1.12k likes | 1.17k Views
Network and System Security. Introduction. Information Security. Computer security Protect system resources Protect data (dynamic/stored) Network security Protect network resources Protect exchanged data Security = confidentiality + integrity + availability + authenticity. Attacks.
E N D
Network and System Security Introduction CSE 5349/7349
Information Security • Computer security • Protect system resources • Protect data (dynamic/stored) • Network security • Protect network resources • Protect exchanged data Security = confidentiality + integrity + availability + authenticity CSE 5349/7349
Attacks • Passive attacks • Affects data confidentiality • More difficult to detect, less harmful • Active attacks • Affects data confidentiality, integrity, and/or availability • Easier detection, more harmful CSE 5349/7349
Attacks (cont’d) • Interruption • Interception • Modification • Fabrication CSE 5349/7349
Interruption • An asset of the system is destroyed of becomes unavailable or unusable • Attack on availability • Destruction of hardware • Cutting of a communication line • Disabling the file management system CSE 5349/7349
Interception • An unauthorized party gains access to an asset • Attack on confidentiality • Wiretapping to capture data in a network • Illicit copying of files or programs CSE 5349/7349
Modification • An unauthorized party not only gains access but tampers with an asset • Attack on integrity • Change values in a data file • Alter a program to make it perform differently • Modify content of messages transmitted on a network CSE 5349/7349
Fabrication • Unauthorized party inserts counterfeit objects into the system • Attack on authenticity • Insertion of spurious messages in a network • Addition of records to a file CSE 5349/7349
Network Security Services • Authentication • validate authenticity claims (identity/data) • Authorization • Enforce selective access (information/resources) • Confidentiality • Prevent disclosure of data (entire message/selected fields/traffic characteristics) • Integrity • Prevent tampering of data (entire message/selected fields) • Non-repudiation • Proof of origin, proof of delivery CIA CSE 5349/7349
Security Mechanisms • Specific mechanisms • Access control list - resource protection • Encryption – data confidentiality • Digital signature – origin verification, non-repudiation • Notarization – trusted third party assurance • Traffic padding – traffic characteristic confidentiality • Routing control – flow protection CSE 5349/7349
Mechanisms (cont’d) • Pervasive mechanisms • Event detection • Security audit trail • Security recovery CSE 5349/7349
Password Security CSE 5349/7349
System Security • Two issues • Attack by unauthorized users • Attack by authorized users • Solution • Unauthorized – authenticate • Authorized – access control CSE 5349/7349
Authentication • Usual User ID + passwd • ID public, passwd private • When to authenticate • Beginning of session • Periodically within session • After a pause • Beginning of sensitive operation CSE 5349/7349
Selection of Passwd • Psychological issues • Disclosing passwd – social engineering • Difficulty in entering • Difficulty in remembering • System issues • Targeted and general attacks • Multi-lateral security • User training CSE 5349/7349
Attacks on Passwd • Attack on passwd entry • Interface design • Eavesdropping • Trusted path (ex. Ctrl-Alt-Del) • Passwd retry counters • Timing attack • Attack on smart cards • Attack on passwd storage • Audit trail • Need for one-way encryption CSE 5349/7349
Passwd Cracking • Brute force attack • Use all combination of characters • Knowledge of victim • Names, license plate numbers… • Dictionary attack CSE 5349/7349
Defense • Use different passwds for users/systems • No default passwds • Against brute force • Longer passwds • More than letters and numbers • Case sensitive • Against dictionary • No words • No “obvious” passwds CSE 5349/7349
System Defenses • Run passwd filters to weed out weak ones • Generate random passwds for users • Enforce passwd life-time • Limit failed logins • Notifying history to users CSE 5349/7349
Salting the Passwd • What happens if two users choose the same passwd? • Will result in same hash • Add some random information (salt)to the passwd before hashing • Makes it harder to crack CSE 5349/7349
Access Control CSE 5349/7349
Authentication vs. Access Control • Authentication about who you are • Access control – who may do what to what? • Major portion of security breaches organized by authorized users CSE 5349/7349
Control Structures • Formalism • Subjects, Objects, Access permissions • Access control matrix • Example CSE 5349/7349
Capabilities and Access Control Lists (ACL) • For large systems • Large number of subjects and objects • Control matrix very large and sparse • Store the matrix rows and columns as linked lists • Rows – capabilities • Columns - ACLs CSE 5349/7349
Capabilities • What subject A is allowed to do • Whenever a new object is created, other subjects may be given the capabilities to access it CSE 5349/7349
Intermediate Solutions • Group permissions • Negative permissions • Protection rings • Permission trees CSE 5349/7349
Group Permissions • Place number of users in a named group • ACLs for groups CSE 5349/7349
Negative Permission • To exclude specific permission from the group grant CSE 5349/7349
Protection Rings • Assigning priority levels to objects and subjects • 0 kernel • 1 OS • 2 system utilities • 3 other programs • Access decisions based on comparing the levels of Ss and Os. CSE 5349/7349
Hardware Protection • Protection problem • Preventing one processor from interfering with another • Confinement problem • Preventing programs communicate outside the authorized channels • Memory management • Reference monitor CSE 5349/7349
Security Processors • Pentium 3 processor serial number • ARM (Acorn Risc Machine) • Smart cards • Protection of protection hardware • Tamper resistance CSE 5349/7349
Attack (cont’d) • Smashing the stack • Finger bug in UNIX • Does not check the length of the input string • Trailing edge could be used to overwrite the system stack • Want to be a root user? CSE 5349/7349
Cryptography CSE 5349/7349
Terminology • Cryptography • Cryptanalysis • Cryptology • Plain text • Cipher text CSE 5349/7349
Historical Background • Mono-alphabetic substitution • Caesar cipher • Stream ciphers C= P + K mod 26 • One-time pad • Perfect secrecy (Shannon’s theorem) • No integrity • Block codes • Playfair • One-way functions CSE 5349/7349
Formal Classifications • Type of operation • Substitution • Transposition • Number of keys used • Symmetric (one key, private) • Asymmetric (two keys, public) • Mode of plain text processing • Block vs. stream CSE 5349/7349
Cryptanalysis • Attacks • Known plain text attack • Chosen plain text • Chosen cipher text • Security • Unconditionally secure • Computationally secure CSE 5349/7349
Block Ciphers • Block of plain text converted into block of cipher of equal length • Based on Fiestal block structure • Unique transformation • Reversible • Example • Small blocks vulnerable to attacks • Large blocks impractical to implement CSE 5349/7349
Fiestal Cipher (FC) • Based on product ciphers • Alternate substitutions and permutations • Shannon’s proposal • Diffusion • Dissipate plain text statistics into long-range cipher statistics • Example: Averaging operation on characters • A permutation on binary bits followed by some operations • Confusion • To make the deduction of the key difficult CSE 5349/7349
FC Structure • Multiple rounds • Round function (based on the round key) • Substitution (XOR) • Permutation (Exchange of halves) • Parameters • Block size (64 bits) • Key size (128 bits) • Number of rounds (16) • Sub-key generation algorithm • Round function CSE 5349/7349
Plaintext Plaintext Encrypt with Decrypt with secret key secret key Ciphertext DES CSE 5349/7349
DES • Currently the most widely used block cipher in the world • IBM’s LUCIFER was the precursor • One of the largest users of the DES is the banking industry, particularly with EFT • Although the standard is public, the design criteria used are classified CSE 5349/7349
DES Security • Recent analysis has shown that DES is well designed (diffusion & confusion) • Rapid advances in computing speed though have rendered the 56 bit key susceptible to exhaustive key search • 1997 on a large network of computers in a few months • 1998 on dedicated h/w in a few days • 1999 above combined in 22hrs! • DES also theoretically broken using Differential or Linear Cryptanalysis • In practice, unlikely to be a problem yet CSE 5349/7349
Overview of DES Encryption • Basic process consists of: • An initial permutation (IP) • 16 rounds of a complex key dependent calculation F • A final permutation, being the inverse of IP CSE 5349/7349
Initial permutation Round 1 L R i – 1 i – 1 Round 2 K F 56-bit i key … + Round 16 L R i i Final permutation • Each Round • 64-bit key (56-bits + 8-bit parity) • 16 rounds CSE 5349/7349
Initial Permutation • No improvement in security, cipher gets more complex 58, 50, 42, 34, 26, 18, 10, 2, 60, 52, 44, 36, 28, 20, 12, 4, 62, 54, 46, 38, 30, 22, 14, 6, 57, 49, 41, 33, 25, 17, 9, 1, 59, 51, 43, 35, 27, 19, 11, 3, 61, 53, 45, 37, 29, 21, 13, 5, 63, 55, 47, 39, 31, 23, 15, 7 CSE 5349/7349
DES Key Generation • Sub-keys used in each round are formed by • An initial permutation of the key (PC1) which selects 56-bits in two 28-bit halves • 16 stages consisting of: • selecting 24-bits from each half • permuting them by PC2 for use in function f, • rotating each half separately either 1 or 2 places depending on the key rotation schedule KS • Can be described functionally as: SKi = PC2(KS(PC1(Key),i)) CSE 5349/7349
Expansion Function E • Expands RH side data input from 32 to 48 bits by duplicating some bits • Specifically split input into 8 groups of 4 bits • Duplicate bits from either side to form groups of 6 bits CSE 5349/7349
Substitution (S) Boxes • 8 S-boxes, each of which maps 6 bits to 4 bits • Each S-box is actually 4 little 4 bit boxes • Outer bits 1 & 6 (row bits) select one of the 4 rows • Inner bits 2-5 (col bits) are substituted for 4 others CSE 5349/7349
DES Decryption • To decrypt a block of data must unwind all steps of data computation • With Feistel design, same as just doing encryption steps again • Except that must use subkeys in reverse order (SK16 first, then SK15 etc.) CSE 5349/7349