chapter 8 roadmap trusted intermediaries

7
1 8: Network Security 8-42 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Authentication 8.4 Integrity 8.5 Key distribution and certification 42 8: Network Security 8-43 Trusted Intermediaries Symmetric key problem: r How do two entities establish shared secret key over network? Solution: r trusted key distribution center (KDC) acting as intermediary between entities Public key problem: r When Alice obtains Bob’s public key (from web site, e-mail, diskette), how does she know it is Bob’s public key, not Trudy’s? Solution: r trusted certification authority (CA) 43 8: Network Security 8-44 Key Distribution Center (KDC) r Alice, Bob need shared symmetric key. r KDC: server shares different secret key with each registered user (many users) r Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for communicating with KDC. KB-KDC KX-KDC KY-KDC K Z-KDC KP-KDC K B-KDC KA-KDC KA-KDC K P-KDC KDC 44 8: Network Security 8-45 Key Distribution Center (KDC) Alice knows R1 Bob knows to use R1 to communicate with Alice Alice and Bob communicate: using R1 as session key for shared symmetric encryption Q: How does KDC allow Bob, Alice to determine shared symmetric secret key to communicate with each other? KDC generates R1 KB-KDC(A,R1) KA-KDC(A,B) KA-KDC(R1, KB-KDC(A,R1) ) 45 8: Network Security 8-46 Certification Authorities r Certification authority (CA): binds public key to particular entity, E. r E (person, router) registers its public key with CA. m E provides “proof of identity” to CA. m CA creates certificate binding E to its public key. m certificate containing E’s public key digitally signed by CA – CA says “this is E’s public key” Bob’s public key K B + Bob’s identifying information digital signature (encrypt) CA private key K CA - K B + certificate for Bob’s public key, signed by CA 46 8: Network Security 8-47 Certification Authorities r When Alice wants Bob’s public key: m gets Bob’s certificate (Bob or elsewhere). m apply CA’s public key to Bob’s certificate, get Bob’s public key Bob’s public key K B + digital signature (decrypt) CA public key K CA + K B + 47

Upload: others

Post on 27-May-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 8 roadmap Trusted Intermediaries

1

8: Network Security 8-42

Chapter 8 roadmap

8.1 What is network security?8.2 Principles of cryptography8.3 Authentication8.4 Integrity8.5 Key distribution and certification

42

8: Network Security 8-43

Trusted Intermediaries

Symmetric key problem:r How do two entities

establish shared secret key over network?

Solution:r trusted key distribution

center (KDC) acting as intermediary between entities

Public key problem:r When Alice obtains

Bob’s public key (from web site, e-mail, diskette), how does she know it is Bob’s public key, not Trudy’s?

Solution:r trusted certification

authority (CA)

43

8: Network Security 8-44

Key Distribution Center (KDC)r Alice, Bob need shared symmetric key.r KDC: server shares different secret key with each

registered user (many users)r Alice, Bob know own symmetric keys, KA-KDC KB-KDC , for

communicating with KDC.

KB-KDC

KX-KDC

KY-KDC

KZ-KDC

KP-KDC

KB-KDC

KA-KDC

KA-KDC

KP-KDC

KDC

44

8: Network Security 8-45

Key Distribution Center (KDC)

Aliceknows

R1

Bob knows to use R1 to

communicate with Alice

Alice and Bob communicate: using R1 as session key for shared symmetric encryption

Q: How does KDC allow Bob, Alice to determine shared symmetric secret key to communicate with each other?

KDC generates

R1

KB-KDC(A,R1)

KA-KDC(A,B)

KA-KDC(R1, KB-KDC(A,R1) )

45

8: Network Security 8-46

Certification Authoritiesr Certification authority (CA): binds public key to

particular entity, E.r E (person, router) registers its public key with CA.

m E provides “proof of identity” to CA. m CA creates certificate binding E to its public key.m certificate containing E’s public key digitally signed by CA

– CA says “this is E’s public key”

Bob’s public

key K B+

Bob’s identifying

information

digitalsignature(encrypt)

CA private

key K CA-

K B+

certificate for Bob’s public key,

signed by CA

46

8: Network Security 8-47

Certification Authoritiesr When Alice wants Bob’s public key:

m gets Bob’s certificate (Bob or elsewhere).m apply CA’s public key to Bob’s certificate, get

Bob’s public key

Bob’s public

key K B+

digitalsignature(decrypt)

CA public

key K CA+

K B+

47

Page 2: Chapter 8 roadmap Trusted Intermediaries

2

8: Network Security 8-48

A certificate contains:r Serial number (unique to issuer)r info about certificate owner, including algorithm

and key value itself (not shown)r info about

certificate issuer

r valid datesr digital

signature by issuer

48

8: Network Security 8-49

Network Security (summary)Basic techniques…...

m cryptography (symmetric and public)m authenticationm message integritym key distribution

…. used in many different security scenariosm secure emailm secure transport (SSL/TLS)m HTTPSm Etc.

49

8: Network Security 8-50

Secure e-mail

Alice:q generates random symmetric private key, KS.q encrypts message with KS (for efficiency)q also encrypts KS with Bob’s public key.q sends both KS(m) and KB(KS) to Bob.

q Alice wants to send confidential e-mail, m, to Bob.

KS( ).

KB( ).++ -

KS(m )

KB(KS )+

m

KS

KS

KB+

Internet

KS( ).

KB( ).-KB-

KS

mKS(m )

KB(KS )+

50

8: Network Security 8-51

Secure e-mail

Bob:q uses his private key to decrypt and recover KSq uses KS to decrypt KS(m) to recover m

q Alice wants to send confidential e-mail, m, to Bob.

KS( ).

KB( ).++ -

KS(m )

KB(KS )+

m

KS

KS

KB+

Internet

KS( ).

KB( ).-KB-

KS

mKS(m )

KB(KS )+

51

8: Network Security 8-52

Secure e-mail (continued)•Alice wants to provide sender authentication message integrity.

• Alice digitally signs message.• sends both message (in the clear) and digital signature.

H( ). KA( ).-+ -

H(m )KA(H(m))-m

KA-

Internet

m

KA( ).+KA+

KA(H(m))-

mH( ). H(m )

compare

52

8: Network Security 8-53

Secure e-mail (continued)

•Alice wants to provide secrecy, sender authentication, message integrity.

Alice uses three keys: her private key, Bob’s public key, newly created symmetric key

H( ). KA( ).-+

KA(H(m))-m

KA-

m

KS( ).

KB( ).++

KB(KS )+

KS

KB+

Internet

KS

53

Page 3: Chapter 8 roadmap Trusted Intermediaries

3

8: Network Security 8-54

Secure sockets layer (SSL)

r transport layer security to any TCP-based app using SSL services.

r used between Web browsers, servers for e-commerce (shttp).

r security services:m server authenticationm data encryption m client authentication

(optional)

r server authentication:m SSL-enabled browser

includes public keys for trusted CAs.

m Browser requests server certificate, issued by trusted CA.

m Browser uses CA’s public key to extract server’s public key from certificate.

r check your browser’s security menu to see its trusted CAs.

54

8: Network Security 8-55

SSL (continued)Encrypted SSL session:r Browser generates

symmetric session key, encrypts it with server’s public key, sends encrypted key to server.

r Using private key, server decrypts session key.

r Browser, server know session keym All data sent into TCP

socket (by client or server) encrypted with session key.

r SSL: basis of IETF Transport Layer Security (TLS).

r SSL can be used for non-Web applications, e.g., IMAP.

r Client authentication can be done with client certificates.

55

8: Network Security 8-56

End of Security!!!Questions

56

Page 4: Chapter 8 roadmap Trusted Intermediaries

Last Class Final Exam Info11 Final Exam info\--

l / Dec 17,1:30 pm ,

In - person for21 course recap on- campus students

31 Follow - on courses ↳ Location : 141,151 Loomis Lab

.

41 Broad questions from students ↳ uca → Go to 141

51 Feedback forms . ↳ Grad → Go to 151

21 Dec 17, 8pm ,

Remote students

↳ zoom link TBA on website

↳ Conflict also in this slot

31 Syllabus↳ comprehensive↳ More emphasis post midterm

but TCP still important .

41 1 page cheat sheet → 2sides

51 Format → similar to HW # 4,midterm

61 Exam ~ 2hr long but you have 3 hrs .

71 Another email will go out with

comprehensive information .

81 No cellular network in syllabus .

Page 5: Chapter 8 roadmap Trusted Intermediaries

÷:÷÷¥÷÷÷÷:÷÷;¥E÷:;÷÷÷÷÷¥÷:÷÷÷÷ .÷,Ei IT

-

:⇒÷÷E¥÷¥iI÷÷ÉÉ☒÷⇐⇒÷÷÷⇐÷j%c↳÷J;*a&,

?.

.

:*:*

"

u

⇒→

CsMA /CA→ collision Avoidance (RTs/cts)CSMAKD→ Collision Detection

Page 6: Chapter 8 roadmap Trusted Intermediaries

598 HH/RRAdvance r Prog .

Nextconrses I:&- *

÷,

!,

$498 DV

i¥¥;Éj÷÷: ""

%,

I

÷

;Y'

>

----

--

----- i.fi?yGnqstnayMathy

--

-

--

- Fo

390 (optimization)313

Lin. Alg .Foundations ✓

\

Page 7: Chapter 8 roadmap Trusted Intermediaries

"efficient

Not ✗