William Stallings Data and Computer Communications 7th Edition - PowerPoint PPT Presentation

1 / 40
About This Presentation
Title:

William Stallings Data and Computer Communications 7th Edition

Description:

Decryption algorithm encryption algorithm run in reverse to produce plaintext. 7 ... E.g. Netscape and Microsoft Explorer and most Web servers ... – PowerPoint PPT presentation

Number of Views:190
Avg rating:3.0/5.0
Slides: 41
Provided by: adria221
Category:

less

Transcript and Presenter's Notes

Title: William Stallings Data and Computer Communications 7th Edition


1
William StallingsData and Computer
Communications7th Edition
  • Chapter 21
  • Network Security

2
Security Requirements
  • Confidentiality data only accessible to
    authorized parties
  • Integrity data can only be modified by
    authorized parties
  • Availability data are available to authorized
    parties
  • Authenticity host or service must be able to
    verify the identity of a user

3
Passive Attacks
  • Eavesdropping on transmissions to obtain
    information
  • Release of message contents
  • Outsider learns content of transmission
  • Traffic analysis
  • By monitoring frequency and length of messages,
    even if encrypted, nature of communication may be
    guessed
  • Difficult to detect, but can be prevented or
    deterred by encryption

4
Active Attacks
  • Masquerade
  • Pretending to be a different entity
  • Replay
  • Passively capture data or transaction, then later
    retransmit to produce unauthorized efect
  • Modification of messages
  • I.e. allow John Smith (Jane Doe) to modify
    accounts
  • Denial of service
  • Prevent or inhibit normal use or management of
    communications facilities
  • Easy to detect, but hard to prevent

5
Symmetric Encryption (Simplified)
6
Ingredients
  • Plaintext original data in unencrypted format
  • Encryption algorithm applied to plaintext to
    encrypt
  • Secret key input to the encryption algorithm
  • Ciphertext result of plaintext and secret key.
    Two different keys produce two different
    ciphertexts (using same plaintext
  • Decryption algorithm encryption algorithm run
    in reverse to produce plaintext

7
Requirements for Security
  • Strong encryption algorithm
  • Even if known, should not be able to decrypt or
    work out key
  • Even if a number of cipher texts are available
    together with plain texts of them
  • Sender and receiver must obtain secret key
    securely
  • Once key is known, all communication using this
    key is readable

8
Attacking a Symmetric Encryption Scheme
  • Cryptanalysis
  • Rely on nature of algorithm plus some knowledge
    of general characteristics of plain text
  • Attempt to deduce plain text or key
  • Brute force
  • Try every possible key until plain text is
    achieved
  • On average, need to attempt 50 of possible key
    to be successful

9
Encryption Algorithms
  • Block cipher
  • Process plain text in fixed block sizes producing
    block of ciphertext of equal size
  • Examples
  • Data encryption standard (DES)
  • Triple DES (TDES)
  • Advanced Encryption Standard (AES)

10
Data Encryption Standard
  • US standard
  • 64 bit plain text blocks
  • 56 bit key
  • Broken in 1998 by Electronic Frontier Foundation
  • Used special purpose machine - 250,000
  • Took less than three days
  • DES IS NOT WORTHLESS!!!!

11
Triple DES
  • Incorporated in DES standard 1999
  • Uses 3 keys and 3 executions of DES algorithm
  • Effective key length 112 or 168 bit
  • Slow
  • Block size (64 bit) too small

12
Advanced Encryption Standard
  • National Institute of Standards and Technology
    (NIST) in 1997 issued call for Advanced
    Encryption Standard (AES)
  • Security strength equal to or better than 3DES
  • Improved efficiency
  • Symmetric block cipher
  • Block length 128 bits
  • Key lengths 128, 192, and 256 bits
  • Evaluation included security, computational
    efficiency, memory requirements, hardware and
    software suitability, and flexibility
  • 2001, AES issued as federal information
    processing standard (FIPS 197)

13
Fundament Encryption Alternatives
  • Link Encryption
  • End-to-End Encryption

14
Link Encryption
  • Each communication link equipped with an
    encryption device at both ends
  • All traffic assumed secure
  • High level of security
  • Requires lots of encryption devices
  • Disadvantage - message must be decrypted at each
    switch to read address (virtual circuit number)
  • Security vulnerable at switches
  • Particularly on public switched network

15
End to End Encryption
  • Encryption done at end systems
  • Data in encrypted form crosses network unaltered
  • Destination shares key with source to decrypt
  • Host can only encrypt user data
  • Otherwise switching nodes could not read header
    or route packet
  • Traffic pattern not secure
  • Can combine both link and end to end

16
Ways to Distribute Key
  • Key selected by A and delivered to B
  • or
  • Third party selects key and delivers to A and B
  • or
  • Use old key to encrypt and transmit new key from
    A to B
  • or
  • Use old key to transmit new key from third party
    to A and B

17
Automatic Key Distribution (diag)
18
Automatic Key Distribution
  • Session Key
  • Used for duration of one logical connection
  • Destroyed at end of session
  • Used for user data
  • Permanent key
  • Used for distribution of keys
  • Key distribution center
  • Determines which systems may communicate
  • Provides one session key for that connection
  • Security service module (SSM)
  • Performs end to end encryption
  • Obtains keys for host

19
Traffic Padding
  • Countermeasure prevents attacker from learning
    traffic patterns
  • Produce ciphertext continuously
  • If no plain text to encode, send random data
  • Makes traffic analysis impossible

20
Message Authentication
  • Protects against active attacks such as
    falsification of data and transactions
  • Message is authentic if it is genuine and comes
    from the alleged source
  • Authentication allows receiver to verify that
    message
  • has not been altered
  • is from authentic source

21
Authentication Using Encryption
  • Assumes sender and receiver are only entities
    that know key
  • Message includes
  • error detection code
  • sequence number
  • time stamp

22
Authentication Without Encryption
  • Authentication tag generated and appended to each
    message
  • Message not encrypted
  • Useful for
  • Messages broadcast to multiple destinations
  • Have one destination responsible for
    authentication
  • One side heavily loaded
  • Encryption adds to workload
  • Can authenticate random messages
  • Programs authenticated without encryption can be
    executed without decoding

23
Message Authentication Code
  • Generate authentication code based on shared key
    and message
  • Common key shared between A and B
  • If only sender and receiver know key and code
    matches
  • Receiver assured message has not been altered
  • Receiver assured message is from alleged sender
  • If message has sequence number, receiver assured
    of proper sequence

24
One Way Hash Function
  • Accepts variable size message and produces fixed
    size tag (message digest)
  • Advantages of authentication without encryption
  • Encryption is slow
  • Encryption hardware expensive
  • Encryption hardware optimized to large data
  • Algorithms covered by patents
  • Algorithms subject to export controls (from USA)

25
Secure Hash Functions
  • Hash function must have following properties
  • Can be applied to any size data block
  • Produce fixed length output
  • Easy to compute
  • Not feasible to reverse
  • Not feasible to find two messages that give the
    same hash

26
SHA-1
  • Secure Hash Algorithm 1
  • First developed by NIST
  • No known weaknesses

27
Public Key Encryption
  • Based on mathematical algorithms
  • Asymmetric
  • Use two separate keys sender and receiver each
    have a public and private key
  • Ingredients
  • Plain text
  • Encryption algorithm
  • Public and private key
  • Cipher text
  • Decryption algorithm

28
Public Key Encryption -Encryption
29
Public Key Encryption Authentication
30
Public Key Encryption - Operation
  • One key made public
  • Used for encryption
  • Other kept private
  • Used for decryption
  • Infeasible to determine decryption key given
    encryption key and algorithm
  • Either key can be used for encryption, the other
    for decryption

31
Steps
  • User generates pair of keys
  • User places one key in public domain
  • To send a message to user, encrypt using public
    key
  • User decrypts using private key

32
Digital Signature
  • Sender encrypts message with their private key
  • Receiver can decrypt using senders public key
  • This authenticates sender, who is only person who
    has the matching key
  • Does not give privacy of data
  • Decrypt key is public

33
Public Key Certificate Use
34
Secure Sockets LayerTransport Layer Security
  • SSL general-purpose service
  • Set of protocols that rely on TCP
  • Two implementation options
  • Part of underlying protocol suite
  • Transparent to applications
  • Embedded in specific packages
  • E.g. Netscape and Microsoft Explorer and most Web
    servers
  • Minor differences between SSLv3 and TLS

35
IPv4 and IPv6 Security
  • IPSec - IP security Protocol
  • Can encrypt and/or authenticate all traffic at
    the IP level. Thus, remote logon, email, file
    transfer, Web access, etc. are secure
  • Applications
  • Secure VPN connectivity over Internet
  • Secure remote access over Internet
  • Extranet and intranet connectivity
  • Enhanced electronic commerce security

36
IPSec Main Functions
  • Authentication header authentication service
  • Encapsulated security payload combined
    authentication/encryption function
  • Key exchange function

37
Security Association
  • One way relationship between sender and receiver
  • For two way, two associations are required

38
Required Reading
  • Stallings chapter 21
  • Web sites on public/private key encryption
  • RFCs mentioned
  • www.rfc-editor.org

39
Chapter 21 Review Questions
  • Define the following terms confidentiality,
    integrity, authenticity, availability
  • What is a passive attack? Provide examples.
  • What is an active attack? Provide examples.
  • Define encryption. Provide an example of
    symmetric encryption.
  • Discuss the security requirements for symmetric
    encryption.
  • Describe Advanced Encryption Standard (AES)
  • Describe the various ways in which encryption
    keys can be distributed.

40
Chapter 21 Review Questions (cont.)
  • Discuss the purpose of traffic padding.
  • Provide an example of message authentication.
  • Compare and contrast a one-way hash with
    encryption. Provide an example of its use.
  • Compare and contrast public key (asymmetric)
    encryption with symmetric encryption.
  • What is the purpose of a public key certificate?
    Describe how it is employed.
Write a Comment
User Comments (0)
About PowerShow.com