Beruflich Dokumente
Kultur Dokumente
Outline
Security motivations
Private key cryptosystems
Public key cryptosystems
Application level protocols
IPsec
Security Threats
Impersonation
Insecrecy
Corruption
Repudiation
Break-ins
Denial of Service
Encrypt: E: M K M
Decrypt: D: M K K
Cryptographic security
Keys
Encryption/Decryption
denotes exclusive or
b = D(b, k) = c k = b k k = b [1, , 1] = b
Properties
Keys
Permutation of n
Let = -1
Encryption/Decryption
Properties
Cryptanalysis possible
Only small part of plaintext and key used for each part of ciphertext
Algorithm
Strength
Difficult to analyze
Cryptanalysis believed to be exponentially difficult in number of
rounds
No currently known attacks easier than brute force
But brute force is now (relatively) easy
Other Ciphers
Triple-DES
Blowfish
Naive scheme
Alice
I am Alice, x, E(x, k)
Bob
Vulnerability?
10
Replay Attack
Eve can listen in and impersonate Alice later
Alice
Eve
I am Alice, x, E(x, k)
I am
,E
x
,
e
c
Ali
Bob
(x)
11
I am Alice
Alice
Bob
E(x, k)
12
Key Distribution
Have network with n entities
Add one more
13
Kerberos
Trivia
14
TGS
Kerberos
TGT
Service TKT
Client
Service REQ
Server
15
Kerberos Tickets
What is a ticket?
Ticket-granting-ticket (TGT)
A needs TGT
AS
16
TGS
E(m, kA,B)
17
Using Kerberos
kinit
klist
Expires
Apr 19 20:40:49
Apr 19 20:40:49
Apr 19 20:40:49
Principal
krbtgt/ANDREW.CMU.EDU@ANDREW.CMU.EDU
afs@ANDREW.CMU.EDU
imap/cyrus.andrew.cmu.edu@ANDREW.CMU.EDU
kdestory
kpasswd
Kerberized applications
18
Public parameters
Prime p
Generator g < p with property: n: 1np-1, k: n = gk mod p
19
Diffie-Hellman Weakness
Man-in-the-Middle attack
20
Properties
x = D(E(x,S), P)
x = D(E(x,P), S)
Given x, hard to determine S(x)
Given P(x), hard to determine x
21
Solutions?
22
SSL/TLS
History
Uses
Issues
Proxies?
Lecture 27: 4-19-2005
23
RSA
Rivest, Shavir, Adleman, MIT, 1977
Message domain
Keys
Strength
24
25
Comparative Performances
26
Digital Signatures
Alice wants to convince others that she wrote message m
27
Authentication Chains
VeriSign
Thwarte
CMU (for WebISO)
Problem
X.509
Not very tightly specified usually includes an email address or domain name
28
Webs of Trust
29
Uses
30
kept in ~/.ssh/known_hosts
Client-to-server authentication
31
IPsec
Protection at the network layer
32
33
AH Authentication Header
Authenticates message
contents
Transport mode
Tunnel mode
34
35
36
Works Cited
http://www.psc.edu/~jheffner/talks/sec_lecture.pdf
http://en.wikipedia.org/wiki/One-time_pad
http://www.iusmentis.com/technology/encryption/d
es/
http://en.wikipedia.org/wiki/3DES
http://en.wikipedia.org/wiki/AES
http://en.wikipedia.org/wiki/MD5
37