Extending Security Functions for Windows NT/2000/XP

Size: px
Start display at page:

Download "Extending Security Functions for Windows NT/2000/XP"

Transcription

1 Abstract Extending Security Functions for Windows NT/2000/XP Ing. Martin Kákona S.ICZ a. s., J. Š. Baara 40, České Budějovice, Czech Republic The paper describes the possibilities of adding security extensions to operating systems based on the Windows NT technology. Some of the current security measures within these operating systems and their respective weak points are discussed. Possible improvements to the current architecture and methods of integrating new security mechanisms into the operating system are also outlined. Examples introduce solutions which strengthen the security of existing components of the operating system by adding proven cryptographic functions. Special attention is paid to the protection of key data and the indivisibility of cryptographic functions. Protection against information disclosure during malfunction of the operating system is stressed. The paper also focuses on hardware cryptographic devices, their support by the operating system and their importance from the viewpoint of the overall system security. Keywords: CryptoAPI - Cryptographic Application Programming Interface, CSP Cryptographic Service Provider, FSFD File system Filter Driver, EFS Encrypting File System, Chip Card, Smart Card, Key Container, Cryptographic Adapter, GINA, Secure Desktop. 1 Introduction This paper will discuss selected security subsystems of operating systems based on Windows NT, their advantages, weak points and possible improvements. For the purposes of this paper, no strict distinction will be made between Windows NT, Windows 2000 and Windows XP operating systems. This is based on the fact that the core of all of these OS's is identical as far as security is concerned. Individual differences of those systems are above the extent of this paper and will be discussed only where necessary. In the following text, we will mostly refer to Windows 2000, a version of the Windows NT OS containing the full range of security subsystems described here. When referring to Windows NT, we mean the entire operating system group of Windows NT/2000/XP. 2 Authentication User authentication under Windows NT uses a module called Winlogon.EXE. This module provides authentication for the LSA subsystem, which manages Access Control. See Figure 1 for a structure diagram. An important characteristic of the Windows NT authentication is the fact that the user undergoes authentication within a so called Secure Desktop. This represents an important security feature and solves the problem of uncontrolled infiltration of authentication data. Switching to the Secure Desktop uses SAS (Secure Attention Sequence), which is, in its correct implementation, unmonitorable by the operating system applications. The SAS must be knowingly initiated by the user. This involves the famous Ctrl+Alt+Del keyboard shortcut, or for example an insertion of a chip card into the reader unit. (The second possibility is not as simple as it sounds and will be discussed later in this paper in the chapter about Smart Cards). Security and Protection of Information

2 Figure 1: Authentication modules structure. Besides authentication using the Winlogon module, Windows NT also provides the possibility of direct authentication from applications, as shown on Figure 2. This option is not completely secure and applications using it should be avoided. The main problem with this type of authentication is the fact that it is not done in the Secure Desktop and thus may be infiltrated by an eventual malicious application. The entire interaction with the user is left to the client application and the user can not control it. Figure 2: Direct Application Authentication. Let us have a look at authentication from another perspective. Which protocols are used for the authentication process itself? In Windows NT-type systems, several authentication protocols are implemented. Native protocols include: LM, NTLM v.1, NTLM v.2 and Kerberos v.5. LM Authentication and NTLM v.1 protocols, which are provided in Windows systems for compatibility reasons only, should not be used. These protocols contain several significant errors and their use is unsafe. Let us concentrate on the comparison between the NTLM 2 and the Kerberos protocols. We will not quote details of the individual protocols because they have not been published by Microsoft. For our purposes, general information contained in platform documentation [2] and definitions in literature [1] will be sufficient. The NTLM protocol is known for being a challenge/response-type protocol and the fact the user password is not transferred when it is used. The strength of this protocol will therefore depend on the quality of the encryption used to encrypt the challenge and on the method of generating the key used for this purpose. Kerberos is basically a challenge/response-type protocol as well. The difference is that under NTLM, the authentication is a two-point type (client versus server), while three-point authentication is used for Kerberos (client versus KDC and then versus the server). Kerberos is therefore not so much of a security feature for Windows OS, as is commonly assumed, but rather a practical feature enabling effective secondary authentication of the user with more servers and services. Another difference between the protocols is their encryption algorithms. The NTLM v.2 protocol uses the HMAC_MD5 algorithm with a 128 bite key and Kerberos uses the RC-4 algorithm with a 128 bite key and/or 56 bite key for international versions. In both cases the cipher-keys are derived from 62 Security and Protection of Information 2003

3 the Logon Password using the hash function. A 128 bite cipher-key corresponds to an alphanumeric password with approximately 21 characters! The length of passwords should not be underestimated, for example a brute force attack against a 6-character password on a single processor computer takes less than 3 days. This is based on the presumption that DES and RC-4 algorithm weaknesses discovered to date can not be used, as they are eliminated by the password hash function. The above example shows that the quality of User Passwords is the key to Windows OS security and that passwords must be stored in Security Tokens, because high quality passwords can not be remembered by humans. The main possibility for improvement of authentication processes under Windows NT is the replacement of the GINA module providing interaction with the user. This would enable saving of the password on a suitable medium, for example a chip card, which ensures both its protection and required quality. The second possibility, also involving Smart Cards, is to use the PKINIT extension of the Kerberos protocol. In this case the encryption does not use a password image as in the classic Kerberos version, but the KDC sends a Session Key to the user encrypted by that user's Public Key. Thus the secret information does not leave the Smart Card. This process is described in detail in [6]. We will discuss Security Tokens more detail later. 3 Cryptography Windows NT OS contains the CryptoAPI cryptography subsystem, a robust implementation of a cryptography functions library based on Public Key Cryptography. CryptoAPI is described in detail in literature [3]. The original purpose of CryptoAPI, which Microsoft still strives to achieve, was to unify cryptography functions into an uniform API and thus enable their uniform implementation. This not only unifies the ciphering algorithms implementation, but also data formats and other implementation details. Figure 3: The CryptoAPI Architecture. The CryptoAPI subsystem may be extended to include other algorithm implementations using CSP modules via a CryptoSPI interface, as shown on Figure 3. Figure 4 shows three possible CSP implementations. User Mode CSP Interface Cryptography Core CSP Interface CSP Interface Kernel Mode Cryptography Core Inner Interface Hardware Equipment Cryptography Core Figure 4: Possible CSP Implementations. Security and Protection of Information

4 The left-hand side shows a standard implementation. All CSP's which are native part of NT and most commercially available CSP's are implemented in this way. The central part shows a compromise where the CSP itself is implemented as a Wrapper only and the cryptography functions are implemented by a driver at the core level of the operating system, which provides a better division of cryptography from applications. The solution shown on the right-hand side implements cryptographic functions on another piece of hardware from that on which the operating system is running. Such solution is very resistant to operating system errors. When the OS generates an error the cryptography module is not in immediate danger. It is for example ensured that the key is not compromised during an OS malfunction, because on correct implementation the key never leaves the cryptographic hardware. Such a situation could only occur as a result of faulty firmware on the cryptographic hardware. This firmware, however, is much less complicated than the host OS and may be programmed as more robust and it can be tested extensively. A combination of complete implementation of cryptography functions in a specialized hardware with the previous method, that is implementation of cryptography functions in to the kernel mode driver, is also possible. In such case it is advisable that only key derivates leave the cryptography hardware. This ensures that during an OS malfunction only the keys used to decrypt/encrypt data processed by the OS at that moment and that data may be compromised. I would also like to call attention to and aspect concerning the use of CryptoAPI. Unfortunately, some applications do not use CryptoAPI in the way it designed. They may expect a certain concrete implementation of the encryption mode, or require outdated data formats, or algorithms against which attacks have been published. The fact that applications are not universally programmed makes the CSP programmers retort to tricks which then make their CSP's incompatible with other implementations. But this is justifiable when a securityprioritised solution is needed. The use of CryptoAPI also concerns PKI. Because CryptoAPI is based on asymmetric cryptography, we must build and operate an entire infrastructure to be able to use it. Description of individual measures and rules is above the scope of this paper, I would just like to point out that in certain cases the use of symmetric cryptography is more effective. The main is the protection of private keys must always be a priority. 4 Directory Services & IPSec Directory Services in the Windows 2000 OS are implemented in the Active Directory (AD). I mention Active Directories here to call attention to security risks associated with their use. From the security point of view, there are two interesting aspects: AD s may be used to store user password images, secret and public keys, certificates, and other sensitive data. AD s are replicated between servers. From the above it is clear that AD's contain private information belonging to different users. During replication and protection of the replicating channel using IPSec (the only built-in replication protection measure) the data is transferred over a point-to-point channel and one shared key is used to protect the transfer of different data. I see this as a potential security risk, because the minimum resulting security of all secure systems dependent on information stored in AD's is only as good as the AD replication protection we use. In a network environment using AD's, it is advisable to store users' private secret information in tokens, even if that means losing the advantage of central administration and distribution of this data. 5 File Encryption File encryption in Windows NT OS is implemented using the EFS. This extension of the NTFS file system is described in detail in [4] and its possibilities and weak points have been described in the NSA Report [5]. EFS is more a method for encryption a local drive than a real implementation of file encryption. Unlike Disk Encryption, the EFS offers the separation of locally stored data (on one drive) belonging to different users at the level of individual files. On the other hand sharing of encrypted data between several users is practically impossible when using the EFS, because the GUI can not be used to specify storing of several DDF s (Data Decryption Fields) for files in one directory. 64 Security and Protection of Information 2003

5 The practical value of such a system is questionable as it does not enable transfer of encrypted files to another medium (for example a CD-ROM or a network server). Removal of the residual information, for example in the Page File, is also not satisfactorily solved by Windows. The only practical use is protection of data from being stolen with the use of physical access to the disk. But when using EFS, we must still control physical access to the disc because of the residual information. When we assume that the attacker does not have physical access to the disc, the need to encrypt files is redundant, because a regularly operating OS is capable of controlling access rights to the files. Another big disadvantage of the EFS is the fact that it does not provide the possibility to select or modify the cryptography used in it. EFS is a typical example of a Windows subsystem which does not use CryptoAPI. CryptoAPI is used with EFS to implement key sharing, but it is reduced to the use of a single CSP, which can not be changed. A single Key Container is also used for all files. A workstation may not be operated in several modes, only in the reserved mode where the access to classified data remains the same level for the entire logon period of one user. The Key Container can not be saved to a Smart Card or another token. The DESX symmetrical encryption algorithm can not be changed either, because for implementation reasons it is not part of CryptoAPI but is implemented directly in EFS. The Windows could therefore be extended to include File Encryption independent on the file system and ensuring transfer of encrypted files over the network and other mediums. The file encryption is only effective if we transfer complete files over the network. Should partial transfers be used and should an attacker be capable of monitoring such partial transfers, in other words should the attacker gain access to different versions of the same file, he would be capable of identifying the location of the modified data in the file with the accuracy the size of a cipher block size, or the size of a chaining block. Such identification could compromise the information dependent on location of the file. The same applies to EFS, because EFS implements chaining by 512 bytes. Let us imagine that an attacker gains access to a computer hard disc two times in a row and does not know the cipher-key. He is not capable to decrypt the data, but the position of changed sectors could give him some information, especially if he has the file which the change was made to in an open form. An example we could have a map available for the general public on which someone have marked a certain location of secret object and information concerning that location are secret. From the changed ciphered data in this example we can determine that location without the knowledge of cipher-key (with an accuracy given by the map scale and the size of the data block over which chaining is done). Correct implementation of file encryption therefore also includes ensuring of correct application operation. Two approaches are possible, either a new file is created every time a file is changed, or the changes must be saved at the end of the file. In the former case, new encryption for the new file is initialised, because two identical files must never have the same encrypted image. In the later case, diversification of the encrypted image of identical and repeating data sequences in the file must be ensured. Correct application operation and correct encryption implementation results in the changed file only offering information about the size of the realized changes. 6 Smart Card Support The following problems are usually encountered when using Smart Cards: A secure authentication of the user to the chip card must be ensured. Secret information transferred by a chip card to the OS mustn t be compromised. The user must have control of when and for what purpose the secret information stored on the chip card is used. Windows NT OS includes an universal subsystem supporting chip cards PC/SC. Figure 5 shows its structure. The figure shows that interface is provided by group of Dynamic Loadable Libraries (DDL), which applications call from the User Mode. The level of security of communication with a chip card therefore depends on the application communicating with the card, because the DLL's run in the context of that application. Security and Protection of Information

6 Figure 5: PC/SC Structure. The main usage of Smart Cards in the system is under CryptoAPI. As explained above, the safest implementation of a CryptoAPI is on the right hand-side of Figure 4. From this the configuration shown on Figure 6 follows. The CryptoAPI concept is based on the principle of secret keys not leaving the CSP. In this case the use of the PC/SC subsystem which has its interface in the User Mode is not advisable for communication with the chip card. It is also not advisable for the user interaction with the chip card (PIN entering, secret key use report) to be implemented in the User Desktop. As we know, a Secure Desktop is provided for such interactions in Windows NT. For example the insertion of a chip card into the reader unit should not be communicated to the user's desktop so that it can not be infiltrated by applications running under that desktop. Application 1 Application k User Interface GINA CryptoAPI CSP 1 CSP n Key containers HW Driver Key containers Smart Card Figure 6: Correct Integration of Smart Cards into Windows NT. The correct implementation of a chip card is to include it into the OS core under the CSP module and into the GINA module, which is capable of processing the SAS from the insertion of the chip card into the reader unit. 66 Security and Protection of Information 2003

7 And last a note about generation of private keys. The above example shows that it would be beneficial for the private key not to leave the data medium (Smart Card) and be generated directly on it. But that would require the Smart Card to include a Random Generator capable of generating random numbers from which the secret key may be derived. Smart Cards available at the present time do not include generators with sufficient reliability. To be more exact the functionality is usually not documented and tested extensively. For these reasons it is advisable to leave this function to the cryptographic adapter in hardware CSP implementation. 7 OS Integrity Checks The Windows NT OS is capable of ensuring its integrity using Access Control as long as OS is installed on the NTFS and the installation meets the security requirements. Problems start when the operation system is not running. It is therefore necessary to ensure safe OS start and prevent its modification while it is not running. Disabling of modification during power off is easy to ensure using seals. The station's BIOS is then responsible for the time between power on and start of the OS loader. It is also possible for this control function to be provided by the Extended BIOS of the encryption hardware (implemented as a firmware extension). This option should be preferred as the encryption adaptor code may be easily verified and is certified, unlike BIOS on individual stations. 8 Conclusion We have shown possible improvements of security functions of Windows NT-based operating systems. Note that most of these solutions are based on additional hardware and/or firmware. This is a result of the complexity of Windows NT OS and the resulting difficult verification of its source code. The solutions described here are all based on minimization of the code necessary to ensure the system's security functions. At the same time the code must be located so that an eventual error in the operating system does not corrupt the security subsystem. References [1] J. Kohl, C. Neuman: RFC1510. Network Working Group, [2] Platform SDK documentation: Logon Authentication. Microsoft, [3] Platform SDK documentation: Cryptography. Microsoft, [4] Mark Russinovich: Inside Encrypting File System. Windows NT Magazine, Duke Communications, [5] G. Bucholz, H. Parkes: Guide to Securing Microsoft Windows 2000 Encrypting File System. NSA, SNAC, [6] White paper: Windows 2000 Kerberos Authentication. Microsoft, Security and Protection of Information

Functional Documentation for "NFC CSP Light" Version 1.0

Functional Documentation for NFC CSP Light Version 1.0 Functional Documentation for "NFC CSP Light" Version 1.0 Prepared by: "Vincent Le Toux" Date: 03/02/2014 1 Table of Contents Table of Contents Revision History Description... 4 System Specifications...

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos Kerberos and Public-Key Infrastructure Key Points Kerberos is an authentication service designed for use in a distributed environment. Kerberos makes use of a thrusted third-part authentication service

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Forensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation

Forensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation Forensics Challenges Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation Introduction Encrypted content is a challenge for investigators Makes it difficult

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

An Analysis of Local Security Authority Subsystem

An Analysis of Local Security Authority Subsystem An Analysis of Local Security Authority Subsystem Shailendra Nigam Computer Science & Engineering Department DIET, Kharar Mohali(Punjab) India. Sandeep Kaur Computer Science & Engineering Department BBSBEC,

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

TPM v.s. Embedded Board. James Y

TPM v.s. Embedded Board. James Y TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions

More information

===============================================================================

=============================================================================== We have looked at how to use public key crypto (mixed with just the right amount of trust) for a website to authenticate itself to a user's browser. What about when Alice needs to authenticate herself

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Mobile Secure Management Platform

Mobile Secure Management Platform Mobile Secure Management Platform Mobile Automation Security Analysis White Paper Document Revision 5.1 Document ID: MLMS security white paper 5.1.2.doc July 2, 2003 Prepared by: Revision History VERSION/RELEASE

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 24 April 16, 2012 CPSC 467b, Lecture 24 1/33 Kerberos Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management

More information

1. Out of the 3 types of attacks an adversary can mount on a cryptographic algorithm, which ones does differential cryptanalysis utilize?

1. Out of the 3 types of attacks an adversary can mount on a cryptographic algorithm, which ones does differential cryptanalysis utilize? Introduction Answer the following questions. When a word count restriction is given for a question, exceeding it will result in marks being deducted. If your answer is more than twice the maximum length,

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Outline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements

Outline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements Outline Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ratings System Components 2 Ratings TCSEC Rating Levels National Computer Center (NCSC) part of US Department of Defense

More information

CS530 Authentication

CS530 Authentication CS530 Authentication Bill Cheng http://merlot.usc.edu/cs530-s10 1 Identification vs. Authentication Identification associating an identity (or a claimed identity) with an individual, process, or request

More information

Security. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Security. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part

More information

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users Learning Objectives Explain why authentication is a critical aspect of network security Explain

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

CT30A8800 Secured communications

CT30A8800 Secured communications CT30A8800 Secured communications Pekka Jäppinen October 31, 2007 Pekka Jäppinen, Lappeenranta University of Technology: October 31, 2007 Secured Communications: Key exchange Schneier, Applied Cryptography:

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

Guide to Windows 2000 Kerberos Settings

Guide to Windows 2000 Kerberos Settings Report Number: C4-018R-01 Guide to Windows 2000 Kerberos Settings Architectures and Applications Division of the Systems and Network Attack Center (SNAC) Author: Updated: June 27, 2001 David Opitz Version

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP

IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP North America Latin America Europe 877.224.8077 info@coalfire.com coalfire.com Coalfire sm and CoalfireOne sm are registered service

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide

IBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export

More information

Data Encryption Standard (DES)

Data Encryption Standard (DES) Data Encryption Standard (DES) Best-known symmetric cryptography method: DES 1973: Call for a public cryptographic algorithm standard for commercial purposes by the National Bureau of Standards Goals:

More information

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19, Test Conditions Closed book, closed notes, no calculator, no laptop just brains 75 minutes Steven M. Bellovin October 19, 2005 1 Form 8 questions I m not asking you to write programs or even pseudo-code

More information

Expert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES.

Expert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES. Expert Reference Series of White Papers BitLocker: Is It Really Secure? 1-800-COURSES www.globalknowledge.com BitLocker: Is It Really Secure? Mark Mizrahi, Global Knowledge Instructor, MCSE, MCT, CEH Introduction:

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,

More information

Overview of Authentication Systems

Overview of Authentication Systems Overview of Authentication Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/

More information

Uses of Cryptography

Uses of Cryptography Uses of Cryptography What can we use cryptography for? Lots of things Secrecy Authentication Prevention of alteration Page 1 Cryptography and Secrecy Pretty obvious Only those knowing the proper keys can

More information

TFS WorkstationControl White Paper

TFS WorkstationControl White Paper White Paper Intelligent Public Key Credential Distribution and Workstation Access Control TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 Important Concepts 4 Logon Modes 4 Password

More information

The Cryptographic Sensor

The Cryptographic Sensor The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective

More information

Implementing Cryptography: Good Theory vs. Bad Practice

Implementing Cryptography: Good Theory vs. Bad Practice Implementing Cryptography: Good Theory vs. Bad Practice Viet Pham Information Security Group, Department of Mathematics Royal Holloway, University of London Outline News report What is cryptography? Why

More information

CERN Certification Authority

CERN Certification Authority CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

PASSWORDS & ENCRYPTION

PASSWORDS & ENCRYPTION PASSWORDS & ENCRYPTION Villanova University Department of Computing Sciences D. Justin Price Fall 2014 CRYPTOGRAPHY Hiding the meaning of a message from unintended recipients. Open source algorithms are

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

C and C++ Secure Coding 4-day course. Syllabus

C and C++ Secure Coding 4-day course. Syllabus C and C++ Secure Coding 4-day course Syllabus C and C++ Secure Coding 4-Day Course Course description Secure Programming is the last line of defense against attacks targeted toward our systems. This course

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

Authentication Technology Alternatives. Mark G. McGovern Chief Technologist Smart Cards, Crypto, Stego, PKI Lockheed Martin

Authentication Technology Alternatives. Mark G. McGovern Chief Technologist Smart Cards, Crypto, Stego, PKI Lockheed Martin Authentication Technology Alternatives Mark G. McGovern Chief Technologist Smart Cards, Crypto, Stego, PKI Lockheed Martin Passwords Initial response by security and programming experts to deny access

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

Sumy State University Department of Computer Science

Sumy State University Department of Computer Science Sumy State University Department of Computer Science Lecture 1 (part 2). Access control. What is access control? A cornerstone in the foundation of information security is controlling how resources are

More information

Web Tap Payment Authentication and Encryption With Zero Customer Effort

Web Tap Payment Authentication and Encryption With Zero Customer Effort Web Tap Payment Authentication and Encryption With Zero Customer Effort Henry Ng Tap-Card-Pay Systems Corporation, Vancouver BC V5X3Y3, Canada henryng@tapcardpay.com Abstract. We propose a public-key authentication

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

Lord of the Rings J.R.R. TOLKIEN

Lord of the Rings J.R.R. TOLKIEN Copyright 1994 AT&T and Lumeta Corporation. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be

More information

Kerberos. Pehr Söderman Natsak08/DD2495 CSC KTH 2008

Kerberos. Pehr Söderman Natsak08/DD2495 CSC KTH 2008 Kerberos Pehr Söderman Pehrs@kth.se Natsak08/DD2495 CSC KTH 2008 Project Athena Started 1983 at MIT 10 000 workstations 1000 servers Unified enviroment Any user, any workstation, any server, anywhere...

More information

6. Security Handshake Pitfalls Contents

6. Security Handshake Pitfalls Contents Contents 1 / 45 6.1 Introduction 6.2 Log-in Only 6.3 Mutual Authentication 6.4 Integrity/Encryption of Data 6.5 Mediated Authentication (with KDC) 6.6 Bellovin-Merrit 6.7 Network Log-in and Password Guessing

More information

Trusted Intermediaries

Trusted Intermediaries AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

Encrypting stored data

Encrypting stored data Encrypting stored data Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 1. Scenarios 2. File encryption Outline 3. Encrypting file system 4. Full disk encryption 5. Data recovery

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

Authentication. Chapter 2

Authentication. Chapter 2 Authentication Chapter 2 Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand how CHAP works Understand what mutual authentication

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

Interface. Circuit. CryptoMate

Interface. Circuit. CryptoMate A C O S 5 - C T M C r y p t o M a t e U S B T o k e n Version 1.5 03-2007, Email: info@acs.com.hk Website: www.acs.com.hk CryptoMate USB Token 1.0 Introduction Frustrated by network breaches like Trojan

More information

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood

More information

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51 Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Apple Product Security

Apple Product Security Apple Product Security Meeting IT Security Needs Fed/Ed XIV Washington,DC - December 14, 2006 Shawn Geddis Enterprise Security Consulting Engineer geddis@apple.com December 2006 Certificates and Keys Everywhere

More information

Chapter 19 Security. Chapter 19 Security

Chapter 19 Security. Chapter 19 Security Chapter 19 Security Outline 19.1 Introduction 19.2 Cryptography 19.2.1 Secret-Key Cryptography 19.2.2 Public-Key Cryptography 19.3 Authentication 19.3.1 Basic Authentication 19.3.2 Biometrics and Smart

More information

TLS Client Certificate and Smart Card Logon

TLS Client Certificate and Smart Card Logon TLS and Smart Card Logon Ing. Ondřej Ševeček GOPAS a.s. MCSM:Directory2012 MCM:Directory2008 MVP:Enterprise Security CEH: Certified Ethical Hacker CHFI: Computer Hacking Forensic Investigator CISA ondrej@sevecek.com

More information

Pass, No Record: An Android Password Manager

Pass, No Record: An Android Password Manager Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server

More information

Trusted Platform Module explained

Trusted Platform Module explained Bosch Security Systems Video Systems Trusted Platform Module explained What it is, what it does and what its benefits are 3 August 2016 2 Bosch Security Systems Video Systems Table of contents Table of

More information

WHITE PAPER. Secure communication. - Security functions of i-pro system s

WHITE PAPER. Secure communication. - Security functions of i-pro system s WHITE PAPER Secure communication - Security functions of i-pro system s Panasonic Video surveillance systems Table of Contents 1. Introduction... 1 2. Outline... 1 3. Common security functions of the i-pro

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

UEFI, SecureBoot, DeviceGuard, TPM a WHB (un)related technologies

UEFI, SecureBoot, DeviceGuard, TPM a WHB (un)related technologies GOLD PARTNER: Hlavní partner: Hlavní odborný partner: UEFI, SecureBoot, DeviceGuard, TPM a WHB (un)related technologies Ing. Ondřej Ševeček GOPAS a.s. MCSM:Directory MVP:Security CISA CISM CEH CHFI ondrej@sevecek.com

More information

Software Vulnerability Assessment & Secure Storage

Software Vulnerability Assessment & Secure Storage Software Vulnerability Assessment & Secure Storage 1 Software Vulnerability Assessment Vulnerability assessment is the process of identifying flaws that reside in an OS, application software or devices

More information

CS 111. Operating Systems Peter Reiher

CS 111. Operating Systems Peter Reiher Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources Operating Systems Peter Reiher Page 1 Outline Basic concepts in computer security Design principles for security

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

6.857 L17. Secure Processors. Srini Devadas

6.857 L17. Secure Processors. Srini Devadas 6.857 L17 Secure Processors Srini Devadas 1 Distributed Computation Example: Distributed Computation on the Internet (SETI@home, etc.) Job Dispatcher Internet DistComp() { x = Receive(); result = Func(x);

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders

File System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders 13 August 2002 File System Section Seven NTFS, EFS, Partitioning, and Navigating Folders NTFS DEFINITION New Technologies File System or NTFS was first applied in Windows NT 3.0 back in 1992. This technology

More information

arxiv: v1 [cs.cr] 10 Dec 2012

arxiv: v1 [cs.cr] 10 Dec 2012 SDMS-based Disk Encryption Method Dokjun An, Myongchol Ri, Changil Choe, Sunam Han, and Yongmin Kim Faculty of Mathematics, Kim Il Sung University, D.P.R.K mathcci@yahoo.com arxiv:1212.2054v1 [cs.cr] 10

More information

1 Identification protocols

1 Identification protocols ISA 562: Information Security, Theory and Practice Lecture 4 1 Identification protocols Now that we know how to authenticate messages using MACs, a natural question is, how can we use MACs to prove that

More information

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class 1.264 Lecture 27 Security protocols Symmetric cryptography Next class: Anderson chapter 10. Exercise due after class 1 Exercise: hotel keys What is the protocol? What attacks are possible? Copy Cut and

More information

3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS)

3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3.1 Introduction In any public key infrastructure deployment, the protection of private key material (application keys) associated with the public/private

More information

COMPUTER PASSWORDS POLICY

COMPUTER PASSWORDS POLICY COMPUTER PASSWORDS POLICY 1.0 PURPOSE This policy describes the requirements for acceptable password selection and maintenance to maximize security of the password and minimize its misuse or theft. Passwords

More information

Introducing Hardware Security Modules to Embedded Systems

Introducing Hardware Security Modules to Embedded Systems Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors

More information

CT30A8800 Secured communications

CT30A8800 Secured communications CT30A8800 Secured communications Pekka Jäppinen October 31, 2007 Pekka Jäppinen, Lappeenranta University of Technology: October 31, 2007 Authentication Three basic models 1. Something you know Password,

More information

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security. Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:

More information

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1 Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information