CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

Similar documents
CS155b: E-Commerce. Lecture 8: February 1, TPSs and Content-Distribution Businesses

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

Overview. SSL Cryptography Overview CHAPTER 1

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Using Cryptography CMSC 414. October 16, 2017

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Security: Focus of Control. Authentication

Lecture 15 Public Key Distribution (certification)

Chapter 7 Doing Business on the Internet

CS 161 Computer Security

Security: Focus of Control

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

HP Instant Support Enterprise Edition (ISEE) Security overview

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Managing SSL Security in Multi-Server Environments

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Authentication Part IV NOTE: Part IV includes all of Part III!

Most Common Security Threats (cont.)

APNIC elearning: Cryptography Basics

CS 161 Computer Security

Chapter 8 Web Security

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing

Lecture Notes 14 : Public-Key Infrastructure

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

CS 161 Computer Security

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

Chapter 6: Security of higher layers. (network security)

Keep your fingers off my keys today & tomorrow

Configuring SSL Security

WHITE PAPER. VeriSign Architecture for Securing Your VPN Go Secure! For Check Point Overview

ICS 180 May 4th, Guest Lecturer: Einar Mykletun

Introduction to Cryptography. Ramki Thurimella

Security Statement Revision Date: 23 April 2009

Grenzen der Kryptographie

Introduction to Cryptography Lecture 10

CSE 565 Computer Security Fall 2018

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Cryptography. Andreas Hülsing. 6 September 2016

But where'd that extra "s" come from, and what does it mean?

The SafeNet Security System Version 3 Overview

Network Security and Cryptography. 2 September Marking Scheme

Certificateless Public Key Cryptography

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Cryptographic Systems

Kurose & Ross, Chapters (5 th ed.)

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Crypto meets Web Security: Certificates and SSL/TLS

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Information Security in Corporation

Security & Privacy. Larry Rudolph. Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph

Security Digital Certificate Manager

Auth. Key Exchange. Dan Boneh

WAP Security. Helsinki University of Technology S Security of Communication Protocols

IBM. Security Digital Certificate Manager. IBM i 7.1

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

Cryptography. Recall from last lecture. [Symmetric] Encryption. How Cryptography Helps. One-time pad. Idea: Computational security

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

Diffie-Hellman. Part 1 Cryptography 136

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM

Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide

UMSSIA DAY VI: ARE WE THERE YET?

Bill Wear. VirtualVault Product Manager. Internet Banking Case Study

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Refresher: Applied Cryptography

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

SMart esolutions Information Security

UNIT - IV Cryptographic Hash Function 31.1

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

CS Computer and Network Security: PKI

Information Security CS 526

Service Managed Gateway TM. Configuring IPSec VPN

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Séminaire sur la Certification Electronique

EEC-682/782 Computer Networks I

Sectigo Security Solution

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Network Security. Chapter 8. MYcsvtu Notes.

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Sample excerpt. Virtual Private Networks. Contents

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

IBM i Version 7.2. Security Digital Certificate Manager IBM

CPET 581 E-Commerce & Business Technologies. References

E-commerce security: SSL/TLS, SET and others. 4.2

Cryptography (Overview)

Servers for e-commerce Operational platforms eg: Web Servers, Application Servers etc. Performance planning and Monitoring Virtualisation

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Introduction to Computer Security

Issues in Assessing Commercial Certification Service Trust

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents

Distributed Systems. Lecture 14: Security. 5 March,

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Configuring SSL CHAPTER

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Transcription:

CS155b: E-Commerce Lecture 6: Jan. 25, 2001 Security and Privacy, Continued

FIREWALL A barrier between an internal network & the Internet Protects the internal network from outside attacks Executes administrator-defined security policy Decides whether a datastream is allowed to pass through or not Main Components: - packet filter - proxy

Interconnection of Networks hosts gateway Recursively build larger networks

PACKET FILTER Works at IP layer Rule-table-driven Forwards, refuses, or drops a packet according to the rules An example rule table Rule# Source Destination Port Action 1 128.*.*.* 130.*.*.* Any Fwd 2 61.*.*.* 130.*.*.* 23 Refuse 3 61.*.*.* Any 21 Drop

PROXY Works at application layer One proxy per (application layer) protocol - HTTP proxy, FTP proxy, User authentication required Different users can have different privileges Can be made transparent to users

SEVERAL CONFIGURATIONS POSSIBLE A Sample Configuration: Dual-home Host Gateway Proxy Internal Network Packet Filter Internet Trade-offs: Security vs. Accessability, Security vs. Cost

CHECKPOINT Full Name: Check Point TM Software Technologies Limited Employees: 1000 + Stock Price: $146.5 (Jan 22, 2001) Revenues in 2000: $425.3 million Business Area: Internet Security

MAIN PRODUCTS FireWall-1 : a popular firewall product Open Platform For Security (OPSEC): an enterprise-wide framework for security policies extending FireWall-1 VPN-1: a family of virtual private networking solutions Provider-1 : a security management solution

BRIEF HISTORY 1993 Founded June 1996 Initial Public Offering 1998 Annual Revenues More than $100M June 2000 Stock Price More than $100 Q3, 2000 Quarterly Revenues More than $100M

STOCK PRICE CHART Price $150 $100 $50 97 98 99 00 01 Year

REVENUES CHART Revenues $400M $300M $200M $100M 95 96 97 98 99 00 Year

Discussion Point Firewalls aren t perfect E.g., Address spoofing is a problem Why is CheckPoint so successful? Importance of feeling secure? Knee-high protection?

Symmetric Key Crypto D(E(x, k), k) = x (decryption, encryption, plaintext, key) Alice and Bob choose k AB Alice: y < -- E(x, k AB ) Alice --> Bob: y Bob: x < -- D(y, k AB ) (Eve does not know k AB ) (ciphertext)

Well Studied and Commercially Available DES IDEA FEAL-n RC5 AES Users must deal with Government (especially export) Key management

Public Key Crypto D(E(x, PK u ), SK u ) = x (user s Secret Key, user s public key) Bob generates SK bob, PK bob Bob publishes PK bob Alice: Lookup PK bob y <-- E (x, PK bob ) Alice --> Bob: y Bob: x <-- D(y, SK bob ) (Eve does not know SK bob )

Digital Signatures Doc 2 Doc 1 -JF... Doc n -JF -JF Trickier than the paper analogue

3-part Scheme c... c Key Generation Procedure PK jf SK jf directory JF s machine

Doc SK jf Signature Procedure SIG

Doc PK jf SIG Verification Procedure Accept / Reject

Exampl es RSA El Gamal DSA McEliece

http://www.bob-soft.com P( ) {...} SP SP = signature(p, SK bob )

Bob-soft: PK bob Sue-soft: PK suẹ.. Bob-soft PK bob Alice: Verify (P, PK bob, SP)

New Potential Problem Is PK bob the Right Key? What does Right mean?

Traditional Meaning Bob-soft PK bob Accurate? Traditional Solution Alice s Computer PK CA

Bootstrapping Trust (Bob-soft, PK bob ) SK CA Signature Algorithm CERT bob Name 1, PK 1, CERT 1 Name 2, PK 2, CERT 2.........

Technical Question: Is this the right PK? Business Question: Can you make money selling public-key certificates? Political Question: Crypto export Legal Question: Do we have a right to use encryption? To some form of electronic privacy?

VeriSign: Enable everyone, everywhere to use the Internet with confidence Through its acquisition of Network Solutions, VeriSign serves as the gateway to establishing an online identity and Web presence, with more than 24 million domain name registrations in.com,.net and.org. As the leader in the Web site security market, VeriSign provides Internet authentication, validation and payment services. Through VeriSign Global Registry Services, VeriSign maintains the definitive directory of over 24 million Web addresses and is responsible for the infrastructure that propagates this information throughout the Internet. VeriSign Global Registry Services responds to over 1.5 billion DNS look-ups daily.

History VeriSign opened HQ in Mountain View: April 1995 IPO: January 1998 Aquired Network Solutions: June 9, 2000 Currently: 2000+ employees

Product Line Web Site Trust Services Authenticate your site to customers and protect Internet transactions with SSL encryption. Payment Processing Securely accept, process, and manage credit card and other payment types for B2B, B2C, and person-to-person purchases on your site. Code Signing Digitally sign software and macros for safe online downloading to your customers. Secure E-Mail Digitally sign and encrypt your e-mail to safeguard it from intrusion and alteration online. Web Identity Register for and manage Web addresses (domain names).

Web Authoring Build a professional-looking Web site and then enhance and promote it with business features Enterprise Trust Services Protect your intranet, extranet, e-mail systems, and Virtual Private Networks as well as B2B transactions with PKI and Internet infrastructure solutions. Network Security Protect information with firewalls, VPNs, network appliances, consulting resources, and security management. Global Registry Services Domain name registrars: take advantage of registry services and Domain Name System (DNS) support. Wireless Trust Services Carriers, service providers, manufacturers, and developers: enable a secure wireless commerce environment through an array of standards, devices, and applications.

Internet Identity Real-World Identity Expertise? Liabilty? Suppose you are Purely Internet Business? (Recall bob-soft.com) Authorization vs. Authentication Importance of Feeling secure