Title: Theory and Design of Network Security
1Theory and Design of Network Security
- Part III Network Protocols
- Unit 8 Secure Network Protocols
2Reference
- Wenbo Mao. Modern Cryptography Theory and
Practice. Prentice Hall, 2003.
3Basic Authentication Techniques
- Challenge-Response Mechanisms
4Manipulation Detection Code
5Applying Asymmetric Cryptographic Technique
Nonce Importance
6Standardization of the Challenge-Response
Mechanism
Unilateral entity authentication
ISO Two-Pass Unilateral Authentication Protocol
7Using a Cryptography Check Function (CCF)
8ISO Public Key Two-Pass Unilateral Authentication
Protocol
9Timestamp Mechanism
10Using MDC
11Applying Asymmetric Cryptographic Techniques
12Standardization of Timestamp Mechanism
ISO Symmetric Key One-Pass Unilateral
Authentication Protocol
13CCF Public Key Techniques
14Non-standard Mechanisms
15Mutual Authentication
16Wieners Attack
17Involving Trusted Third Party
The Woo-Lam Protocol
18Password-based Authentication
19Needhams Password Protocol
20A One-time Password Scheme
21Attack of S/KEY Man-in-the-Middle Attack
22Encrypted Key Exchange (EKE) (1)
Off-line Dictionary Attack
23Encrypted Key Exchange (EKE) (2)
24Authenticated Key Exchange
- The Station-to-Station (STS) Protocol
- Mutual Entity Authentication
- Mutually Authenticated Key Agreement
- Mutual Key Confirmation
- Perfect Forward Secrecy (PFS)
- Anonymity (Deniability)
25STS Protocol
26A Flaw in a Simplified STS protocol (1)
27A Flaw in a Simplified STS protocol (2)
28A minor Flaw of the STS Protocol
Perfect denial of service attack
29Typical Attacks on Authentication Protocols
- Message Replay Attack (page 43,44)
30Message Replay Attack
31Parallel Session Attack (1)
32Parallel Session Attack (2)
33Reflection Attack
34Attack Due to Type Flaw (1)
35Attack Due to Type Flaw (2)
36Attack Due to Name Omission
37Attack Due to Misuse of Cryptographic Services
- Attack due to absence of data-integrity
protection - Confidentiality failure due to absence of
semantic security protection
38A Minor Variation of the Otway-Rees Protocol
39An Attack
40Authentication Protocols for Internet Security
- Internet Protocol Security (IPSec)
41Confidentiality Protection in IPSec
- Encapsulating Security Payload (ESP)
42The Internet Key Exchange (IKE) Protocol (1)
43The Internet Key Exchange (IKE) Protocol (2)
44Authentication Failure
45Signature-based IKE Phase 1 Aggressive Mode
46A Plausible Deniability Feature in IKE
Plausible Deniability Permit an entity to deny
plausibly the existence of a connection with
a Communication partner
47The Secure Shell (SSH) Remote Login Protocol (1)
- The SSH Architecture
- The SSH Transport Layer Protocol
- Unilaterally authenticated secure channel from
the server to the client - The SSH User Authentication Protocol
- Unilateral authentication protocols to achieve
entity authentication from a client-side user to
the server - The SSH Connection protocol
48The Secure Shell (SSH) Remote Login Protocol (2)
49The Secure Shell (SSH) Remote Login Protocol (3)
50The Secure Shell (SSH) Remote Login Protocol (4)