1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part...

49
1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced Cryptography

description

3 Manipulation Detection Code

Transcript of 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part...

Page 1: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

1

Number Theory and Advanced Cryptography 9. Authentication Protocols

Chih-Hung WangSept. 2011

Part I: Introduction to Number TheoryPart II: Advanced Cryptography

Page 2: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

2

Basic Authentication Techniques Challenge-Response Mechanisms

Page 3: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

3

Manipulation Detection Code

Page 4: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

4

Applying Asymmetric Cryptographic Technique

Nonce Importance:

Page 5: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

5

Standardization of the Challenge-Response Mechanism

Unilateral entity authentication

ISO Two-Pass Unilateral Authentication Protocol

Page 6: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

6

Using a Cryptography Check Function (CCF)

Page 7: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

7

ISO Public Key Two-Pass Unilateral Authentication Protocol

Page 8: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

8

Timestamp Mechanism

Page 9: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

9

Using MDC

Page 10: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

10

Applying Asymmetric Cryptographic Techniques

Page 11: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

11

Standardization of Timestamp Mechanism

ISO Symmetric Key One-Pass Unilateral Authentication Protocol

Page 12: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

12

CCF & Public Key Techniques

Page 13: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

13

Non-standard Mechanisms

Page 14: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

14

Mutual Authentication

Page 15: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

15

Wiener’s Attack

Page 16: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

16

Involving Trusted Third PartyThe Woo-Lam Protocol

Page 17: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

17

Password-based Authentication

Page 18: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

18

Needham’s Password Protocol

Page 19: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

19

A One-time Password Scheme

Page 20: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

20

Attack of S/KEY: Man-in-the-Middle Attack

Page 371

Page 21: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

21

Encrypted Key Exchange (EKE) (1)

Off-lineDictionaryAttack

Page 22: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

22

Encrypted Key Exchange (EKE) (2)

Page 23: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

23

Authenticated Key Exchange The Station-to-Station (STS) Protocol

Mutual Entity Authentication Mutually Authenticated Key Agreement Mutual Key Confirmation Perfect Forward Secrecy (PFS) *Anonymity (Deniability)

Page 24: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

24

STS Protocol

Page 25: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

25

A Flaw in a Simplified STS protocol (1)

Page 26: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

26

A Flaw in a Simplified STS protocol (2)

Page 27: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

27

A minor Flaw of the STS Protocol

Perfect denial of serviceattack

Page 28: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

28

Typical Attacks on Authentication Protocols

Message Replay Attack (page 43,44)

Page 29: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

29

Message Replay Attack

Page 30: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

30

Parallel Session Attack (1)

Page 31: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

31

Parallel Session Attack (2)

Page 32: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

32

Reflection Attack

Page 33: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

33

Attack Due to Type Flaw (1)

Page 34: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

34

Attack Due to Type Flaw (2)

Page 35: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

35

Attack Due to Name Omission

Page 36: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

36

Attack Due to Misuse of Cryptographic Services Attack due to absence of data-integrity

protection Confidentiality failure due to absence of

“semantic security” protection

Page 37: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

37

A Minor Variation of the Otway-Rees Protocol

Page 38: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

38

An Attack

Page 39: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

39

Authentication Protocols for Internet Security

Internet Protocol Security (IPSec)

Page 40: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

40

Confidentiality Protection in IPSec Encapsulating Security Payload (ESP)

Page 41: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

41

The Internet Key Exchange (IKE) Protocol (1)

Page 42: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

42

The Internet Key Exchange (IKE) Protocol (2)

Page 43: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

43

Authentication Failure

Page 44: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

44

Signature-based IKE Phase 1 Aggressive Mode

Page 45: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

45

A Plausible Deniability Feature in IKE

Plausible Deniability:Permit an entity to deny “plausibly” the existence of a connection with aCommunication partner

Page 46: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

46

The Secure Shell (SSH) Remote Login Protocol (1) The SSH Architecture

The SSH Transport Layer Protocol Unilaterally authenticated secure channel from the

server to the client The SSH User Authentication Protocol

Unilateral authentication protocols to achieve entity authentication from a client-side user to the server

The SSH Connection protocol

Page 47: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

47

The Secure Shell (SSH) Remote Login Protocol (2)

Page 48: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

48

The Secure Shell (SSH) Remote Login Protocol (3)

Page 49: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced.

49

The Secure Shell (SSH) Remote Login Protocol (4)