network security. contents security requirements and attacks confidentiality with conventional...

40
Network Security

Upload: martina-king

Post on 22-Dec-2015

235 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Network Security

Page 2: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Contents

• Security Requirements and Attacks

• Confidentiality with Conventional Encryption

• Message Authentication and Hash Functions

• Public-Key Encryption and Digital Signatures

• IPv4 and IPv6 Security

Page 3: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Security Requirements

• Confidentiality

• Integrity

• Availability

Page 4: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Passive Attacks

• Release of message content (eavesdropping)– Prevented by encryption

• Traffic Analysis– Fixed by traffic padding

• Passive attacks are easier to prevent than to detect

Page 5: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Active Attacks

• Involve the modification of the data stream or creation of a false data stream

• Active Attacks are easier to detect than to prevent

Page 6: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Active Attacks (cont.)

• Masquerade

• Replay

• Modification of messages

• Denial of service

Page 7: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Conventional Encryption

Plain text

Encryption algorithm

Decryption algorithm

Plain text

Transmitted ciphertext

Shared secret key

Page 8: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Conventional Encryption Requirements

• Knowing the algorithm, the plain text and the ciphered text, it shouldn’t be feasible to determine the key.

• The key sharing must be done in a secure fashion.

Page 9: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Encryption Algorithms

• Data Encryption Standard (DES)– Plaintext: 64-bit blocks– Key: 56 bits– Has been broken in 1998 (brute force)

• Triple DES

• Advanced Encryption Standard (AES)– Plaintext: 128-bit blocks– Key: 128, 256 or 512 bits

Page 10: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Location of Encryption Devices

PSN

PSN

PSN

PSN

PSN Packet Switching Node

End-to-end encryption device

Link encryption device

Page 11: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Key Distribution

• Manual– Selected by A, physically delivered to B– Selected by C, physically delivered to A and B

• Automatic– The new key is sent encrypted with an old key– Sent through a 3-rd party with which A and B

have encrypted links

Page 12: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Message Authentication

• Authentic message means that: – it comes from the alleged source– it has not been modified

Page 13: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Message Authentication Approaches

• Authentication with conventional encryption

• Authentication without message encryption:– when confidentiality is not necessary– when encryption is unpractical

Page 14: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Message Authentication Code

• Uses a secret key to generate a small block of data

MACM = F (KAB, M)

Page 15: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

One-way Hash Function

• Message digest – a “fingerprint” of the message

• Like MAC, but without the use of a secret key

• The message digest must be authenticated

Page 16: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Secure Hash Requirements

• H can be applied to a block of any size• H produces a fixed-length output• H(x) is easy to compute• Given h, it is infeasible to compute x s.t.

H(x) = h• Given x, it is infeasible to find y s.t.

H(x) = H(y)• It is infeasible to find (x,y) such that

H(x) = H(y)

Page 17: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Secure Hash Functions

• Message Digest v5 (MD5)– 128-bit message digest– has been found to have collision weakness

• Secure Hash Algorithm (SHA-1)– 160-bit message digest

Page 18: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Public-Key Encryption

• Each user has a pair of keys:– public key– private key

• What is encrypted with one, can only be decrypted with the other

Page 19: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Encryption

Plain text Plain text

Transmitted ciphertext

Bob’s public key

Alice Bob

Bob’s private key

Page 20: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Authentication

Plain text Plain text

Transmitted ciphertext

Alice’s public key

Alice Bob

Alice’s private key

Page 21: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Digital Signature

• Like authentication, only performed on a message authenticator (SHA-1)

Page 22: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Public-Key Encryption Algorithms

• RSA (used by PGP)

• El Gamal (used by GnuPG)

Page 23: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Key Management

• Public-Key encryption can be used to distribute secret keys for conventional encryption

• Public-Key authentication:– signing authority– web of trust

Page 24: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

IPv4 and IPv6 Security

• Provides encryption/authentication at the network (IP) layer

• IPSec applications:– Virtual Private Networking– E-commerce

• Optional for IPv4, mandatory for IPv6

Page 25: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

IP Header with IPSec Information

Page 26: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Two Types of IPSec Security Protocols

Page 27: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Advantages of IPSec

Page 28: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

How an AH is Generated in IPSec

Page 29: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

AH Fields

Page 30: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

The ESP Header FormatEncapsulated Security Payload

Page 31: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Tunnel Versus Transport Mode

Page 32: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

AH Header Placement in Transport Mode

Page 33: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

AH Header Placement in Tunnel Mode

Page 34: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

ESP Header Placement in Transport Mode

Page 35: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

ESP Header Placement in Tunnel Mode

Page 36: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Security Association

• One-way relationship between two hosts, providing security services for the payload

• Uniquely identified by:– Security Parameter Index (SPI)– IP destination address– Security Protocol Identifier (AH/ESP)

Page 37: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

SA Security Parameters

Page 38: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

IPSec Process Negotiation

Page 39: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

Key Management

• Manual– used for small networks– easier to configure

• Automated– more scalable– more difficult to setup– ISAKMP/Oakley

Page 40: Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key

IKE Use in an IPSec Environment