Title: William Stallings Data and Computer Communications 7th Edition
1William StallingsData and Computer
Communications7th Edition
- Chapter 21
- Network Security
2Security Requirements
- Confidentiality data only accessible to
authorized parties - Integrity data can only be modified by
authorized parties - Availability data are available to authorized
parties - Authenticity host or service must be able to
verify the identity of a user
3Passive Attacks
- Eavesdropping on transmissions to obtain
information - Release of message contents
- Outsider learns content of transmission
- Traffic analysis
- By monitoring frequency and length of messages,
even if encrypted, nature of communication may be
guessed - Difficult to detect, but can be prevented or
deterred by encryption
4Active Attacks
- Masquerade
- Pretending to be a different entity
- Replay
- Passively capture data or transaction, then later
retransmit to produce unauthorized efect - Modification of messages
- I.e. allow John Smith (Jane Doe) to modify
accounts - Denial of service
- Prevent or inhibit normal use or management of
communications facilities - Easy to detect, but hard to prevent
5Symmetric Encryption (Simplified)
6Ingredients
- Plaintext original data in unencrypted format
- Encryption algorithm applied to plaintext to
encrypt - Secret key input to the encryption algorithm
- Ciphertext result of plaintext and secret key.
Two different keys produce two different
ciphertexts (using same plaintext - Decryption algorithm encryption algorithm run
in reverse to produce plaintext
7Requirements for Security
- Strong encryption algorithm
- Even if known, should not be able to decrypt or
work out key - Even if a number of cipher texts are available
together with plain texts of them - Sender and receiver must obtain secret key
securely - Once key is known, all communication using this
key is readable
8Attacking a Symmetric Encryption Scheme
- Cryptanalysis
- Rely on nature of algorithm plus some knowledge
of general characteristics of plain text - Attempt to deduce plain text or key
- Brute force
- Try every possible key until plain text is
achieved - On average, need to attempt 50 of possible key
to be successful
9Encryption Algorithms
- Block cipher
- Process plain text in fixed block sizes producing
block of ciphertext of equal size - Examples
- Data encryption standard (DES)
- Triple DES (TDES)
- Advanced Encryption Standard (AES)
10Data Encryption Standard
- US standard
- 64 bit plain text blocks
- 56 bit key
- Broken in 1998 by Electronic Frontier Foundation
- Used special purpose machine - 250,000
- Took less than three days
- DES IS NOT WORTHLESS!!!!
11Triple DES
- Incorporated in DES standard 1999
- Uses 3 keys and 3 executions of DES algorithm
- Effective key length 112 or 168 bit
- Slow
- Block size (64 bit) too small
12Advanced Encryption Standard
- National Institute of Standards and Technology
(NIST) in 1997 issued call for Advanced
Encryption Standard (AES) - Security strength equal to or better than 3DES
- Improved efficiency
- Symmetric block cipher
- Block length 128 bits
- Key lengths 128, 192, and 256 bits
- Evaluation included security, computational
efficiency, memory requirements, hardware and
software suitability, and flexibility - 2001, AES issued as federal information
processing standard (FIPS 197)
13Fundament Encryption Alternatives
- Link Encryption
- End-to-End Encryption
14Link Encryption
- Each communication link equipped with an
encryption device at both ends - All traffic assumed secure
- High level of security
- Requires lots of encryption devices
- Disadvantage - message must be decrypted at each
switch to read address (virtual circuit number) - Security vulnerable at switches
- Particularly on public switched network
15End to End Encryption
- Encryption done at end systems
- Data in encrypted form crosses network unaltered
- Destination shares key with source to decrypt
- Host can only encrypt user data
- Otherwise switching nodes could not read header
or route packet - Traffic pattern not secure
- Can combine both link and end to end
16Ways to Distribute Key
- Key selected by A and delivered to B
- or
- Third party selects key and delivers to A and B
- or
- Use old key to encrypt and transmit new key from
A to B - or
- Use old key to transmit new key from third party
to A and B
17Automatic Key Distribution (diag)
18Automatic Key Distribution
- Session Key
- Used for duration of one logical connection
- Destroyed at end of session
- Used for user data
- Permanent key
- Used for distribution of keys
- Key distribution center
- Determines which systems may communicate
- Provides one session key for that connection
- Security service module (SSM)
- Performs end to end encryption
- Obtains keys for host
19Traffic Padding
- Countermeasure prevents attacker from learning
traffic patterns - Produce ciphertext continuously
- If no plain text to encode, send random data
- Makes traffic analysis impossible
20Message Authentication
- Protects against active attacks such as
falsification of data and transactions - Message is authentic if it is genuine and comes
from the alleged source - Authentication allows receiver to verify that
message - has not been altered
- is from authentic source
21Authentication Using Encryption
- Assumes sender and receiver are only entities
that know key - Message includes
- error detection code
- sequence number
- time stamp
22Authentication Without Encryption
- Authentication tag generated and appended to each
message - Message not encrypted
- Useful for
- Messages broadcast to multiple destinations
- Have one destination responsible for
authentication - One side heavily loaded
- Encryption adds to workload
- Can authenticate random messages
- Programs authenticated without encryption can be
executed without decoding
23Message Authentication Code
- Generate authentication code based on shared key
and message - Common key shared between A and B
- If only sender and receiver know key and code
matches - Receiver assured message has not been altered
- Receiver assured message is from alleged sender
- If message has sequence number, receiver assured
of proper sequence
24One Way Hash Function
- Accepts variable size message and produces fixed
size tag (message digest) - Advantages of authentication without encryption
- Encryption is slow
- Encryption hardware expensive
- Encryption hardware optimized to large data
- Algorithms covered by patents
- Algorithms subject to export controls (from USA)
25Secure Hash Functions
- Hash function must have following properties
- Can be applied to any size data block
- Produce fixed length output
- Easy to compute
- Not feasible to reverse
- Not feasible to find two messages that give the
same hash
26SHA-1
- Secure Hash Algorithm 1
- First developed by NIST
- No known weaknesses
27Public Key Encryption
- Based on mathematical algorithms
- Asymmetric
- Use two separate keys sender and receiver each
have a public and private key - Ingredients
- Plain text
- Encryption algorithm
- Public and private key
- Cipher text
- Decryption algorithm
28Public Key Encryption -Encryption
29Public Key Encryption Authentication
30Public Key Encryption - Operation
- One key made public
- Used for encryption
- Other kept private
- Used for decryption
- Infeasible to determine decryption key given
encryption key and algorithm - Either key can be used for encryption, the other
for decryption
31Steps
- User generates pair of keys
- User places one key in public domain
- To send a message to user, encrypt using public
key - User decrypts using private key
32Digital Signature
- Sender encrypts message with their private key
- Receiver can decrypt using senders public key
- This authenticates sender, who is only person who
has the matching key - Does not give privacy of data
- Decrypt key is public
33Public Key Certificate Use
34Secure Sockets LayerTransport Layer Security
- SSL general-purpose service
- Set of protocols that rely on TCP
- Two implementation options
- Part of underlying protocol suite
- Transparent to applications
- Embedded in specific packages
- E.g. Netscape and Microsoft Explorer and most Web
servers - Minor differences between SSLv3 and TLS
35IPv4 and IPv6 Security
- IPSec - IP security Protocol
- Can encrypt and/or authenticate all traffic at
the IP level. Thus, remote logon, email, file
transfer, Web access, etc. are secure - Applications
- Secure VPN connectivity over Internet
- Secure remote access over Internet
- Extranet and intranet connectivity
- Enhanced electronic commerce security
36IPSec Main Functions
- Authentication header authentication service
- Encapsulated security payload combined
authentication/encryption function - Key exchange function
37Security Association
- One way relationship between sender and receiver
- For two way, two associations are required
38Required Reading
- Stallings chapter 21
- Web sites on public/private key encryption
- RFCs mentioned
- www.rfc-editor.org
39Chapter 21 Review Questions
- Define the following terms confidentiality,
integrity, authenticity, availability - What is a passive attack? Provide examples.
- What is an active attack? Provide examples.
- Define encryption. Provide an example of
symmetric encryption. - Discuss the security requirements for symmetric
encryption. - Describe Advanced Encryption Standard (AES)
- Describe the various ways in which encryption
keys can be distributed.
40Chapter 21 Review Questions (cont.)
- Discuss the purpose of traffic padding.
- Provide an example of message authentication.
- Compare and contrast a one-way hash with
encryption. Provide an example of its use. - Compare and contrast public key (asymmetric)
encryption with symmetric encryption. - What is the purpose of a public key certificate?
Describe how it is employed.