Top Banner
CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University
25

CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Dec 14, 2015

Download

Documents

Brisa Grandon
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

CSE 511 Cryptology and NW Security

Dr M. Sakalli

Marmara University

Page 2: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

As quoted in the lecture slides by Lawrie Brown, and site: http://williamstallings.com/Crypto3e.html,

in chapter 1 of Introduction

The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. —The Art of War, Sun Tzu

So much material cluttering information channels, I’ll keep it lean, so that you can digest the main concepts and the materials. M. Sakalli

Page 3: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

• Introduction• Symmetric Ciphers

Classical encryption techniques, chaining, ECB, CBC, CFB, OFB.. Message integrity or confidentiality.. Not both.

Block ciphers and data encryption standard. Differential and Linear Cryptanalysis. Probabilistic Finite fields Advanced encryption standard, Using block ciphers in real-world Confidentiality, Random Number Generators.

• Public-Key Encryption and Hashing Functions Introduction to number theory, public key cryptography RSA,

Key Management (Diffie-Hellman key exchange, 1976) Massage authentication Cryptography and RSA Hash, SHA and MAC management, whirlpool (adapted as AES).

Digital Signatures.

Page 4: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

4

Part 3-4 Applications

• NW Security– Kerberos, X.509. Authentication prt over non-secure

NW. – Email, PGP: signatures, certifying mail, privacy (via

encryption), S/MIME, – IP Security, Web security SSL secure sockets Layer,

TSL Transport Secr L• System Security

– System security.– Intrusion detection, – Malicious software. DOS.– Firewalls.– IEEE 802.11 Wireless LAN Security (WEP)

Page 5: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

- i.e. _________________ __________ | firewalls/VPNs | | OS security | ________________ --|-------------- -----|---------- | virus protection | | ______________________ | ---------|------------------ | | web security - SSL | | | | ------- | --------------_____|_____________________|_________________|_________|_____| || CRYPTO ||--------------------------------------------------------------------------------------------|

• Midterm exam I: 30% (Friday, Oct. 24)• Final exam: 40% (Tue, Dec. 9, 1:30pm)• Assignments: 30%

• The later you submit your homework, the lower you will be marked.

Layer by Layer

Page 6: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

From the statistics of Computer Emergency Response Team (CERT)

Vulnerabilities reported seems saturated by the 2002.

Weaknesses of OS, NWs, isp, dns, routers.

Page 7: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

From the statistics of Computer Emergency Response Team (CERT)

The incidents reported has increased, attacks are sophisticated and possibly automated and causing greater amounts of damage.

Page 8: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

The OSI architecture• The systematic approach of OSI security architecture,

compromises security in three stages implemented to complement and be integrated with each other

Attack mechanisms Defence mechanisms The services

• RFC 2828: Threats: are the possibilities of the breaching security rules. An attack: is an assault and/or a deliberate action to inflict

damage on the other side.

Page 9: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Security Mechanisms (X.800)

• OSI specific security mechanisms:– encipherment, digital signatures, access

controls, data integrity, authentication exchange, traffic padding, routing control, notarization

• Non OSI pervasive security mechanisms:– trusted functionality, security labels, event

detection, security audit trails, security recovery

Page 10: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Internet standards and Internet standards and RFCsRFCs

• The Internet society– Internet Architecture Board (IAB)– Internet Engineering Task Force (IETF)– Internet Engineering Steering Group

(IESG)

Page 11: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Distributed Security, Digital and Global Security

• Computer Security: Internal and external protection mechanisms against attacks and malicious applications..

• Network Security: LAN and the ISP level.

• Web and Internet Security: During transmission between routers, and there cyber law to enforce the bodies thwarting the hackers.

isp servers

Local and global InternetWWW

NW backbone

isp servers

Security servers

Page 12: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Passive Security Attacks• Eavesdropping: Shoulder surfing of typing or

recordings:– 1487, from O.E. eavesdropper "place around a house

where the rainwater drips off the roof," from eave (q.v.) + drip. Technically, "one who stands at walls or windows to overhear what's going on inside.“

• Monitoring the traffic– Capturing packets..– Analyzing the traffic flows ..

• Solution is CRYPTOLOGY.

Alice Bob

Eve

Page 13: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Active Security Attacks• Intrusion by capturing messages:

– Preventing (DOS) the service, – Interrupting.. – Impersonating, masquerading of one entity as

some other, modifying or replaying the previous or fabricating new messages or viral attack..

• Enciphering, authentication and security protocols are the solution..

Alice Bob

MalloryAlice Bob

By keeping the server busy, difficult to obviate

Mallory

Page 14: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

• The main reason for cryptology is to hide for surviving: protecting privacy, preventing intrusion.– Secrecy, masking the message traffic can be visible, in the case

of data confidentiality evading passive attacks.

– Authentication, 1- Identity check of the peer entities, 2- data origin auth, prevent interference and masquerading, not preclude passive attacks. Certificates

– Integrity of the message: In connectionless service (assuring that message is not altered), MACs, CRC..

– Nonrepudiation (undeniable producer or receiver). • 1412, "repudiation," from L.L. repulsionem, noun of action from

repellere (see repel),.

– Oblivious transfer = without leaving any trace of inf transferred,

– Zero knowledge proofs = Prove possession of certain information without conveying an ID..

• https… - "s" is for SSL

Page 15: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Possible PT

Plaintext, PT:original message

Transmitted Plaintext, = PT

Ciphertext: CT disguised message

Encryption (enciphering)

Decryption (deciphering)

Key (cipherkey) Key (cipherkey)

Model 1-Securing a communication channel

Page 16: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Model II- Network Access Security Model

Requires access control: 1) Selecting gatekeeper functions to identify users.2) Security methodologies to authenticate users, to ensure

only authorised users can access to designated information or resources.

3) Using trusted computer networks.

Page 17: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

• Cryptology is the mathematics of concealing messages by scrambling under some constraints applied open cipher that are.. – Applicable duration of the cipher.. – Space, physical environment.

Communications, Storage area.. – Complexity, vs simplicity, human factor.. – The cost..

Page 18: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

• if both the encryption and decryption keys are the same, then the method employed is symmetric... Otherwise asymmetric.

• "Crypto graphy" = both Greek 'krypte graphic' meaning hidden (or vault) + writing

• Cryptanalysis (cryptanalyst, cryptoanalyst) is the art of cracking the codes.

• An adversary, eavesdropper, hacker, imposter..• Cryptology = Cryptography + cryptanalysis..• Cryptograms are roughly divided into Ciphers and Codes.

• Perfect security and entropic security. (Shannon), an adversary does not have any information at all about the secret which is equivalent to saying that the random variable constituting the secret and the random variable modeling the adversary’s knowledge must be independent. H(x)=H(X|Y) for adversary, H(X|YK)=0 for recipient.

Page 19: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Steganography and cryptography• BC 499. Histiaeus detained in Sasu island eagerly wanted to send a message to his

regent to revolt against to Persians. The only way he found was to shave the head of his messenger, and (tattoo) write the message on his scalp, and then waited for the hair to regrow. On reaching his destination the messenger, was instructed to shave his head, so that Aristogoras the mayor of Miletus could read the message. Herodotus.

• an alternative to encryption• hides existence of message

– using only a subset of letters/words in a longer message marked in some way– using invisible ink– hiding in LSB in graphic image or sound file

• has drawbacks– high overhead to hide relatively few info bits

• Watermarking.

• Steganography• – “covered writing”• – hides the existence of a message• Cryptography• – “hidden writing”• – hide the meaning of a message

Page 20: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

A very brief history• Substitution cipher is the oldest cipher• Secret key K is a table lookup: A --> C• Breaking: Some single letter for example substituted for E,

will have the same frequency if the message is not too short, then it’ll be easy to figure out which letter is substituted for E, (or such), which is the occurring as frequent asE, etc. Abu al-Kindi's "A Manuscript on Deciphering Cryptographic Messages“..

• Vigenère (1523 - 1570) • Rotor (1800 - 1950): WWII Enigma machine• 1974: DES developed by IBM, 1st good cipher• 1977: Diffie Hellman, public key crypto• Symmetric ciphers: info theoretic approach (Shannon)• -- privacy against eavesdropping• -- make substitution cipher secure• -- one-time pad: very fast, the length of the key is as long

as that of the message; why is this secure?

Page 21: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

Greek’s belt: Spartan skytale..

• In 405 BC: One of the earliest examples of transposition crypt was used by Lysander of Sparta. When the belt of messenger was wound around a wood with a correct diameter, message could appear.

Page 22: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

• http://www.bbc.co.uk/history/ancient/egyptians/decipherment_01.shtml

• Decipherment of Egyptian hieroglyphs.• Jean-François Champollion, 1801. • Ra-me??-s-s..• Sun in coptic, sounds ra, and wind sound ss..

• Unsolved ciphers: Folger scripts after 1717ies.. Freemasonary

• (http://www.canonbury.ac.uk/lectures/folger.htm)

Page 23: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

The Adventure of the Dancing Men, one of the Sherlock Holmes short stories by AC Doyle, Detective solves it with frequency analysis. ““ELSIE PREPARE TO MEET THY GOD””

Not deciphered yet related to a bank deposit wt a US bank.

• Allegedly issued to a General Wang in Shanghai, 1933

• 300 Million $ transaction + 1.8 kg Gold bars?.. .

Page 24: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

• MARY QUEEN OF SCOTS sent messages to her supporters by using a weak cipher for her assassinating Queen Elizabeth I, but the messages were intercepted, and deciphered with frequency analysis, and Mary was executed for treason in 1587.

• Johannes Trithemius • 1499 Steganographia • Polygraphia (1518) — the first printed book on

cryptography

Page 25: CSE 511 Cryptology and NW Security Dr M. Sakalli Marmara University.

• WWWII, German’s Enigma. Turing.

• Marian Rejewski, Bombe, Purple.