Top Banner
ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls
53
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

ISA 3200NETWORK SECURITY

Chapter 9: Encryption and Firewalls

Page 2: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Learning Objectives

IS 3200, Summer 2010

Describe the role encryption plays in a firewall architecture

Explain how digital certificates work and why they are important security tools

Analyze the workings of SSL, PGP, and other popular encryption schemes

Discuss Internet Protocol Security (IPSec) and identify its protocols and modes

2

7/12

Page 3: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Firewalls and Encryption

IS 3200, Summer 2010

Hackers take advantage of a lack of encryption

Encryption: Preserves data integrity Increases confidentiality Is relied upon by user authentication Plays a fundamental role in enabling VPNs

3

7/12

Page 4: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Hacker and an Unencrypted Packet

IS 3200, Summer 2010

4

7/12

Page 5: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Hacker and an Encrypted Packet

IS 3200, Summer 2010

5

7/12

Page 6: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

The Cost of Encryption

IS 3200, Summer 2010

CPU resources and time Bastion host that hosts the firewall should

be robust enough to manage encryption and other security functions

Encrypted packets may need to be padded to uniform length to ensure that some algorithms work effectively

Can result in slowdowns Monitoring can burden system

administrator

6

7/12

Page 7: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Preserving Data Integrity

IS 3200, Summer 2010

Even encrypted sessions can go wrong as a result of man-in-the-middle attacks

Encryption can perform nonrepudiation using a digital signature

7

7/12

Page 8: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Maintaining Confidentiality

IS 3200, Summer 2010

Encryption conceals information to render it unreadable to all but intended recipients

8

7/12

Page 9: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Authenticating Network Clients

IS 3200, Summer 2010

Firewalls need to trust that the person’s claimed identity is genuine

Firewalls that handle encryption can be used to identify individuals who have “digital ID cards” that include encrypted codes Digital signatures Public keys Private keys

9

7/12

Page 10: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Enabling Virtual Private Networks (VPNs)

IS 3200, Summer 2010

As an integral part of VPNs, encryption: Enables the firewall to determine whether

the user who wants to connect to the VPN is actually authorized to do so

Encodes payload of information to maintain privacy

10

7/12

Page 11: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Principles of Cryptography

IS 3200, Summer 2010

Encryption: the process of converting an original message into a form that cannot be understood by unauthorized individuals

Cryptology, the science of encryption, encompasses two disciplines: Cryptography: describes the processes involved in

encoding and decoding messages so that others cannot understand them

Cryptanalysis: the process of deciphering the original message (plaintext) from an encrypted message (ciphertext) without knowing the algorithms and keys used to perform the encryption

11

7/12

Page 12: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Encryption Definitions

IS 3200, Summer 2010

Algorithm: the mathematical formula or method used to convert an unencrypted message into an encrypted message

Cipher: the transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components

Ciphertext or cryptogram: the unintelligible encoded message resulting from an encryption

Cryptosystem: the set of transformations necessary to convert an unencrypted message into an encrypted message

12

7/12

Page 13: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Encryption Definitions (continued)

IS 3200, Summer 2010

Decipher: to decrypt or convert ciphertext to plaintext

Encipher: to encrypt or convert plaintext to ciphertext Key or cryptovariable: the information used in

conjunction with the algorithm to create the ciphertext from the plaintext; it can be a series of bits used in a mathematical algorithm or the knowledge of how to manipulate the plaintext

Keyspace: the entire range of values that can possibly be used to construct an individual key

13

7/12

Page 14: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Encryption Definitions (continued)

Plaintext: the original unencrypted message that is encrypted and results from successful decryption

Steganography: the process of hiding messages, usually within graphic images

Work factor: the amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message

Firewalls & Network Security, 2nd ed. - Chapter 9 14

IS 3200, Summer 2010

14

7/12

Page 15: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Cryptographic Notation

IS 3200, Summer 2010

M represents original message; C represents ciphertext; E represents encryption process; D represents the decryption process; K represents a key

So…

E(M) = C encrypting a message results in cyphertext

D(C) = M and D[E(M)] = M

E(M,K) = C specifies encrypting the message with a key; keys can be annotated K1, K2, etc. in the case of multiple keys

15

7/12

Page 16: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Common Ciphers

IS 3200, Summer 2010

In encryption, the most commonly used algorithms include three functions: substitution, transposition, and XOR

In a substitution cipher, you substitute one value for another; a monoalphabetic substitution uses only one alphabet and a polyalphabetic substitution use two or more alphabets

The transposition cipher (or permutation cipher) simply rearranges the values within a block to create the ciphertext; this can be done at the bit level or at the byte (character) level

16

7/12

Page 17: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Common Ciphers (continued)

IS 3200, Summer 2010

In the XOR cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream

XOR works as follows: ‘0’ XOR’ed with ‘0’ results in a ‘0’ (0 0 = 0) ‘0’ XOR’ed with ‘1’ results in a ‘1’ (0 1 = 1) ‘1’ XOR’ed with ‘0’ results in a ‘1’ (1 0 = 1) ‘1’ XOR’ed with ‘1’ results in a ‘0’ (1 1 = 0)

Simply put, if the two values are the same, you get “0”; if not, you get “1”

This process is reversible; that is, if you XOR the ciphertext with the key stream, you get the plaintext

17

7/12

Page 18: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Vernam Cipher

IS 3200, Summer 2010

Also known as the one-time pad, the Vernam cipher was developed at AT&T and uses a set of characters that are used for encryption operations only one time and then discarded Surely known before AT&T?

The values from this one-time pad are added to the block of text, and the resulting sum is converted to text

18

7/12

Page 19: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Book or Running Key Cipher

IS 3200, Summer 2010

Another method, used in the occasional spy movie, is the use of text in a book as the algorithm to decrypt a message

The key relies on two components: Knowing which book to use A list of codes representing the page

number, line number, and word number of the plaintext word

19

7/12

Page 20: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Symmetric Encryption

IS 3200, Summer 2010

The previous methods of encryption/decryption require the same algorithm and key be used to both encipher/decipher the message

This is known as private key encryption or symmetric encryption

In this approach, the same key—a secret key—is used to encrypt and decrypt the message

Usually extremely efficient, requiring simple processing to encrypt or decrypt the message

Main challenge is getting a copy of the key to the receiver, a process that must be conducted out-of-band to avoid interception

20

7/12

Page 21: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Symmetric Encryption (continued)

IS 3200, Summer 2010

21

7/12

Page 22: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

The Technology of Symmetric Encryption

IS 3200, Summer 2010

Data Encryption Standard (DES) Developed in 1977 by IBM Based on the Data Encryption Algorithm (DEA), which

uses a 64-bit block size and a 56-bit key Federally approved standard for nonclassified data Cracked in 1997 when developers of a new algorithm,

Rivest-Shamir-Aldeman, offered $10,000 to whomever was first to crack it

Fourteen thousand users collaborated over the Internet to finally break the encryption

Triple DES (3DES) was developed as an improvement to DES and uses as many as three keys in succession

22

7/12

Page 23: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

The Technology of Symmetric Encryption (continued)

IS 3200, Summer 2010

Advanced Encryption Standard (AES) Successor to 3DES Based on Rijndael Block Cipher, which features

a variable block length and a key length of either 128, 192, or 256 bits

In 1998, it took a special computer designed by the Electronic Freedom Frontier more than 56 hours to crack DES; it would take the same computer approximately 4,698,864 quintillion years to crack AES

23

7/12

Page 24: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Asymmetric Encryption

IS 3200, Summer 2010

Also known as public key encryption Uses two different but related keys Either key can be used to encrypt or

decrypt If Key A is used to encrypt message,

then only Key B can decrypt; if Key B is used to encrypt message, then only Key A can decrypt

24

7/12

Page 25: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Asymmetric Encryptionn

7/12IS 3200, Summer 2010

25

This technique is most valuable when one of the keys is private and the other is public

Problem: it requires four keys to hold a single conversation between two parties, and the number of keys grows geometrically as parties are added

Page 26: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Public Key Encryption

IS 3200, Summer 2010

26

7/12

Page 27: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Digital Signatures

IS 3200, Summer 2010

When asymmetric process is reversed, that the message was sent by organization owning the private key cannot be refuted (nonrepudiation)

Digital signatures: encrypted messages verified as authentic by independent facility (registry)

Digital certificate: electronic document, similar to digital signature, attached to file certifying that file is from the organization it claims to be from and has not been modified from original format

Certificate Authority (CA): agency that manages issuance of certificates and serves as electronic notary public to verify their origin and integrity

27

7/12

Page 28: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Digital Signatures (continued)

IS 3200, Summer 2010

28

7/12

Page 29: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Start here 7/14

7/12

29

IS 3200, Summer 2010

Page 30: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Public Key Infrastructure

IS 3200, Summer 2010

Public key infrastructure (PKI) is the entire set of hardware, software, and cryptosystems necessary to implement public key encryption

Systems are based on public key cryptosystems and include digital certificates and certificate authorities

30

7/12

Page 31: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Public Key Infrastructure (continued)

Can increase an organization’s ability to protect its information assets by providing: Authentication: digital certificates authenticate

identity of each party in an online transaction Integrity: digital certificate asserts content signed by

the certificate has not been altered in transit Confidentiality: keeps information confidential by

ensuring it is not intercepted during transmission Authorization: digital certificates can replace user IDs

and passwords, enhance security, and reduce overhead

Nonrepudiation: certificates validate actions

Firewalls & Network Security, 2nd ed. - Chapter 9 31

IS 3200, Summer 2010

31

7/12

Page 32: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Hybrid Systems

IS 3200, Summer 2010

Pure asymmetric key encryption not widely used except in area of certificates; instead, typically employed in conjunction with symmetric key encryption, creating a hybrid system

Hybrid process currently in use is based on Diffie-Hellman key exchange, which provides method to exchange private keys using public key encryption without exposure to third parties

32

7/12

Page 33: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Hybrid Systems (continued)

7/12IS 3200, Summer 2010

33

In this method, asymmetric encryption is used to exchange symmetric keys, so two entities can conduct quick, efficient, secure communications based on symmetric encryption; Diffie-Hellman provided the foundation for subsequent developments in public key encryption

Page 34: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Hybrid Encryption

IS 3200, Summer 2010

34

7/12

Page 35: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Using Cryptographic Controls

IS 3200, Summer 2010

Generation of unbreakable ciphertext is possible only if proper key management infrastructure has been constructed and cryptosystems are operated and managed correctly

Cryptographic controls can be used to support several aspects of business: Confidentiality and integrity of e-mail and its attachments Authentication, confidentiality, integrity, and

nonrepudiation of e-commerce transactions Authentication and confidentiality of remote access

through VPN connections Higher standard of authentication when used to

supplement access control systems

35

7/12

Page 36: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

E-mail Security

IS 3200, Summer 2010

Secure Multipurpose Internet Mail Extensions (S/MIME) builds on Multipurpose Internet Mail Extensions (MIME); adds encryption and authentication via digital signatures

Privacy Enhanced Mail (PEM) proposed by Internet Engineering Task Force (IETF) as a standard that will function with public key cryptosystems; uses 3DES and RSA for key exchanges and digital signatures

Pretty Good Privacy (PGP): uses IDEA Cipher, a 128-bit symmetric key block encryption algorithm with 64-bit blocks for message encoding; RSA for symmetric key exchange and digital signatures

36

7/12

Page 37: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Securing the Web

IS 3200, Summer 2010

Secure Electronic Transactions (SET) Developed by MasterCard and VISA in 1997 to

provide protection from electronic payment fraud Encrypts credit card transfers with DES and uses

RSA for key exchange Secure Sockets Layer (SSL)

Developed by Netscape in 1994 to provide security for online electronic commerce transactions

Uses several algorithms; mainly relies on RSA for key transfer and IDEA, DES, or 3DES for encrypted symmetric key-based data transfer

37

7/12

Page 38: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Securing the Web (continued)

IS 3200, Summer 2010

Secure Hypertext Transfer Protocol (SHTTP) An encrypted version of HTTP Provides secure e-commerce transactions and

encrypted Web pages for secure data transfer over the Web, using several different algorithms

Secure Shell (SSH) Uses tunneling to provide security for remote access

connections over public networks Provides authentication services between a client and

a server Used to secure replacement tools for terminal

emulation, remote management, and file transfer applications

38

7/12

Page 39: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Securing the Web (continued)

IS 3200, Summer 2010

IP Security (IPSec): primary and now dominant cryptographic authentication and encryption product of IETF’s IP Protocol Security Working Group

IPSec combines several different cryptosystems: Diffie-Hellman key exchange for deriving key material

between peers on a public network Public key cryptography for signing the Diffie-Hellman

exchanges to guarantee the identity of the two parties Bulk encryption algorithms for encrypting the data Digital certificates signed by a certificate authority to act

as digital ID cards

39

7/12

Page 40: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Securing the Web (continued)

IS 3200, Summer 2010

IPSec has two components: The IP Security protocol itself, which

specifies the information to be added to an IP packet and indicates how to encrypt packet data

The Internet Key Exchange, which uses asymmetric key exchange and negotiates the security associations

40

7/12

Page 41: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Securing the Web (continued)

IS 3200, Summer 2010

IPSec works in two modes of operation: Transport mode: only IP data is encrypted—not

the IP headers themselves; allows intermediate nodes to read source and destination addresses

Tunnel mode: entire IP packet is encrypted and inserted as payload in another IP packet

IPSec and other cryptographic extensions to TCP/IP often used to support a virtual private network (VPN), a private, secure network operated over a public, insecure network

41

7/12

Page 42: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Securing Authentication

IS 3200, Summer 2010

A final use of cryptosystems is to provide enhanced and secure authentication

One approach to this issue is provided by Kerberos, which uses symmetric key encryption to validate an individual user’s access to various network resources

It keeps a database containing the private keys of clients and servers that are in the authentication domain that it supervises

42

7/12

Page 43: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Kerberos

IS 3200, Summer 2010

Kerberos system knows these private keys and can authenticate one network node (client or server) to another

Kerberos also generates temporary session keys—that is, private keys given to the two parties in a conversation

43

7/12

Page 44: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Kerberos (continued)

IS 3200, Summer 2010

44

7/12

Page 45: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Kerberos (continued)

IS 3200, Summer 2010

45

7/12

Page 46: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Attacks on Cryptosystems

IS 3200, Summer 2010

Historically, attempts to gain unauthorized access to secure communications have used brute force attacks in which the ciphertext is repeatedly searched for clues that can lead to the algorithm’s structure (ciphertext attacks)

This process, known as frequency analysis, can be used along with published frequency of occurrence patterns of various languages and can allow an experienced attacker to quickly crack almost any code if the individual has a large enough sample of the encoded text

46

7/12

Page 47: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Attacks on Cryptosystems (continued)

IS 3200, Summer 2010

Occasionally, an attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a known-plaintext attack scheme

Alternatively, an attacker may conduct a selected-plaintext attack by sending a potential victim a specific text that they are sure the victim will forward on to others; the attacker then intercepts the encrypted message and compares it to the original plaintext

47

7/12

Page 48: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Attacks on Cryptosystems (continued)

IS 3200, Summer 2010

Man-in-the-middle attack: method used to intercept the transmission of a public key or even to insert a known key structure in place of the requested public key

Correlation attacks: collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem

48

7/12

Page 49: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Attacks on Cryptosystems (continued)

IS 3200, Summer 2010

In a dictionary attack, the attacker encrypts every word in a dictionary using the same cryptosystem as used by the target

In a timing attack, the attacker eavesdrops during a victim’s session and uses statistical analysis of the user’s typing patterns and inter-keystroke timings to discern sensitive session information

49

7/12

Page 50: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Defending from Attacks

IS 3200, Summer 2010

No matter how sophisticated encryption and cryptosystems have become, however, they have retained the same flaw that the first systems contained thousands of years ago: if you discover the key, that is, the method used to perform the encryption, you can determine the message

Thus, key management is not so much the management of technology but rather the management of people

50

7/12

Page 51: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Chapter Summary

IS 3200, Summer 2010

Encryption: process of rendering information unreadable to all but the intended recipients; purpose is to preserve the integrity and confidentiality of information and/or make the process of authenticating users more effective

Firewalls use encryption both to provide protection for data in transit and to help keep firewall secure

Encryption of data incurs costs since it requires processing time to encrypt and decrypt the data being protected

51

7/12

Page 52: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Chapter Summary (continued)

IS 3200, Summer 2010

Cryptology: science of encryption Cryptography: complex process of making and

using codes Applying concealing techniques in encryption and

decoding ciphertext is called decryption Process used to decrypt data when the process

and/or keys are unknown is called cryptanalysis Cryptographic controls: techniques and tools

used to implement cryptographic protections; used to secure e-mail, Web access, Web applications, file transfers, remote access procedures like VPNs

52

7/12

Page 53: ISA 3200 NETWORK SECURITY Chapter 9: Encryption and Firewalls.

Chapter Summary (continued)

IS 3200, Summer 2010

Cryptographic control systems often subject to attack

Many methods of attack have evolved Brute computational approaches Use of weaknesses often found in

implementation of cryptographic controls Some attacks attempt to inject themselves

between the parties of a secured communication channel

Other attacks combine multiple brute-force approaches into one correlation attack

53

7/12