1 / 25

Case Study (Mid-term question)

Case Study (Mid-term question). Bob sells BatLab Software License Alice buys BatLab Credit card information Number of licenses. Bob. Alice. Security Requirements. Alice wants Authentication of Bob Confidentiality and integrity of the order information Prevention of order replay

halla-hobbs
Download Presentation

Case Study (Mid-term question)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Case Study (Mid-term question) • Bob sells BatLab • Software • License • Alice buys BatLab • Credit card information • Number of licenses Bob Alice

  2. Security Requirements • Alice wants • Authentication of Bob • Confidentiality and integrity of the order information • Prevention of order replay • Bob wants • Non-repudiation of the order • Confidentiality and integrity of the licenses • Integrity of the software • Other Issues • DoS (message lost) • Attacks to the host Bob Alice

  3. Security Mechanisms • What do we need/how we get them? • Authentication (of Bob)/Key distribution • Certificate  Public key • Public key  Secret session key • Confidentiality (order/license) • Symmetric cipher encryption based on secret key • E.g. AES • Message Integrity Protection (software) • Message authentication code based on secret key • E.g. HMAC-SHA1 • Non-repudiation (order) • Digital signature • Defense against replay attack • Usage of Timestamp

  4. Questions • Where these security functions should be implemented? • Who should implement them? • Application developer? (BatLab.com) • Application service developer? (Apache/Mazilla) • System developer? (Microsoft) • Network service provider? (Sprint) • Etc.. • If it is not a single person’s job, what security protocols/services are available? How they are designed?

  5. Network Design • Network Stack/Layer Internet Application (HTTP) Application (HTTP) Transport (TCP) Transport (TCP) End host Network (IP) Network (IP) Network (IP) Network (IP) network … Link Link Link Link

  6. Placement of Security Function • What to encrypt/protect • Message format • Where the security function should be located? • Network stack • Link vs. End-to-end • Where each layer is located and how it may get attacked • Aspects to consider • Message security (which fields in the packet are protected) • Number of keys required • Number of encryption/decryptions • Transparency to users/end hosts

  7. Link vs. End-to-End Encryption

  8. Message format

  9. Big Picture • Application-specific solutions • Web security • End-host-based solutions • Secure network-based applications • PGP, application layer solution • SSL, transportation layer solution • Network-based solutions • Secure network + support for application • IPsec • Internet Security • BGP security • Wireless Security • IEEE 802.11 security Application Web security PGP SSL Transport Connection-oriented vs. connectionless IPSec BGP Network WPA Link

  10. Our Goal • Learn these important security protocols so that we can use them • Learn how they are designed and use similar design in our system • Many pitfalls exist in secure networking system design • Home-brew security solutions usually have many weaknesses • The correct usage of cryptography is crucial • Following conventions is very important

  11. CS 285 Network SecurityPGP Fall 2011 Yuan Xue

  12. Pretty Good Privacy • Overview • Phil Zimmermann in 1991 • Open PGP • Open Standard followed by PGP, GnuPG • PGP vs. GnuPG • PGP goes commercial in 1996 • GnuPG is a free replacement for PGP • Basics • Build a general-purpose security application that is independent of OS • Select the existing cryptographic algorithms as building blocks • Operations • Encryption • Signature • Key management More info: http://en.wikipedia.org/wiki/Pretty_Good_Privacy

  13. Overview • Key Generation • public and privacy key pair/session keys • Key Storage • Key Distribution • Import/export • Fingerprint • Web of Trust • Security Operations • Encryption • Message Authentication • Signature and Verification Start with

  14. Operation -- Authentication SHA-1 DSS/RSA ZIP

  15. Operation -- Encryption ElGamal/RSA one-time session key CAST-128/IDEA/3DES in CFB mode

  16. Operation – Put two together

  17. Details • Compression • Signature before compression • Convenience of future verification • Flexibility in compression algorithm/implementation choice • Message encryption after compression • Less redundancy in plaintext strengthen cryptographic security • Email Capability • Usage of ASCII in Email • Converting 8-bit binary code to ASCII characters • Radix-64 conversion • 3 octets of binary code (3*8 = 24 bits)  4 ASCII characters (4*8 = 32 bits) why? • 33% expansion • compression offset

  18. Keys • Types • Public and private key pair • One-time session symmetric key • Issues • Key generation • Key storage • Key management (distribution)

  19. Key Identifier • A user may have multiple keys • Need an ID • Unique to user ID with very high probability • Key ID of KUa = KUa mod 264

  20. Key Generation • Session Key Generation • Generating unpredictable session keys • E.g., 128-bit CAST key • Two 64-bit blocks encrypted by a 128-bit key in CFB mode  two 64-bit ciphertext as the 128-bit session key • Two 64-bit blocks from a 128-bit random stream based on keystroke input from the user • Previous session key and the random stream forms the 128-bit key input User input 64-bit block 64-bit block Previous Session key + Key input CAST-128 in CFB mode New session key

  21. PGP Message Format • keys are needed for the recipient to identify the keys to • decrypt the key (KUb) • Verify the signature(KUa) Time the signature is made • Plaintext copy of the first two octets. • Enable the recipient to determine if the correct public key was used to decrypt the message digest • Error detection for the message Time the message is made

  22. Key Storage • Pubic and Private Key Ring • Secure the private key with passphrase • Passphrase  hash code via SHA-1 • Encrypt the private key via CAST-128/IDEA/3DES with the hash code as the key • Store the encrypted private key

  23. Put Things Together

  24. Key management • Direct Verification • Physical delivery • Fingerprint • Trusted Third Party • Signed certificate of a key • Web of Trust • A self-organized trust management mechanism • Revoke Public Key • Key revocation certificate

  25. Web of Trust • Directly signed by you • A,B,…,F (first tier) • By the ones you trust to sign (D, E, F, L) • L,M,N, O (2nd tier), P, Q (3rd tier) • By getting enough signatures from partially trusted parties (A,B) • H

More Related