• Ingen resultater fundet

1. Introduction2. Cryptography3. Certificates and Key distribution4. Common threats Security

N/A
N/A
Info
Hent
Protected

Academic year: 2022

Del "1. Introduction2. Cryptography3. Certificates and Key distribution4. Common threats Security"

Copied!
53
0
0

Indlæser.... (se fuldtekst nu)

Hele teksten

(1)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security

Davide Papini

Embedded Systems Engineering DTU Informatics

1. Introduction 2. Cryptography

3. Certificates and Key distribution 4. Common threats

(2)

DTU Informatics

Department of Informatics and Mathematical Modelling

Who I am

• Ph.D. Student at DTU Informatics.

Topic: Attacker modeling in ubiquitous computing systems

• M.Sc. in Telecommunication Engineering focusing on communication networks

• Master Thesis on “Wireless Intrusion Detection Systems”

(3)

DTU Informatics

Department of Informatics and Mathematical Modelling

Purpose of this lecture

• After the lecture you should:

• Have a general idea of what security is

• Be familiar with terms such as cryptography, digital signature etc....

• Understand the importance of Certificates and key distribution

• Be able to analyze simple protocols against common threats

(4)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security

1. Introduction 2. Cryptography

3. Certificates and Key distribution 4. Common threats

(5)

DTU Informatics

Department of Informatics and Mathematical Modelling

Your idea

Spend few minutes in group of 2-3 people and try to answer this question:

What is security?

(6)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security scenario

Alice Bob

Trent

Secur e cha nnel

Opponent Trusted Party

Channel

(7)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security

Protection against interference

with the means to access the resources Protection against disclosure

to unauthorized individuals

Protection against alteration or corruption

(8)

DTU Informatics

Department of Informatics and Mathematical Modelling

Common security requirements

Privacy Security Accountability

Integrity

Confidentiality

Authentication Anonimity

Pseudonymity

Unlinkability

Non-

repudiation

(9)

DTU Informatics

Department of Informatics and Mathematical Modelling

Common threats

•Privacy:

-Personal data theft -Identity theft

-Tracking

•Security:

-Cryptoanalyst attack -Reply attack

-Man-in-the-middle attack -Type-flaw attack

-Masquerading attack

-Denial of Service (DoS) attack -Virus attack

A B

A B

O

A B

O

B O

A B

Intercept:

Eavesdropping

Reply Modify:

Man-in-the-middle

Type-flaw Forge:

Masquerading

Disrupt:

DoS

Virus

(10)

DTU Informatics

Department of Informatics and Mathematical Modelling

Means to ensure security

‣ Cryptography

‣ Certificates

‣ Firewalls, IDS ...

‣ Physical Security

‣ ...

-Confidentiality

-Integrity

-Non-repudiation

-Authentication

-Availability

-Protect from threats e.g. private keys or personal information leaks, system breakdowns etc...

(11)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security map

11

!-@46.-A/1.+!-@46.-A/1.+

"

",/..6+1-04%,/..6+1-04%

#1B+6A47-+1/#1B+6A47-+1/

$%&'()**+,),-(./.&.00%,#1/)(1)/

$%&'()**+,),-(./.&.00%,#1/)(1)/

+0&'1),2%3)12)1*) +0&'1),2%3)12)1*)

C<

C<

DD

*<D

*<D (E3*(E3*

&4.4%F-1G%H

&4.4%F-1G%H

*IJ:-04,

*IJ:-04, (1./61/.

(1./61/.

D641:@+6.

D641:@+6.

<@@,-04.-+1

<@@,-04.-+1

(K3*(K3*

C/.L+6G C/.L+6G 3414M/A/1.%H 3414M/A/1.%H

K+1.6+, K+1.6+,

<@@,-04.-+1:

<@@,-04.-+1:

'12%N:/6 '12%N:/6

<@@,-04.-+1:

<@@,-04.-+1:

OP*QOP*Q PC3*PC3* &SK*&SK* R(*R(*

SDD*SDD*

D/,1/.

D/,1/. P3D*P3D*

!+/+,4%15

!+/+,4%15 ('''%=#"9%***

('''%=#"9%***

-678%&+0,4+7)(

-678%&+0,4+7)(

DL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VV DL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VV

(*W(*W??

(*P/0 (*P/0 3+U-,/(

3+U-,/(

**

N&

N&** X+(*X+(*

X-2/+

X-2/+

RD*YRDK*

RD*YRDK*

RDP*RDP* P(*P(*

P+560/Z%3V%&

P+560/Z%3V%&80-149%"##[80-149%"##[

900,#1/)(1)/,-(./.&.08 900,#1/)(1)/,-(./.&.08

:%00,8..1,%1&0'2) :%00,8..1,%1&0'2)

$)&'(%/7

$)&'(%/7

;6),()2,.1)8,+()

;6),()2,.1)8,+()

$)&'(%/7,-(./.&.08

$)&'(%/7,-(./.&.08

&CP

&CP

QD*QD* P3D*P3D*

PY3(3' PY3(3'

*E**E*

P'DP'D

\/\/6U/6+:6U/6+:

(K3*W(K3*W??

<R*YR<R*

<R*YR<R*

(\'(\'

*<

*<**YKS<*YKS<*

OP*QOP*Q RPX*RPX*

R(*R(* ]E*]E*

(*W>(*W>

PPSPPS

PPFYDFP PPFYDFP DK*DK*

(12)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security

1. Introduction 2. Cryptography

3. Certificates and Key distribution 4. Common threats

(13)

DTU Informatics

Department of Informatics and Mathematical Modelling

Encryption

“Encryption is the transformation of data to a form where their information content is hidden”

Is the key technology for security!

m’ ∈ is the CIPHERTEXT message derived from the PLAINTEXT message m ∈ using the

ENCIPHERMENT KEY k ∈K

m ∈ℳ is the PLAINTEXT message derived from CIPHERTEXT m’ ∈ℳ using the DECIPHERMENT KEY k-1 K

Encipherment: m’=E(m,k)

Decipherment: m=D(m’,k-1)

Enc: C={P} k Dec: P={C}

k-1

(14)

DTU Informatics

Department of Informatics and Mathematical Modelling

Cryptosystems

SYMMETRIC CRYPTOSYSTEM:

A cryptosystem where knowledge of the key k ∈ K for E implies knowledge of the key k∈ K for D (or vice versa). They may even be identical!

This means they must both be kept SECRET.

Symmetric Cryptosystem = “SECRET KEY CRYPTOSYSTEM” (SKCS).

ASYMMETRIC CRYPTOSYSTEM:

A cryptosystem where knowledge of the key k ∈ K for E does not imply knowledge of the key k∈ K for D (or vice versa).

Only one of (k, k) needs to be kept SECRET.

Asymmetric Cryptosystem = “PUBLIC KEY CRYPTOSYSTEM” (PKCS).

(15)

DTU Informatics

Department of Informatics and Mathematical Modelling

How are they used

• Normally during a full communication a combination of symmetric and asymmetric cryptosystems is used. Symmetric cryptography is faster whilst Asymmetric cryptography is suitable for key management purposes.

Asymmetric cryptography is usually used for:

• Key exchange / agreement (DH, DSA)

• One way communications (S/Mime)

• Digital Signature

Symmetric cryptography is used for:

• Communication channels encryption

• “Continuos data” protection e.g. streams

• Real time communications

(16)

DTU Informatics

Department of Informatics and Mathematical Modelling

Some examples

• Symmetric Cryptosystems:

Classical cyphers: Substitution cyphers, Transposition cyphers

Modern cyphers: Digital Encryption Standard, Advanced Encryption Standard,3-DES, Blowfish, TEA, RC4...

• Asymmetric Cryptosystems:

Rivest Shamir Adleman, Digital Signature Algorithm, ElGamal encryption, Diffie-Hellman...

(17)

DTU Informatics

Department of Informatics and Mathematical Modelling

Public Key CryptoSystems

• Each principal knows the other’s PUBLIC KEY

• It must not be possible to evaluate the inverse function E-1 (E is a TRAPDOOR ONE-WAY FUNCTION)

e = E(d,PKB) d = D(e,SKB)

Alice Bob

e’ = E(d’,PKA) d’ = D(e’,SKA)

SK = Secret Key PK = Public Key

Green = known terms Red = secret terms

(18)

DTU Informatics

Department of Informatics and Mathematical Modelling

Sign and encrypt

PUBLIC and PRIVATE KEYS are complementary: it means that you can encipher with the PRIVATE KEY and decipher with the PUBLIC KEY

WHAT IS THE PURPOSE FOR THAT??

• Digital Signature:

Alice sign by enciphering with her PRIVATE KEY and then encipher the signed message with Bob PUBLIC KEY:

SignedMsg={Msg}

SKa →

{SignedMsg}

PKb

Bob then decipher the text first with his PRIVATE KEY and then with Alice’s PUBLIC KEY

(19)

DTU Informatics

Department of Informatics and Mathematical Modelling

Sign and encrypt (2)

• In this way Bob is the only one that can receive and decipher the message, and he is sure that it has been sent from Alice since it is signed!

Now are this two ways of cyphering and signing the same? What is the difference?

{{Msg}

SKa

}

PKb

{{Msg}

PKb

}

SKa

(20)

DTU Informatics

Department of Informatics and Mathematical Modelling

Why we need Digital Signature

• Digital Signature ensures NON-REPUDIATION of transmission and receipt.

• It has all the qualities that an ordinary written signature has:

• cannot be forged.

• cannot be detached from a document and attached to another one.

• Signed documents cannot be modified.

• Signer cannot deny having signed.

(21)

DTU Informatics

Department of Informatics and Mathematical Modelling

Why cryptography works!

• Cryptographic algorithms such as RSA, rely on mathematical functions that are not invertible or that needs time to be broken.

• e.g. RSA: it is based on modular algebra. The encryption function is defined as:

e = dp mod n where (p,n) are publicly known.

E-1 ~ Evaluate integer p’th root modulo n: it is not as simple as in normal mathematics because is based on factorization of LARGE (~1015) integers that is known to be a HARD problem.

(22)

DTU Informatics

Department of Informatics and Mathematical Modelling

Why brute-force does not work!

DES has a 56 bit key

It takes approximately 256/2=255≅1016 attempts to find the key if the time for each attempt is 5 ns = 5 * 10-9 s

then it takes 5 * 107 s ≅ 1 year and 7 months to get the key!!!

Nowadays algorithms are far more complex than DES and use keys ranging from 128 bits up to 1024 bits thus Brute-force is not really an option.

To give you an idea of large numbers:

Probability to die in a car accident in US 1/5600 2-12

Earth age 109 years 230 years

Universe age 1010 years 234 years

Number of earth atoms 10 51 2 170

(23)

DTU Informatics

Department of Informatics and Mathematical Modelling

Integrity

• Encryption is used to ensure confidentiality but does not prevent an attacker to remove, modify or add blocks of data.

• To check the INTEGRITY of a message some other mechanisms must take place. Solutions make use of reference numbers and timestamps so that the message is also recognized as fresh (this counter acts reply attacks).

• A checksum function is used to create a MESSAGE DIGEST (a ONE-WAY HASH FUNCTION) that is sent with the message and encrypted along with it.

The hashing function must be:

✦ strongly COLLISION RESISTANT: is computationally infeasible to find different m1, m2 such that H(m1) = H(m2)

✦ NON-INVERTIBLE: computationally infeasible from v to find m such that H(m)= v.

(24)

DTU Informatics

Department of Informatics and Mathematical Modelling

Integrity (2)

• The second property is easily achieved since message digest are usually of fixed length and the messages use number of bits larger than the message digest.

• The Hash function is designed properly so that it is complex enough to slow down and inhibit attempts to find collisions.

• MD5 is no longer considered secure and doubts has been expressed about

Digest length Basic Block length

MD5 128 512

SHA-1 160 512

SHA-256 256 512

RIPEMD-160 160 512

SHA-512 512 1024

(25)

DTU Informatics

Department of Informatics and Mathematical Modelling

Integrity (3)

• There is an alternative technique called HASH-BASED MESSAGE AUTHENTICATION CODE (HMAC)

• It uses k K as extra parameters for the hash function. k must be a shared secret between sender and receiver

HMAC(Msg,k)

(26)

DTU Informatics

Department of Informatics and Mathematical Modelling

HMAC for Digital Signature

• Usually for Digital Signature is not desirable to encrypt the whole message with the private key because if the message is long it takes time to encrypt it!

• A more effective and efficient method is to hash the message and then sign the hash.

• This method has many advantages:

- is faster

{HMAC(Msg,k)}SKA

Digital Signature

(27)

DTU Informatics

Department of Informatics and Mathematical Modelling

Cryptography: summing up

Alice

{Msg, {HMAC(Msg,MK)}

SKa

}

PKb

• Integrity is ensured through HMAC

• Confidentiality is ensured through encryption {}PKb

• Non-repudiation is ensured through signature {}SKa

Bob

Msg

(28)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security

1. Introduction 2. Cryptography

3. Certificates and Key distribution 4. Common threats

(29)

DTU Informatics

Department of Informatics and Mathematical Modelling

Authentication

• “Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true”

• In security means that each principal (in a communication) is certain of the identity of the other one.

• Requirements:

EVIDENCE: A must produce evidence of its identity. Typically done by producing or demonstrating knowledge of a secret which identifies A and which B can verify.

NON-TRANSFERABILITY: B cannot use info. received from A to impersonate A to a third party.

NO 3rd-PARTY IMPERSONATION: No third party, M, can impersonate A by executing the protocol with B.

NO LEAKAGE: Above properties must hold, regardless of how many times A and B execute the protocol.

(30)

DTU Informatics

Department of Informatics and Mathematical Modelling

Type of evidence

• WEAK AUTHENTICATION: Secret is a password or other simple identification code (PIN, . . . ).

• STRONG AUTHENTICATION: Cryptographically secure form of challenge/

response. E.g. with SKCS:

"

NA and NB are NONCES: Fresh references chosen to identify the current exchange.

#1 AB: NA

#2 BA: {(NA ,A)}KAB Unilateral:

#1 AB: NA

#2 BA: {(NB,NA,A)}KAB

#3 AB: {(NA,NB)}KAB

Mutual:

(31)

DTU Informatics

Department of Informatics and Mathematical Modelling

Authentication with SKCS

• A and B must have a shared secret (i.e. a symmetric key) in order to authenticate and initiate a secure communication

• If they don’t share a secret they must refer to a 3rd TRUSTED PARTY (an AUTHENTICATION SERVER) that enables them to share a “new” secret

• SIMPLIFIED KERBEROS SKCS PROTOCOL:

S

A B

1

2 3

4

#1 A→S: A, B

#2 S→A: {B,KAB, Ts, L,{A,KAB, Ts, L}Kbs}Kas

#3 A→B: {A,KAB, Ts, L}Kbs, {A, TA}Kab

#4 B→A: {TA+1}Kab

(32)

DTU Informatics

Department of Informatics and Mathematical Modelling

Authentication with PKCS

• FIRST IDEA: STRONG AUTHENTICATION USING DIGITAL SIGNATURES:

Once again, NONCES are used to establish integrity and timeliness of the exchange.

• It is assumed that A and B know one another’s public keys (and if necessary the public key PKS of the server which issued them).

#1 A→B: NA

#2 B→A: ({(B,PKB)} SKS,NB, NA, A,{(NB, NA, A)}SKB) Unilateral:

#1 AB: NA

#2 BA: ({(B,PKB)} SKS,NB, NA, A,{(NB, NA, A)}SKB)

#3 AB: ({(A,PKA)} SKS,B,{(NA ,NB, B)}SKA)

Mutual:

{

Certificate Signature

{

(33)

DTU Informatics

Department of Informatics and Mathematical Modelling

Authentication with PKCS (2)

• If A and B does not have any knowledge of each other’s public key they must get it from a 3rd TRUSTED PARTY (an AUTHENTICATION SERVER)

• SIMPLIFIED KERBEROS PKCS PROTOCOL:

S

A B

1

2 3

4

#1 A→S: A, B

#2 S→A: {{(B,PKB)}SKS, Ts, L}PKa

#3 A→B: {{( A,PKA)}SKS, TA, L}PKb

#4 B→A: {TA+1}PKa

(34)

DTU Informatics

Department of Informatics and Mathematical Modelling

Certificates

• Are electronic documents issued by a CERTIFICATION AUTHORITY (CA) trusted by the owner and potential receiver of the certificate.

• Are used in PKI systems to check identity.

Version Serial Number

Signature Algorithm id Issuer (CA)

Validity period Owner identity (Alice) Owner Public Key (PKA)

Digital Signature

Typical structure of a

X. 509 certificate

(35)

DTU Informatics

Department of Informatics and Mathematical Modelling

Public Key Infrastructure

• Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA).

• The primary role of the CA is to publish the key bound to a given user. This is done using the CA's own key, so that trust in the user key relies on one's trust in the validity of the CA's key. The term trusted third party (TTP) may also be used for certificate authority (CA). Moreover, PKI is itself often used as a synonym for a CA implementation.

Bob trusts CA & Alice cert is issued by CA

Bob trusts Alice ID

(36)

DTU Informatics

Department of Informatics and Mathematical Modelling

Certification Path

• In the real PKI world multiple CAs exists

• There is the need for a trust relationship between CAs in order to validate each other certificates.

• This lead to the concept of CERTIFICATION PATH: to validate a certificate issued by CAj the verifier must follow an unbroken directed CERTIFICATION PATH from a CA which the verifier trusts to CAj

• Hierarchical trust model: Certificates can only be issued by superior CAs for inferior ones:

CA0

CA1

To verify CA

4

certificate CA

3

must apply to root (CA

0

)

and work downwards

(37)

DTU Informatics

Department of Informatics and Mathematical Modelling

Key distribution

• In order to initiate a confidential communication Alice and Bob must agree on a shared secret (a session key) that they can use to encrypt the communication.

• Two fundamental methods to do this:

- KEY TRANSPORT: One party derives a new key and sends it to the other (as in simplified kerberos SKCS and PKCS)

- KEY AGREEMENT: Alice and Bob agree on a key by creating a share of the info needed to create the new key.

• Certificates can be used to authenticate parties and make key distribution confidential.

(38)

DTU Informatics

Department of Informatics and Mathematical Modelling

Diffie-Hellman key agreement

Given a prime number q and α Zq = GF(q)

q and α PUBLIC

α xa mod q

Alice Bob

K= α xa xb mod q α xb mod q

Compute the discrete logarithm is computationally infeasible ➞ Only

xa secret xb secret

(39)

DTU Informatics

Department of Informatics and Mathematical Modelling

Certificates and Key distribution: summing up

• Certificates are used to ensure authentication between unknown principals. In order to do that there must be a THIRD PARTY (trusted by all principals) that vouch for them.

• Authentication can be either unilateral or mutual depending on the type of service (e.g. if you do an online payment, web authentication is usually unilateral: you want to be sure that the principal you are giving your credit card info is TRUSTED)

• In order to establish a secure communication, key distribution is used to make all principals share a common secret. Methods to achieve this can be either KEY TRANSPORT or KEY AGREEMENT

(40)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security

1. Introduction 2. Cryptography

3. Certificates and Key distribution 4. Common threats

(41)

DTU Informatics

Department of Informatics and Mathematical Modelling

Common Threats

-Eavesdropping

-Cryptoanalyst attack -Reply attack

-Man-in-the-middle attack -Type-flaw attack

-Masquerading attack

-Denial of Service (DoS) attack -Virus attack

intercept modify

forge disrupt Passive

Active

(42)

DTU Informatics

Department of Informatics and Mathematical Modelling

Common Threats (2)

• EAVESDROPPING: is the action of intercepting and storing DATA sent over communication channel (either plain or encrypted)

• CRYPTOANALYST: the attacker uses mathematical methods to break confidentiality. Is usually done on intercepted and stored DATA

• REPLY ATTACK: an attacker store a message and send it later in time.

• SIMPLIFIED KERBEROS WITHOUT TIMESTAMPS:

S

A B

1

2 3

4

#1 A→S: A, B

#2 S→A: {B,newKAB, L,{A,newKAB, L}Kbs}Kas

#2 O→A: {B,KAB, L,{A,KAB, L}Kbs}Kas

#3 A→B: {A,KAB, L}Kbs, {A, TA}Kab

#4 B→A: {TA+1}Kab

NO MORE CONFIDENTIAL

(43)

DTU Informatics

Department of Informatics and Mathematical Modelling

Common Threats (3)

• Man-in-the-middle (MITM) attack: the attacker place himself in between the communication taking full control on it.

• DIFFIE HELLMAN - MITM:

• What is missing here?

AUTHENTICATION!!!

α xa mod q α xb* mod q

A O B

α xa* mod q α xb mod q

A believes is talking with B as well as B think is talking with A

BUT O is in control!!

(44)

DTU Informatics

Department of Informatics and Mathematical Modelling

Common Threats (4)

• TYPE-FLAW attacks are kind of attacks that exploit misunderstanding in message format:

a simple example:

MASQUERADING: an attacker disguise himself with a false ID Normal Message:

#1 A→S: {A, B, NA}KAS

#1 S→A: {KAB, NA}KAS

Attack:

#1 A→S: {A, B, NA}KAS

#1 O→A: {A, B, NA}KAS

(A, B) is taken from A as KAB

(45)

DTU Informatics

Department of Informatics and Mathematical Modelling

Common Threats (5)

• Denial of Service (DoS) and DistributedDoS attacks are perhaps among the most dangerous attacks:

- They disrupt/interrupt services

- They are nearly impossible to prevent

- They can do major damage in few minutes

On June 25, 2009, the day Michael Jackson died, the spike in searches related to Michael Jackson was so big that Google News initially mistook it for an automated attack. As a result, for about 25 minutes, when some people searched Google News they saw a "We're sorry" page before finding the articles they were looking for.

On August 6, 2009 several social networking sites, including Twitter, Facebook, Livejournal, and Google blogging pages were hit by DDoS attacks, apparently aimed at Georgian blogger "Cyxymu". Although Google came through with only minor set-backs, these attacks left Twitter crippled for hours and Facebook did eventually restore service although some users still experienced trouble. Twitter's Site latency has continued to improve, however some web requests continue to fail.

In August 2003, nearly 50 million homes in the northeastern U.S. and neighboring Canadian provinces suffered from a loss of power after early warning systems failed to work properly, allowing a local outage to cascade across several power grids. A number of factors contributed to the failure, including a bug in a common energy management system and the MSBlast, or Blaster, worm which quickly spread among systems running Microsoft Windows, eventually claiming more than 25 million systems.

(46)

DTU Informatics

Department of Informatics and Mathematical Modelling

Can something be done about DoS?

• Firewalls can block unused port and monitor traffic

• Intrusion Detection Systems can be deployed to further increase security

• Early detection of DoS attacks could block and filter out hostile traffic

• But blocking can facilitate DoS instead of blocking them!!

On february 2010 every machine within the IMM network was rejecting connection to all machines due to a configuration error and a very strict security policy!!

(47)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security map

47

!-@46.-A/1.+!-@46.-A/1.+

"

",/..6+1-04%,/..6+1-04%

#1B+6A47-+1/#1B+6A47-+1/

$%&'()**+,),-(./.&.00%,#1/)(1)/

$%&'()**+,),-(./.&.00%,#1/)(1)/

+0&'1),2%3)12)1*) +0&'1),2%3)12)1*)

C<

C<

DD

*<D

*<D (E3*(E3*

&4.4%F-1G%H

&4.4%F-1G%H

*IJ:-04,

*IJ:-04, (1./61/.

(1./61/.

D641:@+6.

D641:@+6.

<@@,-04.-+1

<@@,-04.-+1

(K3*(K3*

C/.L+6G C/.L+6G 3414M/A/1.%H 3414M/A/1.%H

K+1.6+, K+1.6+,

<@@,-04.-+1:

<@@,-04.-+1:

'12%N:/6 '12%N:/6

<@@,-04.-+1:

<@@,-04.-+1:

OP*QOP*Q PC3*PC3* &SK*&SK* R(*R(*

SDD*SDD*

D/,1/.

D/,1/. P3D*P3D*

!+/+,4%15

!+/+,4%15 ('''%=#"9%***

('''%=#"9%***

-678%&+0,4+7)(

-678%&+0,4+7)(

DL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VV DL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VV

(*W(*W??

(*P/0 (*P/0 3+U-,/(

3+U-,/(

**

N&

N&** X+(*X+(*

X-2/+

X-2/+

RD*YRDK*

RD*YRDK*

RDP*RDP* P(*P(*

P+560/Z%3V%&

P+560/Z%3V%&80-149%"##[80-149%"##[

900,#1/)(1)/,-(./.&.08 900,#1/)(1)/,-(./.&.08

:%00,8..1,%1&0'2) :%00,8..1,%1&0'2)

$)&'(%/7

$)&'(%/7

;6),()2,.1)8,+()

;6),()2,.1)8,+()

$)&'(%/7,-(./.&.08

$)&'(%/7,-(./.&.08

&CP

&CP

QD*QD* P3D*P3D*

PY3(3' PY3(3'

*E**E*

P'DP'D

\/\/6U/6+:6U/6+:

(K3*W(K3*W??

<R*YR<R*

<R*YR<R*

(\'(\'

*<

*<**YKS<*YKS<*

OP*QOP*Q RPX*RPX*

R(*R(* ]E*]E*

(*W>(*W>

PPSPPS

PPFYDFP PPFYDFP DK*DK*

(48)

DTU Informatics

Department of Informatics and Mathematical Modelling

Questions?

(49)

DTU Informatics

Department of Informatics and Mathematical Modelling

Security

Exercises

(50)

DTU Informatics

Department of Informatics and Mathematical Modelling

Diffie-Hellman - FIX

• Find a fix to Diffie-Hellman protocol weaknesses discussed before:

α xa mod q α xb* mod q

A O B

α xa* mod q α xb mod q

(51)

DTU Informatics

Department of Informatics and Mathematical Modelling

SIMPLIFIED KERBEROS PKCS

• Discuss possible weaknesses and improvements to the SIMPLIFIED KERBEROS PKCS PROTOCOL

S

A B

1

2 3

4

#1 A→S: A, B

#2 S→A: {{(B,PKB)}SKS, Ts, L}PKa

#3 A→B: {{( A,PKA)}SKS, TA, L}PKb

#4 B→A: {TA+1}PKa

(52)

DTU Informatics

Department of Informatics and Mathematical Modelling

The Otway Rees Protocol

• Find possible attacks and fixes to the protocol.

• I is a session identifier (aka a random number generated by A to ID the session)

#1 A→B: I,A, B, {NA,I,A, B}KAS

#2 B→S: I,A, B, {NA,I,A, B}KAS , {NB,I,A, B}KBS

#3 S→B: I,{NA, KAB}KAS , {NB,KAB}KBS

#4 B→A: I,{NA, KAB}KAS

S

A B

1

2

3

4

(53)

DTU Informatics

Department of Informatics and Mathematical Modelling

Other two simple example

• Analyze the following protocol pieces and discuss possible attacks and fixes.

First:

#1 A→S: A, B,NA

#2 S→A: S, {S, A, NA,PKB}SKS

Second:

#1 A→B: {NA}KAB

#2 B→A: {NA + 1}KAB

Hint:

Think about multiple connections Hint:

Think about MITM, reply and masquerading

Referencer

RELATEREDE DOKUMENTER

• This class provides a constructor that makes an instance out of an array of bytes comprising a message, the length of the message and the Internet address

The main contributions of this paper are (1) explicitly including the customer value concept in the business model definition and focussing on value creation, (2) presenting four

• The process that knows it has the highest identifier can elect itself as the coordinator simply by sending a coordinator message to all processes. • A process with a

One key issue identified in the course of the project is that dealing with innovation in the classroom is a huge challenge for teachers, and clearly for such technology to

Business Transaction BT-004 is used by the Distribution Company to send an EDI message containing master data for a Metering point to the Gas Supplier. It is also used to

the comunication issue at respectively service layer and network layer, since the purpose of the type system is to ensure that a message with the wrong type is never send nor

The communication channel produces an omission failure if it does not transport a message from p’s outgoing message buffer to q’s incoming message buffer. This is

» StegoBlock is great « If the user does not specify a message for the steganographic block, one will be chosen at random - providing the sender with plausible deniability of