440 likes | 543 Views
Myungchul Kim mckim@icu.ac.kr. Ch 8. Security in computer networks. What is network security?. Confidentiality: only sender, intended receiver should “ understand ” message contents sender encrypts message receiver decrypts message
E N D
Myungchul Kim mckim@icu.ac.kr Ch 8. Security in computer networks
What is network security? Confidentiality: only sender, intended receiver should “understand” message contents • sender encrypts message • receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and availability: services must be accessible and available to users
There are bad guys (and girls) out there! Q: What can a “bad guy” do? A: a lot! • eavesdrop: intercept messages • actively insert messages into connection • impersonation: can fake (spoof) source address in packet (or any field in packet) • hijacking:“take over” ongoing connection by removing sender or receiver, inserting himself in place • denial of service: prevent service from being used by others (e.g., by overloading resources) more on this later ……
Principles of cryptography • The encryption technique is known – published, standardized, and available to everyone. • Symmetric key systems • Public key systems • Symmetric key cryptography • Block ciphers • PGP, SSL, IPsec
Symmetric key crypto: DES DES: Data Encryption Standard • US encryption standard [NIST 1993] • 56-bit symmetric key, 64-bit plaintext input • How secure is DES? • DES Challenge: 56-bit-key-encrypted phrase (“Strong cryptography makes the world a safer place”) decrypted (brute force) in 4 months • no known “backdoor” decryption approach • making DES more secure: • use three keys sequentially (3-DES) on each datum • use cipher-block chaining
DES operation Symmetric key crypto: DES initial permutation 16 identical “rounds” of function application, each using different 48 bits of key final permutation
AES: Advanced Encryption Standard • new (Nov. 2001) symmetric-key NIST standard, replacing DES • processes data in 128 bit blocks • 128, 192, or 256 bit keys • brute force decryption (try each key) taking 1 sec on DES, takes 149 trillion years for AES
Public key encryption • Diffie and Hellman, 1976 • For encryption, authentication, digital signature • A public key available to every one and a private key that is known only to a person
Message integrity • Cryptographic hash function • Originated from … • Not tampered with on its way to … • A cryptograhic hash function: it is computationaly infeasible to find any two different messages x and y such that H(x) = H(y). • MD5 (128-bit hash)
Digital signatures • Verifiable and nonforgeable
Public key certification • Verify that you have the actual public key fo the entity • Certification Authority: binding a public key to a particular entity • ITU X.509
A certificate contains: • Serial number (unique to issuer) • info about certificate owner, including algorithm and key value itself (not shown) • info about certificate issuer • valid dates • digital signature by issuer
End-point authentication • The process of proving one’s identity to someone else.
Securing E-mail • Confidentiality, sender authentication, message integrity, receiver authentication
Pretty Good Privacy (PGP): MD5 or SHA for message digest; CAST, triple-DES or IDEA for symmetric key encryption and RSA for the public key encryption
Securing TCP connections: SSL • Secure Sockets Layer (SSL) • Transport Layer Security (TLS)
Network-layer security: IPsec • Virtual private networks (VPNs) • Authentication Header (AH) protocol: source host authentication and data integrity • Encapsulation Security Payload (ESP) protocol: … and confidentiality • AH header: next header, security parameter index, sequence number, authentication data
The ESP protocol • Key distribution • Manual • Automated: Internet Key Exchange protocol using public-key cryptography
IEEE 802.11 security • war-driving: drive around Bay area, see what 802.11 networks available? • More than 9000 accessible from public roadways • 85% use no encryption/authentication • packet-sniffing and various attacks easy! • securing 802.11 • encryption, authentication • first attempt at 802.11 security: Wired Equivalent Privacy (WEP): a failure • current attempt: 802.11i
Securing wireless LANs • Wired equivalent privacy (WEP) • Authentication and data encryption • Symmetric shared key • No key distribution
Firewalls and Intrusion Detection Systems • The goals of firewall • All traffic from outside to inside, and vice versa, passes through the firewall • Only authorized traffic, as defined by the local security policy, will be allowed to pass. • The firewall itself is immune to penetration.
Traditional packet filters • Filtering decision • IP source or destination address • Protocol type in IP datagram field: TCP, UDP, ICMP, OSPF, … • TCP or UDP source and destination port • TCP flag bits: SYN, ACK, … • ICMP message type • Different rules for datagrams leaving and entering the network • Different rules for the different router interfaces.
stateful packet filters • Actually track TCP connections • Check connections • Application gateway • Policy decision based on application data • Disadvantages • A different application gateway for each application • Perfrance penalty • The client software must know how to contact the gateway
Intrusion detection systems • Deep packet inspection • A high-security region and a lower-security region (demilitarized zone(DMZ)) • Signature-based system: require previous knowledge of the attach to generate an accurate signature • Anomaly-based system: create a traffic profile • Example: snort