Lectures 1 Merged
Lectures 1 Merged
Lectures 1 Merged
TMN2073
Lecture 1:
Computer Security Overview
By Dr. Adnan Shahid Khan-UNIMAS @2020
Objectives
Examine the risks involved in computing
Understand the goals of secure computing
Examine the threats to security in computing
Identify the controls available to address the threats
2
Computer Security
What does “SECURE” means to you ?
◦ Protecting your valuable assets?
◦ House, car, office, (physical assets)
◦ Your money? Safe in the bank !
◦ How sure are you that your money in safe
◦ How about your confidential data- email etc.
3
Computer Security
The definition ;
4
Computer Security
The protection of the Information and Physical Assets of a computer system.
Involves the measures and controls that ensure CONFIDENTIALITY, INTEGRITY, and AVAILABILITY of
the information processed and stored by a computer.
These include Policies, Procedures, the Hardware and Software tools necessary to protect the
computer systems and the information processed, stored, and transmitted by the systems.
5
Why do we need security in computing ?
The Internet is host to numerous threats:
6
The need for security
Consider the following areas :
1. Banking
2. Education
3. Government
4. Healthcare
5. Retail
6. Telecommunications
7
Types of Security
Physical
◦ e.g Environmental Protection
Procedural / Personnel
◦ e.g Security Policy
8
Principles and Concepts
1- Security Requirements
2- Security Threats/Attacks
2- Security Controls
http://www.aiqus.com/wiki/Computer_Security
9
For this course, we will consider there is a wireless communication between two parties
WIRELESS LINK
Security issues occurs once more then ONE devices communicate with each other,
Even if we insert PENDRIVE, the chances of injection of virus etc. is high (two nodes communicate i.e. host & pen drive)
Alice and Bob are using cellular network
(just an example, or any networks)
WIRELESS LINK
They also required their communication must be continuous and available as far as
they required their communication. If Alice/bob is uploading/downloading any video files,
the data must be available throughout the session. And
Since, they are very far, so both required that both partner must be legitimate, For instance: if Alice send some message
So at the end of day, Alice must accept that she send the message and vice versa.
On the other hand, the network provider must ensure that the network is secure.
WIRELESS LINK
They also required their communication must be continuous and available as far as
they required their communication. If Alice/bob is uploading/downloading any video files,
the data must be available throughout the session. And
Availability
Since, they are very far, so both required that both partner must be legitimate, For instance: if Alice send some message
So at the end of day, Alice must accept/agrees that she send the message and vice versa.
On the other hand, the network provider must ensure that the network is secure. Non-Repudiation
Security Requirements/Goals
Confidentiality
Integrity
Availability
Non-repudiation
http://www.aiqus.com/wiki/Computer_Security
13
Confidentiality
The protection of data from unauthorized disclosure to a third party.
Level of protection:
– Protect all user data transmitted between two users over a period of time.
– Protect a single message or even specific fields within a message.
15
Availability
The continuous operation of computing system to ensure legitimate users have access to the
data.
Applies both to data and to services
Assets are accessible to authorized parties at appropriate times.
If some person or system has legitimate access to a particular set of object, that access should
not be prevented.
Opposite of denial of service (DoS).
16
Non-repudiation
The guarantee that something came from the source it claims.
Prevents either sender or receiver from denying a transmitted message.
When a message is sent, the receiver can prove that the message was in fact sent by alleged
sender.
When a message is received, the sender can prove that the message was in fact received by the
alleged receiver.
17
SECURITY THREATS
Security Requirements
Security Threats
RELATIONSHIP BETWEEN SECURITY REQUIREMENTS
& SECURITY THREATS
SECURITY REQUIREMENTS SECURITY THREATS
CONFIDENTIALITY INTERCEPTION
INTEGRITY MODIFICATION/FABRICATION
AVAILABILITY INTERRUPTION
NON-REPUDIATION INTERCEPTION/MODIFICATION/FABRICATION
Security Threats/Attacks
Threats
– A set of circumstances that has the potential to cause lost or harm to a computing system.
Vulnerability
– A weakness in the security system that might be exploited to cause lost or harm.
Control
– A protective measure.
– An action, device, procedure, or technique that removes or reduces a vulnerability.
Relationship:
A threat is blocked by control of a vulnerability.
21
MOM
Method, Opportunity, Motive
Method – the skills, knowledge, tools, and other things with which to be
able to pull off the attack.
Opportunity – the time and access to accomplish attack.
Motive – a reason to want to perform attack against system.
22
Security Threats
There are 4 general categories:
1. Interruption
2. Interception
3. Modification
4. Fabrication
http://www.thetechaxis.com
2
3
Interruption
An asset of the system is destroyed or becomes unavailable or unusable.
Attack on availability.
Examples: destruction of a piece of hardware such as a hard disk, the cutting of communication
line, the disabling of the file management system
24
Interception
An unauthorized party gains access to an asset.
Attack on confidentiality.
The unauthorized party could be a person, a program, or a computer.
Examples: wiretapping to capture data in a network, unauthorized copying of files or programs.
25
Modification
An unauthorized party not only gains access to but tampers with an asset.
Attack on integrity.
Examples: changing values in a data file, altering a program so that it performs differently,
modifying the content of messages being transmitted in a network.
26
Fabrication
An unauthorized party inserts counterfeit objects into the system.
Attack on authenticity.
Examples: the insertion of spurious messages in a network, the addition of records to a file.
27
Security Threats (illustration)
Information Information
source destination
Normal Flow
Interruption Interception
Modification Fabrication
28
Vulnerabilities
Interruption (DoS) Interception (Theft)
Fabrication
Modification HARDWARE
(substitution)
Interruption (Deletion)
Interruption (Loss)
Interception
Fabrication
Modification (Logic bomb)
29
Hardware Vulnerabilities
Add, change, remove devices.
Intercept the traffic to devices.
Flooding devices with traffic until they can no longer function.
Drench with water, burn, frozen, gas, and electrocute with power surge.
Spill, kick, slap, bump, jar, punch.
Shot, stab.
Bombs, fires, collisions.
Others
30
Software Vulnerabilities
Replace, change, destroy software maliciously.
Modify, delete, misplace software accidentally.
Logic bomb, Trojan horse, virus, trapdoor, information leaks.
Unauthorized copying of software (pirated software).
31
Data Vulnerabilities
Tapping wires, planting bugs in output devices, filter through trash receptacles, monitoring
electromagnetic radiation, bribing key employees, inferring one data point from other values,
requesting the data.
Stealing, buying, finding, hearing data.
Modifying data.
32
Security Control
Legal and ethical restrictions on computer-based crime.
Controls are needed to preserve Confidentiality, Integrity, and Availability.
Physical controls
Encryption
Software controls
Hardware controls
Policies and procedures
33
Q&A
34
Computer Security
TMN 2073
Lecture 2:
Cryptography and
Basic Security Mechanisms
Lecture Outline
Basic Terminology, Background and Notation
Cryptography Techniques
Cryptanalysis
Types of Algorithm
“Good” Cipher
2
Cryptography - What is it?
The definition:
Cryptography – ‘ A secret manner of writing, either by arbitrary characters, by using letters or
characters in other than their ordinary sense, or by other methods intelligible only to those
possessing the key ’.
(Oxford Dictionary, 2006)
Cryptography(secret writing)
- Is the strongest tool for controlling against many kinds of security threats.
(Security in Computing 4th Ed , 2007)
3
Introduction
Transformation of information into an encrypted form that cannot
be read by third parties
Originally used almost exclusively for diplomatic and military
communications
◦ fundamental change in recent days due to public / commercial
use of IT- based communications
May be applied to data communications or stored information
4
CRYTPGRAPHY
INSURE CHANNEL
Basic Terminology & Notation (1)
Plaintext
◦ plaintext is the readable message or data which will be used by the cryptographic process.
Ciphertext
◦ ciphertext is the un-readable message or data which is the outcome of the cryptographic process.
◦ 2 different key produce 2 different ciphertext
Encryption [encode]
◦ encryption is the process of turning plaintext into ciphertext
◦ Use encryption algorithm
6
cont…
Decryption [decode]
◦ decryption is the process of turning ciphertext into plaintext.
Cryptography
◦ a cipher system where plaintext is transformed into ciphertext using an algorithm
◦ at the recipient end, the message is deciphered to recover the original
Cryptanalysis
◦ used by an interceptor on the ciphertext to determine the plaintext information
7
Implementing Cryptography
Simplest arrangements rely on secrecy of the cryptographic algorithm
◦ once discovered all the information is insecure
8
Basic Cryptographic Scheme
original
plaintext ciphertext plaintext
ENCRYPTION DECRYPTION
P E C D P
9
Formal Notation
ENCRYPTION DECRYPTION original
plaintext ciphertext plaintext
ENCODING DECODING
P ENCIPHERING C DECIPHERING P
E D
◼ C = E(P) E – encryption rule/algorithm
◼ P = D(C) D – decryption rule/algorithm
◼ We need a cryptosystem, where:
◼ P = D(C)= D(E(P))
10
Cryptographic Techniques Vernam Cipher
By Gilbert Vernam for AT&T
Immune to most cryptanalytic attacks
Modulo 2 transformations using binary (XOR)
Key (K) Key (K)
+ +
Plaintext (P) Ciphertext (C) Plaintext
= (P + K) = (P + K) + K = P
11
Benefits of Cryptography
It’s just an improvement but not a Solution!
◦ Minimizes problems
◦ Doesn’t solve them
◦ Remember: There is no solution!
◦ Adds an envelope (encoding) to an open postcard (cleartext)
Cryptographic Techniques
Transposition
◦ the method by which symbols in the plaintext are moved into different
positions in the ciphertext.
Substitution
◦ the method by which symbols in the plaintext are replaced with
different (usually) symbols in the ciphertext.
Concealment
◦ the method by which additional symbols are placed in the ciphertext to
conceal the content.
13
Cryptographic Techniques Transposition
Rearrangement of the order of bits in a data block according to a fixed permutation
Total number 1’s and 0’s is preserved
Only secure if each message has its own transposition
Simple transposition may be target of brute force attack :
◦ attempting each permutation of encrypted text
14
Transposition Methods
Simple Transposition
transposition using matrix
Plaintext SECRET ILOVEASECURITYSUBJECT
S R
E T I L O V E
Encrypt C E S E C U R
R S I T Y S U
E C B J E C T
T E
15
Cryptographic Techniques
Substitution
Systematic replacement of one symbol by another
Uses a lookup table
Number of 1’s and 0’s not preserved
Vulnerable to statistical analysis
◦ e.g. based upon frequency of character occurrence
16
Example of Substitution
(Plaintext)
secretmessage
Encrypt
VHFUHWPHVVDJH
(Ciphertext)
ci = E ( pi ) = pi + 3
17
Cryptographic Techniques
Concealment :
◦ Message symbols are mixed up with many other symbols that carry no useful
information
◦ Gives considerable security, but can greatly expand the message
18
Shannon’s “Rules”
1. The amount of secrecy needed should determine the amount of labor
appropriate for the encryption and decryption.
2. The set of keys and the enciphering algorithm should be free from
complexity.
3. The implementation of the process should be as simple as possible.
4. Errors in ciphering should not propagate and cause corruption of further
information in the message.
5. The size of the ciphertext should be no larger than the plaintext.
19
Cryptanalysis (1)
Cryptanalyst attempts to deduce the original meaning of the ciphertext
message.
Cryptanalysts goals:
◦ Break a single msg
◦ Recognize patterns in encrypted msgs, to be able to break the subsequent ones
◦ Infer meaning without breaking encryption
◦ Unusual volume of msgs between enemy troops may indicate a coming attack
◦ Busiest node may be enemy headquarters
◦ Deduce the key, to facilitate breaking subsequent msgs
◦ Find vulnerabilities in implementation or environment of an encryption algorithm
◦ Find a general weakness in an encryption algorithm
20
Cryptanalysis (2)
Information used for cryptanalysts:
◦ Intercepted encrypted msgs
◦ Known encryption algorithms
◦ Intercepted plaintext
◦ Data known or suspected to be ciphertext
◦ Math or statistical tools and techniques
◦ Properties of natural languages
◦ Esp. adversary’s natural language
◦ To confuse the Japanese cryptanalysts, Americans used Navajo language in WW2
◦ Propertiers of computer systems
21
Classification of
Cryptosystems -
Keys
22
Breakable Encryption
An encryption algorithm is called breakable
- given enough time and data, an analyst can determine the algorithm.
-
Breakable encryption
◦ Practical cryptosystems almost always are breakable, given adequate time and computing power
[cf. J. Leiwo, VU, NL]
23
Requirements for Crypto Protocols
◦ Messages should get to destination
◦ Only the recipient should get it
◦ Only the recipient should see it
◦ Proof of the sender’s identity
◦ Message shouldn’t be corrupted in transit
◦ Message should be sent/received once
◦ Proofs that message was sent/received (non-repudiation)
24
Making “Good” Ciphers
Cipher = encryption algorithm
25
1. Criteria for “Good” Ciphers (1)
◼ “Good” depends on intended application
◼ Substitution
◼ C hides chars of P
◼ Transposition
◼ C scrambles text => hides n-grams for n > 1
◼ Product ciphers
◼ Can do all of the aboveWhat is more important for your app?
What facilities available to sender/receiver?
◼ E.g., no supercomputer support on the battlefield
26
Criteria for “Good” Ciphers (2)
◼ Claude Shannon’s criteria (1949):
27
Criteria for “Good” Ciphers (3)
◼ Shannon’s criteria (1949) – cont.
28
Criteria for “Good” Ciphers (4)
◼ Characteristics of good encryption schemes
◼ Confusion:
interceptor cannot predict what will happen to C when she changes one char in P
◼ E with good confusion:
29
Criteria for “Good” Ciphers (5)
◼ Commercial Principles of Sound Encryption Systems
1. Sound mathematics
▪ Proven vs. not broken so far
2. Verified by expert analysis
▪ Including outside experts
3. Stood the test of time
▪ Long-term success is not a guarantee
▪ Still. Flows in many E’s discovered soon after their release
◼ Examples of popular commercial E’s:
DES = Data Encryption Standard
◼ DES / RSA / AES RSA = Rivest-Shamir-Adelman
AES = Advanced Encryption Standard (rel. new)
[cf. A. Striegel]
30
Types of Algorithm
Symmetric algorithm
◦ uses a common secret key at sender and receiver ends
◦ aka secret or private key cryptography
◦ e.g. DES, IDEA
Asymmetric algorithm
◦ uses a pair of keys, one secret and one public
◦ aka public key cryptography
◦ e.g. RSA
31
Symmetric Algorithm
32
Asymmetric Algorithm
33
Symmetric and Asymmetric Cryptosystems (2)
◼ Problems with symmetric encryption:
◼ Ensuring security of the “key channel”
pair
◼ For n communicating users, need:
n * (n -1) /2 keys
34
Symmetric and Asymmetric Cryptosystems (3)
35
Symmetric and Asymmetric Cryptosystems (4)
◼ One PKE approach:
◼ R keeps her private key KD
36
Symmetric and Asymmetric Cryptosystems (5)
Symm. vs. Asymm. Key Algorithms
Symmetric Asymmetric
37
Symmetric and Asymmetric Cryptosystems (6)
Need for Key Management
ASYMMETRIC CRYPTOGRAPHY
FOCUS ON ASYMMETRIC CRYPTOSYSTEM, FEASBILBE FOR
WIRELSS COMMUNICATION
ASYMMETRIC CRYPTOSYSTEM
AKA- PUBLIC KEY CRYPTOGRAPHY
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
PRIVATE KEY (ALICE) PRIVATE KEY (BOB)
PLAINTEXT PLAINTEXT
(PT) (PT)
PUBLIC KEY (BOB) PRIVATE KEY (BOB)
ENCRYPTION ALGORITHM DECRYPTION ALGORITHM
CIPHERTEXT CIPHERTEXT
CT CT
CRYTPANALYSIS
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
PRIVATE KEY (ALICE) PRIVATE KEY (BOB)
Example
Email address:
adnan.unimas@gmail.com (public key)
********** (private key)
Sender: if X, THEN, X will use my public key (available online etc)
To encrypt his/her message, later, adnan will use his private key to
PLAINTEXT Decrypt the message. PLAINTEXT
(PT) (PT)
PUBLIC KEY (BOB) PRIVATE KEY (BOB)
ENCRYPTION ALGORITHM DECRYPTION ALGORITHM
CIPHERTEXT CIPHERTEXT
CT CT
CRYTPANALYSIS
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
PRIVATE KEY (ALICE) SEEMS SECURED RIGHT? PRIVATE KEY (BOB)
USUALLY, ONCE I RECEIVED MESSAGE FROM ANYONE
I WILL USE MY PASSWORD TO DECRYPT THE MESSAGE
Example
Email address:
adnan.unimas@gmail.com (public key)
********** (private key)
Sender: if X, THEN, X will use my public key (available online etc)
To encrypt his/her message, later, adnan will use his private key to
PLAINTEXT Decrypt the message. PLAINTEXT
(PT) (PT)
PUBLIC KEY (BOB) PRIVATE KEY (BOB)
ENCRYPTION ALGORITHM DECRYPTION ALGORITHM
CIPHERTEXT CIPHERTEXT
CT CT
CRYTPANALYSIS
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
PRIVATE KEY (ALICE)
X PRIVATE KEY (BOB)
POSSIBLE ATTACK
“IMPERSONATION”
ANYONE CAN SEND ME “email”
There is no method to verify who is the
PLAINTEXT PLAINTEXT
(PT)
sender or either the (PT)
PUBLIC KEY (BOB) Sender is LEGITIMATE USER PRIVATE KEY (BOB)
ENCRYPTION ALGORITHM DECRYPTION ALGORITHM
CIPHERTEXT CIPHERTEXT
CT CT
CRYTPANALYSIS
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
PRIVATE KEY (ALICE) PRIVATE KEY (BOB)
POSSIBLE SOLUTION
PUBLIC KEY INFRASTRUCTURE
PLAINTEXT AKA “PKI” PLAINTEXT
(PT) (PT)
PUBLIC KEY (BOB) PRIVATE KEY (BOB)
ENCRYPTION ALGORITHM DECRYPTION ALGORITHM
CIPHERTEXT CIPHERTEXT
CT CT
CRYTPANALYSIS
Public Key Encryption
Aka asymmetric-key
P K E uses 2 different keys at once
◦ Private key
- known only to your computer
◦ Public key
- given by your computer to any computer that
wants to communicate securely with it
Adapted from how stuffworks
46
Problem with public key encryption
Encryption is primarily composed of public key /
private key systems in the modern world.
The main problems with any system to distribute
public keys are:
1. How do you know
1. this is in fact the right key for the party you wish to communicate
with?
2. the information associated with the key is correct (i.e. name, email address, etc.)?
3. the key has not been revoked (i.e. if it is stolen the owner would want people to stop using it)?
47 47
cont…
Difficulty of knowing whether a public key is really owned by the person it is claimed to belong to.
– A user could advertise that a public key belongs to Siti when in fact it doesn’t; that user could then intercept messages
intended for Siti and decrypt them with the private key belonging to the key pair.
Since you cannot meet every single person you wish to communicate with and verify all the
details there is a need for a solution.
Public Key Infrastructure allows for distribution (and to some degree management) of
public keys, thus allowing people to encrypt/decrypt, sign and verify data from other people.
48
49
Computer
Security
TMN 2073
http://web-vuln.blogspot.com/2011/09/let-us-more-aware-of-computer-security.html
Lecture 3:
Cryptography -Part II
RECAP
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
PRIVATE KEY (ALICE)
X PRIVATE KEY (BOB)
POSSIBLE ATTACK
“IMPERSONATION”
ANYONE CAN SEND ME “email”
There is no method to verify who is the
sender or either the
PLAINTEXT PLAINTEXT
(PT)
Sender is LEGITIMATE USER (PT)
PUBLIC KEY (BOB) PRIVATE KEY (BOB)
ENCRYPTION ALGORITHM DECRYPTION ALGORITHM
CIPHERTEXT CIPHERTEXT
CT CT
CRYTPANALYSIS
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
PRIVATE KEY (ALICE) PRIVATE KEY (BOB)
POSSIBLE SOLUTION
PUBLIC KEY INFRASTRUCTURE
PLAINTEXT AKA “PKI” PLAINTEXT
(PT) (PT)
PUBLIC KEY (BOB) PRIVATE KEY (BOB)
ENCRYPTION ALGORITHM DECRYPTION ALGORITHM
CIPHERTEXT CIPHERTEXT
CT CT
CRYTPANALYSIS
USER SELECT TWO KEYS
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
SUBMIT THESE KEYS ALONG WITH OTHER CREDENTIALS TO REGISTRATION AUTHORITY
PRIVATE KEY (ALICE) PRIVATE KEY (BOB)
REGISTRATION AUTHORITY VERIFIES THE DOCUMENTS AND SUBMIT TO CERTIFICATE AUTHORITY
CERTIFICATE AUTHORITY BINDS THESE TWO KEYS AND CREATE DIGITAL CERTIFICATE OR DIGITAL SIGNATURE
CONFIDENTIALITY, INTEGRITY, AVAILABILITY & NON-REPUDIATION
(PT) (PT)
CONFIDENTIALITY D(PT)
E(PT)
CT CT
H(CT) INTEGRITY H(CT)=H(CT)
H(CT)
CT+H(CT)
CT+H(CT)
DIGITAL SIGNATURE NON-REPUDIATION APPLY PUBLIC KEY ALICE DIGITAL SIGNATURE
=E[CT+H(CT)]PRIVATE KEY ALICE =E[CT+H(CT)]PRIVATE KEY ALICE
DS DS
AVAILABILITY
What is Registration Authority (RA)?
Registration---Required only if the user generates the key pair.- personal certificate, User has to send the public key and the associated
registration information (e.g. subject name, etc.) and all the evidence about herself to the RA.
Verification---After the registration process is complete, the RA has to verify the user’s credentials. Why verify?
◦ The RA needs to verify the user’s credentials (evidence provided) and ensure that they are acceptable.
◦ To ensure that the user who requesting for the certificate does indeed posses the private key corresponding to the given public key - Proof
Of Possession (POP).
Certificate creation---The RA passes on all the details of the user to the CA. The CA does its own verification (if required) and creates a DC for
the user using program for creating certificate in the X.509 format. Then, the CA sends the certificate to the user, and also retains a copy of the
certificate for its own record in a certification directory/certificate repository. The DC can be attached to an email or the CA can send an email
to user, informing that the certificate is ready and can be downloaded from the CA’s site.
8
USER SELECT TWO KEYS
PUBLIC KEY (ALICE) PUBLIC KEY (BOB)
SUBMIT THESE KEYS ALONG WITH OTHER CREDENTIALS TO REGISTRATION AUTHORITY
PRIVATE KEY (ALICE) PRIVATE KEY (BOB)
REGISTRATION AUTHORITY VERIFIES THE DOCUMENTS AND SUBMIT TO CERTIFICATE AUTHORITY
CERTIFICATE AUTHORITY BINDS THESE TWO KEYS AND CREATE DIGITAL CERTIFICATE OR DIGITAL SIGNATURE
CONFIDENTIALITY, INTEGRITY, AVAILABILITY & NON-REPUDIATION
AVAILABILITY
What is the PKI Made of?
IS NOT AUTHENTICATION MECHANISM OR ANY SECURITY SCHEME ITS AN INFRASTRUCTURE
12
CERTIFICATE AUTHORITY
To understand CA, we must know how keys are created
The CA is one of the entities that provides the element of trust for the PKI. A party relying on
a digital certificate trusts the CA to have correctly included the certificate holder's public key,
and other details, in the digital certificate, and to have digitally signed the digital certificate to
validate its authenticity and integrity
What are Digital Certificates?
What do they do?
A digital certificate is in many ways the electronic equivalent of a passport or driver's license, and may be
used to identify and authenticate someone making online transactions.
Digital certificates are digital files that certify the identity of an individual or institution seeking access to
computer-based information.
In enabling such access, they serve the same purpose as a driver’s license or ID card. – to prove that you
have the right to access information/ services online
14
A digital certificate is issued to a certificate holder by a certification authority on the request of a
registration authority. Details on a digital certificate include the certificate holder’s name, their
public key, the name of the certification authority and an indication of the certificate policy
under which it was issued.
CA creates the digital certificate, incorporating the public key and signs it, protecting the
integrity of the information.
The public key in a digital certificate is linked to the private key. The certificate holder must hold
the private key securely
15 15
The digital certificate links the identifier of an individual or institution to a digital public key.
Used in conjunction with encryption, Digital Certificates provide a more complete security
solution, assuring the identity of all parties involved in a transaction.
The sender can also digitally sign the message using their own private key to prove that the message
originated from them. If the message has been digitally signed, the recipient would verify the sender by
obtaining the sender's digital certificate from a trusted directory and using this to verify the sender's digital
signature.
The effectiveness and reliability of the digital certificate is based on the confidence all parties to a
transaction have in the structure, policies and procedures surrounding the PKI system.
16
How are certificates issued ?
A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key.
CA issues a certificate associated with a key pair to a user (or computer) whose identity it has already verified.
Is a trusted authority for certifying individuals’ identities and creating an electronic document (digital certificate)
indicating that individuals are who they say they are.
17
PKI Trust Model: Browser Model
Applications that are written to use the PKI.
18
PKI Policies:
Certification Practice Statement (CPS)
• PKI policies lay out rules governing
– key security,
– the process for issuing,
– renewing and revoking certificates,
– default certificate lifetimes, and so forth.
• Public (commercial) PKIs such as VeriSign are required to publish a document called a Certificate Practice Statement (CPS).
19
Certificate Server (CS)
The actual service that issues certificates based on the data provided during the initial registration
process.
Constructs and populates the digital certificate (DS) with the necessary information and combines the
user’s public key with the resulting certificate.
20
Issuance, Management and Revocation of Certificates
❑When Request for a certificate is made to a CA, a key pair must be created and signed by the requestor, then
the public key is sent to the CA
❑CA must verify the signature and identity based on its policies
❑CA signs the user’s public key with the CA’s private key. This creates the certificate, which is then sent back to
the requestor. The certificate can then be published.
❑Certificates are generally stored on the requestor’s computer, but they can be moved (exported) to another computer.
You also can export the certificate to back it up, and then import it to restore it.
❑Many reasons a certificate might need to be revoked.
❑key is compromised
❑user leaves the organization
❑Done by publishing and distributing a Certificate Revocation List (CRL).
21
Computer
Security
TMN 2073
Authenticated.
Auth-Req
Auth-Rsp. Auth-Rsp. Auth-Req
CIMB BANK
Challenge
User Name
Password
INSECURE CHANNEL
CRYPTANALYSIS
User Identification & Authentication
3
Some Terminology
Authentication
◦ Process of identifying an individual usually based on a username and password
◦ What is Authentication ? Authentication is the act of confirming the truth of an attribute of a
datum or entity. This might involve confirming the identity of a person or software program,
tracing the origins of an artifact, or ensuring that a product is what its packaging and labeling
claims to be. Authentication often involves verifying the validity of at least one form of
identification.
Authorization
◦ Process of giving individuals access to system objects based on their identity
Identification
◦ An act or instance of identifying ; the state of being identified
◦ Something that identifies a person, animal, or thing: Your student ID ???
4
Authentication Strategies
• Three main approaches to authentication :
6
cont...
3. Something the user is
• a biometric characteristics of a user;
• Finger print
• Iris
• Hand geometry
• Finger geometry
• Face geometry
• Ear shape
• Retina
7
Authenticated.
Auth-Req
Auth-Rsp. Auth-Rsp. Auth-Req
CIMB BANK
Challenge
User Name
Password
9
AUTHENTICATION FACTORS
Authentication factors classically fall into three categories:
Knowledge factors: include things a user must know in order to log in: User
names, IDs, passwords and personal identification numbers (PINs) all fall
into this category. (ONE FACTOR AUTHENTICATION)
Possession factors: include anything a user must have in his possession to
log in. This category includes one-time password tokens (OTP tokens), key
fobs, smartphones with OTP apps, employee ID cards and SIM cards.
(TWO FACTOR AUTHENTICATION)
Inherence factors: include any biological traits the user is that are
confirmed for log in. This category includes the scope of biometrics such
as retina scans, iris scans, fingerprint scans, finger vein scans, facial
recognition, voice recognition, hand geometry and even earlobe geometry.
(THREE/MULTI-FACTOR AUTHENTICATION)
10
Secure Protocol-Basics
A protocol is a set of rules for exchanging messages between 2 or more
entities/parties where a message is a unit of information/data sent from
one entity/party to another as part of a protocol.
A protocol has a number of rounds(>1) and a number of messages(>1)
A round is a basic unit of protocol time:
1. Wake up because of: a) Alarm clock b) Initial start or c) Receive
message(s) from other(s) or Initialization
2. Compute something
3. Send message(s) to others
4. Repeat steps 2-3, if needed
5. Wait for message(s) or sleep until alarm clock
11
One factor Authentication
user knows
UNILATERAL AUTHENTICATION
Authenticated
SERVICES AVAILABILITY
One factor Authentication
user knows
Entered Password
Authenticated
SERVICES AVAILABILITY
One factor Authentication
user knows
Entered Password
Authenticated
SECRET WORD WAS ONLY SAVED DURING REGISTRATION, PROCESS AT SERVER, SO ONLY LEGITIMATE
SERVER CAN TELL YOU ABOUT THE SECURE WORD
TWO WAY PHISHING OR IMPERSONATION IS AGAIN VERY HIGH
FIRST ATTACKER TRY TO DO CRYPTANALYSIS AND DO
SPOOFING (EMAIL SEND THROUGH LINK, USER CLICK THE LINK, AND ATTACKERS GET SOME CREDENTIALS)
AND THEN OFFLINE PASSWORD GUESSING (ONCE PASSWORD GUESSED)
CREATE PHISHING CLIENT TO THE SERVER AND GET HOLD OF THE COMMUNICATION
CALLED MAN IN THE MIDDLE ATTACK
SERVICES AVAILABILITY
Two factor Authentication
user knows
Entered Password
Authenticated
SERVICES AVAILABILITY
Three factor Authentication
user knows
Entered Password
Authenticated
SERVICES AVAILABILITY
AUTHENTICATIONS OVER NETWORKS
(UNDERSTANDING ATTACKS IN NETWORKS) - NETWORK SECURITY
1) No password
2) Same as user ID
3) User’s name or derived from it
4) Common word list plus common names and patterns
▪ Ex. common patterns: ‘asdfg’ – consecutive keyboard keys, ‘aaaa’
5) Short college dictionary
6) Complete English word list
7) Common non-English language dictionaries
8) Short college dictionary with capitalizations & substitutions
▪ E.g. PaSsWoRd, pa$$w0rd
▪ Substitutions include: a -> @, e -> 3, i/l -> 1, o -> 0, s -> $, ...
9) Complete English with capitalization and substitutions
10) Common non-English dictionaries with capitalization and substitutions
11) Brute force, lowercase alphabetic characters
12) Brute force, full character set
13) System Search using Sniffing and Spoofing
18
1. Previously Password is save as 2. Later, Password was
encrypted using any 4. CHANCES to get same Password is high, so it is advisable
Plaintext but protecting by Access
encryption algorithm, usually to use SALT value, for example, Alice Password & Bob
Control.
entire table or specific Password same, so we hashed Alice password plus any Salt
Memory dump and searching for
columns are encrypted. Value and then store in database.
pwd table
Get pwd table from system backups Penetrate Memory or H(pwdAlice+saltAlice)]
Backups often include no file Finding the key become
protection – security of backups Possible
relies on physical security
Get pwd file by attacking disk
3. DURING REGISTRATION
PROCESS
Enter Password
H(Password)
SAVE IN DATABASE
VICTIM SERVER
ORIGINAL CONNECTION
ALICE BOB
[IDA]KB
Alice send her IDENTITY encrypted with BOB public key
ATTACKER/ADVERSARY
TO DEAL WITH MODIFICATION & IMPERSONATION
Alice send her IDENTITY together with Hashed of identity, encrypted by Alice private key and encrypt the whole message with BOB public
key
ATTACKER/ADVERSARY
TO DEAL WITH REPLAY ATTACK
ALICE BOB
[[IDA ,TS ,H(IDA, TS)]KA-]KB e1
Alice send her IDENTITY together with Timestamps & Hashed of identity, and Timestamps, AND encrypted by Alice private key and encrypt
the whole message with BOB public key
e2 e1>e2
ATTACKER/ADVERSARY
UNILATERAL AUTHENTICATION
ALICE BOB
[[IDA ,TSA ,H(IDA, TSA)]KA-]KB
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CH]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CH’]KA
AUTHORIZED
SECURITY
ANALYSIS
ALICE BOB
[[IDA ,TSA ,H(IDA, TSA)]KA-]KB
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CH]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CH’]KA
AUTHORIZED
ALICE BOB
[[IDA ,TSA ,H(IDA, TSA)]KA- CHA]KB
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA’,CHB]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1,CHB’]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1’,CHB1, AK]K
AUTHORIZED
ALICE BOB
[[IDA ,TSA ,H(IDA, TSA)]KA- CHA]KB
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA’,CHB]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1,CHB’]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1’,CHB1, AK]K
AUTHORIZED
Password Guessing
ITS MUTUAL AUTHENTICATION is still Possible
TWO FACTOR MUTUAL AUT
ALICE BOB
[[IDA ,TSA ,H(IDA, TSA)]KA- CHA]KB
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA’,CHB]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1,CHB’]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1’,CHB1,ACK
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA12,CHB1’, REQ]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA12’,CHB12, OTP]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA12’,CHB12’, OTP’]KA
AUTHORIZED
SECURITY
High Level Authentication Protocol ANALYSIS
Mostly Online Banking System is Using
Two factor Authentication
However, still chances to get OTP, theft of mobile devices is there.
ALICE BOB
[[IDA ,TSA ,H(IDA, TSA)]KA- CHA]KB
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA’,CHB]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1,CHB’]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA1’,CHB1,ACK
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA12,CHB1’, REQ]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA12’,CHB12, OTP]KA
[[IDA ,TSA , IDB ,TSB H(IDA, TSA, IDB ,TSB )]KB- CHA12’,CHB12’, OTP’]KA
AUTHORIZED
MULTI FACTOR MUTUAL AU
EVALUATE
1-TYPE OF AUTHENTICATION PR
2- ATTACKS POSSIBLE & MITIGA
3- AUTHENTICATION OVERHEAD
4-COMPUTATIONAL COST
SOME BASIC FACTORS
USERNAME
PASSWORD
RANDOM NUMBER
CHALLENGE
TIMESTAMPS
ONE TIME PASSWORD
BIOMETRICS
SUPPORTING SLIDES-LITEARTURE
REVIEW
Search system list of pwds
▪System must keep list of passwords to authenticate logging users
▪Attacker may try to capture pwd list
▪Pwd lists:
1) Plaintext system pwd file
2) Encrypted pwd file
a. Conventional encryption
b. One-way encryption
1) Plaintext system pwd file
▪ Protected w/ strong access controls
▪ Only OS can access it
▪ Better: only some OS modules that really need access to pwd list can
access it
▪ Otherwise any OS penetration is pwd file penetration
a.Conventional encryption
▪ Encrypts entire pwd table
OR
encrypts pwd column of pwd table
It's possible to configure sniffers in two ways. The first is "unfiltered," meaning they
will capture all packets possible and write them to a local hard drive for later
examination. Next is "filtered" mode, meaning analyzers will only capture packets
that contain specific data elements.
Packet sniffers can be used on both wired and wireless networks — their efficacy
depends on how much they are able to "see" as a result of network security
protocols. On a wired network, sniffers might have access to the packets of every
connected machine or may be limited by the placement of network switches. On a
wireless network, most sniffers can only scan one channel at a time, but the use of
multiple wireless interfaces can expand this capability.
Using a sniffer, it's possible to capture almost any information — for example, which
websites that a user visits, what is viewed on the site, the contents and destination
of any email along with details about any downloaded files.
Protocol analyzers are often used by companies to keep track of network use by
employees and are also a part of many reputable antivirus software packages.
It's worth noting, however, that these analyzers can also be used for malicious
purposes. If a user is convinced to download malware-laden email attachments or
infected files from a website, it's possible for an unauthorized packet sniffer to be
installed on a corporate network. Once in place, the packet sniffer can record any
data transmitted and send it to a command and control (C&C) server for further
analysis. It's then possible for hackers to attempt packet injection or man-in-the-
middle attacks, along with compromising any data that was not encrypted before
being sent.
Proper use of packet sniffers can help clean up network traffic and limit malware
infections; to protect against malicious use, however, intelligent security software is
required.
Email spoofing
Email spoofing is a technique used in spam and phishing attacks to trick
users into thinking a message came from a person or entity they either
know or can trust.
In spoofing attacks, the sender forges email headers so that client
software displays the fraudulent sender address. If it’s a name they
recognize, they’re more likely to trust it. So they’ll click malicious links,
open malware attachments, send sensitive data and even wire
corporate funds.
Recipient servers and antimalware software can help detect and filter
spoofed messages. Unfortunately, not every email service has security
protocols in place. Still, users can review email headers packaged with
every message to determine whether the sender address is forged.
They attempt to gain your trust so you will click on a link to a fraudulent
website, share private information, or open an attachment on your phone,
tablet or computer.
Clicking on a phishing link or opening an attachment in one of these
messages may install malware, like viruses, spyware or ransomware, on
your device. This is all done behind the scenes, so it is undetectable to the
average user. Once the malware has been installed, it could harvest your
sensitive information, send out more phishing emails to contacts in your
address book or provide a scammer with remote access to your device.
Unfortunately, phishing messages are becoming harder and harder to
identify. Since these scams are becoming increasingly sophisticated, there is
a high probability either you or someone who uses your devices will fall
victim to phishing at some point. For tips on how to protect yourself from
these messages, read How to Spot a Phishing Email.
Offline guessing
Sniffing and Spoofing and get the credentials (hashed passwords)
Dictionary attack
During a dictionary attack, a program systematically enters words from a list
as passwords to gain access to a system, account, or encrypted file. A
dictionary attack can be performed both online and offline.
In an online attack, the attacker repeatedly tries to log in or gain access like
any other user. This type of attack works better if the hacker has a list of
likely passwords. If the attack takes too long, it might get noticed by a
system administrator or the original user.
During an offline attack, however, there are no network limitations to how
many times you can guess the password. To do it, hackers need to get their
hands on the password storage file from the system they want to access, so
it’s more complicated than an online attack. But once they have the correct
password, they will be able to log in without anyone noticing.
Brute force attacks are also used to guess passwords. They mostly rely on
the computing power of the attacker’s computer. During a brute force
attack, a program also automatically enters combinations of letters,
symbols, and numbers, but in this case, they are entirely random. Brute
force attacks can also be performed online and offline.
However, there are 1,022,000 words in the English language. By using the
alphabet and numbers 0-9, you can make 218,340,105,584,896 eight-
character passwords. In this case, a dictionary attack is much more likely to
succeed, given that the password will be a simple English word. And it will
most likely be a simple English word. A basic brute force attack would take
much more time and is less likely to be successful.
Dictionary attacks are brute force attacks in nature. The only difference is
that dictionary attacks are more efficient – they usually don’t need to try as
many combinations to succeed. However, if the password is a truly unique
one, a dictionary attack won’t work. In that case, using brute force is the
only option.
Q&A
References
Adapted from Prof. Dr. Steven Furnell, University of Plymouth, 2005, UK
49
50