+ All Categories
Home > Documents > 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

1-1 1DT057 Distributed Information System Chapter 8 Network Security.

Date post: 05-Jan-2016
Category:
Upload: olivia-hunt
View: 235 times
Download: 0 times
Share this document with a friend
Popular Tags:
36
1-1 1DT057 Distributed Information System Chapter 8 Network Security
Transcript
Page 1: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

1-1

1DT057Distributed Information System

Chapter 8Network Security

Page 2: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CHAPTER 8: NETWORK SECURITY

8: Netw

ork Security

8-2

Chapter goals: understand principles of network security:

cryptography and its many uses beyond “confidentiality”

authentication message integrity

security in practice: firewalls and intrusion detection systems security in application, transport, network, link layers

Page 3: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CHAPTER 8 ROADMAP

8.1 What is network security?8.2 Principles of cryptography8.3 Message integrity8.4 Securing e-mail8.5 Operational security: firewalls and IDS

8-3

8: Netw

ork Security

Page 4: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

WHAT IS NETWORK SECURITY?

Confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver decrypts message

Authentication: sender, receiver want to confirm identity of each other

Message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection

Access and availability: services must be accessible and available to users

8-4

8: Netw

ork Security

Page 5: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

FRIENDS AND ENEMIES: ALICE, BOB, TRUDY well-known in network security world Bob, Alice (lovers!) want to communicate “securely” Trudy (intruder) may intercept, delete, add messages 8: N

etwork S

ecurity

8-5

securesender

securereceiver

channel data, control messages

data data

Alice Bob

Trudy

Page 6: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

THERE ARE BAD GUYS (AND GIRLS) OUT THERE!Q: What can a “bad guy” do?A: a lot!

eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in

packet (or any field in packet) hijacking: “take over” ongoing connection by

removing sender or receiver, inserting himself in place

denial of service: prevent service from being used by others (e.g., by overloading resources)

8-6

8: Netw

ork Security

more on this later ……

Page 7: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CHAPTER 8 ROADMAP

8.1 What is network security?8.2 Principles of cryptography8.3 Message integrity8.4 Securing e-mail8.5 Operational security: firewalls and IDS

8-7

8: Netw

ork Security

Page 8: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

THE LANGUAGE OF CRYPTOGRAPHY

symmetric key crypto: sender, receiver keys identicalpublic-key crypto: encryption key public, decryption

key secret (private)8-8

8: Netw

ork Security

plaintext plaintextciphertext

KA

encryptionalgorithm

decryption algorithm

Alice’s encryptionkey

Bob’s decryptionkey

KB

Page 9: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

SYMMETRIC KEY CRYPTOGRAPHYsubstitution cipher: substituting one thing for

another monoalphabetic cipher: substitute one letter for another

8-9

8: Netw

ork Security

plaintext: abcdefghijklmnopqrstuvwxyz

ciphertext: mnbvcxzasdfghjklpoiuytrewq

Plaintext: bob. i love you. aliceciphertext: nkn. s gktc wky. mgsbc

E.g.:

Q: How hard to break this simple cipher?: brute force (how hard?) other?

Page 10: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

SYMMETRIC KEY CRYPTOGRAPHY

symmetric key crypto: Bob and Alice share know same (symmetric) key: K

e.g., key is knowing substitution pattern in mono alphabetic substitution cipher

Q: how do Bob and Alice agree on key value?8-10

8: Netw

ork Security

plaintextciphertext

KA-B

encryptionalgorithm

decryption algorithm

A-B

KA-B

plaintextmessage, m

K (m)A-B

K (m)A-Bm = K ( )

A-B

Page 11: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

PUBLIC KEY CRYPTOGRAPHY

symmetric key crypto requires sender,

receiver know shared secret key

Q: how to agree on key in first place (particularly if never “met”)?

8: Netw

ork Security

8-11

public key cryptography

radically different approach [Diffie-Hellman76, RSA78]

sender, receiver do not share secret key

public encryption key known to all

private decryption key known only to receiver

Page 12: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

PUBLIC KEY CRYPTOGRAPHY8: N

etwork S

ecurity

8-12

plaintextmessage, m

ciphertextencryptionalgorithm

decryption algorithm

Bob’s public key

plaintextmessageK (m)

B+

K B+

Bob’s privatekey

K B-

m = K (K (m))B+

B-

Page 13: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

PUBLIC KEY ENCRYPTION ALGORITHMS

need K ( ) and K ( ) such that

8-13

8: Netw

ork Security

B B. .

given public key K , it should be impossible to compute private key K B

B

Requirements:

1

2

RSA: Rivest, Shamir, Adleman algorithm

+ -

K (K (m)) = m BB

- +

+

-

Page 14: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

RSA: ENCRYPTION, DECRYPTION

8-15

8: Netw

ork Security

0. Given public key (n,e) and private key (n,d) as computed above

1. To encrypt bit pattern, m, compute

c = m mod n

e (i.e., remainder when m is divided by n)e

2. To decrypt received bit pattern, c, compute

m = c mod n

d (i.e., remainder when c is divided by n)d

m = (m mod n)

e mod n

dMagichappens!

c

Page 15: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

RSA EXAMPLE:

8-16

8: Netw

ork Security

Bob chooses p=5, q=7. Then n=35, z=24.e=5 (so e, z relatively prime).d=29 (so ed-1 exactly divisible by z.

letter m me c = m mod ne

l 12 1524832 17

c m = c mod nd

17 481968572106750915091411825223071697 12

cdletter

l

encrypt:

decrypt:

Page 16: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

RSA: ANOTHER IMPORTANT PROPERTY

8-18

8: Netw

ork Security

The following property will be very useful later:

K (K (m)) = m BB

- +K (K (m))

BB+ -

=

use public key first, followed

by private key

use private key first,

followed by public key

Result is the same!

Page 17: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CHAPTER 8 ROADMAP

8.1 What is network security?8.2 Principles of cryptography8.3 Message integrity8.4 Securing e-mail8.5 Operational security: firewalls and IDS

8-19

8: Netw

ork Security

Page 18: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

MESSAGE INTEGRITY8: N

etwork S

ecurity

8-20

Bob receives msg from Alice, wants to ensure: message originally came from Alice message not changed since sent by Alice

Cryptographic Hash: takes input m, produces fixed length value, H(m)

e.g., as in Internet checksum computationally infeasible to find two different

messages, x, y such that H(x) = H(y) equivalently: given m = H(x), (x unknown), can not

determine x. note: Internet checksum fails this requirement!

Page 19: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

MESSAGE AUTHENTICATION CODE

8: Netw

ork Security

8-22

m

s(shared secret)

(message)

H(.)H(m+s)

publicInternetappend

m H(m+s)

s

compare

m

H(m+s)

H(.)

H(m+s)

(shared secret)

Page 20: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

DIGITAL SIGNATURES

8: Netw

ork Security

8-23

cryptographic technique analogous to hand-written signatures.

sender (Bob) digitally signs document, establishing he is document owner/creator.

verifiable, nonforgeable: recipient (Alice) can prove to someone that Bob, and no one else (including Alice), must have signed document

Page 21: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

DIGITAL SIGNATURES

8: Netw

ork Security

8-24

simple digital signature for message m: Bob “signs” m by encrypting with his private

key KB, creating “signed” message, KB(m)--

Dear Alice

Oh, how I have missed you. I think of you all the time! …(blah blah blah)

Bob

Bob’s message, m

public keyencryptionalgorithm

Bob’s privatekey

K B-

Bob’s message, m, signed

(encrypted) with his private key

K B-(m)

Page 22: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

DIGITAL SIGNATURES (MORE)8: N

etwork S

ecurity

8-25

suppose Alice receives msg m, digital signature KB(m) Alice verifies m signed by Bob by applying Bob’s

public key KB to KB(m) then checks KB(KB(m) ) = m.

if KB(KB(m) ) = m, whoever signed m must have used Bob’s private key.

Alice thus verifies that: Bob signed m. No one else signed m. Bob signed m and not m’.

non-repudiation: Alice can take m, and signature KB(m) to court

and prove that Bob signed m.

+ +

-

-

- -

+

-

Page 23: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

Alice verifies signature and integrity of digitally signed message:

8: Netw

ork Security

8-26

large message

mH: hashfunction H(m)

digitalsignature(encrypt)

Bob’s private

key K B-

+

Bob sends digitally signed message:

KB(H(m))-

encrypted msg digest

KB(H(m))-

encrypted msg digest

large message

m

H: hashfunction

H(m)

digitalsignature(decrypt)

H(m)

Bob’s public

key K B+

equal ?

Digital signature = signed MAC

Page 24: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

PUBLIC KEY CERTIFICATION8: N

etwork S

ecurity

8-27

public key problem: When Alice obtains Bob’s public key (from web

site, e-mail, diskette), how does she know it is Bob’s public key, not Trudy’s?

solution: trusted certification authority (CA)

Page 25: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CERTIFICATION AUTHORITIES Certification Authority (CA): binds public key to

particular entity, E. E registers its public key with CA.

E provides “proof of identity” to CA. CA creates certificate binding E to its public key. certificate containing E’s public key digitally signed by

CA: CA says “This is E’s public key.”

8: Netw

ork Security

8-28

Bob’s public

key K B+

Bob’s identifying informatio

n

digitalsignature(encrypt)

CA private

key K CA-

K B+

certificate for Bob’s public

key, signed by CA

-K CA(K ) B+

Page 26: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CERTIFICATION AUTHORITIES when Alice wants Bob’s public key:

gets Bob’s certificate (Bob or elsewhere). apply CA’s public key to Bob’s certificate, get Bob’s

public key

8: Netw

ork Security

8-29

Bob’s public

key K B+

digitalsignature(decrypt)

CA public

key K CA+

K B+

-K CA(K ) B+

Page 27: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CHAPTER 8 ROADMAP

8.1 What is network security?8.2 Principles of cryptography8.3 Message integrity8.4 Securing e-mail8.5 Operational security: firewalls and IDS

8-30

8: Netw

ork Security

Page 28: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

SECURE E-MAIL

8-31

8: Netw

ork Security

Alice: generates random symmetric private key, KS. encrypts message with KS (for efficiency) also encrypts KS with Bob’s public key. sends both KS(m) and KB(KS) to Bob.

Alice wants to send confidential e-mail, m, to Bob.

KS( ).

KB( ).+

+ -

KS(m

)

KB(KS )+

m

KS

KS

KB+

Internet

KS( ).

KB( ).-

KB-

KS

mKS(m

)

KB(KS )+

Page 29: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

SECURE E-MAIL

8-32

8: Netw

ork Security

Bob: uses his private key to decrypt and recover KS

uses KS to decrypt KS(m) to recover m

Alice wants to send confidential e-mail, m, to Bob.

KS( ).

KB( ).+

+ -

KS(m

)

KB(KS )+

m

KS

KS

KB+

Internet

KS( ).

KB( ).-

KB-

KS

mKS(m

)

KB(KS )+

Page 30: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

SECURE E-MAIL (CONTINUED)

8-34

8: Netw

ork Security

• Alice wants to provide secrecy, sender authentication, message integrity.

Alice uses three keys: her private key, Bob’s public key, newly created symmetric key

H( ). KA( ).-

+

KA(H(m))-

m

KA-

m

KS( ).

KB( ).+

+

KB(KS )+

KS

KB+

Internet

KS

Page 31: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

CHAPTER 8 ROADMAP

8.1 What is network security?8.2 Principles of cryptography8.3 Message integrity8.4 Securing e-mail8.5 Operational security: firewalls and IDS

8-35

8: Netw

ork Security

Page 32: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

FIREWALLS8: N

etwork S

ecurity

8-36

isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others.

firewall

administerednetwork

publicInternet

firewall

Page 33: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

FIREWALLS: WHY8: N

etwork S

ecurity

8-37

prevent denial of service attacks: SYN flooding: attacker establishes many bogus

TCP connections, no resources left for “real” connections

prevent illegal modification/access of internal data. e.g., attacker replaces CIA’s homepage with

something elseallow only authorized access to inside network (set of

authenticated users/hosts)

Page 34: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

INTRUSION DETECTION SYSTEMS packet filtering:

operates on TCP/IP headers only no correlation check among sessions

IDS: intrusion detection system deep packet inspection: look at packet contents

(e.g., check character strings in packet against database of known virus, attack strings)

examine correlation among multiple packets port scanning network mapping DoS attack

8-40

8: Netw

ork Security

Page 35: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

INTRUSION DETECTION SYSTEMS multiple IDSs: different types of checking at

different locations

8-41

8: Netw

ork Security

Webserver

FTPserver

DNSserver

applicationgateway

Internet

demilitarized zone

internalnetwork

firewall

IDS sensors

Page 36: 1-1 1DT057 Distributed Information System Chapter 8 Network Security.

NETWORK SECURITY (SUMMARY)Basic techniques…...

cryptography (symmetric and public) message integrity digital signature

…. used in many different security scenarios secure email

Operational Security: firewalls and IDS

8-42

8: Netw

ork Security


Recommended