Network Security - Lecture 23

The difference between Digital Signature Standard (DSS) and Digital Signature Algorithm (DSA) was also explored. We will talk about authentication applications We will study Kerberos which is an Authentication service developed at MIT

pptx19 trang | Chia sẻ: dntpro1256 | Lượt xem: 798 | Lượt tải: 0download
Bạn đang xem nội dung tài liệu Network Security - Lecture 23, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Network SecurityLecture 23Presented by: Dr. Munam Ali Shah Part – 2 (e): Incorporating security in other parts of the networkSummary of the Previous LectureIn previous lecture we explored the limitations of the centralized key distribution and have explored key distribution in a decentralized fashion.We discussed in detail, how message authentication could be achieved. There are several functions and protocols used for message authenticationMessage Authentication Mechanism classification:Message encryptionMAC HashOutlines of today’s lectureDigital signature and authentication protocolsProblems in message authenticationDifferent protocols for message authentication will be studiedDigital Signature Standard (DSS) and Digital Signature Algorithm (DSA) will be exploredObjectivesYou would be able to present an understanding of the higher level message authentication mechanism.You would be able demonstrate knowledge about different protocols used for message authenticationProblem in message authenticationMessage authentication protect two parties from third party, will it protect two parties from each ?? John sends authenticated message to Marry (msg+MAC)Marry may forge a different message and claims that it comes from JohnJohn can deny sending the message to Marry later onhence include authentication function with additional capabilitiesDigital Signature Propertiesmust depend on the message being signedmust use information unique to senderto prevent both forgery and denialmust be relatively easy to producemust be relatively easy to recognize & verifybe computationally infeasible to forge with new message for existing digital signaturewith fraudulent digital signature for given messagebe practical save digital signature in storageDirect Digital SignaturesInvolve only sender & receiverAssumed receiver has sender’s public-keyDigital signature made by sender signing entire message or hash with private-keycan encrypt using receivers public-keysecurity depends on sender’s private-keyWhat if sender claim later that its private key is lostAdministrative controls relating to security of private keySigned message including time stampRequire prompt reporting of compromised keysIf private key is stolen from X at time T then opponent use stolen key with time stampArbitrated Digital SignatureInvolves use of arbiter Avalidates any signed messagethen dated and sent to recipientRequires suitable level of trust in arbiterCan be implemented with either secret or public-key algorithmsArbiter may or may not see messageArbiter DS TechniquesX –> A: M||E(Kxa, [IDX||H(M)])A –> Y: E(Kay, [IDX||M||E(Kxa, IDX||H(M)])||T]) Arbiter sees the message Y cannot directly check X’s signatureX –>A: IDX||E(Kxy, M)||E(Kxa, [IDX||H(E(Kxy, M))])A –>Y: E(Kay,[IDX||E(Kxy, M)]) || E(Kxa, [IDX||H(E(Kxy, M)) || T] ) Arbiter doesnot see the messageArbiter could form alliance with sender to deny a signed message or with receiver to forge the sender’s signatureX –> A: IDX||E(PRx, [IDX||E(PUy, E(PRx, M))])A –> Y: E(PRa, [IDX||E(PUy, E(PRx, M))||T]) public key encryption arbiter cannot see the messageAdvantagesPreventing alliance to defraud: no information is shared between parties before communicationNo incorrectly dated messages are sent even if PRx is compromised, assuming that PRa is not compromisedContent of message from A to B are secretAuthentication Protocolsused to convince parties of each others identity and to exchange session keysmay be one-way or mutualkey issues of authenticated key exchange areconfidentiality – to prevent masquerading and to protect session keys (secret or public key are used)timeliness – to prevent replay attacks Replay AttacksSimple replay: copies the message and replays it laterRepetition that can be logged: opponent replay the time stamped message within the valid time windowRepetition that cannot be detected: the original message did not arrive, only replay message arrives at destinationBackward replay without modification: replay back to sender. Possible if symmetric encryption is used and sender cannot recognized the difference between message sent and receivedCountermeasures for replay attacksUse of sequence numbers (generally impractical)message is accepted if its sequence no. is in proper orderKeep track of last sequence no. For each claimant it has dealt with. Timestamps (needs synchronized clocks)Party A accept the message if it arrive before or at the A’s knowledge of current timeChallenge/response (using unique nonce)Party A first sends a nonce to B and requires the subsequent message contain correct nonce valueSymmetric Encryption ApproachesAs discussed previously can use a two-level hierarchy of keysUsually with a trusted Key Distribution Center (KDC)each party shares own master key with KDCKDC generates session keys used for connections between partiesmaster keys used to distribute these to them Needham-Schroeder ProtocolUsed to securely distribute a new session key for communications between A & Bbut it is vulnerable to a replay attack if an old session key has been compromisedthen message no. 3 can be resent convincing B that is communicating with AUnless B remembers all the previous session keys used with A, B will be unable to determine that this is replay attack Modifications to address this require:timestamps (Denning 81)using an extra nonce (Neuman 93)SummaryIn today’s we talked about Digital signature and authentication protocolsProblems in message authenticationA protocol for message authentication were also studiedNext lecture topicsThe difference between Digital Signature Standard (DSS) and Digital Signature Algorithm (DSA) was also explored.We will talk about authentication applications We will study Kerberos which is an Authentication service developed at MITThe End

Các file đính kèm theo tài liệu này:

  • pptxnetwork_security_22_6008_2027065.pptx
Tài liệu liên quan