310 likes | 497 Views
Securing TCP/IP. Chapter 11. Four Security Methods. Encryption: Transforming information (plaintext, cleartext) using a cipher/algorithm and a key into ciphertext (meaningless, unreadable data) Example: Plaintext: 01001101 = M Key: 01010101 Cipher/algorithm: OR
E N D
Securing TCP/IP Chapter 11
Four Security Methods • Encryption: • Transforming information (plaintext, cleartext) • using a cipher/algorithm and a key • into ciphertext (meaningless, unreadable data) • Example: • Plaintext: 01001101 = M • Key: 01010101 • Cipher/algorithm: OR • Ciphertext: 01011101 ≠ M
Four Security Methods • Encryption: • Symmetric key algorithm: • One key for both encryption and decryption • The sender generates the key • The sender uses the key to encrypt the message • The sender sends the encrypted message • The sender sends the key • The receiver uses the key to decrypt the encrypted message • Disadvantage: While the key is being sent to the receiver, somebody might intercept it and use it to decrypt the encrypted message
Four Security Methods • Encryption: • Symmetric key algorithm: • One key for both encryption and decryption
Four Security Methods • Encryption: • Symmetric key algorithm: • Block ciphers: • Encrypting a single chunk of data at a time • Used when data come in discrete chunks (e.g., frame) • The key is generated for each block/chunk • Examples: DES, 3DES, IDEA, Blowfish, AES (popular) • Stream ciphers: • Encrypting a single bit of data at a time • Used when data come in long stream • The key is generated for each bit • Examples: RC4
Four Security Methods • Encryption: • Asymmetric key algorithm: • A key for encryption and another (different) key for decryption • Public key encryption: • The receiver generates both keys • The receiver sends the encryption key to the sender (public key) • The sender uses the key to encrypt the message • The sender sends the encrypted message • The receiver uses the decryption key (private key) to the sender • Advantage: Eliminate the possibility for interception
Four Security Methods • Encryption: • Asymmetric key algorithm:
Four Security Methods • Nonrepudiation • The process guaranteeing that the data came from the source you think it should have come • Cryptographic hash function: • A complex mathematical function that you run on the data to generate a value (message digest, hash sum) • One way function • Example: MD5 (Message Digest algorithm v. 5)
Four Security Methods • Nonrepudiation • The process guaranteeing that the data came from the source you think it should have come • Digital signature: • Only the “true” sender has the private key, while the receiver has the public key • The sender runs the cryptographic hash function on the data, encrypts the hash value by using its private key, and sends the data and the encrypted hash value (digital signature) • The receiver receives the data, and runs the same cryptographic hash function to the data to get the hash value (H-1) • The receiver also receives the encrypted hash value, decrypts it by using its public key to get the hash value (H-2) • The receiver compares H-1 and H-2. If they are the same, it means that the data came from the true sender • http://www.youdzone.com/signature.html
Four Security Methods • Nonrepudiation • The process guaranteeing that the data came from the source you think it should have come (not from someone pretending to be someone you think) • Certificate: • A digital document • Binding a public key • To an identity of the sender of the public key • Whose truthfulness is guaranteed by the issuing Certification Authority (CA) • PKI: A set of CAs creating and distributing certificates
Certificate The identity of the sender of the public key CA = The guarantor The public key
Four Security Methods • Authentication: • Verifying that whoever accesses the data is the person you want accessing that data • A request to enter a username and password • Authorization: • Defining what a person accessing the data can do with that data • Assigning permissions to a user account
Authentication-Authorization Authorization Authentication
TCP/IP Security Standards • Authentication Standards • PAP • The username and password are sent in plaintext • CHAP and MS-CHAP • The username and the hash value of the password is sent • RADIUS (default protocol for MS) and TACACS+ (Cisco) • Allowing a single server to become responsible for all remote access authentication, authorization, and accounting services (see the definitions on page 295) • Kerberos • Cross platform authentication protocol (enabling multiple brands of servers to authenticate multiple brands of clients)
TCP/IP Security Standards • Authentication Standards • EAP • Helping two devices negotiate the type of authentication options • EAP-PSK • EAP-TLS • EAP-TTLS • EAP-MS-CHAPv2 • EAP-MD5 • LEAP • Used in the wired and wireless network
TCP/IP Security Standards • Authentication Standards • 802.1X • Combined with the EAP versions to make a complete authentication solution widely used for wireless network
TCP/IP Security Standards • Encryption Standards • SSH • Secure replacement for Telnet • Ability to act as a tunnel for any TCI/IP application • Tunneling • Encrypted link between two programs in two separate computers • SSH tunnel: • A link between SSH client and SSH server • Once established, anything exchanged between SSH client and SSH server is encrypted
TCP/IP Security Standards • Combined Authentication and Encryption Standards • SSL/TLS • Used by Web server with a certificate (Web server authentication) • Once the Web client confirms the certificate, anything exchanged between client and server is encrypted by using a faster symmetric algorithm • TLS: an updated version of SSL
SSL Encrypted data exchange
TCP/IP Security Standards • Combined Authentication and Encryption Standards • IPSec • An encryption protocol working at the Network layer (the rest work at the Presentation layer) • Also doing authentication • Used in IPv6 • Creating a secure tunnel between two computers
TCP/IP Security Standards • Secure TCP/IP Applications • HTTPS • Secured HTTP • Using SSL/TLS • SCP • Secured FTP • Using SSH • Inability to resume interrupted transfers, directory listings, remote file removal • SFTP • Secured FTP/SSH FTP • Ability to resume interrupted transfers, directory listings, remote file removal
TCP/IP Security Standards • Secure TCP/IP Applications • SNMP • Network management tool • UDP based protocol • Consists of SNMP manager and agents • Querying the state (e.g., CPU usage, network utilization, other network information) from SNMP-capable devices
TCP/IP Security Standards • Secure TCP/IP Applications • NTP • Providing the mechanisms to synchronize time and coordinate time distribution in a large, diverse network