Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco...

31
© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public Protect Yourself Against Security Challenges with Next-Generation Encryption [email protected] [email protected]

Transcript of Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco...

Page 1: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Protect Yourself Against Security

Challenges with Next-Generation

Encryption [email protected]

[email protected]

Page 2: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

How to detect attacks?

Malware

Broken encryption

2

Page 3: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

How to detect attacks?

Malware

‒ Host Process Monitoring

‒ Network Monitoring

‒ Tripwire

‒ Antivirus

‒ Antimalware

‒ Product Security Bulletins

‒ Behavioral Analysis

Broken encryption

3

Page 4: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Next Generation Encryption

Upgrades all crypto mechanisms

Designed to meet security and scalability requirements of next two decades

Standards based

Available today

4

Page 5: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Cryptographic Mechanisms

Encryption

Data Authentication

Key Establishment

Signatures

Hashing

5

Page 6: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Using cryptographic mechanisms in IPsec

6

IKE_SA_INIT

CREATE_CHILD_SA

IKE_AUTH IKEv2

Page 7: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Using cryptographic mechanisms in IPsec

7

IKE_SA_INIT

CREATE_CHILD_SA

ESP

ESP

IKE_AUTH IKEv2

ESP

Page 8: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Authenticated Encryption

Single algorithm provides both confidentiality and authentication in a single pass over data

• More efficient

• More secure

8

Page 9: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Authenticated Encryption -

security issues solved

On the (in)security of IPsec in MAC-then-encrypt

configurations, Paterson, Degabriele, ACM CCS

2010.

Attacking the IPsec Standards in Encryption-only

Configurations, Degabriele and Paterson, IEEE

Symposium on Privacy and Security, 2009.

Security Flaws Induced by CBC Padding -

Applications to SSL, IPSEC, WTLS ...., Vaudenay,

EUROCRYPT 2002.

Problem Areas for the IP Security Protocols,

Bellovin, USENIX Security, 1996.

9

Page 10: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Next Generation Encryption

10

Key Establishment ECDH

Digital Signatures ECDSA

Hashing SHA-2

Authenticated

Encryption AES-GCM

Authentication HMAC-SHA-2

Entropy SP800-90

Protocols TLSv1.2, IKEv2,

IPsec, MACSec

Page 11: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Next Generation Encryption

11

Suite B Key Establishment ECDH

Digital Signatures ECDSA

Hashing SHA-2

Authenticated

Encryption AES-GCM

Authentication HMAC-SHA-2

Entropy SP800-90

Protocols TLSv1.2, IKEv2,

IPsec, MACSec

Page 12: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Security Problems Solved by NGE

12

DH, RSA 1024-bit at risk

RSA, DSA 1024-bit at risk

MD5, SHA-1 Collision attacks

3DES 1GB limit

HMAC-MD5 Theoretical attacks

Entropy Inconsistent quality

TLS1.0, IKEv1 No AE, security issues

Page 13: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Key Strength

Sources: Lenstra and Verheul, NIST 13

Weak

Strong

Page 14: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Hacker ($400)

14

Page 15: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Medium Organization ($300K)

15

Page 16: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Intelligence Agency

16

Page 17: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Key Strength

17

Page 18: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Algorithms Never Get Stronger

Sources: FIPS-180-1, Wang, Yin, Yu ‘05, Cochran ‘07

SHA-1

18

Page 19: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Prevalent

AES-128-CBC

DH-1024 SHA-1

RSA-1024

19

Page 20: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Next Generation Encryption

AES-128-GCM ECDH-P256 SHA-256 ECDSA-

P256

20

128-bit Security Level

Page 21: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

NGE higher security levels

AES-256-GCM

ECDH-P384 SHA-384 ECDSA-

P384

21

ECDH-P521 SHA-512 ECDSA-

P521

AES-192-GCM

Page 22: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

ECC Efficiency

22

1

10

100

1000

10000

80 96 112 128 144 160 192 176 208 224 240 256

RSA

ECC

Signatures per second

Page 23: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

Implementations of NGE

Page 24: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

NGE Enabled Encryption Architectures:

Available Today

24

Remote Access VPNs

ASA Firewall

CSM / ASDM

Spoke-3

. .

.

Site to Site,

DMVPN, and

FlexVPN

GM1

GM2

GM3 GM4

GM5

GM6

GM7 GM8

GM9 KS

GETVPN*

&^*RTW#(*J^*&*sd#J$%UJ&(

802.1X

Supplicant with

MACSec

Guest User

MACSec Capable Devices

&^*RTW#(*J^*&*sd#J$%UJWD&(

Data sent in clear

MACSec Link

Encrypt Decrypt Authenticated User

MACSec

Page 25: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Cisco NGE Enabled Products

25

ISRG2 3900 Series

2900 Series 1900 Series ISRG2 800 Series VPN-ISM

ASA 5512-X

ASA 5515-X

ASA 5525-X

ASA 5545-X

ASA 5555-X

ASA 5585 SSP-20

ASA 5585 SSP-40

ASA 5585 SSP-10

ASA 5585 SSP-60

ASA 5505

AnyConnect

Catalyst 3750-X Catalyst 3560-X

Catalyst 45xx-E w/ Supervisor 7-E

Catalyst 6500-E Nexus 7000

Page 26: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

NGE Enabled IPSec VPNs

26

• For Cisco IOS devices:

• Cisco IOS releases >15.1(4)M

• For Cisco Adaptive Security Appliance:

• ASA 9.0 release

• For Cisco AnyConnect Secure Mobile Client:

• AnyConnect 3.1

NGE Capabilities

Software Requirements

• Protocols:

• IPSEC with IKEv2

• Cryptography:

• AES-GCM (128 and 256 bit keys)

• ECDSA (256 and 384)

• ECDH (256 and 384)

• SHA2 (256 and 384)

• Entropy:

• Hardware based RNGs

Page 27: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

NGE Enabled Encryption:

High Speed, High Density MACsec

AES-GCM for per frame encryption and

authentication

Supported at High speeds:

Cisco Nexus 7000 Series Modules

2 Port 100 Gigabit Ethernet

6 Port 40 Gigabit Ethernet

24-Port 10 Gigabit Ethernet

48-Port Gigabit Ethernet

Cisco Nexus® 7000 M2-Series 2-Port 100 Gigabit Ethernet Module

27

Page 28: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Standards

28

RFC6090, SP800-56

RFC6090, FIPS-186-3

FIPS-180-2

FIPS-197, SP800-38D, SP800-38, RFC5116

RFC2104, RFC4868, FIPS-198

SP800-90

IKEv2, IPsec, TLS1.2, IEEE 802.1 AE

Page 29: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

NGE Benefits

Upgrades the entire Crypto Suite

Efficient at high security levels

‒ Addresses escalating threats

Scalable to high speeds

USG recommended crypto algorithms

‒ Subset of FIPS-140

‒ Approved for sensitive information protection by global

governments (US Government, UK Government)

Included in many standards

‒ IPsec, TLS, MACSec

29

Page 30: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. Next Generation Encryption Cisco Public

Conclusions

•Highly Secure

•Scalable and Efficient

•Standards Based and Interoperable

•Available Today

Next Generation Encryption

30

Page 31: Protect Yourself Against Security Challenges with …...Next Generation Encryption © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public Protect Yourself Against Security

© 2012 Cisco and/or its affiliates. All rights reserved. BRKSEC-3009 Cisco Public