Title: The Secure Environment
1The Secure Environment
2The Secure Environment
Security goals (C.I.A.) and threats
3Intruders
- Common Categories
- Casual prying by nontechnical users
- Snooping by insiders
- Determined attempt to make money
- Commercial or military espionage
- Others (such as cyber wars)
4Basics of Cryptography
5Network Is NOT Secure
A
D
B
C
6Encrypt Your Information
A
D
B
C
7Data Encryption Process
Plaintext
Plaintext
Ciphertext
Decryption
Encryption
Network
8Two Types of Cryptography
9Conventional two-way Cryptography
10Conventional two-way Cryptography
- Substitution Cipher
- Caesar Cipher
- Playfair Cipher
- Etc.
11Conventional two-way Cryptography Problems
A
D
B
C
12Public Key Cryptography
Public
Private
13Public Key Cryptography Advantages
Private key A
A
Private key D
D
Public key A Public key B Public key C Public key
D
Private key B
B
Private key C
C
14PKI Certification Authority
- What is a certificate? Why do we need
Certification Authorities (CA) or trusted third
party?
A certificate is a digitally signed statement by
a CA that provides independent confirmation of an
attribute claimed by a person proffering a
digital signature. More formally, a certificate
is a computer-based record which (1) identifies
the CA issuing it, (2) names, identifies, or
describes an attribute of the subscriber, (3)
contains the subscriber's public key, and (4) is
digitally signed by the CA issuing it.
15Trapdoor function
Public Key Cryptography Some Roads Are One-Way
Easy
N5
Difficulty
N1/5
Trapdoor characteristics (1) It is easy to
compute f(x) from x. (2) Computation of x from
f(x) is likely to be intractable.
16An Example Encryption
EB(p)
DB(EB(p)) p
Network
User A
User B
A encrypts message p using Bs public key
B decrypts the ciphertext using its own private
key
17Another Example Digital Signature
EA(DB(EB(DA(p)))) EA(DA(p)) p
EB(DA(p))
Network
User B
User A
A signs message p using its own private key and
encrypts it using Bs public key
B decrypts the ciphertext using its own private
key and verifies it using As public key
18Hash functions
. . . .. .
Message Digest
Hash
- The basic requirements for a cryptographic hash
function H(x) are as follows. - The input can be of any length.
- The output has a fixed length.
- H(x) is relatively easy to compute for any given
x. - H(x) is one-way.
- H(x) is collision-free.
19More on Digital Signature
. . . .. .
Message Digest
Hash
Sign (decrypt) Using Private Key
. . . ..
Append
Signature
Signature
20More on Digital Signature
. . . ..
Message Digest
Hash
Verify (Encrypt operation) Using Public Key
Message Digest
Signature
21User Authentication
22User Authentication
- Basic Principles. Authentication must identify
- Something the user knows
- Something the user has
- Something the user is
- This is done before user can use the system
23Authentication Using Passwords
Note be careful when failed several times.
(a) A successful login (b) Login rejected after
name entered (c) Login rejected after name and
password typed
24Authentication Using Passwords
- How a cracker broke into LBL (source
A.S.Tanenbaum Modern Operating System course
materials) - a U.S. Dept. of Energy research lab
25Login Spoofing
Login
Login
(b) Phony login screen
(a) Correct login screen
26Authentication Using Passwords
,
,
,
,
Password
Salt
- The use of salt to defeat precomputation of
encrypted passwords
27Authentication Using a Physical Object
- Magnetic cards
- magnetic stripe cards
- chip cards stored value cards, smart cards
28Authentication Using Biometrics
A device for measuring finger length.
29Countermeasures
- Limiting times when someone can log in
- Automatic callback at number prespecified
- Limited number of login tries
- A database of all logins
- Simple login name/password as a trap
- security personnel notified when attacker bites
30Secure Communications Over Insecure Channels
- R. C. Merkles Puzzle
- secure Communications over Insecure Channels
- Communications of the ACM, 1978, Vol. 21, No. 4.
31One-way Hash Chain and TESLA
- Adrian Perrig, Ran Canetti, Dawn Song, and J. D.
Tygar. Efficient and secure source authentication
for multicast. In Network and Distributed System
Security Symposium, NDSS '01, February 2001.