Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this...

53
DTU Informatics Department of Informatics and Mathematical Modelling Security Davide Papini Embedded Systems Engineering DTU Informatics 1. Introduction 2. Cryptography 3. Certificates and Key distribution 4. Common threats

Transcript of Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this...

Page 1: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security

Davide PapiniEmbedded Systems Engineering DTU Informatics

1. Introduction2. Cryptography3. Certificates and Key distribution4. Common threats

Page 2: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Who I am

• Ph.D. Student at DTU Informatics.

Topic: Attacker modeling in ubiquitous computing systems

• M.Sc. in Telecommunication Engineering focusing on communication networks

• Master Thesis on “Wireless Intrusion Detection Systems”

2

Page 3: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Purpose of this lecture

• After the lecture you should:

• Have a general idea of what security is

• Be familiar with terms such as cryptography, digital signature etc....

• Understand the importance of Certificates and key distribution

• Be able to analyze simple protocols against common threats

3

Page 4: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security

1. Introduction2. Cryptography3. Certificates and Key distribution4. Common threats

Page 5: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Your idea

Spend few minutes in group of 2-3 people and try to answer this question:

What is security?

5

Page 6: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security scenario

6

Alice Bob

Trent

Oscar, Eve, Mallory ...

Secure channel

Opponent

Trusted Party

Channel

Page 7: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security

7

Protection against interference with the means to access the resources

Protection against disclosureto unauthorized individuals

Protection against alteration or corruption

Page 8: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Common security requirements

8

Privacy Security Accountability

Integrity

Confidentiality

Authentication

Availability

Anonimity

Pseudonymity

Unlinkability

Unobservability

Non-repudiation

Page 9: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Common threats

•Privacy:-Personal data theft-Identity theft-Tracking

•Security:-Cryptoanalyst attack-Reply attack-Man-in-the-middle attack-Type-flaw attack-Masquerading attack-Denial of Service (DoS) attack-Virus attack

9

A B

A B

O

A B

O

B

O

A B

Intercept: ➡Eavesdropping➡Reply

Modify: ➡Man-in-the-middle➡Type-flaw

Forge: ➡Masquerading

Disrupt: ➡DoS➡Virus

Page 10: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Means to ensure security

‣ Cryptography

‣ Certificates

‣ Firewalls, IDS ...

‣ Physical Security

‣ ...

10

-Confidentiality-Integrity-Non-repudiation

-Authentication

-Availability

-Protect from threats e.g. private keys or personal information leaks, system breakdowns etc...

Page 11: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security map

11

!!"##$%&'("##$%&'())*+,-./01-0+%2-%3-,41+*+,-./01-0+%2-%3-,41+ 3456-7-+%&3456-7-+%&880-149%(1./61/.%/%:-056/774%0-149%(1./61/.%/%:-056/774%;; <<%"##$<<%"##$;;"##="##=;; >?>? ;;

[email protected]/[email protected]/1.+"",/..6+1-04%,/..6+1-04%

##1B+6A47-+1/1B+6A47-+1/$%&'()**+,),-(./.&.00%,#1/)(1)/$%&'()**+,),-(./.&.00%,#1/)(1)/

+0&'1),2%3)12)1*)+0&'1),2%3)12)1*)

C<C<DD

*<D*<D

(E3*(E3*

&4.4%F-1G%H&4.4%F-1G%H*IJ:-04,*IJ:-04,

(1./61/.(1./61/.

D641:@+6.D641:@+6.

<@@,-04.-+1<@@,-04.-+1

(K3*(K3*

C/.L+6GC/.L+6G3414M/A/1.%H3414M/A/1.%H

K+1.6+,K+1.6+,<@@,-04.-+1:<@@,-04.-+1:

'12%N:/6'12%N:/6<@@,-04.-+1:<@@,-04.-+1:

OP*QOP*QPC3*PC3* R(*R(*&&SK*SK*

SDD*SDD*D/,1/.D/,1/. P3D*P3D*

!+/+,4%15!+/+,4%15('''%=#"9%***('''%=#"9%***

-678%&+0,4+7)(-678%&+0,4+7)(DL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VVDL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VV

((*W*W??(*P/0(*P/03+U-,/(3+U-,/(

**

N&N&**

X+(*X+(*X-2/+X-2/+

RD*YRDK*RD*YRDK*RDP*RDP* P(*P(*

P+560/Z%3V%&P+560/Z%3V%&880-149%"##[0-149%"##[

900,#1/)(1)/,-(./.&.08900,#1/)(1)/,-(./.&.08:%00,8..1,%1&0'2):%00,8..1,%1&0'2)

$)&'(%/7$)&'(%/7;6),()2,.1)8,+();6),()2,.1)8,+()$)&'(%/7,-(./.&.08$)&'(%/7,-(./.&.08

&CP&CP

QDQD** P3D*P3D*

PY3(3'PY3(3'*E**E*P'DP'D

\\//6U/6+:6U/6+:

(K3(K3*W*W??<R*YR<R*<R*YR<R*

(\'(\'

*<*<**YKS<*YKS<*

OP*QOP*Q RPX*RPX*R(*R(* ]E*]E*

((*W>*W>

PPSPPS

PPFYDFPPPFYDFPDK*DK*

Page 12: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security

1. Introduction2. Cryptography3. Certificates and Key distribution4. Common threats

12

Page 13: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Encryption

“Encryption is the transformation of data to a form where their information content is hidden”

Is the key technology for security!

13

m’ ∈ℳ is the CIPHERTEXT message derived from the PLAINTEXT message m ∈ℳ using the

ENCIPHERMENT KEY k ∈K

m ∈ℳ is the PLAINTEXT message derived from CIPHERTEXT m’ ∈ℳ using the DECIPHERMENT

KEY k-1 ∈K

Encipherment: m’=E(m,k)

Decipherment: m=D(m’,k-1)

Enc: C={P}k Dec: P={C} k-1

Page 14: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Cryptosystems

SYMMETRIC CRYPTOSYSTEM:A cryptosystem where knowledge of the key k ∈ K for E implies knowledge of the key k′ ∈ K for D (or vice versa). They may even be identical!

This means they must both be kept SECRET.

Symmetric Cryptosystem = “SECRET KEY CRYPTOSYSTEM” (SKCS).

ASYMMETRIC CRYPTOSYSTEM:A cryptosystem where knowledge of the key k ∈ K for E does not imply knowledge of the key k′ ∈ K for D (or vice versa).

Only one of (k, k′) needs to be kept SECRET.

Asymmetric Cryptosystem = “PUBLIC KEY CRYPTOSYSTEM” (PKCS).

14

Page 15: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

How are they used

• Normally during a full communication a combination of symmetric and asymmetric cryptosystems is used. Symmetric cryptography is faster whilst Asymmetric cryptography is suitable for key management purposes.

Asymmetric cryptography is usually used for:• Key exchange / agreement (DH, DSA)• One way communications (S/Mime)• Digital Signature

Symmetric cryptography is used for:• Communication channels encryption• “Continuos data” protection e.g. streams• Real time communications

15

Page 16: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Some examples

• Symmetric Cryptosystems:Classical cyphers: Substitution cyphers, Transposition cyphersModern cyphers: Digital Encryption Standard, Advanced Encryption Standard,3-DES, Blowfish, TEA, RC4...

• Asymmetric Cryptosystems:Rivest Shamir Adleman, Digital Signature Algorithm, ElGamal encryption, Diffie-Hellman...

16

Page 17: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Public Key CryptoSystems

• Each principal knows the other’s PUBLIC KEY

• It must not be possible to evaluate the inverse function E-1

(E is a TRAPDOOR ONE-WAY FUNCTION)

17

e = E(d,PKB) d = D(e,SKB)

Alice Bob

e’ = E(d’,PKA)d’ = D(e’,SKA)

SK = Secret Key PK = Public Key

Green = known termsRed = secret terms

Page 18: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Sign and encrypt

• PUBLIC and PRIVATE KEYS are complementary: it means that you can encipher with the PRIVATE KEY and decipher with the PUBLIC KEY

WHAT IS THE PURPOSE FOR THAT??

• Digital Signature: Alice sign by enciphering with her PRIVATE KEY and then encipher the signed message with Bob PUBLIC KEY:

SignedMsg={Msg}SKa → {SignedMsg}PKb

18

Bob then decipher the text first with his PRIVATE KEY and then with Alice’s PUBLIC

KEY

SignedMsg = {RecvMsg}SKb → Msg={SignedMsg}PKa

Page 19: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Sign and encrypt (2)

• In this way Bob is the only one that can receive and decipher the message, and he is sure that it has been sent from Alice since it is signed!

Now are this two ways of cyphering and signing the same? What is the difference?

19

{{Msg}SKa} PKb

{{Msg}PKb} SKa

Page 20: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Why we need Digital Signature

• Digital Signature ensures NON-REPUDIATION of transmission and receipt.

• It has all the qualities that an ordinary written signature has:

• cannot be forged.• cannot be detached from a document and attached to another one.• Signed documents cannot be modified.• Signer cannot deny having signed.

20

Page 21: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Why cryptography works!

• Cryptographic algorithms such as RSA, rely on mathematical functions that are not invertible or that needs time to be broken.

• e.g. RSA: it is based on modular algebra. The encryption function is defined as:

e = dp mod n

where (p,n) are publicly known.

E-1 ~ Evaluate integer p’th root modulo n: it is not as simple as in normal mathematics because is based on factorization of LARGE (~1015) integers that is known to be a HARD problem.

21

Page 22: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Why brute-force does not work!DES has a 56 bit key

It takes approximately 256/2=255≅1016 attempts to find the keyif the time for each attempt is 5 ns = 5 * 10-9 s then it takes 5 * 107 s ≅ 1 year and 7 months to get the key!!!

Nowadays algorithms are far more complex than DES and use keys ranging from 128 bits up to 1024 bits thus Brute-force is not really an option.

To give you an idea of large numbers:

22

Probability to die in a car accident in US 1/5600 2-12

Earth age 109 years 230 years

Universe age 1010 years 234 years

Number of earth atoms 10 51 2 170

Number atoms in the galaxy 10 67 2 223

Number atoms in the universe 10 77 2 265

Universe volume 10 84 cm 3 2 280 cm 3

Page 23: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Integrity

• Encryption is used to ensure confidentiality but does not prevent an attacker to remove, modify or add blocks of data.

• To check the INTEGRITY of a message some other mechanisms must take place. Solutions make use of reference numbers and timestamps so that the message is also recognized as fresh (this counter acts reply attacks).

• A checksum function is used to create a MESSAGE DIGEST (a ONE-WAY HASH FUNCTION) that is sent with the message and encrypted along with it. The hashing function must be:✦ strongly COLLISION RESISTANT: is computationally infeasible to find

different m1, m2 such that H(m1) = H(m2) ✦ NON-INVERTIBLE: computationally infeasible from v to find m such that

H(m)= v.

23

Page 24: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Integrity (2)

• The second property is easily achieved since message digest are usually of fixed length and the messages use number of bits larger than the message digest.

• The Hash function is designed properly so that it is complex enough to slow down and inhibit attempts to find collisions.

• MD5 is no longer considered secure and doubts has been expressed about SHA-1 as well.

24

Digest length Basic Block lengthMD5 128 512

SHA-1 160 512SHA-256 256 512

RIPEMD-160 160 512SHA-512 512 1024

Page 25: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Integrity (3)

• There is an alternative technique called HASH-BASED MESSAGE AUTHENTICATION CODE (HMAC)

• It uses k ∈ K as extra parameters for the hash function. k must be a shared

secret between sender and receiver

25

HMAC(Msg,k)

Page 26: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

HMAC for Digital Signature

• Usually for Digital Signature is not desirable to encrypt the whole message with the private key because if the message is long it takes time to encrypt it!

• A more effective and efficient method is to hash the message and then sign the hash.

• This method has many advantages:

- is faster- the signature has a fixed length

26

{HMAC(Msg,k)}SKA Digital Signature

Page 27: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Cryptography: summing up

27

Alice{Msg, {HMAC(Msg,MK)}SKa } PKb

• Integrity is ensured through HMAC• Confidentiality is ensured through encryption {}PKb

• Non-repudiation is ensured through signature {}SKa

Bob

Msg

Page 28: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security

1. Introduction2. Cryptography3. Certificates and Key distribution4. Common threats

Page 29: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Authentication

• “Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true”

• In security means that each principal (in a communication) is certain of the identity of the other one.

• Requirements:➡EVIDENCE: A must produce evidence of its identity. Typically done by producing or

demonstrating knowledge of a secret which identifies A and which B can verify.➡NON-TRANSFERABILITY: B cannot use info. received from A to impersonate A to a

third party.➡NO 3rd-PARTY IMPERSONATION: No third party, M, can impersonate A by executing

the protocol with B.➡NO LEAKAGE: Above properties must hold, regardless of how many times A and B

execute the protocol.

29

Page 30: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Type of evidence

• WEAK AUTHENTICATION: Secret is a password or other simple identification code (PIN, . . . ).

• STRONG AUTHENTICATION: Cryptographically secure form of challenge/response. E.g. with SKCS:

"

NA and NB are NONCES: Fresh references chosen to identify the current exchange.

30

#1 A→B: NA#2 B→A: {(NA ,A)}KAB

Unilateral:

#1 A→B: NA #2 B→A: {(NB,NA,A)}KAB

#3 A→B: {(NA,NB)}KAB

Mutual:

Page 31: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Authentication with SKCS

• A and B must have a shared secret (i.e. a symmetric key) in order to authenticate and initiate a secure communication

• If they don’t share a secret they must refer to a 3rd TRUSTED PARTY (an AUTHENTICATION SERVER) that enables them to share a “new” secret

• SIMPLIFIED KERBEROS SKCS PROTOCOL:

31

S

A B

1

23

4

#1 A→S: A, B#2 S→A: {B,KAB, Ts, L,{A,KAB, Ts, L}Kbs}Kas#3 A→B: {A,KAB, Ts, L}Kbs, {A, TA}Kab#4 B→A: {TA+1}Kab

Page 32: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Authentication with PKCS

• FIRST IDEA: STRONG AUTHENTICATION USING DIGITAL SIGNATURES:

• Once again, NONCES are used to establish integrity and timeliness of the exchange.

• It is assumed that A and B know one another’s public keys (and if necessary the public key PKS of the server which issued them).

32

#1 A→B: NA#2 B→A: ({(B,PKB)} SKS,NB, NA, A,{(NB, NA, A)}SKB)

Unilateral:

#1 A→B: NA #2 B→A: ({(B,PKB)} SKS,NB, NA, A,{(NB, NA, A)}SKB)

#3 A→B: ({(A,PKA)} SKS,B,{(NA ,NB, B)}SKA)

Mutual:

{

Certificate {

Signature

Page 33: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Authentication with PKCS (2)

• If A and B does not have any knowledge of each other’s public key they must get it from a 3rd TRUSTED PARTY (an AUTHENTICATION SERVER)

• SIMPLIFIED KERBEROS PKCS PROTOCOL:

33

S

A B

1

23

4

#1 A→S: A, B#2 S→A: {{(B,PKB)}SKS, Ts, L}PKa#3 A→B: {{( A,PKA)}SKS, TA, L}PKb #4 B→A: {TA+1}PKa

Page 34: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Certificates

• Are electronic documents issued by a CERTIFICATION AUTHORITY (CA) trusted by the owner and potential receiver of the certificate.

• Are used in PKI systems to check identity.

• A party who receives this certificate and trusts CA can check if messages have been signed by Alice.

34

Version

Serial Number

Signature Algorithm id

Issuer (CA)

Validity period

Owner identity (Alice)

Owner Public Key (PKA)

Digital Signature

Typical structure of a X. 509 certificate

Page 35: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Public Key Infrastructure

• Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA).

• The primary role of the CA is to publish the key bound to a given user. This is done using the CA's own key, so that trust in the user key relies on one's trust in the validity of the CA's key. The term trusted third party (TTP) may also be used for certificate authority (CA). Moreover, PKI is itself often used as a synonym for a CA implementation.

35

Bob trusts CA & Alice cert is issued by CA ⇓

Bob trusts Alice ID

Page 36: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Certification Path

• In the real PKI world multiple CAs exists

• There is the need for a trust relationship between CAs in order to validate each other certificates.

• This lead to the concept of CERTIFICATION PATH: to validate a certificate issued by CAj the verifier must follow an unbroken directed CERTIFICATION PATH from a CA which the verifier trusts to CAj

• Hierarchical trust model: Certificates can only be issued by superior CAs for inferior ones:

36

CA0

CA1

CA2 CA4CA3

To verify CA4 certificate CA3

must apply to root (CA0) and work downwards

Page 37: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Key distribution

• In order to initiate a confidential communication Alice and Bob must agree on a shared secret (a session key) that they can use to encrypt the communication.

• Two fundamental methods to do this:

- KEY TRANSPORT: One party derives a new key and sends it to the other (as in simplified kerberos SKCS and PKCS)

- KEY AGREEMENT: Alice and Bob agree on a key by creating a share of the info needed to create the new key.

• Certificates can be used to authenticate parties and make key distribution confidential.

37

Page 38: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Diffie-Hellman key agreement

38

Given a prime number q and α ∈ Zq = GF(q)

➡ q and α PUBLIC

α xa mod q

Alice BobK= α xa xb mod q

α xb mod q

Compute the discrete logarithm is computationally infeasible ➞ Only

Alice and Bob can derive K!!

xa secret

K = (α xb) xa

xb secret

K = (α xa) xb

Page 39: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Certificates and Key distribution: summing up

• Certificates are used to ensure authentication between unknown principals. In order to do that there must be a THIRD PARTY (trusted by all principals) that vouch for them.

• Authentication can be either unilateral or mutual depending on the type of service (e.g. if you do an online payment, web authentication is usually unilateral: you want to be sure that the principal you are giving your credit card info is TRUSTED)

• In order to establish a secure communication, key distribution is used to make all principals share a common secret. Methods to achieve this can be either KEY TRANSPORT or KEY AGREEMENT

39

Page 40: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security

1. Introduction2. Cryptography3. Certificates and Key distribution4. Common threats

Page 41: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Common Threats

-Eavesdropping

-Cryptoanalyst attack

-Reply attack

-Man-in-the-middle attack

-Type-flaw attack

-Masquerading attack

-Denial of Service (DoS) attack

-Virus attack

41

intercept

modifyforge

disrupt

PassiveActive

Page 42: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Common Threats (2)

• EAVESDROPPING: is the action of intercepting and storing DATA sent over communication channel (either plain or encrypted)

• CRYPTOANALYST: the attacker uses mathematical methods to break confidentiality. Is usually done on intercepted and stored DATA

• REPLY ATTACK: an attacker store a message and send it later in time.

• SIMPLIFIED KERBEROS WITHOUT TIMESTAMPS:

42

S

A B

1

23

4

#1 A→S: A, B#2 S→A: {B,newKAB, L,{A,newKAB, L}Kbs}Kas#2 O→A: {B,KAB, L,{A,KAB, L}Kbs}Kas#3 A→B: {A,KAB, L}Kbs, {A, TA}Kab#4 B→A: {TA+1}Kab

O intercept and store message #2: {B,KAB, L,{A,KAB, L}Kbs}Kas

After breaking KAB when a new communication between A and B occurs, O intercepts and destroys new #2 and sends to A the old #2

NO MORE CONFIDENTIAL

Page 43: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Common Threats (3)

• Man-in-the-middle (MITM) attack: the attacker place himself in between the communication taking full control on it.

• DIFFIE HELLMAN - MITM:

• What is missing here?

AUTHENTICATION!!!

43

α xa mod q

α xb* mod q

A O B

α xa* mod q

α xb mod q

A believes is talking with B as well as B think is talking with A

BUTO is in control!!

Page 44: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Common Threats (4)

• TYPE-FLAW attacks are kind of attacks that exploit misunderstanding in message format:

a simple example:

• MASQUERADING: an attacker disguise himself with a false ID

44

Normal Message:#1 A→S: {A, B, NA}KAS

#1 S→A: {KAB, NA}KAS

Attack:#1 A→S: {A, B, NA}KAS

#1 O→A: {A, B, NA}KAS

(A, B) is taken from A as KAB

Page 45: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Common Threats (5)

• Denial of Service (DoS) and DistributedDoS attacks are perhaps among the most dangerous attacks:

- They disrupt/interrupt services- They are nearly impossible to prevent- They can do major damage in few minutes

45

On June 25, 2009, the day Michael Jackson died, the spike in searches related to Michael Jackson was so big that Google News initially mistook it for an automated attack. As a result, for about 25 minutes, when some people searched Google News they saw a "We're sorry" page before finding the articles they were looking for.

On August 6, 2009 several social networking sites, including Twitter, Facebook, Livejournal, and Google blogging pages were hit by DDoS attacks, apparently aimed at Georgian blogger "Cyxymu". Although Google came through with only minor set-backs, these attacks left Twitter crippled for hours and Facebook did eventually restore service although some users still experienced trouble. Twitter's Site latency has continued to improve, however some web requests continue to fail.

In August 2003, nearly 50 million homes in the northeastern U.S. and neighboring Canadian provinces suffered from a loss of power after early warning systems failed to work properly, allowing a local outage to cascade across several power grids. A number of factors contributed to the failure, including a bug in a common energy management system and the MSBlast, or Blaster, worm which quickly spread among systems running Microsoft Windows, eventually claiming more than 25 million systems.

Page 46: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Can something be done about DoS?

• Firewalls can block unused port and monitor traffic

• Intrusion Detection Systems can be deployed to further increase security

• Early detection of DoS attacks could block and filter out hostile traffic

• But blocking can facilitate DoS instead of blocking them!!

46

On february 2010 every machine within the IMM network was rejecting connection to all machines due to a configuration error and a very strict security policy!!

Page 47: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security map

47

!!"##$%&'("##$%&'())*+,-./01-0+%2-%3-,41+*+,-./01-0+%2-%3-,41+ 3456-7-+%&3456-7-+%&880-149%(1./61/.%/%:-056/774%0-149%(1./61/.%/%:-056/774%;; <<%"##$<<%"##$;;"##="##=;; >?>? ;;

[email protected]/[email protected]/1.+"",/..6+1-04%,/..6+1-04%

##1B+6A47-+1/1B+6A47-+1/$%&'()**+,),-(./.&.00%,#1/)(1)/$%&'()**+,),-(./.&.00%,#1/)(1)/

+0&'1),2%3)12)1*)+0&'1),2%3)12)1*)

C<C<DD

*<D*<D

(E3*(E3*

&4.4%F-1G%H&4.4%F-1G%H*IJ:-04,*IJ:-04,

(1./61/.(1./61/.

D641:@+6.D641:@+6.

<@@,-04.-+1<@@,-04.-+1

(K3*(K3*

C/.L+6GC/.L+6G3414M/A/1.%H3414M/A/1.%H

K+1.6+,K+1.6+,<@@,-04.-+1:<@@,-04.-+1:

'12%N:/6'12%N:/6<@@,-04.-+1:<@@,-04.-+1:

OP*QOP*QPC3*PC3* R(*R(*&&SK*SK*

SDD*SDD*D/,1/.D/,1/. P3D*P3D*

!+/+,4%15!+/+,4%15('''%=#"9%***('''%=#"9%***

-678%&+0,4+7)(-678%&+0,4+7)(DL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VVDL-:./2%*4-6:9%K+4T9%Q-U/69%R42-+9%*+L/6,-1/9%VV

((*W*W??(*P/0(*P/03+U-,/(3+U-,/(

**

N&N&**

X+(*X+(*X-2/+X-2/+

RD*YRDK*RD*YRDK*RDP*RDP* P(*P(*

P+560/Z%3V%&P+560/Z%3V%&880-149%"##[0-149%"##[

900,#1/)(1)/,-(./.&.08900,#1/)(1)/,-(./.&.08:%00,8..1,%1&0'2):%00,8..1,%1&0'2)

$)&'(%/7$)&'(%/7;6),()2,.1)8,+();6),()2,.1)8,+()$)&'(%/7,-(./.&.08$)&'(%/7,-(./.&.08

&CP&CP

QDQD** P3D*P3D*

PY3(3'PY3(3'*E**E*P'DP'D

\\//6U/6+:6U/6+:

(K3(K3*W*W??<R*YR<R*<R*YR<R*

(\'(\'

*<*<**YKS<*YKS<*

OP*QOP*Q RPX*RPX*R(*R(* ]E*]E*

((*W>*W>

PPSPPS

PPFYDFPPPFYDFPDK*DK*

Page 48: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

48

Questions?

Page 49: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Security

Exercises

Page 50: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Diffie-Hellman - FIX

• Find a fix to Diffie-Hellman protocol weaknesses discussed before:

50

α xa mod q

α xb* mod q

A O B

α xa* mod q

α xb mod q

Page 51: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

SIMPLIFIED KERBEROS PKCS

• Discuss possible weaknesses and improvements to the SIMPLIFIED KERBEROS PKCS PROTOCOL

51

S

A B

1

23

4

#1 A→S: A, B#2 S→A: {{(B,PKB)}SKS, Ts, L}PKa#3 A→B: {{( A,PKA)}SKS, TA, L}PKb #4 B→A: {TA+1}PKa

Page 52: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

The Otway Rees Protocol

• Find possible attacks and fixes to the protocol.

• I is a session identifier (aka a random number generated by A to ID the session)

52

#1 A→B: I,A, B, {NA,I,A, B}KAS

#2 B→S: I,A, B, {NA,I,A, B}KAS , {NB,I,A, B}KBS

#3 S→B: I,{NA, KAB}KAS , {NB,KAB}KBS

#4 B→A: I,{NA, KAB}KAS

S

A B1

2

3

4

Page 53: Security...DTU Informatics Department of Informatics and Mathematical Modelling Purpose of this lecture • After the lecture you should: • Have a general idea of what security is

DTU InformaticsDepartment of Informatics and Mathematical Modelling

Other two simple example

• Analyze the following protocol pieces and discuss possible attacks and fixes.

53

First:#1 A→S: A, B,NA

#2 S→A: S, {S, A, NA,PKB}SKS

Second:#1 A→B: {NA}KAB

#2 B→A: {NA + 1}KAB

Hint:Think about multiple connections

Hint:Think about MITM, reply and masquerading