Security and Cryp tography CS-502 Fall 2007 1 Security and Cryptography CS-502 Operating Systems Fall 2007 (Slides include materials from Operating System Concepts, 7 th ed., by Silbershatz, Galvin, & Gagne and from Modern Operating Systems, 2 nd ed., by Tanenbaum)
54
Embed
Security and Cryptography CS-502 Fall 20071 Security and Cryptography CS-502 Operating Systems Fall 2007 (Slides include materials from Operating System.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Security and Cryptography
CS-502 Fall 2007 1
Security and Cryptography
CS-502 Operating SystemsFall 2007
(Slides include materials from Operating System Concepts, 7th ed., by Silbershatz, Galvin, & Gagne and from Modern Operating Systems, 2nd ed., by Tanenbaum)
Security and Cryptography
CS-502 Fall 2007 2
Puzzle
• Alice wishes to send secret message to Bob– She places message in impenetrable box– Locks the box with unbreakable padlock– Sends locked box to Bob
• Problem:– Bob has no key to unlock box– No feasible way to securely send key to Bob
• How does Bob retrieve message?
Security and Cryptography
CS-502 Fall 2007 3
Answer
• Bob adds 2nd unbreakable padlock to box– Locks with own key– Sends box back to Alice (with two padlocks!)
• Alice unlocks and removes her lock– Sends box back to Bob
• Bob unlocks his lock– Opens box and reads message
• What could go wrong?
Security and Cryptography
CS-502 Fall 2007 4
Authentication
• How does the machine know who it is talking to?
• Who do I say that I am?
• How can I verify that?• Something I know (that nobody else should know)• Something I have (that nobody else should have)• Something I am (that nobody else should be…)
Security and Cryptography
CS-502 Fall 2007 5
Threats against authentication
I want to pretend to be you:• I can steal your password
– the sticky note on your monitor or the list in your desk drawer
– by monitoring your communications or looking over your shoulder
• I can guess your password – particularly useful if I can also guess your user name
• I can get between you and the system you are talking to
Security and Cryptography
CS-502 Fall 2007 6
Getting between you and system you are talking to
Security and Cryptography
CS-502 Fall 2007 7
Login Spoof
• I create a login screen in my process– On a public machine
– Looks exactly like real one
• You log into system– My login process records your user ID and password
– Logs you in normally
• Result:– I have gotten between you and system without your knowledge– Also, I have stolen your user ID and password
Security and Cryptography
CS-502 Fall 2007 8
The Trouble with Passwords
• They are given away
• They are too easy to guess
• They are used too often
• There are too many of them
• They are used in too many places
Security and Cryptography
CS-502 Fall 2007 9
Some ways around the problem
• Better passwords– longer– larger character set– more random in nature/encrypted
• Used less often– changed frequently, one system per password– challenge/response – use only once
Security and Cryptography
CS-502 Fall 2007 10
The Challenge/Response Protocol
Art MaryHello, I’m Art
Decrypt This {R}P
R
Hello Art! How can I help you?
Security and Cryptography
CS-502 Fall 2007 11
Threat: Steal passwords from the system
• Don’t keep them in an obvious place
• Encrypt them so that version system sees is not same as what user enters – or version on the wire
Security and Cryptography
CS-502 Fall 2007 12
Too many passwords to remember?
• Third-party authentication– Get someone to vouch for you
• The basics: “This guy says you know him..”“Yes, I trust him, so you should too..”
• Kerberos – Certificate-based authentication within a trust community
Security and Cryptography
CS-502 Fall 2007 13
What is in a certificate?
• Who issued it
• When was it issued
• For what purpose was it issued
• For what time frame is it valid
• (possibly other application-specific data)
• A “signature” that proves it has not been forged
Security and Cryptography
CS-502 Fall 2007 14
Systems and Networks Are Not Different
• Same basic rules about code behavior apply
• Same authentication rules apply
• The same security principles apply
• Same coding rules apply to: – An application
– Code which manages incoming messages
– Code which imposes access controls on a network
– ...
Security and Cryptography
CS-502 Fall 2007 15
The Principles
• Understand what you are trying to protect
• Understand the threat(s) you are trying to protect against– Also, costs and risks
• Be prepared to establish trust by telling people how you do it
• Assume that the bad guys are at least as clever as you are!
Security and Cryptography
CS-502 Fall 2007 16
Security must occur at four levels to be effective
• Physical– The best security system is no better than the lock on
your front door (or desk, or file cabinet, etc.)!• Human
– Phishing, dumpster diving, social engineering• Operating System
– Protection and authentication subsystems• Network
– Similar to OS
• Security is as weak as the weakest link in chain
Security and Cryptography
CS-502 Fall 2007 17
How do these attacks work?
• Messages that attack mail readers or browsers
• Denial of service attacks against a web server
• Password crackers
• Viruses, Trojan Horses, other “malware”
Security and Cryptography
CS-502 Fall 2007 18
The concept of a “Vulnerability”
• Buffer overflow
• Protocol/bandwidth interactions– Protocol elements which do no work
• “execute this” messages– The special case of “mobile agents”
• Human user vulnerabilities– eMail worms– Phishing
Security and Cryptography
CS-502 Fall 2007 19
Another Principle
• There is a never-ending war going on between the “black hats” and the rest of us.
• For every asset, there is at least one vulnerability
• For every protective measure we add, “they” will find another vulnerability
Security and Cryptography
CS-502 Fall 2007 20
Yet Another Principle
• There is no such thing as a bullet-proof barrier
• Every level of the system and network deserves an independent threat evaluation and appropriate protection
• Only a multi-layered approach has a chance of success!
Security and Cryptography
CS-502 Fall 2007 21
Actual Losses:
• Approximately 70% are due to user error
• More than half of the remainder are caused by insiders
• “Social Engineering” accounts for more loss than technical attacks.
Security and Cryptography
CS-502 Fall 2007 22
What is “Social Engineering”?
“Hello. This is Dr. Burnett of the cardiology department at the Conquest Hospital in Hastings. Your patient, Sam Simons, has just been admitted here unconscious. He has an unusual ventricular arrhythmia. Can you tell me if there is anything relevant in his record?”
• Broadest security tool available– Source and destination of messages cannot be
trusted without cryptography– Means to constrain potential senders (sources)
and / or receivers (destinations) of messages
• Based on secrets (keys)
Security and Cryptography
CS-502 Fall 2007 35
Principles
• Cryptography is about the exchange of messages
• The key to success is that all parties to an exchange trust that the system will both protect them from threats and accurately convey their message
• TRUST is essential
Security and Cryptography
CS-502 Fall 2007 36
Therefore
• Algorithms must be public and verifiable
• We need to be able to estimate the risk of compromise
• The solution must practical for its users, and impractical for an attacker to break
Security and Cryptography
CS-502 Fall 2007 37
Guidelines
• Cryptography is always based on algorithms which are orders of magnitude easier to compute in the forward (normal) direction than in the reverse (attack) direction.
• The attacker’s problem is never harder than trying all possible keys
• The more material the attacker has the easier his task
Security and Cryptography
CS-502 Fall 2007 38
Example
• What is 314159265358979 314159265358979?
vs.
• What are prime factors of3912571506419387090594828508241?
Security and Cryptography
CS-502 Fall 2007 39
Time marches on…
• We must assume that there will always be improvements in computational power, mathematics and algorithms.– Messages which hang around get less secure
with time!
• Increases in computing power help the good guys and hurt the bad guys for new and short-lived messages
Security and Cryptography
CS-502 Fall 2007 40
Caveat
• We cannot mathematically PROVE that the inverse operations are really as hard as they seem to be…It is all relative…
The Fundamental Tenet of Cryptography:
If lots of smart people have failed to solve a problem, it won’t be solved (soon)
Security and Cryptography
CS-502 Fall 2007 41
Secret key cryptography
f (T,K) g (C,K)Cleartext Cleartext
K K
CyphertextT TC
Security and Cryptography
CS-502 Fall 2007 42
Secret Key Methods
• DES (56 bit key)
• IDEA (128 bit key)• http://www.mediacrypt.com/community/index.asp
• Triple DES (three 56 bit keys)
• AES– From NIST, 2000– choice of key sizes up to 256 bits and more– Commercial implementations available