Date post: | 10-Apr-2018 |
Category: |
Documents |
Upload: | paramjit-singh-sahota |
View: | 217 times |
Download: | 0 times |
of 34
8/8/2019 My Tutorial on Security Lecture 1 and 2
1/34
9/17/2010 Tutorial on Network Security: Sep2003 1
Network SecurityNetwork Security
Bijendra Jain([email protected])
8/8/2019 My Tutorial on Security Lecture 1 and 2
2/34
9/17/2010 Tutorial on Network Security: Sep2003 2
Lecture 1: IntroductionLecture 1: Introduction
8/8/2019 My Tutorial on Security Lecture 1 and 2
3/34
9/17/2010 Tutorial on Network Security: Sep2003 3
TopTop--level issueslevel issues
Safety, security and privacy
Security policy threats, both external and internal
economic gains
cost of securing resources cryptographic methods vs. physical security
Information security: nature of resources (HW, SW, information)
during storage, access and communication
limited to a single computer vs. network security various layers (physical through application layers)
8/8/2019 My Tutorial on Security Lecture 1 and 2
4/34
9/17/2010 Tutorial on Network Security: Sep2003 4
Security threatsSecurity threats
Intentional vs. accidental
Various forms of violations: Non-destructive
Destructive
Repudiation Denial of service
Threat techniques: crypt-analysis
snooping
masquerading replay attacks
virus, worms
etc.
8/8/2019 My Tutorial on Security Lecture 1 and 2
5/34
9/17/2010 Tutorial on Network Security: Sep2003 5
Security servicesSecurity services
Services (or functions) vs. mechanisms
Security functions: confidentiality
authentication
integrity
non-repudiation
access control
availability
8/8/2019 My Tutorial on Security Lecture 1 and 2
6/34
9/17/2010 Tutorial on Network Security: Sep2003 6
Security mechanismsSecurity mechanisms
Physical controls
Audit trails
Fraud detection (data mining)
Steganography
Encryption: private-key vs. public-key encryption
key generation, exchange, and management
certification
Firewalls etc.
8/8/2019 My Tutorial on Security Lecture 1 and 2
7/34
9/17/2010 Tutorial on Network Security: Sep2003 7
Lecture 2: SymmetricLecture 2: Symmetric--keykeyencryptionencryption
8/8/2019 My Tutorial on Security Lecture 1 and 2
8/34
9/17/2010 Tutorial on Network Security: Sep2003 8
Cryptographic systemsCryptographic systems Symmetric vs. asymmetric encryption
Number of keys used
Key lengths
Block vs. stream cipher
Crypt-analysis (assume algorithm is known) ciphertext (only)
plaintext + ciphertext
chosen plaintext + ciphertext
chosen ciphertext + plaintext
Key size Possible
no. of keys
Time to crack
(1 encryption/microsec)
Time to crack (106
encryptions/microsec)
32 109
36 min 2. msec56 1016 1100 years 10 hrs
128 1038 5 x 1024 years 5 x 1018 years
26 character
permutation
1026 6 x 1012 years 6 x 106 years
8/8/2019 My Tutorial on Security Lecture 1 and 2
9/34
9/17/2010 Tutorial on Network Security: Sep2003 9
Symmetric cryptographic systemSymmetric cryptographic system Symmetric encryption
Plaintext, X
Ciphertext, Y
Secret keys for encryption, decryption, K
Secret
key, K
Encrypt
EK(X)
Decrypt
DK(X)
Crypt-
analysis
X Y X
K K
Secure channel
Insecure
channel
8/8/2019 My Tutorial on Security Lecture 1 and 2
10/34
9/17/2010 Tutorial on Network Security: Sep2003 10
Asymmetric cryptographic systemAsymmetric cryptographic system Asymmetric encryption
Plaintext, X
Ciphertext, Y
Two keys K1, and K2. One is secret, other is public
One of them (secret or public) is used to encrypt, the other for decryption
Helps with confidentiality, digital signatures
Key generation, management
Encrypt
EK(X)
Decrypt
DK(X)
Crypt-
analysis
X Y X
K1 K2
Insecure
channel
8/8/2019 My Tutorial on Security Lecture 1 and 2
11/34
9/17/2010Tutorial on Network Security: Sep
2003 11
Symmetric encryptionSymmetric encryption
Substitution cipher
Transposition cipher
DES
Triple DES Blowfish, RC5, RC4, etc.
8/8/2019 My Tutorial on Security Lecture 1 and 2
12/34
9/17/2010Tutorial on Network Security: Sep
2003 12
Substitution cipherSubstitution cipher
Ceasar cipher encrypt Cn (p+k) mod n
decrypt pn (C-k) mod n
assumes set of n characters
easily breakable in n-1 steps
Substitute using n x n table encrypt Cin lookup_encrypt(pi)
decrypt pjn lookup_decrypt(Cj)
26! Different keys
may be broken using known relative frequency of each character
To counter: use multiple symbols to substitute
substitute multiple symbols at a time e.g. two letter strings at a time
8/8/2019 My Tutorial on Security Lecture 1 and 2
13/34
9/17/2010Tutorial on Network Security: Sep
2003 13
Transposition cipherTransposition cipher
Transposition example:
To make it more secure: transposition it multiple times
combine it with substitution ciphers
Key 4 3 1 2 5 6 7
Plaint t a t t a c k p
o s t p o n e
d u n t I l t
o a m x y z
iphertext:
TT AAPTMTSU A C I K LYPETZ
8/8/2019 My Tutorial on Security Lecture 1 and 2
14/34
9/17/2010Tutorial on Network Security: Sep
2003 14
DESDES
Combination of several substitution and transposition ops Applied to each block of size 64 bits
Key is 56 bits
ses portions of key at different steps
ses techniques referred to by diffusion and confusion
Developed by IB 1971-73, accepted by NBS ( SA) as astandard in 1977
Primarily a block cipher
Decrypt
DK(X)
P1
K
C1
Encypt
EK(X)
C1
K
P1
8/8/2019 My Tutorial on Security Lecture 1 and 2
15/34
9/17/2010Tutorial on Network Security: Sep
2003 15
DES encryption algorithmDES encryption algorithm
Initial permutation
Round 1
Round 2
Round 16
32-bit swap
Inverse permute
K1
K2
K16
Permuted key
Permuted key
Permuted key
Left circular shift
Left circular shift
Left circular shift
Permuted key
64-bit plaintext
64-bit ciphertext
56-bit key
8/8/2019 My Tutorial on Security Lecture 1 and 2
16/34
9/17/2010Tutorial on Network Security: Sep
2003 16
Cipher Block ChainingCipher Block Chaining
Encrypt
EK(X)
C1
IV
K
+
P1
Encrypt
EK(X)
C2
+
P2
K
Decrypt
DK(X)
P1
IV
K
+
C1
P2
C2
Decrypt
DK(X)
K
+
Primarily a block cipher
ay be used in block chaining mode
8/8/2019 My Tutorial on Security Lecture 1 and 2
17/34
9/17/2010Tutorial on Network Security: Sep
2003 17
Strength of DESStrength of DES
Key size of56 bits appears to be too small
In 1993 Weiner developed HW device for $100K with 5760 searchengines to break it in 35 hours
In 1997, 70,000 systems on Internet discovered the key in less than96 days (part of plaintext is given)
Automating the process is difficult, unless plaintext is known
Perhaps breakable by studying and exploiting weakness
Differential cryptanalysis
Linear cryptanalysis
Trapdoor
S Govt changed the original design
Continues to enjoy wide acceptibility
Particularly with triple-DES (used in PGP)
8/8/2019 My Tutorial on Security Lecture 1 and 2
18/34
9/17/2010Tutorial on Network Security: Sep
2003 18
DoubleDouble--DESDES
Two stages of encryption, using two different keys
Decrypt
EK2(X)
X
K2
Encypt
EK1(X)
CP
K1
8/8/2019 My Tutorial on Security Lecture 1 and 2
19/34
9/17/2010Tutorial on Network Security: Sep
2003 19
DoubleDouble--DESDES
two stages cannot be reduced to one stage: for given K1, K2, there is no K s.t. EK2(EK1(P)) = EK(P)
eet-in-the-middle attack Let C = EK2(EK1(P)), and X = EK1(P) = DK2(C)
Let known P and C
Search for K1 and K2 such that X = EK1(P) = DK2(C)
Complexity is O(256 + 256), not O(2128)
8/8/2019 My Tutorial on Security Lecture 1 and 2
20/34
9/17/2010Tutorial on Network Security: Sep
2003 20
TripleTriple--DESDES
Three stages of encryption, using two different keys
Decrypt
EK2(X)
X1
K2
Encypt
EK1(X)
CP
K1
X2
Decrypt
EK3(X)
K3
8/8/2019 My Tutorial on Security Lecture 1 and 2
21/34
9/17/2010Tutorial on Network Security: Sep
2003 21
IDEAIDEA
International data encryption algorithm (IDEA)
developed in 1991, gaining ground
block cipher
better understood S government has had no role in its design
design principle: block size 64 bits
key length 128 bits
more emphasis on diffusion and confusion
uses three operations:
exclusive-OR, addition, multiplication
some effort to make HW implementation easier
8/8/2019 My Tutorial on Security Lecture 1 and 2
22/34
9/17/2010Tutorial on Network Security: Sep
2003 22
RC5RC5
developed by Rivest, in 1994
suitable for HW or SW implementation onmicroprocessors simple
different word length
low memory
high level of security simpler determination of strength
variable no. of rounds, key length
8/8/2019 My Tutorial on Security Lecture 1 and 2
23/34
9/17/2010Tutorial on Network Security: Sep
2003 23
BlowfishBlowfish
Developed in 1993
block cipher
up to 448 bit keys
no known attacks simple, fast and compact
algorithm cycles/"round" No. of rounds cycles/byte encrypted
Blowfish 9 16 18
RC5 12 16 23DES 18 16 45
IDEA 50 8 50
Triple-DES 18 48 108
8/8/2019 My Tutorial on Security Lecture 1 and 2
24/34
9/17/2010Tutorial on Network Security: Sep
2003 24
Summary: symmetric key encryptionSummary: symmetric key encryption
Since the same key is used to encrypt and decrypt,the system is also know as private-key encryption
Symmetric key encryption uses shared secret keys
also known as private-key encryption Primarily used for purpose of confidentiality
but may be used to authenticate as well, but may berepudiated
Key sharing or management is an issue
particularly when the no. of clients sharing the key is large
8/8/2019 My Tutorial on Security Lecture 1 and 2
25/34
9/17/2010Tutorial on Network Security: Sep
2003 25
Application to confidentialityApplication to confidentiality
Private-key encryption may be used to provideconfidentiality of messages during transfer overLANsand/or WANs
At issue:
what information: ser data vs. headers
Identity of correspondents vs. node/route identity
in what layer, and between what points Link-layer vs. end-to-end vs. application level
Assumption: data over physical network is accessible Wireless links Employee of the network service provider
Your own colleagues
8/8/2019 My Tutorial on Security Lecture 1 and 2
26/34
9/17/2010Tutorial on Network Security: Sep
2003 26
LinkLink--level vs. endlevel vs. end--toto--endend
confidentialityconfidentiality
Host
A
Host
B
R R
R
Link-levelenrypt/ decrypt
End-to-endenrypt/ decrypt
8/8/2019 My Tutorial on Security Lecture 1 and 2
27/34
9/17/2010Tutorial on Network Security: Sep
2003 27
LinkLink--level vs. endlevel vs. end--toto--endend
confidentialityconfidentialityLink-level encryption End-to-end encryption
Security within nodes, hosts
Exposed in intermediate nodes
Exposed in end hosts
Encrypted in intermediate nodes
Encrypted/Decrypted by end hosts
Role of end devices, intermediate nodes
Intermediate nodes require encryptionOne key for each link
Done in hardware
Only end hosts need encryption One keyper session/connection
Perhaps done in software
8/8/2019 My Tutorial on Security Lecture 1 and 2
28/34
9/17/2010Tutorial on Network Security: Sep
2003 28
Traffic confidentialityTraffic confidentiality
Issues: Identity of communicating entities
Identity of hosts, routers
Traffic volumes, patterns
Link-level encryption offers better confidentiality Padding may be used to hide patterns and volumes
8/8/2019 My Tutorial on Security Lecture 1 and 2
29/34
9/17/2010Tutorial on Network Security: Sep
2003 29
Key distributionKey distribution
Secret key must be distributed between the communicatingentities, say A and B
Link level encryption requires L number of keys to bedistributed, one for each device at the end of a link
Host-to-host encryption requires N*(N-1)/2 keys to be distributed
Two techniques: Physical delivery (works only in a very limited environs)
A delivers it to B
A trusted third party C delivers the key to A and to B
Electronic delivery using an established secure connection orsession A delivers it to B after suitably encrypting it A trusted third party C delivers the key to A and to B using secure
channels to A and to B.
8/8/2019 My Tutorial on Security Lecture 1 and 2
30/34
9/17/2010
Tutorial on Network Security: Sep
2003 30
Key distributionKey distribution Electronic distribution by B to A, though process initiated by A
Above: N1 and N2 are nonce,
Km is the master key used by A and B
KS is the new session key
F is a well-known function, such as ADD 1
8/8/2019 My Tutorial on Security Lecture 1 and 2
31/34
9/17/2010
Tutorial on Network Security: Sep
2003 31
Key distributionKey distribution Electronic distribution by trusted third party C to A and to B
8/8/2019 My Tutorial on Security Lecture 1 and 2
32/34
9/17/2010
Tutorial on Network Security: Sep
2003 32
Key distributionKey distribution
Above:
KA and KB are keys used by A and B, respectively, to communicatewith C
IDA identifies entity A
8/8/2019 My Tutorial on Security Lecture 1 and 2
33/34
9/17/2010
Tutorial on Network Security: Sep
2003 33
Key distributionKey distribution
Secure operation of these schemes, against: asquerade
replay attacks
Other issues:
Hierarchy of keys Lifetime of a session key
Generation of Nonce or Random numbers
8/8/2019 My Tutorial on Security Lecture 1 and 2
34/34
9/17/2010
Tutorial on Network Security: Sep
2003 34
ThanksThanks