58
Network Security

Network Security. 2 Why Network Security? Malicious people share your network Problem made more severe the more the Internet became commercialized

Embed Size (px)

Citation preview

Page 1: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

Network Security

Page 2: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

2

Why Network Security?

Malicious people share your network

Problem made more severe the more the Internet became commercialized

Page 3: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

3

What are the Security metrics?Confidentiality: can a 3rd party see it?Authentication: Am I talking to the

person I intend to?Non-repudiation: can you claim you

didn’t send it even if you really did? Integrity: was it altered before I got it?Authorization: Are you allowed to

perform the action (method)?

Page 4: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

4

Security Tools

Cryptography/Encryption:

Encode a message in a way that only the communicating parties can interpret it

Used for secrecy and authentication

Page 5: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

5

Cryptography

Encoding a message in a way that only the communicating parties can interpret it

EncryptionPlaintext (P) Ciphertext (C)

Key (K)

Notation:Encryption: C=EK (P) Decryption: P = DK(C)

Page 6: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

6

Rules for Encryption

Encryption requires:

Algorithm:• Public, known to all

– Inspires trust that the algorithm works

Keys:• Long enough to prevent easy breaking of the

encryption• Short enough to keep algorithm efficient• Typical key lengths: 56-bit, 128-bit, 256-bit, 512-bit

Page 7: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

7

Types of Encryption Algorithms Substitution Ciphers

Every letter (or group of letters) is replaced by another letter (or group of letters)

Example:• Caesar cipher:

– a/D, b/E, c/F, d/G, …, z/C

• Monoalphabetic cipher:– a/Q, b/W, c/E, …

Easy to break by analyzing statistical properties of written language

Page 8: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

8

Types of Encryption (cont’d)

Transposition Ciphers Instead of substituting letters in the plaintext, we

change their order

A N D R E W1 4 2 5 3 6t h i s i sa m e s s ag e i w o ul d l i k et o e n c ry p t n o w

Key = ANDREWPlaintext = thisisamessageiwould liketoencryptnowCiphertext = tagltyieiletisokco hmedopsswinnsauerw

Page 9: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

9

Transposition Cipher Decryption The following message has been

encrypted using transposition. The transposition key is “SKYBLUE”.

SRMTISHEAGIIETHNASGSIOLE Give the plaintext message?

Page 10: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

10

Types of Encryption (cont’d)

Most actual encryption algorithms use a complex combination of substitution and transposition

Examples: Data Encryption Standard (DES)

• Multiple iterations of substitution and transposition using a 56-bit key

• designed by IBM with input from the NSA DES chaining

• Multiple stages of DES coding, in which the input of each stage is the output of previous stages

International Data Encryption Algorithm (IDEA)• uses a 128-bit key

Page 11: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

11

Symmetric Encryption

Problem with all the cryptography algorithms used so far?

How to communicate the shared key safely

Page 12: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

12

Public Key Cryptography

symmetric key crypto requires sender,

receiver know shared secret key

public key cryptography

sender, receiver do not share secret key

public encryption key known to all

private decryption key known only to receiver

Page 13: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

13

Public key cryptography

plaintextmessage, m

ciphertextencryptionalgorithm

decryption algorithm

Bob’s public key

plaintextmessageK (m)

B+

K B+

Bob’s privatekey

K B-

m = K (K (m))B+

B-

• Messages to Bob are encrypted using Bob’s public key.• Bob decrypts all received messages using his private key.

Page 14: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

14

Public key encryption algorithms

need K ( ) and K ( ) such thatB B

. .

given public key K it should be impossible to compute private key K B

B

Requirements:

1

2

RSA: Rivest, Shamir, Adelson algorithm

+ -

K (K (m)) = m BB

- +

+

-

Page 15: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

15

RSA: Choosing keys

1. Choose two large prime numbers p, q. (e.g., 1024 bits each)

2. Compute n = pq, z = (p-1)(q-1)

3. Choose e (with e<n) that has no common factors with z. (e, z are “relatively prime”).

4. Choose d such that ed-1 is exactly divisible by z. (in other words: ed mod z = 1 ).

5. Public key is (n,e). Private key is (n,d).

K B+ K B

-

Page 16: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

16

RSA: Encryption, decryption

0. Given (n,e) and (n,d) as computed above

1. To encrypt bit pattern, m, compute

c = m mod n

e (i.e., remainder when m is divided by n)e

2. To decrypt received bit pattern, c, compute

m = c mod n

d (i.e., remainder when c is divided by n)d

m = (m mod n)

e mod n

dMagichappens!

c

Page 17: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

17

RSA example:

Bob chooses p=5, q=7. Then n=35, z=24.e=5 (so e, z relatively prime).d=29 (so ed-1 exactly divisible by z.

letter m me c = m mod ne

l 12 1524832 17

c m = c mod nd

17 481968572106750915091411825223071697 12

cdletter

l

encrypt:

decrypt:

Page 18: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

18

RSA: Why is that m = (m mod n)

e mod n

d

(m mod n)

e mod n = m mod n

d ed

Useful number theory result: If p,q prime and n = pq, then:

x mod n = x mod ny y mod (p-1)(q-1)

= m mod n

ed mod (p-1)(q-1)

= m mod n1

= m

(using number theory result above)

(since we chose ed to be divisible by(p-1)(q-1) with remainder 1 )

Page 19: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

19

RSA: another important property

The following property will be very useful later:

K (K (m)) = m BB

- +K (K (m))

BB+ -

=

use public key first, followed

by private key

use private key first,

followed by public key

Result is the same!

Page 20: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

20

Cryptography question

Suppose N people want to communicate with each of N-1 other people. All communication between any two people, i and j is visible to all other people in the group and security is guaranteed by the encryption scheme. With symmetric key encryption, how many keys are

required in the system as a whole? Express you answer in terms of N.

How many keys are required (total) using public/private key cryptography. Express your answer in terms of N.

Page 21: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

21

What are the Security metrics?Confidentiality: can a 3rd party see it?Authentication: Am I talking to the

person I intend to?Non-repudiation: can you claim you

didn’t send it even if you really did? Integrity: was it altered before I got it?Authorization: Are you allowed to

perform the action (method)?

Page 22: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

22

Authentication

Goal: Bob wants Alice to “prove” her identity to him

Protocol ap1.0: Alice says “I am Alice”

Failure scenario??“I am Alice”

Page 23: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

23

Authentication

Goal: Bob wants Alice to “prove” her identity to him

Protocol ap1.0: Alice says “I am Alice”

in a network,Bob can not “see”

Alice, so Trudy simply declares

herself to be Alice“I am Alice”

Page 24: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

24

Authentication: another try

Protocol ap2.0: Alice says “I am Alice” in an IP packetcontaining her source IP address

Failure scenario??

“I am Alice”Alice’s

IP address

Page 25: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

25

Authentication: another try

Protocol ap2.0: Alice says “I am Alice” in an IP packetcontaining her source IP address

Trudy can createa packet

“spoofing”Alice’s address“I am Alice”

Alice’s IP address

Page 26: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

26

Authentication: another try

Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it.

Failure scenario??

“I’m Alice”Alice’s IP addr

Alice’s password

OKAlice’s IP addr

Page 27: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

27

Authentication: another try

Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it.

playback attack: Trudy records Alice’s

packetand later

plays it back to Bob

“I’m Alice”Alice’s IP addr

Alice’s password

OKAlice’s IP addr

“I’m Alice”Alice’s IP addr

Alice’s password

Page 28: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

28

Authentication: yet another try

Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it.

Failure scenario??

“I’m Alice”Alice’s IP addr

encrypted password

OKAlice’s IP addr

Page 29: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

29

Authentication: another try

Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it.

recordand

playbackstill works!

“I’m Alice”Alice’s IP addr

encryptedpassword

OKAlice’s IP addr

“I’m Alice”Alice’s IP addr

encryptedpassword

Page 30: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

30

Authentication: yet another try

Goal: avoid playback attack

Failures, drawbacks?

Nonce: number (R) used only once –in-a-lifetime

ap4.0: to prove Alice “live”, Bob sends Alice nonce, R. Alice

must return R, encrypted with shared secret key“I am Alice”

R

K (R)A-B

Alice is live, and only Alice knows key to encrypt

nonce, so it must be Alice!

Page 31: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

31

Authentication: ap5.0

ap4.0 requires shared symmetric key can we authenticate using public key techniques?ap5.0: use nonce, public key cryptography

“I am Alice”

RBob computes

K (R)A-

“send me your public key”

K A+

(K (R)) = RA

-K A

+

and knows only Alice could have the

private key, that encrypted R such that

(K (R)) = RA-

K A+

Page 32: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

32

ap5.0: security hole

Man (woman) in the middle attack: Trudy poses as Alice (to Bob) and as Bob (to Alice)

I am Alice I am Alice

R

TK (R)

-

Send me your public key

TK

+A

K (R)-

Send me your public key

AK

+

TK (m)+

Tm = K (K (m))+

T-

Trudy gets

sends m to Alice encrypted

with Alice’s public key

AK (m)+

Am = K (K (m))+

A-

R

Page 33: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

33

ap5.0: security holeMan (woman) in the middle attack: Trudy poses

as Alice (to Bob) and as Bob (to Alice)

Difficult to detect: Bob receives everything that Alice sends, and vice versa. (e.g., so Bob, Alice can meet one week later and recall conversation) problem is that Trudy receives all messages as well!

Problem to solve: key distribution

Page 34: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

34

Distribution: key distribution center (for symmetric key)

Key Distribution

Center

Page 35: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

35

Distribution: Public key certification (for public key)

Encryptionalgorithm

CA’s privatekey

K CA-

Alice’s CA-signed

certificate containing her

public key

Certification Authority

K A+

( , Alice)

Page 36: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

36

What are the Security metrics?Confidentiality: can a 3rd party see it?Authentication: Am I talking to the

person I intend to?Non-repudiation: can you claim you

didn’t send it even if you really did? Integrity: was it altered before I got it?Authorization: Are you allowed to

perform the action (method)?

Page 37: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

37

Digital Signatures

Cryptographic technique analogous to hand-written signatures.

sender (Bob) digitally signs document, establishing he is document owner/creator.

verifiable, nonforgeable: recipient (Alice) can prove to someone that Bob, and no one else (including Alice), must have signed document

Page 38: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

38

Digital Signatures

Simple digital signature for message m: Bob signs m by encrypting with his private

key KB, creating “signed” message, KB(m)--

Dear Alice

Oh, how I have missed you. …(blah blah blah)

Bob

Bob’s message, m

Public keyencryptionalgorithm

Bob’s privatekey

K B-

Bob’s message, m, signed

(encrypted) with his private key

K B-(m)

Page 39: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

39

Digital Signatures (more)

If KB(KB(m) ) = m, whoever signed m must have

used Bob’s private key.

-+

Non-repudiation: Alice can take m, and signature KB(m) to court

and prove that Bob signed m.

Page 40: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

40

Message Digests

Computationally expensive to public-key-encrypt long messages

Goal: fixed-length, easy- to-compute digital “fingerprint”

apply hash function H to m, get fixed size message digest, H(m).

Page 41: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

41

Message Digests

Hash function properties: many-to-1 produces fixed-size msg digest

(fingerprint) given message digest x, computationally

infeasible to find m such that x = H(m)

large message

m

H: HashFunction

H(m)

Page 42: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

42

large message

mH: Hashfunction H(m)

digitalsignature(encrypt)

Bob’s private

key K B-

+

Bob sends digitally signed message:

Alice verifies signature and integrity of digitally signed message:

KB(H(m))-

encrypted msg digest

KB(H(m))-

encrypted msg digest

large message

m

H: Hashfunction

H(m)

digitalsignature(decrypt)

H(m)

Bob’s public

key K B+

equal ?

Digital signature = signed message digest

Page 43: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

43

Hash Function Algorithms

MD5 hash function widely used (RFC 1321) computes 128-bit message digest in 4-step

process. arbitrary 128-bit string x, appears difficult to

construct msg m whose MD5 hash is equal to x.

SHA-1 is also used. US standard [NIST, FIPS PUB 180-1]

160-bit message digest

Page 44: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

44

What are the Security metrics?Confidentiality: can a 3rd party see it?Authentication: Am I talking to the

person I intend to?Non-repudiation: can you claim you

didn’t send it even if you really did? Integrity: was it altered before I got it?Authorization: Are you allowed to

perform the action (method)?

Page 45: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

45

Firewalls

isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others.

firewall

administerednetwork

publicInternet

firewall

Page 46: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

46

Firewalls

allow only authorized access to inside network (set of authenticated users/hosts)

two types of firewalls: packet-filtering application-level

Page 47: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

47

Packet Filtering

internal network connected to Internet via router firewall

router filters packet-by-packet, decision to forward/drop packet based on: source IP address, destination IP address TCP/UDP source and destination port numbers ICMP message type TCP SYN and ACK bits

Should arriving packet be allowed

in? Departing packet let out?

Page 48: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

48

Packet Filtering

Example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or dest port = 23. All incoming and outgoing UDP flows and

telnet connections are blocked. Example 2: Block inbound TCP segments with

ACK=0. Prevents external clients from making TCP

connections with internal clients, but allows internal clients to connect to outside.

Page 49: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

49

Application gateways

Filters packets on application data.

Example: allow select internal users to telnet outside.

host-to-gatewaytelnet session

gateway-to-remote host telnet session

applicationgateway

router and filter

1. Require all telnet users to telnet through gateway.2. For authorized users, gateway sets up telnet

connection to dest host. Gateway relays data between 2 connections

3. Router filter blocks all telnet connections not originating from gateway.

Page 50: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

50

Limitations of firewalls and gateways

IP spoofing: router can’t know if data “really” comes from claimed source

if multiple app’s. need special treatment, each has own app. gateway.

client software must know how to contact gateway. e.g., must set IP address

of proxy in Web browser

filters often use all or nothing policy for UDP.

tradeoff: degree of communication with outside world, level of security

many highly protected sites still suffer from attacks.

Page 51: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

A little more on Internet Security Threat Examples

Page 52: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

52

Internet security threatsPacket sniffing:

broadcast media promiscuous NIC reads all packets passing by can read all unencrypted data (e.g. passwords) e.g.: C sniffs B’s packets

A

B

C

src:B dest:A payload

Countermeasures?

Page 53: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

54

Internet security threatsIP Spoofing:

can generate “raw” IP packets directly from application, putting any value into IP source address field

receiver can’t tell if source is spoofed e.g.: C pretends to be B

A

B

C

src:B dest:A payload

Countermeasures?

Page 54: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

56

Internet security threatsDenial of service (DOS):

flood of maliciously generated packets “swamp” receiver Distributed DOS (DDOS): multiple coordinated sources

swamp receiver e.g., C and remote host SYN-attack A

A

B

C

SYN

SYNSYNSYN

SYN

SYN

SYN

Countermeasures?

Page 55: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

58

SSL and TLS

• Secure Sockets Layer (SSL) is a different approach - a new layer is added that provides a secure channel over a TCP only link.

• TLS is Transport Layer Security (IETF standard based on SSL).

Page 56: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

59

SSL layer

Application

SSL

TCP

IP

Application

SSL

TCP

IP

Page 57: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

60

Advantages of SSL/TLS

• Independent of application layer

• Includes support for negotiated encryption techniques. easy to add new techniques.

• Possible to switch encryption algorithms in the middle of a session.

Page 58: Network Security. 2 Why Network Security?  Malicious people share your network  Problem made more severe the more the Internet became commercialized

61

HTTPS Usage

• HTTPS is HTTP running over SSL. used for most secure web transactions. HTTPS server usually runs on port 443. Include notion of verification of server via a

certificate. Central trusted source of certificates.