Top Banner
Secure communications Week 10 – Lecture 2
24

Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Secure communications

Week 10 – Lecture 2

Page 2: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

To summarise yesterday

• Security is a system issue• Technology and security specialists are part of the

system• Users from inside the organisation are usually the

biggest risk – they have the motivation• As systems architect – you are responsible• The system has to be designed to protect itself –

user profiles, database views etc.

Page 3: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Are Networks a risk?

• Yes• Two main areas where an intruder can listen

passively• Within a collision zone on the LAN – a “sniffer”

can look at all datagrams passing the NIC not just datagrams addressed to it

• At a router – much more difficult

• Internet• More difficult to read – sniff

• Easier to write – spoof - pretend to be someone else

Page 4: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Firewalls

• Routers as packet filters

• Application level firewalls - proxy

InternalNetwork

Outside worldRouter

Application

Firewalls

But there may be other connections to the outside world

Page 5: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Routers as Firewalls

• A Router is usually the connection to the outside world

• Routers can check all packets• Source & destination addresses

• Protocol – eg TCP UDP

• Port number – application eg Telnet

• Little intelligence – work quickly• Use NAT to hide topology of the internal network

Page 6: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Application firewalls

• Mail servers & Internet proxy servers are examples

• Higher level of intelligence

• Can implement most security policies e.g. could limit WEB requests from Purchasing to between 8:00am and 6:00pm

• Has logging & auditing capabilities

• Slows throughput but as a caching device can also speed up WEB access

• Application specific

Page 7: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Secure communications

• Secrecy – only the two parties should understand the messages

• Authentication – each party should know the messages are from the right person

• Message integrity – the messages must not be able to be changed

Page 8: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Secrecy - encryption

• Encryption has been around for centuries• It used to be reliant on keeping the algorithm

secret• But computers make it easier to encrypt and to

break the code• Early computer development was made by code

breakers during WW2 – Enigma - Turing at Bletchley Park

Page 9: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Four elements to encryption

• The Original or plain text• An Encryption method – the algorithm is common

and normally well known – a transformation method

• The Key – many locks are the same but the key is different. The key must be secret to the parties.

• The Encrypted text

Page 10: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

So keeping the key secret is the requirement

• Secret

• Secure

• So how do you share keys?

Page 11: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Attacks on algorithms

• Brute force is too difficult

• Plain text attacks is more useful if you know– The algorithm– The encrypted text and the– Plain text (remember Enigma)

Page 12: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Common security protocols

• IPsec for IP traffic across the Internet – VPNs• SSL – Secure Socket Layer – secures WWW

connections• PGP – Pretty Good Privacy and S/MIME secure

email• SET secures Internet financial transactions

These protocols may use different algorithms for encryption and Digital signatures

Page 13: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Protocols use 6 basic tools

• Symmetric encryption

• Public key encryption

• One way hash codes

• Message authentication schemes

• Digital signature schemes

• Random number generators

Page 14: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Two types of key

• Symmetric key – each party has the same key and thus must be kept secret

• Asymmetric or public keys – • the writer uses a public key to encrypt, but this

cannot decrypt, thus it can be public knowledge

• The reader has a private key to decrypt. This must be kept secret

Page 15: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Bob generates two keys- he gives the public key to any one who wants it - Bob keeps the private key

Alice et al

Alice sends Bob a messageEncrypted with HIS public key

No one can decrypt the Message with the public key

Bob however is the only Person to have the privateKey, and thus only he can Decrypt the message

Bob

Page 16: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

DES – Data Encryption Standard

• Symmetric key• Developed by US National Bureau of Standards• Uses a 56 bit key (triple DES 112 bits)• In 2000 it took a network of computers 22 hours

to break the key• Good enough for most of us.

Page 17: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

RSA Algorithm

• Asymmetric key method

• Recommends a key length of 768 bits or greater

• Asymmetric encryption takes 1000 more CPU time

• Usually used in combination with DES• Alice wants to talk to Bob

• Alice sends a DES key for the session to Bob, encrypted using his public RSA key

• Only Bob can decrypt the session key

• It is then used for the session

• Kurose page 571 for details on these methods

Page 18: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Using the hybrid approach is usual

• It is normal in all security protocols– PGP– S/MIME– Etc

• The protocol generates a session key using a random number generator

• This is encrypted using the receiver’s public key and sent to the other party

• The symmetric key is then used to encrypt the session

Page 19: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Authentication

• If Alice sends a message to Bob, how does he know it is Alice?

• Alice’s IP address – but can be spoofed

• Use a special password – but even if encrypted it can be used in playback mode

• Use of a random number or nonce

Page 20: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Authentication by Nonce

• Alice sends Hi to Bob

• Bob sends back a “nonce” in plain text

• Alice encrypts the nonce with their symmetric key

• Bob decrypts and compares it to the number he sent

Page 21: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Message integrity

• The digital world need some way of knowing that a message came from the specified person, has not been changed, and that the writer cannot repudiate the message

• One characteristic of the RSA method is that it also works in reverse. If Bob encrypts a message using his private key, then it can be decrypted by a person having the public key

• Thus one knows• It came from Bob

• It has not been changed

Page 22: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Message Digest

• Use of the RSA key might be overkill for large documents

• Can calculate a fingerprint (like a hash total) that will prove the message has not been changed

• This fingerprint is then encrypted with the author’s private key

• Holders of the author’s public key can then know that the message came from the author and has not been changed

Page 23: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

Key Distribution Centres

• Trusted intermediary - Verisign

• Can be authorised to distribute shared private keys, or a person’s public key

Page 24: Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.

VPN – Virtual Private Network

• Over a shared network infrastructure, usually the Internet

• Through an encrypted connection– Tunneling – set of predetermined router hops– Encryption of the packet contents– Packet and user authentication

• Most private WANs will soon be VPNs – 30 to 0% cheaper