1 / 52

21: Network Security Basics

21: Network Security Basics. Last Modified: 9/15/2014 9:49:17 PM Some slides based on notes from cs515 at UMass. Importance of Network Security?. Think about… The most private, embarrassing or valuable piece of information you’ve ever stored on a computer

inga
Download Presentation

21: Network Security Basics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 21: Network Security Basics Last Modified: 9/15/2014 9:49:17 PM Some slides based on notes from cs515 at UMass 7: Network Security

  2. Importance of Network Security? • Think about… • The most private, embarrassing or valuable piece of information you’ve ever stored on a computer • How much you rely on computer systems to be available when you need them • The degree to which you question whether a piece of email really came from the person listed in the From field • How convenient it is to be able to access private information online (e.g. buy without entering all data, look up your transcript without requesting a copy,…) 7: Network Security

  3. Importance of Network Security • Society is becoming increasingly reliant on the correct and secure functioning of computer systems • Medical records, financial transactions, etc. • It is our jobs as professional computer scientists: • To evaluate the systems we use to understand their weaknesses • To educate ourselves and others to be wise network consumers • To design networked systems that are secure 7: Network Security

  4. Acceptable Use • In this section of the course, we will discuss the weaknesses of the protocol stack we have just learned • In the homework, you will examine a trace of some security exploits • This trace was taken in network that was completely disconnected from the Internet. We had root privileges on all machines. The experiments were conducted with the full knowledge and consent of all participants. • This is the only acceptable environment in which to experiment with security exploits. Doing so on any production network is unacceptable. 7: Network Security

  5. Taxonomy of Attacks (1) • Process based model to classify methods of attack • Passive: • Interception: attacks confidentiality. a.k.a., eavesdropping, “man-in-the-middle” attacks. • Traffic Analysis: attacks confidentiality, or anonymity. Can include traceback on a network, CRT radiation. • Active: • Interruption: attacks availability. (a.k.a., denial-of-service attacks • Modification: attacks integrity. • Fabrication: attacks authenticity. 7: Network Security

  6. Taxonomy of Attacks (2) • ‘Result of the attack’ taxonomy • Increased Accessthe quest for root • Disclosure of Informationcredit card numbers • Corruption of Informationchanging grades, etc • Denial of Serviceself explanatory • Theft of Resourcesstealing accounts, bandwidth 7: Network Security

  7. Fundamentals of Defense • Cryptography • Restricted Access • Restrict physical access, close network ports, isolate from the Internet, firewalls, NAT gateways, switched networks • Monitoring • Know what normal is and watch for deviations • Heterogeneity/Randomness • Variety of Implementations, Random sequence numbers, Random port numbers 7: Network Security

  8. Fundamentals of Defense • Cryptography: the study of mathematical techniques related to information security that have the following objectives: • Integrity • Non-repudiation • Confidentiality • Authentication 7: Network Security

  9. Objectives of Cryptography • Integrity : ensuring information has not been altered by unauthorized or unknown means • Integrity makes it difficult for a third party to substitute one message for another. • It allows the recipient of a message to verify it has not been modified in transit. • Nonrepudiation : preventing the denial of previous commitments or actions • makes it difficult for the originator of a message to falsely deny later that they were the party that sent the message. • E.g., your signature on a document. 7: Network Security

  10. Objectives of Cryptography • Secrecy/Confidentiality : ensuring information is accessible only by authorized persons • Traditionally, the primary objective of cryptography. • E.g. encrypting a message • Authentication: corroboration of the identity of an entity • allows receivers of a message to identify its origin • makes it difficult for third parties to masquerade as someone else • e.g., your driver’s license and photo authenticates your image to a name, address, and birth date. 7: Network Security

  11. Security Services • Authorization • AccessControl • Availability • Anonymity • Privacy • Certification • Revocation 7: Network Security

  12. Security Services • Authorization: conveyance of official sanction to do or be something to another entity. • Allows only entities that have been authenticated and who appear on an access list to utilize a service. • E.g., your date of birth on your driver’s license authorizes you to drink as someone who is over 21. • Access Control: restricting access to resources to privileged entities. • ensures that specific entities may perform specific operations on a secure object. • E.g. Unix access control for files (read, write, execute for owner, group, world) 7: Network Security

  13. Security Services • Availability: ensuring a system is available to authorized entities when needed • ensures that a service or information is available to an (authorized) user upon demand and without delay. • Denial-of-service attacks seek to interrupt a service or make some information unavailable to legitimate users. 7: Network Security

  14. Security Services • Anonymity : concealing the identity of an entity involved in some process • Concealing the originator of a message within a set of possible entities. • The degree of anonymity of an entity is the sum chance that everyone else in the set is the originator of the message. • Anonymity is a technical means to privacy. • Privacy: concealing personal information, a form of confidentiality. 7: Network Security

  15. Security Services • Certification: endorsement of information by a trusted entity. • Revocation: retraction of certification or authorization • Certification and Revocation • Just as important as certifying an entity, we need to be able to take those rights away, in case the system is compromised, we change policy, or the safety that comes from a “refresh”. 7: Network Security

  16. Original Plaintext Plaintext Ciphertext Encryption Decryption Cryptography • The most widely used tool for securing information and services is cryptography. • Cryptography relies on ciphers: mathematical functions used for encryption and decryption of a message. • Encryption: the process of disguising a message in such a way as to hide its substance. • Ciphertext: an encrypted message • Decryption: the process of returning an encrypted message back into plaintext. 7: Network Security

  17. Ciphers • The security of a cipher may rest in the secrecy of its restricted algorithm . • Whenever a user leaves a group, the algorithm must change. • Can’t be scrutinized by people smarter than you. • But, secrecy is a popular approach :( • Modern cryptography relies on keys, a selected value from a large set (a keyspace), e.g., a 1024-bit number. 21024 values! • Security is based on secrecy of the key, not the details of the algorithm. • Change of authorized participants requires only a change in key. 7: Network Security

  18. Friends and enemies: Alice, Bob, Trudy • well-known in network security world • Bob, Alice want to communicate “securely” • Trudy, the “intruder” may intercept, delete, add messages Figure 7.1 goes here 7: Network Security

  19. K K A B The language of cryptography plaintext plaintext ciphertext Figure 7.3 goes here 7: Network Security

  20. What makes a good cipher? substitution cipher: substituting one thing for another • monoalphabetic cipher: substitute one letter for another plaintext: abcdefghijklmnopqrstuvwxyz ciphertext: mnbvcxzasdfghjklpoiuytrewq E.g.: Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc • Q: How hard to break this simple cipher?: • brute force (how hard?) • other? 7: Network Security

  21. Symmetric vs Assymetric Key • The most common cryptographic tools are • Symmetric key ciphers • DES, 3DES, AES, Blowfish, Twofish, IDEA • Fast and simple (based on addition, masks, and shifts) • One key shared and kept secret • Typical key lengths are 40, 128, 256, 512 • Asymmetric key ciphers • RSA, El Gamal • two keys • Slow, but versatile (usually requires exponentiation) • Typical key lengths are 512, 1024, 2048 7: Network Security

  22. Keys • Symmetric key (private key) algorithms have a separate key for each pair of entities sharing a key. • Public-Key algorithms use a public-key and private-key pair over a message. • Only the public-key can decrypt a message encrypted with the private key. • Similarly, only the private key can decrypt a message decrypted with the public key. • Often, a symmetric session key is generated by one of participants and encrypted with the other’s public key. • Further communication occurs with the symmetric key. 7: Network Security

  23. Symmetric key crypto: DES DES: Data Encryption Standard • US encryption standard [NIST 1993] • 56-bit symmetric key, 64 bit plaintext input • initial permutation • 16 identical “rounds” of function application, each using different 48 bits of key • final permutation • How secure is DES? • DES Challenge: 56-bit-key-encrypted phrase decrypted (brute force) in 4 months • no known “backdoor” decryption approach • making DES more secure • use three keys sequentially (3-DES) on each datum • use cipher-block chaining 7: Network Security

  24. Public key cryptography 7: Network Security

  25. d (e (m)) = m B B 1 2 need public and private keys for dB ( ) and eB ( ) . . Public key encryption algorithms Two inter-related requirements: need a decryption function dB ( ) and an encrption function eB ( ) such that . . 7: Network Security

  26. RSA • Rivest, Shamir, Adelson • Want a function eB that is easy to do, but hard to undo without a special decryption key • Based on the difficulty of factoring large numbers (especially ones that have only large prime factors) 7: Network Security

  27. RSA: Choosing keys 1. Choose two large prime numbers p, q. (e.g., 1024 bits each) 2. Compute n = pq, z = (p-1)(q-1) 3. Choose e (with e<n) that has no common factors with z. (e, z are “relatively prime”). 4. Choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ). 5.Public key is (n,e).Private key is (n,d). Why? (Will hint at) How? (Won’t discuss) 7: Network Security

  28. 1. To encrypt bit pattern (message), m, compute d e c = m mod n m = c mod n e (i.e., remainder when m is divided by n) Magic happens! d e m = (m mod n) mod n RSA: Encryption, decryption 0. Given (n,e) and (n,d) as computed above 2. To decrypt received bit pattern, c, compute d (i.e., remainder when c is divided by n) 7: Network Security

  29. d e m = c mod n c = m mod n d c RSA example: Bob chooses p=5, q=7. Then n=35, z=24. e=5 (so e, z relatively prime). d=29 (so ed-1 exactly divisible by z. e m m letter encrypt: l 17 1524832 12 c letter decrypt: 17 12 l 481968572106750915091411825223072000 7: Network Security

  30. e d ed (m mod n) mod n = m mod n ed mod (p-1)(q-1) 1 = m = m mod n = m mod n Number theory result: If p,q prime, n = pq, then y y mod (p-1)(q-1) d e x mod n = x mod n m = (m mod n) mod n RSA: Why: (using number theory result above) (since we choseed to be divisible by (p-1)(q-1) with remainder 1 ) 7: Network Security

  31. Using Cryptography 7: Network Security

  32. Using Cryptography for: Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Authentication: sender, receiver want to confirm identity of each other Secrecy: only sender, intended receiver should “understand” msg contents • sender encrypts msg • receiver decrypts msg 7: Network Security

  33. Cryptographic technique analogous to hand-written signatures. Sender (Bob) digitally signs document, establishing he is document owner/creator. Verifiable, nonforgeable: recipient (Alice) can verify that Bob, and no one else, signed document. Simple digital signature for message m: Bob encrypts m with his public key dB, creating signed message, dB(m). Bob sends m and dB(m) to Alice. Digital Signatures 7: Network Security

  34. Suppose Alice receives msg m, and digital signature dB(m) Alice verifies m signed by Bob by applying Bob’s public key eB to dB(m) then checks eB(dB(m) ) = m. If eB(dB(m) ) = m, whoever signed m must have used Bob’s private key. Alice thus verifies that: Bob signed m. No one else signed m. Bob signed m and not m’. Non-repudiation: Alice can take m, and signature dB(m) to court and prove that Bob signed m. Digital Signatures (more) 7: Network Security

  35. Computationally expensive to public-key-encrypt long messages Goal: fixed-length,easy to compute digital signature, “fingerprint” apply hash function H to m, get fixed size message digest, H(m). Hash function properties: Many-to-1 Produces fixed-size msg digest (fingerprint) Given message digest x, computationally infeasible to find m such that x = H(m) computationally infeasible to find any two messages m and m’ such that H(m) = H(m’). Message Digests 7: Network Security

  36. Bob sends digitally signed message: Alice verifies signature and integrity of digitally signed message: Digital signature = Signed message digest 7: Network Security

  37. Internet checksum would make a poor message digest. Too easy to find two messages with same checksum. MD5 hash function widely used. Computes 128-bit message digest in 4-step process. arbitrary 128-bit string x, appears difficult to construct msg m whose MD5 hash is equal to x. SHA-1 is also used. US standard 160-bit message digest Hash Function Algorithms 7: Network Security

  38. Authentication Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0:Alice says “I am Alice” Failure scenario?? 7: Network Security

  39. Authentication: another try Protocol ap3.0:Alice says “I am Alice” and sends her secret password to “prove” it. Failure scenario? 7: Network Security

  40. Authentication: yet another try Protocol ap3.1:Alice says “I am Alice” and sends her encrypted secret password to “prove” it. I am Alice encrypt(password) Failure scenario? 7: Network Security

  41. ap4.0: Authentication: yet another try Goal:avoid playback attack Nonce:number (R) used onlyonce in a lifetime ap4.0:to prove Alice “live”, Bob sends Alice nonce, R. Alice must return R, encrypted with shared secret key Figure 7.11 goes here Failures, drawbacks? 7: Network Security

  42. Problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC) acting as intermediary between entities Problem: When Alice obtains Bob’s public key (from web site, e-mail, diskette), how does she know it is Bob’s public key, not Trudy’s? Solution: trusted certification authority (CA) Trusted Intermediaries 7: Network Security

  43. Alice,Bob need shared symmetric key. KDC: server shares different secret key with each registered user. Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for communicating with KDC. Key Distribution Center (KDC) • Alice communicates with KDC, gets session key R1, and KB-KDC(A,R1) • Alice sends Bob KB-KDC(A,R1), Bob extracts R1 • Alice, Bob now share the symmetric key R1. 7: Network Security

  44. Authentication: ap5.0 ap4.0 requires shared symmetric key • problem: how do Bob, Alice agree on key • can we authenticate using public key techniques? ap5.0: use nonce, public key cryptography Figure 7.12 goes here 7: Network Security

  45. ap5.0: security hole Man (woman) in the middle attack: Trudy poses as Alice (to Bob) and as Bob (to Alice) Figure 7.14 goes here Need “certified” public keys 7: Network Security

  46. Certification authority (CA) binds public key to particular entity. Entity (person, router, etc.) can register its public key with CA. Entity provides “proof of identity” to CA. CA creates certificate binding entity to public key. Certificate digitally signed by CA. Public key of CA can be universally known (on billboard, embedded in software) When Alice wants Bob’s public key: gets Bob’s certificate (Bob or elsewhere). Apply CA’s public key to Bob’s certificate, get Bob’s public key Certification Authorities 7: Network Security

  47. Administrators • Persons managing the security of a valued resource consider five steps: • Risk assessment: the value of a resource should determine how much effort (or money) is spent protecting it. • E.g., If you have nothing in your house of value do you need to lock your doors other than to protect the house itself? • If you have an $16,000,000 artwork, you might consider a security guard. (can you trust the guard?) • Policy: define the responsibilities of the organization, the employees and management. It should also fix responsibility for implementation, enforcement, audit and review. 7: Network Security

  48. Administrators • Prevention: taking measures that prevent damage. • E.g., firewalls or one-time passwords (e.g., s/key) • Detection: measures that allow detection of when an asset has been damaged, altered, or copied. • E.g., intrusion detection, trip wire, network forensics • Recovery/Response: restoring systems that were compromised; patch holes. 7: Network Security

  49. Physical Security • Are you sure someone can just walk into your building and • Steal floppies or CD-ROMs that are lying around? • Bring in a laptop and plug into your dhcp-enable ethernet jacks? • Reboot your computer into single user mode? (using a bios password?) • Reboot your computer with a live CD-ROM and mount the drives? • Sit down at an unlocked screen? • Can anyone sit down outside your building and get on your DHCP-enable 802.11 network? 7: Network Security

  50. Social Engineering • Using tricks and lies that take advantage of people’s trust to gain access to an otherwise guarded system. • Social Engineering by Phone: “Hi this is your visa credit card company. We have a charge for $3500 that we would like to verify. But, to be sure it’s you, please tell me your social security number, pin, mother’s maiden name, etc” • Dumpster Diving: collecting company info by searching through trash. • Online: “hi this is Alice from my other email account on yahoo. I believe someone broke into my account, can you please change the password to “Sucker”? • Persuasion: Showing up in a FedEx or police uniform, etc. • Bribery/Threats 7: Network Security

More Related