Isg
Isg
2
ICDCN06, IIT Guwahati
3
ICDCN06, IIT Guwahati
Security Attacks
Interruption
Interception
Modification
Fabrication
Basic model:
S
Source
D
Destination
4
Interruption:
Attack on availability
Interception:
Attack on confidentiality
5
ICDCN06, IIT Guwahati
Modification:
Attack on integrity
I
Fabrication:
Attack on authenticity
S
I
6
ICDCN06, IIT Guwahati
Active attacks
Involve some modification of the data stream or
the creation of a false stream.
Four categories:
Masquerade:- One entity pretends to be a different entity.
Replay:- Passive capture of a data unit and its
subsequent retransmission to produce an unauthorized
effect.
Modification:- Some portion of a legitimate message is
altered.
Denial of service:- Prevents the normal use of
communication facilities.
8
ICDCN06, IIT Guwahati
Security Services
Confidentiality
Authentication
Integrity
Non-repudiation
Access control
Availability
Denial of Service Attacks
Virus that deletes files
9
ICDCN06, IIT Guwahati
10
ICDCN06, IIT Guwahati
11
ICDCN06, IIT Guwahati
Introduction
Most important concept behind network
security is encryption.
Two forms of encryption are in common use:
Private (or Symmetric)
Single key shared by sender and receiver.
Examples: DES, AES, IDEA
12
ICDCN06, IIT Guwahati
Some Terminologies
Plaintext:
the data that is to be encrypted
Ciphertext:
the encrypted form of the data
Encryption/Decryption algorithm
the algorithm used to carry out the transformation.
Key
Usually a secret entity.
Used as parameter to the encryption/decryption
algorithm.
13
ICDCN06, IIT Guwahati
14
ICDCN06, IIT Guwahati
Plaintext
P
Encryption
Algorithm
Shared Key K
Ciphertext C
Decryption
Algorithm
Plaintext
P
15
ICDCN06, IIT Guwahati
Classical Techniques
16
ICDCN06, IIT Guwahati
Substitution Ciphers
1. Caesar Cipher
Earliest known substitution cipher.
Replace each letter of the alphabet with the letter
three places after that alphabet.
Alphabets are assumed to be wrapped around (
Z is followed by A, etc.).
P:
C:
17
ICDCN06, IIT Guwahati
Drawback:
Brute force attack is easy
Try out all the 25 possible keys
18
ICDCN06, IIT Guwahati
2. Mono-alphabetic Cipher
Allow any arbitrary substitution.
There can be 26! or 4x1026 possible keys.
A typical key may be:
(ZAQWSXCDERFVBGTYHNMJUIKLOP)
Drawback:
3. Poly-alphabetic Cipher
Use different mono-alphabetic substitutions as
we proceed through the plaintext message.
Vigenere cipher is the best known cipher of
this class.
20
ICDCN06, IIT Guwahati
10
Drawback:
Key and the plaintext share the same
frequency distribution of letters.
The best thing would have been to use a
keyword which is as large as the plaintext, and
has no statistical relationship to it.
21
ICDCN06, IIT Guwahati
Transposition Cipher
Many techniques were proposed under this
category.
A simple scheme:
Write out the plaintext in a rectangle, row by row,
and read the message column by column, by
permuting the order of the columns.
Order of the column becomes the key.
22
ICDCN06, IIT Guwahati
11
An example
P: we have enjoyed the workshop in jadavpur
Key:
C:
4 3
w e
n j
h e
h o
d a
1
h
o
w
p
v
2
a
y
o
i
p
5
v
e
r
n
u
6
e
d
k
j
r
7
e
t
s
a
-
23
ICDCN06, IIT Guwahati
Drawback:
The ciphertext has the same letter frequency
as the original plaintext.
Guessing the number of columns and some
probable words in the plaintext holds the key.
24
ICDCN06, IIT Guwahati
12
25
ICDCN06, IIT Guwahati
What is meant by
Security lies in the Keys
Time required at 106
decryptions / s
Key Size
(bits)
Number of
Alternative Keys
32
2.15 milliseconds
56
10 hours
128
168
13
IDEA
Block size is 64 bits.
Key size is 128 bits.
28
ICDCN06, IIT Guwahati
14
P (64-bit)
K (56-bit)
Initial Permutation
Round 1
Round 2
Round 16
Permuted Choice 1
K1
K2
K16
Permuted Choice 2
Permuted Choice 2
Permuted Choice 2
32-bit Swap
Reverse Inverse
Permutation
General Schematic
of DES Algorithm
C (64-bit)
29
ICDCN06, IIT Guwahati
15
DES
The overall processing at each iteration:
Li = Ri-1
Ri = Li-1 F(Ri-1, Ki)
Fiestel Structure
Concerns about:
The algorithm and the key length (56-bits)
Longer key lengths essential for critical
applications
31
ICDCN06, IIT Guwahati
32
ICDCN06, IIT Guwahati
16
C = ciphertext
P = Plaintext
EK[X] = encryption of X using key K
DK[Y] = decryption of Y using key K
K2
D
X
K3
C
K3
E
K2
K1
E
Y
34
ICDCN06, IIT Guwahati
17
D
35
Key Distribution
Two parties A and B trying to communicate.
A key could be selected by A and physically
delivered to B.
A third party could select the key and physically
deliver it to both A and B.
If A and B have previously used a key, one party
could transmit the new key to the other, encrypted
using the old key.
If A and B each have an encrypted connection to a
third party C, C could deliver a key on the
encrypted links to A and B.
36
ICDCN06, IIT Guwahati
18
Permanent key:
Used between entities for the purpose of
distributing session keys.
37
ICDCN06, IIT Guwahati
38
ICDCN06, IIT Guwahati
19
Basic Concept
39
ICDCN06, IIT Guwahati
Plaintext
P
Encryption
Algorithm
Ciphertext C
Decryption
Algorithm
Plaintext
P
40
ICDCN06, IIT Guwahati
20
Encryption
Algorithm
Plaintext
P
Ciphertext C
Decryption
Algorithm
Plaintext
P
41
ICDCN06, IIT Guwahati
Applications
Three categories:
a) Encryption/decryption:
c) Key exchange:
42
ICDCN06, IIT Guwahati
21
Requirements
Computationally easy for a party B to
generate a key pair
Public key KUB
Private key KRB
43
ICDCN06, IIT Guwahati
44
ICDCN06, IIT Guwahati
22
45
ICDCN06, IIT Guwahati
Select p,q
Calculate n = p x q
Calculate
Select integer e
Calculate d
Public Key
Private key
Key Generation
p and q both prime
(n) = ( p 1)(q 1)
23
Plaintext:
M<n
Ciphertext:
C = Me (mod n)
47
ICDCN06, IIT Guwahati
Ciphertext:
Plaintext:
M = Cd (mod n)
48
ICDCN06, IIT Guwahati
24
Example
Example (contd.)
50
ICDCN06, IIT Guwahati
25
52
ICDCN06, IIT Guwahati
26
53
ICDCN06, IIT Guwahati
Authentication Application::
KERBEROS
Users wish to access services on servers.
Three threats exist:
User pretend to be another user.
User alter the network address of a computer.
User eavesdrop on exchanges and use a replay
attack.
54
ICDCN06, IIT Guwahati
27
55
ICDCN06, IIT Guwahati
56
ICDCN06, IIT Guwahati
28
57
ICDCN06, IIT Guwahati
Algorithm Used
Digital Signature
DSS/SHA or
RSA/SHA
CAST or IDEA or 3key Triple DES with
Diffie-Hellman or RSA
Message
Encryption
Compression
ZIP
Email
Compatibility
Radix-64 Conversion
58
ICDCN06, IIT Guwahati
29
60
ICDCN06, IIT Guwahati
30
HTTP
LDAP
POP3
SSL
TCP/IP
Application
Layer
Network
Layer
61
ICDCN06, IIT Guwahati
62
ICDCN06, IIT Guwahati
31
SSL Architecture
SSL consists of two layers of protocols:
SSL Record Protocol
Ensures data security and integrity.
63
ICDCN06, IIT Guwahati
SSL
SSL
SSL
Application
Handshake ChangeCipherSpec
Alert
Protocol
Protocol
Protocol
Protocol (HTTP, etc.)
SSL Record Protocol
TCP
IP
64
ICDCN06, IIT Guwahati
32
65
ICDCN06, IIT Guwahati
Application Data
Fragments
Compressed data
MAC
Add MAC
Encrypt data
TCP packet
H: SSL record
header
66
33
67
ICDCN06, IIT Guwahati
68
ICDCN06, IIT Guwahati
34
69
ICDCN06, IIT Guwahati
SSL version
Random (used to protect key exchange)
Session ID
CipherSuite
SSL version
Random (a different number is generated)
Session ID
CipherSuite
70
ICDCN06, IIT Guwahati
35
71
ICDCN06, IIT Guwahati
72
ICDCN06, IIT Guwahati
36
73
ICDCN06, IIT Guwahati
74
ICDCN06, IIT Guwahati
37
IP Security (IPSec)
Security built into the IP layer.
Provides host-to-host (or firewall-to-firewall)
encryption and authentication.
Required for IPv6, but optional for IPv4.
75
ICDCN06, IIT Guwahati
IPSec
Provides two modes of protection
Tunnel Mode
Transport Mode
76
ICDCN06, IIT Guwahati
38
77
ICDCN06, IIT Guwahati
78
ICDCN06, IIT Guwahati
39
Confidentiality
Encrypts data to protect against eavesdropping.
Can hide data source when encryption is used
over a tunnel.
Replay Prevention
Causes transmitted packets to be dropped.
79
ICDCN06, IIT Guwahati
80
ICDCN06, IIT Guwahati
40
81
ICDCN06, IIT Guwahati
Some Features:
Provides a variety of security mechanisms to HTTP
clients and servers.
Does not require client-side public certificates (or
public keys), as it supports symmetric key-only
operation modes.
Provides full flexibility of cryptographic algorithms.
41
83
ICDCN06, IIT Guwahati
84
ICDCN06, IIT Guwahati
42
Ethical Hacking .
Definition of ethical hacking
A situation where a computer and network expert
attacks a security system on behalf of its owners,
seeking vulnerabilities that a malicious hacker
could exploit.
To test a security system, ethical hacking uses
the same methods as their less principled
counterparts (hackers), but report problems
instead of taking advantage of them.
Why is it Required?
There are several reasons why organizations
choose to perform a penetration test.
To identify the threats facing the information
assets of the organization.
Reduce the IT security costs by identifying and
resolving vulnerabilities and weaknesses.
Provide the organization with information
assurance.
Gain and maintain certification to an industry
regulation (BS7789, HIPAA, etc.).
86
ICDCN06, IIT Guwahati
43
Types of Tests
1. External Penetration Testing
This is the traditional approach.
The testing is focused on servers, infrastructure,
and the underlying software (OS, database, etc.).
Two broad approaches:
87
ICDCN06, IIT Guwahati
88
ICDCN06, IIT Guwahati
44
89
ICDCN06, IIT Guwahati
45
91
ICDCN06, IIT Guwahati
Network surveying
Port scanning
System identification
Services identification
Router testing
Firewall testing
Intrusion detection system testing
Trusted systems testing
Password cracking
Denial of service testing
92
ICDCN06, IIT Guwahati
46
Wireless Security
93
ICDCN06, IIT Guwahati
94
ICDCN06, IIT Guwahati
47
95
ICDCN06, IIT Guwahati
96
ICDCN06, IIT Guwahati
48
97
ICDCN06, IIT Guwahati
98
ICDCN06, IIT Guwahati
49
99
ICDCN06, IIT Guwahati
100
ICDCN06, IIT Guwahati
50
References
1.
2.
3.
4.
5.
6.
7.
The Internet
101
102
ICDCN06, IIT Guwahati
51