Internet Security in my Crystal Ball

Similar documents
DDoS Attacks and Pushback

Moving Application Security into the Network

Steven M. Bellovin AT&T Labs Research Florham Park, NJ 07932

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Designing a System. We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10,

The Cybersecurity Challenge

Uses of Cryptography

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

More on Cryptography CS 136 Computer Security Peter Reiher January 19, 2017

System Structure. Steven M. Bellovin December 14,

CE Advanced Network Security Wireless Security

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

The Internet of Things. Steven M. Bellovin November 24,

BCA III Network security and Cryptography Examination-2016 Model Paper 1

6.857 L17. Secure Processors. Srini Devadas

Architecture. Steven M. Bellovin October 31,

Web Servers and Security

Authentication. Steven M. Bellovin January 31,

Web Servers and Security

Authentication. Steven M. Bellovin September 26,

«On the Internet, nobody knows you are a dog» Twenty years later

Most Common Security Threats (cont.)

Securing Grid Data Transfer Services with Active Network Portals

Architecture. Steven M. Bellovin October 27,

Rethinking Authentication. Steven M. Bellovin

Bitcoin, Security for Cloud & Big Data

GT Apiary: Remote Honeypots

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Expiration Date: August 2003 February Access Control Prefix Router Advertisement Option for IPv6 draft-bellovin-ipv6-accessprefix-01.

n-bit Output Feedback

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

1 Achieving IND-CPA security

18-642: Cryptography 11/15/ Philip Koopman

CS November 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Wireless Network Security Fundamentals and Technologies

Implementing Practical leakage-resilient symmetric cryptography. University of Illinois at Chicago, Technische Universiteit Eindhoven

Implementing Cisco Network Security (IINS) 3.0

Overview. SSL Cryptography Overview CHAPTER 1

Practical Aspects of Modern Cryptography

Configuring Secure Socket Layer HTTP

Network Security - ISA 656 Routing Security

Kerberos. Pehr Söderman Natsak08/DD2495 CSC KTH 2008

Remote Persistent Memory With Nothing But Net Tom Talpey Microsoft

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

18-642: Security Vulnerabilities

Application Firewalls

CS244a: An Introduction to Computer Networks

Cryptography Functions

U.S. E-Authentication Interoperability Lab Engineer

Introduction and Overview. Why CSCI 454/554?

Cryptography. Recall from last lecture. [Symmetric] Encryption. How Cryptography Helps. One-time pad. Idea: Computational security

Complex Access Control. Steven M. Bellovin September 10,

Network Security - ISA 656 Routing Security

SSL/TLS. Pehr Söderman Natsak08/DD2495

Sirindhorn International Institute of Technology Thammasat University

ETHICAL HACKING LAB SERIES. Lab 19: Using Certificates to Encrypt

VPN Overview. VPN Types

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Analysis of Security or Wired Equivalent Privacy Isn t. Nikita Borisov, Ian Goldberg, and David Wagner

Introduction to Cryptography. Steven M. Bellovin September 27,

InConnect. Secure Remote Connection Plug & Play. 2018v1 Nov.2018

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

CS November 2017

Internet Protocol and Transmission Control Protocol

Table of Contents. Computer Networks and the Internet

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Lecture 3: Symmetric Key Encryption

Building a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017

18-642: Cryptography

An Embedded Firewall Based on Network Processor

Chapter 6: Contemporary Symmetric Ciphers

Ultra-Lightweight Cryptography

Authentication. Steven M. Bellovin September 16,

Configuring Secure Socket Layer HTTP

PQ-Crypto Standardization Preparing today for the future of cryptography

Covert channels in TCP/IP: attack and defence

Welcome to CS 395/495 Internet Security: A Measurement-based Approach

Radius, LDAP, Radius used in Authenticating Users

NETGEAR-FVX Relation. Fabrizio Celli;Fabio Papacchini;Andrea Gozzi

COMPUTER SECURITY: THE GOOD, THE BAD, AND THE UGLY (with applications to embedded systems)

Encryption and Forensics/Data Hiding

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

CS 332 Computer Networks Security

Cryptography and Network Security

Cryptography Trends: A US-Based Perspective. Burt Kaliski, RSA Laboratories IPA/TAO Cryptography Symposium October 20, 2000

Are You Avoiding These Top 10 File Transfer Risks?

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Stream Ciphers - RC4. F. Sozzani, G. Bertoni, L. Breveglieri. Foundations of Cryptography - RC4 pp. 1 / 16

SaaS. Public Cloud. Co-located SaaS Containers. Cloud

The DNS. Application Proxies. Circuit Gateways. Personal and Distributed Firewalls The Problems with Firewalls

Standardisation efforst in lightweight cryptography

Next Week. Network Security (and related topics) Project 3 Q/A. Agenda. My definition of network security. Network Security.

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Configuring Secure Socket Layer HTTP

Firmware Updates for Internet of Things Devices

Transcription:

Steven M. Bellovin June 21, 2001 1 Florham Park, NJ 07932 AT&T Labs Research +1 973-360-8656 http://www.research.att.com/ smb Steven M. Bellovin Internet Security in my Crystal Ball security speculation

What s the Problem? Bugs. Availability. Sniffing and spoofing. None of these will go away! Steven M. Bellovin June 21, 2001 2

Bugs Most Internet security problems are caused by buggy code (plus administrators not installing patches for known security bugs). This is not just the high-order bit of Internet security, it s the high-order byte. Buggy code won t go away. The only solution is to keep bad guys away from the bugs. Today, we use firewalls for that. Is there an architecturally clean, scalable alternative? N.B. This is a neither a requirement for, nor a condemnation of, a topological solution. It is a statement of a ongoing need. Steven M. Bellovin June 21, 2001 3

Availability We can t fix DDoS problems on the end systems the network s resources are being abused, so the fix has to be in the net. We lack proven defenses (though there are several schemes on the table). Should a new network design improve our ability to control such abuse? How? What, if anything, should such a solution have in common with a congestion or flash crowd solution? Steven M. Bellovin June 21, 2001 4

Sniffing and Spoofing There have been a variety of attacks that are preventable by cryptography. But cryptography is used very rarely. Will this change in the future? Steven M. Bellovin June 21, 2001 5

Encryption Symmetric-key encryption in software is cheap, and getting cheaper. (On a 450 Mhz Pentium II, AES has been measured at about 243 Mbps.) Some NIC cards have IPsec on-board. RC4 is twice as fast, and has a very small footprint. Assertion: Asymptotically, encryption is free. Steven M. Bellovin June 21, 2001 6

What About the Low End? RC4 is very fast, even on wimpy processors. Besides, wimpy processors don t need to talk at such data rates. Caveat: encryption generally needs to be accompanied by authentication, especially with stream ciphers like RC4. Authentication is more expensive than RC4 encryption, though not as expensive as AES encrytion. Steven M. Bellovin June 21, 2001 7

What About the High End? We can encrypt blocks very fast; we can t encrypt messages much faster than OC-192. Well, we can, but we can t authenticate faster than that. Some work going on for new combined encryption/authentication modes of operation. Tentative conclusion: the high end won t be a problem, either. Steven M. Bellovin June 21, 2001 8

But... Public key encryption is considerably more expensive, and is likely to remain so. Will it ever be cheap enough for low-end devices? Unknown there are some new schemes, but they re new, and their strength is quite unclear. Regardless, public key cryptography will always be more expensive than symmetric crypto, especially at the very low end. Steven M. Bellovin June 21, 2001 9

Key Management Cryptography generally requires key management. It s almost always mandatory for our nice, cheap, stream ciphers. Key management is expensive: In round trips keys must be fresh and authentic. In hardware you may need a timer. In infrastructure KDC and/or CA. In CPU, if you use public key. Steven M. Bellovin June 21, 2001 10

Authorization An encrypted channel to a bad guy isn t very useful. You need to know to whom you re talking, and whether or not they re authorized. May require technical infrastructure; will require management infrastructure. Steven M. Bellovin June 21, 2001 11

What Does This Mean? We may need to offload some functions from some boxes: Proxy key management? Proxy authorization? Proxy encryption? Authorization management is very difficult, and is getting worse. (Can the manufacturer of your washing machine query its MIB? What about the owner of a leased car?) Scale is the only interesting problem. Steven M. Bellovin June 21, 2001 12