FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Similar documents
Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Cryptography MIS

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Introduction to Cryptography. Vasil Slavov William Jewell College

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

(2½ hours) Total Marks: 75

APNIC elearning: Cryptography Basics

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Cryptography and Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Overview. SSL Cryptography Overview CHAPTER 1

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Cryptographic Concepts

Computers and Security

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

CCNA Security 1.1 Instructional Resource

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Cryptography=To protect transmitted info from being read and understood by anyone but the recipient.

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

PASSWORDS & ENCRYPTION

Chapter 8 Information Technology

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Computer Security 3/23/18

Network Security Essentials

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

14. Internet Security (J. Kurose)

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Introduction and Overview. Why CSCI 454/554?

Cryptography (Overview)

Transport Layer Security

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

Cryptanalysis. Ed Crowley

Security. Communication security. System Security

Network Security and Cryptography. 2 September Marking Scheme

Cryptography ThreeB. Ed Crowley. Fall 08

CRYPTOGRAPHY. BY, Ayesha Farhin

SMart esolutions Information Security

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

10EC832: NETWORK SECURITY

Network Security Chapter 8

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

KALASALINGAM UNIVERSITY

2.1 Basic Cryptography Concepts

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Making and Breaking Ciphers

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

Computer Security: Principles and Practice

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

Transport Level Security

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Network Security. Chapter 8. MYcsvtu Notes.

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

Most Common Security Threats (cont.)

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

EEC-484/584 Computer Networks

Cryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)

L13. Reviews. Rocky K. C. Chang, April 10, 2015

NETWORK SECURITY & CRYPTOGRAPHY

Network Security Issues and Cryptography

Service Managed Gateway TM. Configuring IPSec VPN

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

CSC 474/574 Information Systems Security

Network Encryption 3 4/20/17

PROTECTING CONVERSATIONS

LECTURE 4: Cryptography

CSC 580 Cryptography and Computer Security

Public Key Cryptography

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

Chapter 19 Security. Chapter 19 Security

E-commerce security: SSL/TLS, SET and others. 4.1

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Encryption. INST 346, Section 0201 April 3, 2018

Cryptology. An introduction. by Ulf Lindqvist translated and processed by Erland Jonsson

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Cryptography and Network Security

6 Cryptographic Techniques A Brief Introduction

Lecture 4: Symmetric Key Encryption

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Classical Cryptography. Thierry Sans

Network Security and Cryptography. December Sample Exam Marking Scheme

Symmetric, Asymmetric, and One Way Technologies

Transcription:

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 9 Encryption and Firewalls By Whitman, Mattord & Austin 2008 Course Technology

Learning Objectives Describe the role encryption plays in a firewall architecture Explain how digital certificates work and why they are important security tools Analyze the workings of SSL, PGP, and other popular encryption schemes Discuss Internet Protocol Security (IPSec) and identify its protocols and modes Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 2

Firewalls and Encryption Hackers take advantage of a lack of encryption Encryption: Preserves data integrity Increases confidentiality Is relied upon by user authentication Plays a fundamental role in enabling VPNs Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 3

Hacker and an Unencrypted Packet Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 4

Hacker and an Encrypted Packet Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 5

The Cost of Encryption CPU resources and time Bastion host that hosts the firewall should be robust enough to manage encryption and other security functions Encrypted packets may need to be padded to uniform length to ensure that some algorithms work effectively Can result in slowdowns Monitoring can burden system administrator Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 6

Preserving Data Integrity Even encrypted sessions can go wrong as a result of man-in-the-middle attacks Encryption can perform nonrepudiation using a digital signature Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 7

Maintaining Confidentiality Encryption conceals information to render it unreadable to all but intended recipients Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 8

Authenticating Network Clients Firewalls need to trust that the person s claimed identity is genuine Firewalls that handle encryption can be used to identify individuals who have digital ID cards that include encrypted codes Digital signatures Public keys Private keys Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 9

Enabling Virtual Private Networks (VPNs) As an integral part of VPNs, encryption: Enables the firewall to determine whether the user who wants to connect to the VPN is actually authorized to do so Encodes payload of information to maintain privacy Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 10

Principles of Cryptography p y Encryption - the process of converting an original message into a form that cannot be understood by unauthorized individuals Cryptology, the science of encryption, encompasses two disciplines: Cryptography - describes the processes involved in encoding and decoding messages so that others cannot understand them Cryptanalysis - the process of deciphering i the original message (plaintext) from an encrypted message (ciphertext), without knowing the algorithms and keys used to perform the encryption Firewalls & Network Security, 2nd ed. - Chapter 9 11

Encryption Definitions Algorithm: The mathematical formula or method used to convert an unencrypted message into an encrypted message Cipher: The transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components Ciphertext or cryptogram: The unintelligible encoded d message resulting from an encryption Cryptosystem: The set of transformations necessary to convert an unencrypted message into an encrypted message Firewalls & Network Security, 2nd ed. - Chapter 9 12

Encryption Definitions (continued) Decipher: To decrypt or convert ciphertext to plaintext Encipher: To encrypt or convert plaintext to ciphertext Key or cryptovariable: The information used in conjunction with the algorithm to create the ciphertext from the plaintext; it can be a series of bits used in a mathematical algorithm, or the knowledge of how to manipulate the plaintext t Keyspace: The entire range of values that can possibly be used to construct an individual key Firewalls & Network Security, 2nd ed. - Chapter 9 13

Encryption Definitions (continued) Plaintext: The original unencrypted message that is encrypted and results from successful decryption Steganography: The process of hiding messages, usually within graphic images Work factor: The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message Firewalls & Network Security, 2nd ed. - Chapter 9 14

Cryptographic p Notation M represents original message; C represents ciphertext; E represents encryption process; D represents the decryption process; K represents a key So E(M) = C encrypting a message results in cyphertext D(C) = M and D[E(M)] = M E(M,K) = C specifies encrypting the message with a key; keys can be annotated t K1, K2 etc in the case of multiple keys Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 15

Common Ciphers In encryption the most commonly used algorithms include three functions: substitution, transposition, and XOR In a substitution cipher, you substitute one value for another - a monoalphabetic substitution uses only one alphabet - a polyalphabetic substitution use two or more alphabets The transposition cipher (or permutation cipher) simply rearranges the values within a block to create the ciphertext - this can be done at the bit level or at the byte (character) level Firewalls & Network Security, 2nd ed. - Chapter 9 16

Common Ciphers (continued) In the XOR cipher conversion, the bit stream is subjected to a Boolean XOR function against some other data stream, typically a key stream XOR works as follows: 0 XOR ed with 0 results in a 0. (0 0 = 0) 0 XOR ed with 1 results in a 1. (0 1 = 1) 1 XOR ed with 0 results in a 1. (1 0 = 1) 1 XOR ed with 1 results in a 0. (1 1 = 0) Simply put, if the two values are the same, you get 0 ; if not, you get 1 This process is reversible. That is, if you XOR the ciphertext t with the key stream, you get the plaintext Firewalls & Network Security, 2nd ed. - Chapter 9 17

Vernam Cipher Also known as the one-time pad, the Vernam cipher was developed at AT&T and uses a set of characters that are used for encryption operations only one time and then discarded The values from this one-time pad are added to the block of text, t and the resulting sum is converted to text Firewalls & Network Security, 2nd ed. - Chapter 9 18

Book or Running Key Cipher Another method, used in the occasional spy movie, is the use of text in a book as the algorithm to decrypt a message The key relies on two components: knowing which book to use a list of codes representing the page number, line number, and word number of the plaintext word Firewalls & Network Security, 2nd ed. - Chapter 9 19

Symmetric Encryption The previous methods of encryption/decryption require the same algorithm and key be used to both encipher/decipher the message This is known as private key encryption, or symmetric encryption In this approach, the same key a secret key is used to encrypt and decrypt the message Usually extremely efficient, requiring simple processing to encrypt or decrypt the message Main challenge is getting a copy of the key to the receiver, a process that must be conducted out-of-band to avoid interception Firewalls & Network Security, 2nd ed. - Chapter 9 20

Symmetric Encryption Firewalls & Network Security, 2nd ed. - Chapter 9 21

The Technology of Symmetric Encryption Data Encryption Standard (DES) developed in 1977 by IBM based on the Data Encryption Algorithm (DEA), which uses a 64-bit block size and a 56-bit key federally approved standard for nonclassified data cracked in 1997 when developers of a new algorithm, Rivest-Shamir-Aldeman offered $10,000 to whomever was first to crack it fourteen thousand users collaborated over the Internet to finally break the encryption Triple DES (3DES) was developed as an improvement to DES and uses as many as three keys in succession Firewalls & Network Security, 2nd ed. - Chapter 9 22

The Technology of Symmetric Encryption (continued) Advanced Encryption Standard (AES) successor to 3DES based on Rinjndael Block Cipher, which features a variable block length and a key length of either 128, 192, or 256 bits In 1998, it took a special computer designed by the Electronic Freedom Frontier more than 56 hours to crack DES - it would take the same computer approximately 4,698,864 864 quintillion years to crack AES Firewalls & Network Security, 2nd ed. - Chapter 9 23

Asymmetric Encryption Also known as public key encryption Uses two different but related keys Either key can be used to encrypt or decrypt If Key A is used to encrypt message, then only Key B can decrypt; if Key B is used to encrypt message, then only Key A can decrypt This technique is most valuable when one of the keys is private and the other is public Problem: it requires four keys to hold a single conversation between two parties and the number of keys grows geometrically as parties are added Firewalls & Network Security, 2nd ed. - Chapter 9 24

Public Key Encryption Firewalls & Network Security, 2nd ed. - Chapter 9 25

Digital Signatures When asymmetric process is reversed, that the message was sent by organization owning the private key cannot be refuted (nonrepudiation) Digital signatures: encrypted messages verified as authentic by independent facility (registry) Digital certificate: electronic document, similar to digital signature, attached to file certifying that file is from the organization it claims to be from and dhas not tbeen modified dfrom original i lformat Certificate Authority (CA): agency that manages issuance of certificates and serves as electronic notary public to verify their origin and integrity Firewalls & Network Security, 2nd ed. - Chapter 9 26

Digital Signature Firewalls & Network Security, 2nd ed. - Chapter 9 27

Public Key Infrastructure Public key infrastructure (PKI) is the entire set of hardware, software, and cryptosystems necessary to implement public key encryption Systems are based on public key cryptosystems and include digital it certificates t and certificate t authorities Firewalls & Network Security, 2nd ed. - Chapter 9 28

Public Key Infrastructure (continued) Can increase an organization s ability to protect its information assets by providing: Authentication: Digital certificates authenticate identity of each party in an online transaction Integrity: Digital certificate asserts content signed by the certificate has not been altered in transit Confidentiality: Keeps information confidential by ensuring it is not intercepted during transmission Authorization: Digital certificates can replace user IDs and passwords, enhance security, and reduce overhead Nonrepudiation: Certificates validate actions Firewalls & Network Security, 2nd ed. - Chapter 9 29

Hybrid Systems Pure asymmetric key encryption not widely used except in area of certificates t - instead, typically employed in conjunction with symmetric key encryption, creating a hybrid system Hybrid process currently in use is based on Diffie-Hellman key exchange, which provides method to exchange private keys using public key encryption without exposure to third parties In this method, asymmetric encryption is used to exchange symmetric keys, so two entities can conduct quick, efficient, secure communications based on symmetric encryption - Diffie-Hellman provided d the foundation for subsequent developments in public key encryption Firewalls & Network Security, 2nd ed. - Chapter 9 30

Hybrid Encryption Firewalls & Network Security, 2nd ed. - Chapter 9 31

Using Cryptographic p Controls Generation of unbreakable ciphertext is possible only if proper key management infrastructure has been constructed and cryptosystems are operated and managed correctly Cryptographic controls can be used to support several aspects of business: Confidentiality and integrity of e-mail and its attachments Authentication, confidentiality, integrity, and nonrepudiation of e-commerce transactions Authentication and confidentiality of remote access through VPN connections Higher standard of authentication when used to supplement access control systems Firewalls & Network Security, 2nd ed. - Chapter 9 32

E-mail Security Secure Multipurpose Internet Mail Extensions (S/MIME) builds on Multipurpose Internet Mail Extensions (MIME); adds encryption and authentication via digital signatures Privacy Enhanced Mail (PEM) proposed by Internet Engineering Task Force (IETF) as a standard d that t will function with public key cryptosystems; uses 3DES and RSA for key exchanges and digital signatures Pretty Good Privacy (PGP): uses IDEA Cipher, a 128-bit symmetric key block encryption algorithm with 64-bit blocks for message encoding; RSA for symmetric key exchange and digital signatures Firewalls & Network Security, 2nd ed. - Chapter 9 33

Securing the Web Secure Electronic Transactions (SET) developed by MasterCard and VISA in 1997 to provide protection from electronic payment fraud encrypts credit card transfers with DES and uses RSA for key exchange Secure Sockets Layer (SSL) developed by Netscape in 1994 to provide security for online electronic commerce transactionsti uses several algorithms; mainly relies on RSA for key transfer and IDEA, DES, or 3DES for encrypted symmetric key-based data transfer Firewalls & Network Security, 2nd ed. - Chapter 9 34

Securing the Web (continued) Secure Hypertext Transfer Protocol (SHTTP) an encrypted version of HTTP provides secure e-commerce transactions and encrypted Web pages for secure data transfer over the Web, using several different algorithms Secure Shell (SSH) uses tunneling to provide security for remote access connections over public networks provides authentication services between a client and a server used to secure replacement tools for terminal emulation, remote management, and file transfer applications Firewalls & Network Security, 2nd ed. - Chapter 9 35

Securing the Web (continued) IP Security (IPSec): primary and now dominant cryptographic authentication ti ti and encryption product of IETF s IP Protocol Security Working Group IPSec combines several different cryptosystems: t Diffie-Hellman key exchange for deriving key material between peers on a public network Public key cryptography for signing the Diffie-Hellman exchanges to guarantee the identity of the two parties Bulk encryption algorithms for encrypting the data Digital certificates signed by a certificate authority to act as digital ID cards Firewalls & Network Security, 2nd ed. - Chapter 9 36

Securing the Web (continued) IPSec has two components: the IP Security protocol itself, which specifies the information to be added to an IP packet and indicates how to encrypt packet data the Internet Key Exchange, which uses asymmetric key exchange and negotiates the security associations Firewalls & Network Security, 2nd ed. - Chapter 9 37

Securing the Web (continued) IPSec works in two modes of operation: transport mode: only IP data is encrypted not the IP headers themselves; allows intermediate nodes to read source and destination addresses tunnel mode: entire IP packet is encrypted and inserted as payload in another IP packet IPSec and other cryptographic extensions to TCP/IP often used to support a virtual private network (VPN), a private, secure network operated over a public, insecure network Firewalls & Network Security, 2nd ed. - Chapter 9 38

Securing Authentication A final use of cryptosystems y is to provide enhanced and secure authentication One approach to this issue is provided by Kerberos, which uses symmetric key encryption to validate an individual user s access to various network resources It keeps a database containing the private keys of clients and servers that are in the authentication domain that it supervises Firewalls & Network Security, 2nd ed. - Chapter 9 39

Kerberos Kerberos system knows these private keys and can authenticate one network node (client or server) to another Kerberos also generates temporary session keys that is, private keys given to the two parties in a conversation Firewalls & Network Security, 2nd ed. - Chapter 9 40

Kerberos Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 41

Kerberos Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 42

Attacks on Cryptosystems y Historically, attempts to gain unauthorized access to secure communications have used brute force attacks in which the ciphertext is repeatedly searched for clues that can lead to the algorithm s structure (ciphertext attacks) This process, known as frequency analysis, can be used along with published frequency of occurrence patterns of various languages and can allow an experienced attacker to quickly crack almost any code if the individual has a large enough sample of the encoded text Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 43

Attacks on Cryptosystems y (continued) Occasionally, an attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a known-plaintext attack scheme Alternatively, ti l an attacker may conduct a selected-plaintext attack by sending a potential victim a specific text that they are sure the victim will forward on to others; the attacker then intercepts the encrypted message and compares it to the original plaintext Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 44

Attacks on Cryptosystems y (continued) Man-in-the-middle attack: method used to intercept the transmission of a public key or even to insert a known key structure in place of the requested public key Correlation attacks: collection of brute-force methods that t attempt t to deduce d statistical ti ti relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 45

Attacks on Cryptosystems y (continued) In a dictionary attack, the attacker encrypts every word in a dictionary using the same cryptosystem as used by the target In a timing attack, the attacker eavesdrops during a victim s session and uses statistical analysis of the user s typing patterns and interkeystroke timings to discern sensitive session information Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 46

Defending from Attacks No matter how sophisticated encryption and cryptosystems have become, however, they have retained the same flaw that the first systems contained thousands of years ago: If you discover the key, that is, the method used to perform the encryption, you can determine the message Thus, key management is not so much the management of technology but rather the management of peoplep Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 47

Chapter Summary Encryption: process of rendering information unreadable to all but the intended recipients; purpose is to preserve the integrity and confidentiality of information and/or make the process of authenticating users more effective Firewalls use encryption to provide protection ti both for data in transit and to help keep firewall secure Encryption of data incurs costs since it requires processing time to encrypt and decrypt the data being protected Firewalls & Network Security, 2nd ed. - Chapter 9 48

Chapter Summary (continued) Cryptology: science of encryption Cryptography: complex process of making and using codes Applying concealing techniques is encryption and decoding ciphertext is called decryption Process used to decrypt data when the process and/or keys are unknown is called cryptanalysis Cryptographic controls: techniques and tools used to implement cryptographic protections; used to secure e-mail mail, Web access, Web applications, file transfers, remote access procedures like VPNs Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 49

Chapter Summary (continued) Cryptographic control systems often subject to attack Many methods of attack have evolved brute computational approaches use of weaknesses often found in implementation of cryptographic controls Some attacks attempt to inject themselves between the parties of a secured communication channel Other attacks combine multiple brute-force approaches into one correlation attack Firewalls & Network Security, 2nd ed. - Chapter 9 Slide 50