Secure Communications: Remote Branch
Secure Communications: Remote Branch
CSA
MARS
Firewall
VPN
IPS
CSA
Vigenère table
2
F...K...T...T...A...W.
.L.N.E.S.A.T.A.K.T.A.N Use a rail fence cipher and a
..A...A...T...C...D... key of 3.
3
FKTTAW The clear text message would
LNESATAKTAN
AATCD appear as follows.
Ciphered Text
Substitution Ciphers
Caesar Cipher
1
FLANK EAST The clear text message would be
ATTACK AT DAWN encoded using a key of 3.
Clear text
3
IODQN HDVW The clear text message would be
DWWDFN DW GDZQ encrypted as follows using a key of
3.
Cipherered text
Cipher Wheel
1
FLANK EAST The clear text message would be
ATTACK AT DAWN encoded using a key of 3.
Clear text
2
Shifting the inner wheel by 3, then the
A becomes D, B becomes E, and so
on.
3
IODQN HDVW The clear text message would appear
DWWDFN DW GDZQ as follows using a key of 3.
Cipherered text
Vigenѐre Table
a b c d e f g h i j k l m n o p q r s t u v w x y z
A a b c d e f g h i j k l m n o p q r s t u v w x y z
B b c d e f g h i j k l m n o p q r s t u v w x y z a
C c d e f g h i j k l m n o p q r s t u v w x y z a b
D d e f g h i j k l m n o p q r s t u v w x y z a b c
E e f g h i j k l m n o p q r s t u v w x y z a b c d
F f g h i j k l m n o p q r s t u v w x y z a b c d e
G g h i j k l m n o p q r s t u v w x y z a b c d e f
H h i j k l m n o p q r s t u v w x y z a b c d e f g
I i j k l m n o p q r s t u v w x y z a b c d e f g h
J j k l m n o p q r s t u v w x y z a b c d e f g h i
K k l m n o p q r s t u v w x y z a b c d e f g h i j
L l m n o p q r s t u v w x y z a b c d e f g h i j k
M m n o p q r s t u v w x y z a b c d e f g h i j k l
N n o p q r s t u v w x y z a b c d e f g h i j k l m
O o p q r s t u v w x y z a b c d e f g h i j k l m n
P p q r s t u v w x y z a b c d e f g h i j k l m n o
Q q r s t u v w x y z a b c d e f g h i j k l m n o p
R r s t u v w x y z a b c d e f g h i j k l m n o p q
S s t u v w x y z a b c d e f g h i j k l m n o p q r
T t u v w x y z a b c d e f g h i j k l m n o p q r s
U u v w x y z a b c d e f g h i j k l m n o p q r s t
V v w x y z a b c d e f g h i j k l m n o p q r s t u
W w x y z a b c d e f g h i j k l m n o p q r s t u v
X x y z a b c d e f g h i j k l m n o p q r s t u v w
Y y z a b c d e f g h i j k l m n o p q r s t u v w x
Z z a b c d e f g h i j k l m n o p q r s t u v w x y
Stream Ciphers
• Invented by the Norwegian Army Signal
Corps in 1950, the ETCRRM machine uses
the Vernam stream cipher method.
• It was used by the US and Russian
governments to exchange information.
• Plain text message is eXclusively OR'ed with
a key tape containing a random stream of
data of the same length to generate the
ciphertext.
• Once a message was enciphered the key
tape was destroyed.
• At the receiving end, the process was
reversed using an identical key tape to
decode the message.
Defining Cryptanalysis
Cryptanalysis is from the Greek words kryptós (hidden), and analýein (to
loosen or to untie). It is the practice and the study of determining the
meaning of encrypted information (cracking the code), without access to
the shared secret key.
Cryptanalysis Methods
Brute Force Attack
Known Ciphertext
Successfully
Unencrypted
Key found
With a Brute Force attack, the attacker has some portion of ciphertext.
The attacker attempts to unencrypt the ciphertext with all possible keys.
Meet-in-the-Middle Attack
Known Ciphertext Known Plaintext
Use every possible decryption Use every possible
key until a result is found encryption key until a result
matching the corresponding is found matching the
plaintext. corresponding ciphertext.
MATCH of
Ciphertext!
Key found
DES
HMAC-MD5 3DES
MD5
HMAC-SHA-1 AES
SHA
RSA and DSA SEAL
RC (RC2, RC4, RC5, and RC6)
Fixed-Length
e883aa0b24c09f
Hash Value
Hashing Properties
Arbitrary
length text
X
Why is x not in
Parens?
h = H (x)
Hash
Function (H)
Why is H in
Parens?
Hash h e883aa0b24c09f
Value
Hashing in Action
• Vulnerable to man-in-the-middle attacks
– Hashing does not provide security to transmission.
• Well-known hash functions
– MD5 with 128-bit hashes I would like to
cash this check.
– SHA-1 with 160-bit hashes
Internet
Match = No changes
No match = Alterations
MD5
• MD5 is a ubiquitous hashing
algorithm
• Hashing properties
– One-way function—easy to compute
hash and infeasible to compute data
given a hash
MD5
– Complex sequence of simple binary
operations (XORs, rotations, etc.)
which finally produces a 128-bit
hash.
SHA
• SHA is similar in design to the MD4 and MD5
family of hash functions
– Takes an input message of no more than 264 bits
– Produces a 160-bit message digest
• The algorithm is slightly slower than MD5. SHA
• SHA-1 is a revision that corrected an
unpublished flaw in the original SHA.
• SHA-224, SHA-256, SHA-384, and SHA-512 are
newer and more secure versions of SHA and are
collectively known as SHA-2.
Hashing Example
HMAC HMAC
(Authenticated 4ehIDx67NMop9 (Authenticated 4ehIDx67NMop9
Fingerprint) Fingerprint)
Pay to Terry Smith $100.00 If the generated HMAC matches the sent
One Hundred and xx/100 Dollars HMAC, then integrity and authenticity
have been verified.
4ehIDx67NMop9 If they don’t match, discard the
message.
Using Hashing
Data Integrity Data Authenticity
e883aa0b24c09f
Fixed-Length Hash
Value
Entity Authentication
Encrypt $!@#IQ
Decrypt
$1000 $1000
Encrypt %3f7&4
Decrypt
$1000 $1000
Designed at IBM during the 1970s and was the NIST standard until 1997.
Although considered outdated, DES remains widely in use.
DES 56
Designed to be implemented only in hardware, and is therefore extremely
slow in software.
Based on using DES three times which means that the input data is
3DES 112 and 168 encrypted three times and therefore considered much stronger than DES.
However, it is rather slow compared to some new block ciphers such as AES.
Fast in both software and hardware, is relatively easy to implement, and
AES 128, 192, and 256 requires little memory.
As a new encryption standard, it is currently being deployed on a large scale.
RC2 (40 and 64) A set of symmetric-key encryption algorithms invented by Ron Rivest.
RC4 (1 to 256) RC1 was never published and RC3 was broken before ever being used.
The RC series RC5 (0 to 2040) RC4 is the world's most widely used stream cipher.
RC6 (128, 192, RC6, a 128-bit block cipher based heavily on RC5, was an AES finalist
and 256) developed in 1997.
Symmetric Encryption Techniques
Encr
y
Mes pted
blank blank 1100101 s ag e
01010010110010101 01010010110010101
Encr
y
Mes pted
s ag e
0101010010101010100001001001001 0101010010101010100001001001001
Speed Medium
Resource
Medium
Consumption
3DES Scorecard
Description Triple Data Encryption Standard
Speed Low
Time to crack
(Assuming a computer could try 4.6 Billion years with current technology
255 keys per second)
Resource
Medium
Consumption
Encryption Steps
The clear text from Alice is
encrypted using Key 1. That
ciphertext is decrypted using a
1 different key, Key 2. Finally
that ciphertext is encrypted
using another key, Key 3.
Speed High
Time to crack
(Assuming a computer could try 149 Trillion years
255 keys per second)
Resource
Low
Consumption
Advantages of AES
An attempt at
deciphering the text
using a lowercase, and
incorrect key
Asymmetric Key Characteristics
Encryption Decryption
Key Key
Plain Encryption Encrypted Decryption Plain
text text text
Alice’s Public
Encryption
Alice transmits the 4 Key
Algorithm
encrypted message Encrypted
2 Text
to Bob
Encrypted
Computer Text
3 Computer
Encryption
Algorithm
A B
Alice’s Public Can I get your Public Key please?
Key Here is my Public Key
CSA
VPN
Internet Firewall
SOHO with a Cisco
DSL Router Corporate Network
VPN
WAN
VPN
IPSec
Internet
SOHO with a Cisco DSL
Router
CSA
MARS
VPN
SOHO with a Cisco Internet Firewall
DSL Router
Site-to-Site VPN
IPS
VPNs WAN
VPN
Iron Port CSA
Regional branch with CSA CSA CSACSA
a VPN enabled CSA
Cisco ISR router
Web Email
Server Server DNS
Site-to-Site VPN
Business Partner
with a Cisco Router
Hosts send and receive normal
TCP/IP traffic through a VPN gateway
CSA
MARS
VP
N
SOHO with a Internet Firewall
Site-to-Site VPN
IP
VPNs WAN S
VPN
Iron Port CSA
MARS
Internet Firewall
VPN
IPS
R1 R1-vpn-cluster.span.com
“R1”
Cisco PIX 500 Series Security Appliances Secondary role Primary role
Cisco VPN
Primary role Secondary role
3000 Series Concentrators