informationsecurity - polito.itnetgroup.polito.it/courses/didattica/cnts-tsr_slide/...the author...

Post on 21-May-2020

5 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

INFORMATION SECURITY

� Information security

challenges

� Cryptography

� Addressing information

security challenges

� Digital certificates

Outline

INFORMATION

SECURITY

CHALLENGES

An observer should not be

able to access information

Secrecy/Privacy

�E.g. someone intercepting

network packets

�Particularly easy with

wireless communications

Data has not been tampered

with

Integrity

� E.g. packets modified

as they travel through

network

The author is the intended

one

Authentication

� A user or system sending

data pretending to be

another one

� Sometimes it includes

integrity

The author cannot deny it

�After having performed

an operation a user states

someone else did it

on his/her behalf

�E.g. on-line contract

signing

Non Repudiation

CRYPTOGRAPHY

� Provides solutions to all

the above

� Literally: hidden writing

� Deals with techniques

and protocols

� Information represented

by a code

�Coded version does not

reveal the information

�(Secret) techniques

and parameters needed

to reveal it

Encryption

#$ˆ!@%&#ˆ

7jsdfk &*685

23*(&&*ˆ*#$J

\*#(@HKJH?

KFHDSAF><

Computer

Networks

are an

integral part

of daily life.

Usually known

Usually secret

The longer the key, the stronger

Decryption

Same as encryption key

Symmetric key cryptography

#$ˆ!@%&#ˆ

7jsdfk &*685

23*(&&*ˆ*#$J

\*#(@HKJH?

KFHDSAF><

Computer

Networks

are an

integral part

of daily life.

� Key must be shared

securely

� E.g. off-line

Shared/Secret Key

� Requires pre-existing

relation

� If key is compromised on

one party, no one can use

it any longer

Asymmetric KeyCryptography

Computer

Networks

are an

integral part

of daily life.

#$ˆ!@%&#ˆ

7jsdfk &*685

23*(&&*ˆ*#$J

\*#(@HKJH?

KFHDSAF><

Computer

Networks

are an

integral part

of daily life.RSA (2048 bit key)

� One of the two keys can

be publicly distributed

� Used for encryption

� Public key

� Only owner of paired

private key can decrypt

Public Key Cryptography

� Private key never needs

to be shared

� Easier to keep safe

� Keys are complementary

� Repository for public keys

� Associated to users

ADDRESSING INFORMATION SECURITY

CHALLENGES

Secrecy/Privacy

A B#$ˆ!@%&#ˆ7jsdfk &*68523*(&&*ˆ*#$J\*#(@HKJH?KFHDSAF><

B’s public key

B’s private key

Key repo

Computer

Networks

are an

integral part

of daily life.

� Asymmetric (d)encryption

requires more computation

power

Symmetric and Asymmetric

Cryptography

� Used for secure sharing

of secret key

� Shared secret to encrypt

data

� Periodically changed

Authentication

A’s private key

A’s public key

Key repo

A B#$ˆ!@%&#ˆ7jsdfk &*68523*(&&*ˆ*#$J\*#(@HKJH?KFHDSAF><

Computer

Networks

are an

integral part

of daily life.

Digital Signature (Integrity+Authentication)

A’s private key

Messagedigest

AComputer

Networks

are an

integral part

of daily life.

Computer

Networks

are an

integral part

of daily life.

Signeddocument

A’s public key

B

Computer

Networks

are an

integral part

of daily life.

Key Key repo

Cryptographic Digest (Hash)

Electronicsignature

A

Computer

Networks

are an

integral part

of daily life.

A’s private key

MD5 (128 bit digest)

SHA (160 bit digest)

� An authentication problem

� Signature can solve it

What if the signer’s

public key is not the

signer’s

A.k.a. public-key certificates

DIGITAL CERTIFICATES

A key with a tag, both

signed

What is it?

A

But who is going

to sign it?

� CA needs to verify owner’s

identity before signing

�E.g. show up in person

with a piece of ID

� Can be used to enforce

non repudiation

Certification Authority

� Impractical to have

� One CA

� Multiple independent CAs

PKI: Public Key Infrastructure

Certification Authority

Hierarchy

Certificate Verification

MB

PdT

PdT

ePKI

ePKI

ePKI

Root CA

Obtained with own cert

� CA verifies owner’s legal

identity

�Possibly through

Registration Authority

� CA generates key pair

� CA assembles and signs cert

Certificate Issuance

� Cert. published in

repository

� Contains public key

� Owner is given private key

� Owner is given root CA cert

� Unfortunately not

� Several Root CAs

Does the whole World

trust one Root CA?

How do we get their certs?

Embedded in operating

systems/browsers

We all trust software

vendors!?!

(maybe just because we don’t

know it)

top related