SSL-enabled browser includes public keys for trusted CAs. Browser requests server certificate, issued by trusted CA. Browser uses CA’s public key to extract server’s public key from certificate. check your browser’s security menu to see its trusted CAs. Monday, October 13, 2014
  • 75. http://sohamsironline.weeby.com 8-75 SSL (continued) Encrypted SSL session: Browser generates symmetric session key, encrypts it with server’s public key, sends encrypted key to server. Using private key, server decrypts session key. Browser, server know session key All data sent into TCP socket (by client or server) encrypted with session key. SSL: basis of IETF Transport Layer Security (TLS). SSL can be used for non-Web applications, e.g., IMAP. Client authentication can be done with client certificates. Monday, October 13, 2014
  • 76. IPsec: Network Layer Security http://sohamsironline.weeby.com 8-76 Network-layer secrecy: sending host encrypts the data in IP datagram TCP and UDP segments; ICMP and SNMP messages. Network-layer authentication destination host can authenticate source IP address Two principle protocols: authentication header (AH) protocol encapsulation security payload (ESP) protocol For both AH and ESP, source, destination handshake: create network-layer logical channel called a security association (SA) Each SA unidirectional. Uniquely determined by: security protocol (AH or ESP) source IP address 32-bit connection ID Monday, October 13, 2014
  • 77. Authentication Header (AH) Protocol http://sohamsironline.weeby.com 8-77 provides source authentication, data integrity, no confidentiality AH header inserted between IP header, data field. protocol field: 51 intermediate routers process datagrams as usual AH header includes: connection identifier authentication data: source- signed message digest calculated over original IP datagram. next header field: specifies type of data (e.g., TCP, UDP, ICMP) IP header data (e.g AH header ., TCP, UDP segment) Monday, October 13, 2014
  • 78. http://sohamsironline.weeby.com 8-78 ESP Protocol provides secrecy, host authentication, data integrity. data, ESP trailer encrypted. next header field is in ESP trailer. ESP authentication field is similar to AH authentication field. Protocol = 50. authenticated IP header ESP TCP/UDP segment header ESP trailer ESP authent. encrypted Monday, October 13, 2014
  • 79. http://sohamsironline.weeby.com 8-79 IEEE 802.11 security War-driving: drive around Bay area, see what 802.11 networks available? More than 9000 accessible from public roadways 85% use no encryption/authentication packet-sniffing and various attacks easy! Securing 802.11 encryption, authentication first attempt at 802.11 security: Wired Equivalent Privacy (WEP): a failure current attempt: 802.11i Monday, October 13, 2014
  • 80. Wired Equivalent Privacy (WEP): authentication as in protocol ap4.0 host requests authentication from access point access point sends 128 bit nonce host encrypts nonce using shared symmetric key access point decrypts nonce, authenticates host no key distribution mechanism authentication: knowing the shared key is enough http://sohamsironline.weeby.com 8-80 Monday, October 13, 2014
  • 81. http://sohamsironline.weeby.com 8-81 WEP data encryption Host/AP share 40 bit symmetric key (semi-permanent) Host appends 24-bit initialization vector (IV) to create 64-bit key 64 bit key used to generate stream of keys, kIV i ki IV used to encrypt ith byte, di, in frame: ci = di XOR ki IV IV and encrypted bytes, ci sent in frame Monday, October 13, 2014
  • 82. http://sohamsironline.weeby.com 8-82 802.11 WEP encryption IV (per frame) KS: 40-bit secret symmetric IV k2 key k1 IV k3 IV … kN IV kN+1 IV… kN+1 IV d1 d2 d3 … dN CRC1 … CRC4 c1 c2 c3 … cN cN+1 … cN+4 plaintext frame data plus CRC key sequence generator ( for given KS, IV) 802.11 header IV WEP-encrypted data plus CRC Figure 7.8-new1: 802.11 Sender-side WEP e WnEcPr pyroptotciool n Monday, October 13, 2014
  • 83. Breaking 802.11 WEP encryption Security hole: 24-bit IV, one IV per frame, - IV’s eventually reused IV transmitted in plaintext - IV reuse detected Attack: Trudy causes Alice to encrypt known plaintext d1 d2 d3 d4 … Trudy sees: ci = di XOR ki http://sohamsironline.weeby.com 8-83 IV Trudy knows ci di, so can compute ki IV Trudy knows encrypting key sequence k1 IV k2 IV k3 IV … Next time IV is used, Trudy can decrypt! Monday, October 13, 2014
  • 84. 802.11i: improved security numerous (stronger) forms of encryption possible provides key distribution uses authentication server separate from access point http://sohamsironline.weeby.com 8-84 Monday, October 13, 2014
  • 85. 802.11i: four phases of operation AP: access point AS: Authentication server STA and AS mutually authenticate, together generate Master Key (MK). AP servers as “pass through” http://sohamsironline.weeby.com 8-85 wired network STA: client station 1 Discovery of security capabilities 3 2 3 STA derives Pairwise Master Key (PMK) AS derives same PMK, sends to AP 4 STA, AP use PMK to derive Temporal Key (TK) used for message Monday, October 13, 2014 encryption, integrity
  • 86. EAP: extensible authentication protocol EAP: end-end client (mobile) to authentication server protocol EAP sent over separate “links” mobile-to-AP (EAP over LAN) AP to authentication server (RADIUS over UDP) wired network http://sohamsironline.weeby.com 8-86 EAP TLS EAP EAP over LAN (EAPoL) IEEE 802.11 RADIUS UDP/IP Monday, October 13, 2014
  • 87. Network Security (summary) Basic techniques…... cryptography (symmetric and public) authentication message integrity key distribution …. used in many different security scenarios http://sohamsironline.weeby.com 8-87 secure email secure transport (SSL) IP sec 802.11 Monday, October 13, 2014