Chapter 13 - Security
Chapter 13 - Security
Alice Bob
data, control
channel
messages
Trudy
8: Network Security 8-3
Who might Bob, Alice be?
… well, real-life Bobs and Alices!
Web browser/server for electronic
transactions (e.g., on-line purchases)
on-line banking client/server
DNS servers
routers exchanging routing table updates
other examples?
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
KA-B KA-B
- Bob’s private
K
B key
Requirements:
+ . .
1 need K B( ) and K - ( ) such that
B
- +
K (K (m)) = m
B B
given public key K , it should +be impossible to
2 compute private key K B
-
B
- + + -
K (K (m)) = m = K (K (m))
B B B B
“I am Alice”
Failure scenario??
in a network,
Bob can not “see”
Alice, so Trudy simply
“I am Alice” declares
herself to be Alice
Alice’s
IP address
“I am Alice”
Failure scenario??
Alice’s Alice’s
“I’m Alice”
IP addr password
Alice’s Alice’s
“I’m Alice”
IP addr password
playback attack: Trudy
Alice’s records Alice’s packet
OK
IP addr and later
plays it back to Bob
Alice’s Alice’s
“I’m Alice”
IP addr password
Alice’s encrypted
“I’m Alice”
IP addr password
Alice’s encrypted
IP addr password
“I’m Alice” record
and
Alice’s
OK playback
IP addr
still works!
Alice’s encrypted
“I’m Alice”
IP addr password
R
KA-B(R) Alice is live, and
only Alice knows
key to encrypt
nonce, so it must
Failures, drawbacks? be Alice!
8: Network Security 8-21
Authentication: ap5.0
ap4.0 requires shared symmetric key
can we authenticate using public key techniques?
ap5.0: use nonce, public key cryptography
“I am Alice”
Bob computes
R + -
- KA(KA (R)) = R
K A (R) and knows only Alice
“send me your public key”
could have the private
+ key, that encrypted R
KA such that
+ -
K (K (R)) = R
A A
I am Alice I am Alice
R -
K (R)
T
R - Send me your public key
K (R) +
A K
T
Send me your public key
+
K
A +
K (m)
Trudy gets T
- +
+ m = K (K (m))
K (m)
A sends T T Alice
m to
- + encrypted with
m = K (K (m))
A A Alice’s public key
8: Network Security 8-23
ap5.0: security hole
Man (woman) in the middle attack: Trudy poses as
Alice (to Bob) and as Bob (to Alice)
Difficult to detect:
Bob receives everything that Alice sends, and vice
versa. (e.g., so Bob, Alice can meet one week later and
recall conversation)
problem is that Trudy receives all messages as well!
Non-repudiation:
Alice can take m, and signature KB(m) to court and prove
that Bob signed m. -
equal
?
8: Network Security 8-29
Hash Function Algorithms
MD5 hash function widely used (RFC 1321)
computes 128-bit message digest in 4-step
process.
arbitrary 128-bit string x, appears difficult to
construct msg m whose MD5 hash is equal to x.
SHA-1 is also used.
US standard [NIST, FIPS PUB 180-1]
160-bit message digest
KA-KDC KP-KDC
KX-KDC
KP-KDC KB-KDC
KY-KDC
KZ-KDC
KA-KDC KB-KDC
Bob’s digital
+
public +
signature KB
key KB (encrypt)
CA
certificate for
K-
Bob’s private
identifying key CA Bob’s public key,
information signed by CA
8: Network Security 8-33
Certification Authorities
When Alice wants Bob’s public key:
gets Bob’s certificate (Bob or elsewhere).
apply CA’s public key to Bob’s certificate, get
Bob’s public key
+ digital Bob’s
KB signature public
+
(decrypt) K B key
CA
public +
K CA
key
Client Server
Open secure socket
•Verify CA trusted
•Extract Server Pub Key
•Generate symmetric Session Key
•Encrypt Session Key with Server Pub Key
Encrypted Session Key
•Extract Session Key
(using Private Key)
administered public
network Internet
firewall
on IP/TCP/UDP fields.
Example: allow select
internal users to telnet
outside.
Countermeasures?
A C
A C
A C
B
Countermeasures?
8: Network Security 8-56
Internet security threats
IP Spoofing: ingress filtering
routers should not forward outgoing packets with invalid source
addresses (e.g., datagram source address not in router’s network)
great, but ingress filtering can not be mandated for all networks
A C
A C
SYN
SYN
SYN SYN SYN
B
SYN
Countermeasures? SYN
8: Network Security 8-58
Internet security threats
Denial of service (DOS): countermeasures
filter out flooded packets (e.g., SYN) before reaching host:
throw out good with bad
traceback to source of floods (most likely an innocent,
compromised machine)
A C
SYN
SYN
SYN SYN SYN
B
SYN
SYN
8: Network Security 8-59