• Keine Ergebnisse gefunden

• Security layers - why?

N/A
N/A
Protected

Academic year: 2022

Aktie "• Security layers - why?"

Copied!
27
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

haw-hamburg.de

Internet Security

Virtual Private Networks

• Security layers - why?

• Encryption basics

• Network Layer Security - Overview

(2)

haw-hamburg.de

Dangers in

Insecure Networks:

⇒ Spying out your data

⇒ Manipulating your data

⇒ Computer and system sabotage

⇒ Analysis of communication profiles

⇒ ...

Problem: To gain physical control of networks

is expensive and often unreachable

(3)

haw-hamburg.de

Wide Area Scenario:

(4)

haw-hamburg.de

Objectives of Security Layers:

⇒ Secrecy of information

⇒ Secrecy of communication relations

⇒ Verification of information integrity

⇒ Verification of (sender-) authenticity

⇒ Protection of infrastructure

⇒ ...

(5)

haw-hamburg.de

Basics: Encryption

Gain of communication privacy in public networks by encryption

KJSIJHASJDHK secure text

plain text plain text

Ottos Mops .. Ottos Mops ..

key

983492342342734

key

234539834922734

Public Key: public execution of key exchange

Private Key: secret key needs ‘out of band’ installation

(6)

haw-hamburg.de

Symmetric Encryption

• Private key method

• Classical, performant

• Key exchange at runtime

• Problem: exchange of initial seed

• Problem: No method for signature

(7)

haw-hamburg.de

Asymmetric Encryption

Public key method (Diffie/Hellman 1976)

• Calculations numerically complex

• Separate key generating (certification!)

• Public key exchange

• Permits sender authentication

RSA-Algorithm

p, q large prime number, n= p * q let e, d and k with

e*d = k* (p-1) * (q-1) +1 Number Theory: for every m

(m**e)**d mod n = m m: message to send

e: Encryptor (public key) d: Decryptor (private key)

(8)

haw-hamburg.de

Key Agreement: Diffie-Hellmann

Problem: Two mutually unknown parties (A & B) want to exchange an encryption key via a public data channel Approach: Use public key cryptography to spontaneously

establish a shared secret key.

Method: Diffie-Hellmann “New Directions in Cryptography”

(1976)

Shortcoming: Mutual authentication left open - to public

key infrastructure or off channel solution

(9)

haw-hamburg.de

Diffie-Hellmann Algorithm

Let

p

be a sufficiently large prime,

g : g

n

mod p = p

for some

n, p

and

g

publicly available.

Then:

1. A chooses

0 ≤ a ≤ p – 2

at random and sends

c := g

a to B 2. B chooses

0 ≤ b ≤ p – 2

at random and sends

d := g

b to A 3. A computes the shared key

k = d

a

= (g

b

)

a

4. B computes the shared key

k = c

b

= (g

a

)

b

The strength of the algorithm relies on the secrets

a

and

b

, which are discrete logarithms

mod p

(10)

haw-hamburg.de

Layer of Encryption

Transport Network

Process/

Application

Bit transfer Link

Layer 1: Line encryption Layer 2: Logic tunnelling

Layer 3: Transport encryption Layer 4+: Socket security

Layer 7: Application encryption

(11)

haw-hamburg.de

Application Layer

Example: Pretty Good Privacy (Mail) Advantage:

- serves all purposes

- application specifically optimized

Disadvantage:

- Communication profile on application layer remains visible

- Needs incorporation into application programs

(12)

haw-hamburg.de

Example: PGP

• Public key based: Fred encrypts his message with the public key of Barney.

• For authentication Fred appends a ‚signature‘ at his mail.

• Only Barney can decrypt the content of this mail.

• Barney decrypt the signature with the public key of Fred.

(13)

haw-hamburg.de

Socket Layer (4+)

Example: Secure Socket Layer (SSL) Advantage:

- transparent w.r.t application data - easy to integrate

Disadvantage:

- Communication profile on the application protocols remains visible

- Needs incorporation into application programs

(14)

haw-hamburg.de

Example: SSL

• Protocol for encrypted transfer between unknown clients and (known) servers.

• Public key based session-initiation: on request server sends the public key to a client.

• Client generates a pre-shared secret (private key) and sends this with the received public key encrypted to the server.

• The communication afterwards will be encrypted symmetrically .

(15)

haw-hamburg.de

Line Encryption (L 1)

Example: Transmission-Scrambling, WEP Advantage:

- complete information encryption - completely transparent

Disadvantage:

- requires line control

- normally requires hardware support

(16)

haw-hamburg.de

Example: WEP

• Protocol for encrypting wireless transmission between Access Point and Stations.

• Private key based: AP & STA hold pre-shared secret.

Fixed length: 40 or 104 bits

• Static: no key exchange, except by reconfiguration

• Authentication: Challenge (AP) – Response (STA) scheme.

• Encryption: RC4 encryption (XOR with pseudorandom stream) with (insufficiently changed) Initialisation Vectors (IV).

• Improvement: WPA – the upgrade to Temporal Key Integrity Protocol (TKIP) – a deficit healing by improved IV selection and re-keying.

(17)

haw-hamburg.de

Layer 2 Tunnels

Example: PPP, L2TP, ... (+encryption) Advantage:

- only the tunnel is visible - completely transparent

Disadvantage:

- needs server / provider support

- performance problems

(18)

haw-hamburg.de

(19)

haw-hamburg.de

(20)

haw-hamburg.de

Internet Layer (IP)

Example: packet encryption Advantage:

- transport transparent - (wide-area) routable

Disadvantage:

- communication profile visible on IP layer

Solution: IP-tunnel

(21)

haw-hamburg.de

Example: IPsec

IPsec: Layer-3 Tunnel

IP H E A D E R

Auth H E A D E R

E S P

IP H E A D E R

DATA

Tunnel original Packet

ESP: Encapsulation Security Protocol

(22)

Generated Addresses (IPv6)

haw-hamburg.de

Problem: In IP infrastructure protocols the sender of a message frequently has to prove its ‘ownership of address’ to a receiver, it never met before.

Authentication between unknown partners normally requires a public key infrastructure.

• Cryptographically Generated Addresses (CGAs) are source addresses formed from the public key.

• This mechanism allows the authentication of sender’s address and the signing of data without a PKI.

(23)

haw-hamburg.de

(24)

haw-hamburg.de

CGA: Encapsulation Steps

1. Sender forms public/private key pair

e

and

d,

calculates (node-)source address as a 64 bit hash from

e.

2. Sender computes signature of network prefix, public key

e,

data

encrypted with its private key

d.

3. Sender includes (unencrypted) network prefix,

e

and the signature in a CGA parameter header within the packet.

4. Sender adds data and sends packet.

(25)

haw-hamburg.de

(26)

haw-hamburg.de

CGA: Decapsulation Steps

1. Receiver extracts network prefix and the public key

e

from the CGA parameter header.

2. It decrypts the signature with the public key

e

and verifies the CGA parameters + Data.

3. Receiver re-calculates and verifies sender’s source address as a 64 bit hash from

e.

4. The receiver can now be sure, that the received packet has been originally sent by the owner of the claimed IP address.

(27)

haw-hamburg.de

Summary

• Gaining security in the net can be reached on many layers

• Final selection of a technology needs a careful need analysis

• The level of security achieved is determined by concept /

algorithms, key strength and the management quality

Referenzen

ÄHNLICHE DOKUMENTE

In this work we propose a novel approach to long-term secure key exchange based on security assumptions that are independent of strong complexity assumptions.. We present a

Despite its simplicity, elaborating on this basic construction turns out to be worthwhile: even if the traditional public key encryption scheme built upon (E , D) does not offer

Eine No- de interessiert sich f¨ur die Zertifikate, die einem bestimmten Subjekt Y den ¨offentlichen Schl¨ussel P Y bescheinigen.. Gerade diese Information war (zusammen mit

Increased investment in materials technology is critical to national security, American economic competitiveness on the global stage, and our response to climate change. Investing

first studied security notions for digital signature schemes against quantum adversaries, and gave a quantum analogue of EUF-CMA in which a quantum adversary is able to interact with

Dann verschl ¨usselt sie die Nachricht mit Alice’s ¨offentlichem Schl ¨ussel und schickt dies an Alice. • Weder Bob noch Alice sch

Dann verschl ¨usselt sie die Nachricht mit Alice’s ¨offentlichem Schl ¨ussel und schickt dies an Alice. • Weder Bob noch Alice sch

I Darf keine public keys ersetzen ’item Kann beliebig public keys abfragen. I Kann partial private