Top Banner
Cryptography in e- Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College
55

Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Cryptography in e-Business

Guest Lecture, November 13, 2006, Olin College

Steven R. GordonProf. of Info Tech ManagementBabson College

Page 2: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Agenda

Simple protocols– Logging in: MS-CHAP

PKI Protocols– About PKI– Secure Email– Secure Web Transactions: SSL

Page 3: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Logging InWith

MS-CHAP

A Simple Application

Page 4: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

MS-CHAP Challenge-Response Authentication Protocol

2.Verifier sends Challenge Message

Challenge

Applicant(Client)

Verifier(Server)

1.Verifier creates

Challenge Message

Note: Both the client and the serverknow the client’s password.

Source: Panko: Corporate Computer and Network Security by Raymond Panko, Prentice-Hall, 2005.

Page 5: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

MS-CHAP Challenge-Response Authentication Protocol

3. Applicant creates a Response Message:

(a) Adds password toChallenge Message

(b) Hashes the resultant bit string

(c) The hash is theResponse Message

ChallengePassword

Response

Hashing(Not Encryption)

Source: Panko: Corporate Computer and Network Security by Raymond Panko, Prentice-Hall, 2005.

Page 6: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

MS-CHAP Challenge-Response Authentication Protocol

4.Applicant sends Response Message without encryption

Transmitted Response

Source: Panko: Corporate Computer and Network Security by Raymond Panko, Prentice-Hall, 2005.

Page 7: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

MS-CHAP Challenge-Response Authentication Protocol

ChallengePassword

Expected Response

Hashing

5. Verifier adds password to theChallenge Message it sent.

Hashes the combination.This is the expectedResponse Message.

Source: Panko: Corporate Computer and Network Security by Raymond Panko, Prentice-Hall, 2005.

Page 8: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

MS-CHAP Challenge-Response Authentication Protocol

Expected ResponseTransmitted Response =?

6. If the two Response Messages are equal, theapplicant knows the password and is authenticated.Sever logs Client in.

Note that only hashing is involved.There is no encryption.

Source: Panko: Corporate Computer and Network Security by Raymond Panko, Prentice-Hall, 2005.

Page 9: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Advantages of MS-CHAP

The password never gets transmitted Eve can see the challenge and response Eve cannot learn the password Eve cannot respond to the challenge

Page 10: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Problems With MS-CHAP?

Page 11: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Solutions to Key Distribution Problem A selects a key and physically delivers it to B.

Trusted third party key distribution center selects a key and physically delivers it to A and B.

If A and B already share a key, it can be used to distribute a new key.

If A and B already share keys with key distribution center, it can distribute a new key.

Or …

Page 12: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Public Key Encryption Each user gets a pair of keys

– 1 private; 1 public

Public key is shared with the world and used for encryption

Private key is kept private and used for decryption

There is no way to determine the private key from knowledge of the public key

There is no need to exchange keys secretly

Page 13: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Public Key Encryption

Alice createsmessage

Bob’s public key Bob’s private key

Bob readsmessage

Encryptedmessage

Eve cannot read intercepted message becauseEve does not have Bob’s private key

Page 14: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Authentication

How does Bob know that message came from Alice?

Everyone knows Bob’s public key Solution:

– Alice signs the message

Page 15: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Authentication: Signing a Message

Alice hashes the message

She encrypts the hash, date, and time with her private key and appends it to message (signature)

Then entire message is encrypted with Bob’s public key

Page 16: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

How Does Bob Know Message is From Alice? Bob decrypts the message and reads the

signature

Tries to decrypt the signature with Alice’s public key– OK: Must be Alice -- only she has the

corresponding private key– Not OK: Sent by someone else

Page 17: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Non-Repudiation

Alice cannot repudiate message Signature is hers Signature hash matches document Nobody else could have sent it and Bob

could not have made it up

Page 18: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Integrity

Nobody can intercept the message, modify it, and resend

If so, hash would be incorrect

Page 19: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Potential Problems with Public Key Cryptography Too hard to keep track of all partners’ public keys What if partner wants to change public key

(perhaps private key was compromised)? Cannot trust sender to send you their public key,

because they could be imposter Solution is Public Key Infrastructure

Page 20: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Solution -- Digital Certificate

What is it?– Document signed with the private key of a well

known third party (certificate issuer)

What does it contain– Name and public key of certificate owner– Serial number, expiration date– Other info on rights and privileges of owner– Name of certificate issuer

Page 21: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Public Key InfrastructureAnalog to Physical World

Physical

Signatures/Seal Envelope ID (passport/license) Notary/Bank

PKI

Digital Signature Encryption Digital certificate Certificate authority

Page 22: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Certificate Authority (CA)

The CA is a trusted and known authority for issuing digital certificates

Examples:– Verisign– Thawte– InstantSSL

Page 23: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

How Does Bob Know Alice’s Certificate is Valid? It is “signed” by a recognized certificate

authority It identifies Alice and her public key

Page 24: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Key Management Issues

Who generates the key pairs?– Should the CA have access to everyone’s

private key?– If the CA doesn’t have a copy of the private

key, how does it know that it has the right public key

Page 25: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Key Management Issues

Should the CA need to see physical proof of identity before issuing a certificate?– If not, how can CA avoid being fooled?– If so, how can CA have adequate geographical

coverage?

Page 26: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Key Management

What if a company wanted multiple keys for its different subsidiaries, departments, and/or servers?– Should it be allowed to generate new keys and

sub-certificates?

Page 27: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Key Management

Where and how should private keys be stored?

How can a certificate be revoked? How is a certificate renewed?

Page 28: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

PKI Components and Relationships

Source: PGP Corporation webcast, “PGP Education Series -- Is PKI Relevant?”, viewed on 3/18/04.

Page 29: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

PKI Components

Need to add Certificate Revocation List– Usually maintained by CA– Periodically downloaded to CA’s cross-

certificate partners

Page 30: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Hierarchical Trust Relationships

Trust users if you trust the root CA

Trust based on brand

Example: Verisign

Source: http://www.pgpi.org/doc/pgpintro/

Page 31: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Network Trust Relationships

There is no root authority

Based on who knows who

Assumes six degrees of separation

Example: PGP

Page 32: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

PKI Standards Leave (too many?) Options X.509 Version 3 Certificate

– Version, Validity period, Serial Number

– Issuer identifier (could be domain name, email, or directory name) and signature

– Subject identifier (same options), public key, and algorithms used for encryption

– Optional identifiers for issuer and subject

– Optional extensions

– CA’s digital signature

Page 33: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Examples of Optional X.509 Certificate Extensions List of allowed uses (such as only for email) Certificate policies Subject directory attributes CRL distribution points Additional signers

Page 34: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

PKI Application: Secure Email

Page 35: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Obtain a Free Personal Digital Certificate Go to Comodo Fill out form selecting defaults Accept

Page 36: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Pick Up and Install Digital Certificate Within a few minutes, you’ll receive email

with your collection password Click on Collect and Install Certificate If you are using Outlook

– Follow the instructions to pick up and install your digital

Otherwise, do not continue until you have Outlook installed and configured

Page 37: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Configure Outlook to Use Your Certificate In Outlook, select Tools/Options/Security Click the “Settings” button in the Encrypted e-

mail section Click the “Choose” button to select your

certificate for signing and encryption Check “Send these certificates with signed

messages” Click OK, Apply, and OK

Page 38: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Sign An E-Mail Message

Create an email message to yourself Click Options/Security Settings/Add

Digital Signature Send the message

Page 39: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Check Your Digital Signature

Note “secure message” icon in your inbox next to incoming message

Open message. Note security iconin upper right corner

Click on the security icon

Page 40: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Click on Details

Page 41: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Click on Signer thenView Details

Page 42: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Click onView Certificate

Explore:Issuer StatementTrust tabCertification Path tab

Page 43: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Now click on Details tab

Click on any of the fields, includingPublic key, to seecertificate details.

Page 44: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Close the Message

Click OK and Close and Close to return to the message view

Close the message

Page 45: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Optional: Configure Outlook to Always Use Your Certificate Select Tools/Options/Security Check “Add digital signature …” Click Apply and OK

Page 46: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Adding Encryption

Create a new message to yourself Select Options/Security Settings/Encrypt Try to send the message. What happens? You can only send encrypted messages to

people whose public keys are published

Page 47: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Publish Your Public Key

Select Tools/Options/Security Select “Publish to GAL…”

– Outlook confirms you are publishing your key to the global address list

– Click on OK– Click on OK again to close Security window

Page 48: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Test Your Encryption

Send yourself a message Note encryption icon

next to message in inbox Click on blue lock icon in upper right corner

Page 49: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Details are availablefor the EncryptionLayer.

If message is signed, details will also be available for the signer.

Page 50: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Your Certificate is Known to IE

Select Tools/Internet Options/Content

Click Certificates Highlight your Comodo

certificate Click on View

Page 51: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

PKI Applications: Secure Web Transactions With SSL

Works below the application layer Creates a secure channel between a client

and server Can be used to secure a “session”

Page 52: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

SSL Protocol Simplified

Source: http://www.rdcormia.com/COIN56/presentations/Security.ppt

Page 53: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

SSL Pros and Cons

Server authentication Client authentication Integrity Confidentiality Establishes “session” Can be used by any

application

No support for non-repudiation

No encryption of IP or TCP headers

Pros Cons

Page 54: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

How HTTP Uses SSL

HTTP invokes SSL if URL starts with https://

Browsers display a lock when in the status area when SSL is in use

Page 55: Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.

Contact Information

Prof. Steven GordoneMail: [email protected]: 781-239-4571Web: http://faculty.babson.edu/gordon