network security chapter 8 12/13/20151. cryptography introduction to cryptography substitution...

68
Network Security Chapter 8 03/30/22 1

Upload: gwendoline-bradford

Post on 17-Jan-2016

250 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Network Security

Chapter 8

04/21/23 1

Page 2: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Cryptography

• Introduction to Cryptography

• Substitution Ciphers

• Transposition Ciphers

• One-Time Pads

• Two Fundamental Cryptographic Principles

04/21/23 www.ishuchita.com 2

Page 3: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Need for Security

Some people who cause security problems and why.04/21/23 www.ishuchita.com 3

Page 4: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

An Introduction to Cryptography

The encryption model (for a symmetric-key cipher).04/21/23 www.ishuchita.com 4

Page 5: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Transposition Ciphers

A transposition cipher.04/21/23 www.ishuchita.com 5

Page 6: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

One-Time Pads

The use of a one-time pad for encryption and the possibility of getting any possible plaintext from

the ciphertext by the use of some other pad.

04/21/23 6

Page 7: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Quantum Cryptography

An example of quantum cryptography.04/21/23 www.ishuchita.com 7

Page 8: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Symmetric-Key Algorithms

• DES – The Data Encryption Standard

• AES – The Advanced Encryption Standard

• Cipher Modes

• Other Ciphers

• Cryptanalysis

04/21/23 www.ishuchita.com 8

Page 9: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Product Ciphers

Basic elements of product ciphers. (a) P-box. (b) S-box. (c) Product.04/21/23 www.ishuchita.com 9

Page 10: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Data Encryption Standard

The data encryption standard. (a) General outline.(b) Detail of one iteration. The circled + means exclusive OR.04/21/23 www.ishuchita.com 10

Page 11: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Triple DES

(a) Triple encryption using DES. (b) Decryption.04/21/23 www.ishuchita.com 11

Page 12: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

AES – The Advanced Encryption Standard

Rules for AES proposals

1. The algorithm must be a symmetric block cipher.

2. The full design must be public.

3. Key lengths of 128, 192, and 256 bits supported.

4. Both software and hardware implementations required

5. The algorithm must be public or licensed on nondiscriminatory terms.

04/21/23 www.ishuchita.com 12

Page 13: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

AES (2)

An outline of Rijndael.

04/21/23 www.ishuchita.com 13

Page 14: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

AES (3)

Creating of the state and rk arrays.04/21/23 www.ishuchita.com 14

Page 15: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Electronic Code Book Mode

The plaintext of a file encrypted as 16 DES blocks.04/21/23 www.ishuchita.com 15

Page 16: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Cipher Block Chaining Mode

Cipher block chaining. (a) Encryption. (b) Decryption.04/21/23 www.ishuchita.com 16

Page 17: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Cipher Feedback Mode

(a) Encryption. (c) Decryption.04/21/23 www.ishuchita.com 17

Page 18: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Stream Cipher Mode

A stream cipher. (a) Encryption. (b) Decryption.04/21/23 www.ishuchita.com 18

Page 19: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Counter Mode

Encryption using counter mode.04/21/23 www.ishuchita.com 19

Page 20: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Cryptanalysis

Some common symmetric-key cryptographic algorithms.04/21/23 www.ishuchita.com 20

Page 21: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Public-Key Algorithms

• RSA

• Other Public-Key Algorithms

04/21/23 www.ishuchita.com 21

Page 22: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

RSA

An example of the RSA algorithm.04/21/23 www.ishuchita.com 22

Page 23: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Digital Signatures

• Symmetric-Key Signatures

• Public-Key Signatures

• Message Digests

• The Birthday Attack

04/21/23 www.ishuchita.com 23

Page 24: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Symmetric-Key Signatures

Digital signatures with Big Brother.04/21/23 www.ishuchita.com 24

Page 25: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Public-Key Signatures

Digital signatures using public-key cryptography.04/21/23 www.ishuchita.com 25

Page 26: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Message Digests

Digital signatures using message digests.04/21/23 www.ishuchita.com 26

Page 27: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

SHA-1

Use of SHA-1 and RSA for signing nonsecret messages.04/21/23 www.ishuchita.com 27

Page 28: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

SHA-1 (2)

(a) A message padded out to a multiple of 512 bits.

(b) The output variables. (c) The word array.04/21/23 www.ishuchita.com 28

Page 29: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Management of Public Keys

• Certificates

• X.509

• Public Key Infrastructures

04/21/23 www.ishuchita.com 29

Page 30: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Problems with Public-Key Encryption

A way for Trudy to subvert public-key encryption.04/21/23 www.ishuchita.com 30

Page 31: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Certificates

A possible certificate and its signed hash.04/21/23 www.ishuchita.com 31

Page 32: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

X.509

The basic fields of an X.509 certificate.04/21/23 www.ishuchita.com 32

Page 33: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Public-Key Infrastructures

(a) A hierarchical PKI. (b) A chain of certificates.04/21/23 www.ishuchita.com 33

Page 34: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Communication Security

• IPsec

• Firewalls

• Virtual Private Networks

• Wireless Security

04/21/23 www.ishuchita.com 34

Page 35: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

IPsec

The IPsec authentication header in transport mode for IPv4.04/21/23 www.ishuchita.com 35

Page 36: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

IPsec (2)

(a) ESP in transport mode. (b) ESP in tunnel mode.04/21/23 www.ishuchita.com 36

Page 37: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Firewalls

A firewall consisting of two packet filters and an application gateway.04/21/23 www.ishuchita.com 37

Page 38: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Virtual Private Networks

(a) A leased-line private network. (b) A virtual private network.04/21/23 www.ishuchita.com 38

Page 39: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

802.11 Security

Packet encryption using WEP.04/21/23 www.ishuchita.com 39

Page 40: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Protocols

• Authentication Based on a Shared Secret Key

• Establishing a Shared Key: Diffie-Hellman

• Authentication Using a Key Distribution Center

• Authentication Using Kerberos

• Authentication Using Public-Key Cryptography

04/21/23 www.ishuchita.com 40

Page 41: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Based on a Shared Secret Key

Two-way authentication using a challenge-response protocol.04/21/23 www.ishuchita.com 41

Page 42: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Based on a Shared Secret Key (2)

A shortened two-way authentication protocol.04/21/23 www.ishuchita.com 42

Page 43: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Based on a Shared Secret Key (3)

The reflection attack.04/21/23 www.ishuchita.com 43

Page 44: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Based on a Shared Secret Key (4)

A reflection attack on the protocol of Fig. 8-32.04/21/23 www.ishuchita.com 44

Page 45: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Based on a Shared Secret Key (5)

Authentication using HMACs.04/21/23 www.ishuchita.com 45

Page 46: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Establishing a Shared Key:The Diffie-Hellman Key Exchange

The Diffie-Hellman key exchange.04/21/23 www.ishuchita.com 46

Page 47: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Establishing a Shared Key:The Diffie-Hellman Key Exchange

The bucket brigade or man-in-the-middle attack.04/21/23 www.ishuchita.com 47

Page 48: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Using a Key Distribution Center

A first attempt at an authentication protocol using a KDC.04/21/23 www.ishuchita.com 48

Page 49: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Using a Key Distribution Center (2)

The Needham-Schroeder authentication protocol.04/21/23 www.ishuchita.com 49

Page 50: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Using a Key Distribution Center (3)

The Otway-Rees authentication protocol (slightly simplified).04/21/23 www.ishuchita.com 50

Page 51: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Using Kerberos

The operation of Kerberos V4.04/21/23 www.ishuchita.com 51

Page 52: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Authentication Using Public-Key Cryptography

Mutual authentication using public-key cryptography.04/21/23 www.ishuchita.com 52

Page 53: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

E-Mail Security

• PGP – Pretty Good Privacy

• PEM – Privacy Enhanced Mail

• S/MIME

04/21/23 www.ishuchita.com 53

Page 54: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

PGP – Pretty Good Privacy

PGP in operation for sending a message.04/21/23 www.ishuchita.com 54

Page 55: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

PGP – Pretty Good Privacy (2)

A PGP message.04/21/23 www.ishuchita.com 55

Page 56: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Web Security

• Threats

• Secure Naming

• SSL – The Secure Sockets Layer

• Mobile Code Security

04/21/23 www.ishuchita.com 56

Page 57: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Secure Naming

(a) Normal situation. (b) An attack based on breaking into DNS and modifying Bob's record.04/21/23 www.ishuchita.com 57

Page 58: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Secure Naming (2)

How Trudy spoofs Alice's ISP.04/21/23 www.ishuchita.com 58

Page 59: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Secure DNS

An example RRSet for bob.com. The KEY record is Bob's public key. The SIG record is the top-level com server's signed has of the A and KEY records to verify their authenticity.04/21/23 www.ishuchita.com 59

Page 60: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Self-Certifying Names

A self-certifying URL containing a hash of server's name and public key.

04/21/23 www.ishuchita.com 60

Page 61: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

SSL—The Secure Sockets Layer

Layers (and protocols) for a home user browsing with SSL.04/21/23 www.ishuchita.com 61

Page 62: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

SSL (2)

A simplified version of the SSL connection establishment subprotocol.04/21/23 www.ishuchita.com 62

Page 63: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

SSL (3)

Data transmission using SSL.04/21/23 www.ishuchita.com 63

Page 64: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Java Applet Security

Applets inserted into a Java Virtual Machine interpreter inside the browser.04/21/23 www.ishuchita.com 64

Page 65: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Social Issues

• Privacy

• Freedom of Speech

• Copyright

04/21/23 www.ishuchita.com 65

Page 66: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Anonymous Remailers

Users who wish anonymity chain requests through multiple anonymous remailers.04/21/23 www.ishuchita.com 66

Page 67: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Freedom of Speech

Possibly banned material:

1. Material inappropriate for children or teenagers.

2. Hate aimed at various ethnic, religious, sexual, or other groups.

3. Information about democracy and democratic values.

4. Accounts of historical events contradicting the government's version.

5. Manuals for picking locks, building weapons, encrypting messages, etc.

04/21/23 www.ishuchita.com 67

Page 68: Network Security Chapter 8 12/13/20151. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental

Steganography

(a) Three zebras and a tree. (b) Three zebras, a tree, and the complete text of five plays by William Shakespeare.04/21/23 www.ishuchita.com 68