1 / 62

Security

Security. Peter O’Grady. Network Security Problem. Data Flow - transmission security Network Security - server security Malicious code - virus security. User. User. The Internet. User. User. Data moves through a network Attacker may try to gain access.

frey
Download Presentation

Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Peter O’Grady

  2. Network Security Problem • Data Flow - transmission security • Network Security - server security • Malicious code - virus security

  3. User User The Internet User User • Data moves through a network • Attacker may try to gain access

  4. “By accessing or altering data, an attacker can steal tangible assets or lead an organization to take actions it would not otherwise take. By merely examining data, an attacker can gain competitive advantage, without the owner of the data being any the wiser.” • Computers at Risk: Safe Computing in the Information Age • National Research Council, 1991

  5. Network Security • where an intruder may be malicious in that they may interfere with the operation of the network, causing operation problems such as deliberately crashing a server. • Particularly dangerous when they gain access to data on servers.

  6. Example Attack • Texas A&M August 1992 • Several outside intruders • Captured hundreds of passwords (including some on servers) • One machine set up as hacker bulletin board to discuss progress without the victim knowing. • Hackers had developed programs to test for weaknesses.

  7. Transmission Security- Data Flow • The potential security problems in data flow can be thought of as: • Interruption – stop flow • Interception – intercept message, for reading – original message continues • Modification – intercept message and replace with alternative. Send alternative • Fabrication – send fabricated message • How can each of these be stopped?

  8. Conveying Messages Securely • Phrases that convey meaning • 1:1 coding - has to be pre-determined • Difficult to decode • Low flexibility • Character encryption • Very flexible • Need large number of possible permutations to avoid brute force decryption

  9. Transmission Security • Transmission Security involves three main measures that can be taken to prevent these breaches of security occurring. • encryption, • authentication, • and data integrity.

  10. Encryption • Task: take regular text and produce encrypted text so that original text cannot be determined easily from the encrypted text. • Encryption Examples • Caesar cipher • Enigma encoding machine • Decryption: • Letter usage analysis • Complete enumeration • Obtaining Key

  11. Encryption • History of encryption tied to military and diplomatic messages • If messages are send by wireless then can be heard by others • Governments seek very hard encryption for messages. Other governments try hard to decrypt messages. • Of VERY great importance • Examples: • Midway • German Enigma machine

  12. Midway • December 7 Pearl Harbor • Japanese had “Purple” cipher machine. US had decoded this (“Magic”) • Japanese overran much of SE Asia by May 1942 • Japanese 4 large carriers, 3 battleships, 16 submarines for invasion of Midway • US only had 3 carriers (one damaged) in Pacific • Messages decoded about Japanese plan. Nimitz rushes all US carriers to Midway. • US surprises Japanese fleet and sinks 4 Japanese carriers.

  13. “Scouts found the Japanese early in the morning of June 4. Although initial strikes by Midway-based planes were not successful, American carrier-based planes turned the tide. Torpedo bombers became separated from the American dive-bombers and were slaughtered (36 of 42 shot down), but they diverted Japanese defenses just in time for the dive-bombers to arrive; some of them had become lost, and now by luck they found the Japanese. The Japanese carriers were caught while refueling and rearming their planes, making them especially vulnerable. The Americans sank four fleet carriers—the entire strength of the task force….” http://college.hmco.com/history/readerscomp/mil/html/ml_034100_midwaybattle.htm

  14. Iraq I “One of the ROCKSTARS (codename for group of agents) next delivered an Iraqi mobile communications device that was supposed to be sent out for repairs. It was the device used by Deputy Prime Minister Tariq Aziz. It had encryption capability and was part of the SSO communications network. A ROCKSTAR agenthas swiped it. Tim (a USA agent) had it couriered back to Washington where the National Security Agency was able to exploit it. Soon NSA was listening in to some SSO communications.” "Plan of Attack", Bob Woodward 2004 p 303

  15. Iraq II “Ahmad Chalabi, the Iraqi leader and former ally of the Bush administration, disclosed to an Iranian official that the United States had broken the secret communications code of Iran's intelligence service, betraying one of Washington's most valuable sources of information about Iran, according to United States intelligence..”NY Times, June 2, 2004

  16. Caesar Cipher • Simple coding that replaces letter by one n places further along the alphabet. • If n=2 then, for example, all occurrences of a are replaced by c. • internet becomes kpvgtpgv • Easy to decode (26 possible keys) especially using letter usage analysis (e.g. e is most frequently used letter in English)

  17. Improving Caesar Cipher • Cipher where n is variable would be stronger • n varies with letter - i.e. one to one mapping between letters • Can decipher using letter usage analysis • mapping that varies over time/usage would be better - example is the German Enigma machine of WWII.

  18. Enigma encoding machine • On successive keystrokes the wheels moved so that the encoding was different for each keystroke. • The wheels could be set by the users and the same settings had to be used at both ends of the transmission. • With five wheels, each with 26 pins, the number of different substitution alphabets is 265 (which equals 11,881,376).

  19. Enigma in use Gen. Guderian, 1943

  20. Enigma Coding Machine • 11,881,376 possible permutations was thought to be impregnable. • Illustrated key points on encryption: • Same key at both ends (single key)- wheel positions • Number of permutations as high as possible to defeat complete enumeration • Varying characteristics of encoding to defeat letter usage analysis • Now need much larger number of permutations to avoid eavesdroppers.

  21. Transmission Security - Main Elements • Single Key Encryption • Dual Key Encryption • Message Digest (often 128 bit) • Certificate - containing subjects public key and encrypted using certificates authority private key • We’ll go through each of these and see how they apply

  22. Simplified Model of Conventional Single Key Encryption (Stallings, 1995)

  23. Model of Conventional Single Key Encryption (Stallings, 1995)

  24. Single Key Encryption • Input • plaintext X=[X1, X2, X3 , …., XM ] • K=[K1, K2, ……, KJ ] • Output • ciphertext Y=[Y1,Y2, ….., YN]

  25. Single Key Decryption • Input • ciphertext Y=[Y1,Y2, ….., YN] • K=[K1, K2, ……, KJ ] • Output • plaintext X=[X1, X2, X3 , …., XM ]

  26. Single Key • The general method for decrypting are generally based on enumerating the possible key settings. • Historically single key most common. • Both ends have key. • Example is Data Encryption Standard (DES) from NIST. • DES takes 64 bits of message and uses 56 bit length key. • 56 bit length key provides 256 ( = 7.2 x 1016) keys

  27. Encryption - Public (or Dual) Key • Uses two separate, but matched, keys - public and private. • RECEIVER generates two keys with the public key made available to others. • TRANSMITTER uses public key to encrypt the message. • RECEIVER uses private key to decrypt message. • Can be used for authentication

  28. Simplified Model of Dual-Key Encryption (Stallings, 1995)

  29. Dual-Key Encryption (Stallings, 1995)

  30. Dual Key Encryption • Input • plaintext X=[X1, X2, X3 , …., XM ] • KUb • Output • ciphertext Y=[Y1,Y2, ….., YN]

  31. Dual Key Decryption • Input • ciphertext Y=[Y1,Y2, ….., YN] • KRb • Output • plaintext X=[X1, X2, X3 , …., XM ]

  32. Dual-Key Encryption • Most Internet data that is very sensitive is now encrypted using this dual key system (using the RCA or IDEA algorithms) with a key length of 128 bits (in North America) and 40 bits elsewhere.

  33. Dual-Key Encryption • The 128 bit key provides for 2128 (=3.4 x 1038) different keys while the 40 bit key provides for 240( approximately 1012) different keys. Each is therefore secure from all but the most determined eavesdropper. • Dual Key Encryption more computing intensive then single key so is only used to start communications

  34. Authentication • Is the process of checking that the sender of data is in fact who they claim to be. • This is not as simple as it first appears. • an intruder can copy all of the packet information, perhaps also altering some of the data, and then re-transmitting it as if it had come from the original source.

  35. Authentication Using Dual-Key Encryption (Stallings, 1995)

  36. Dual Key Authentication (encrypt) • Input • plaintext X=[X1, X2, X3 , …., XM ] • KRa • Output • ciphertext Y=[Y1,Y2, ….., YN]

  37. Dual Key Authentication (decrypt) • Input • ciphertext Y=[Y1,Y2, ….., YN] • KUa • Output • plaintext X=[X1, X2, X3 , …., XM ]

  38. Digital Signature • This mode of operation has been formulated into what is termed the Secure Sockets Layer (SSL) which uses an independent Certification Authority (CA) to issue a digital certificate. The digital certificate contains the name of the server and the public key, as well as a digital signature

  39. Example Certificate (RSA Secure Server Certification Authority)

  40. Digital Signature Procedure • The client sends a request to connect to the secure server • The server generates a public and private key and then sends a signed digital certificate with the public key. • The client uses the public key from the server to decrypt the message and authenticate the server.

  41. Authentication and Encryption • It should be noted that this authentication process does not prevent eavesdropping. • What is often used to prevent this is a double encryption procedure combining both authentication and encryption that provides both authentication and message encryption.

  42. Authentication and Encryption (Encrypt) • Input • plaintext X=[X1, X2, X3 , …., XM ] • KUb(KRa) • Output • ciphertext Y=[Y1,Y2, ….., YN]

  43. Authentication and Encryption (Decrypt) • Input • ciphertext Y=[Y1,Y2, ….., YN] • KUa(KRb) • Output • plaintext X=[X1, X2, X3 , …., XM ]

  44. Data Integrity • Data Integrity involves ensuring that the message received has not been tampered with. • A main method used is that of computing a small block of code that is derived from the message and appending this small block of code to the message.

  45. Data Integrity • This code is known as a cryptographic checksum or Message Authentication Code (MACs) • The function that is used to calculate the MAC need be only one way

  46. SSL Process A->B hello B->A Hi, I'm Bob, bobs-certificate (Bobs public key and encrypted using CA private key) A->B prove it (A has CA public key and hence obtains Bobs public key securely) B->A Alice, This Is Bob { digest[Alice, This Is Bob] } bobs-private-key A->B ok bob, here is a secret {secret}bobs-public-key {some message,MAC}secret-key

More Related