cnt-4403 introduction to computer security

59
CNT-4403: 13.January.2015 1 Bogdan Carbunar CNT-4403 Introduction to Computer Security Class 1

Upload: others

Post on 16-Oct-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 1

Bogdan Carbunar

CNT-4403

Introduction to Computer Security

Class 1

Page 2: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 2

Administrative Issues

Class Overview

Computer Security Overview

Outline

Page 3: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 3

Staff Bogdan Carbunar, assistant prof.

Communications Class web page:

http://users.cis.fiu.edu/~carbunar/teaching/cnt4403.S.2015/cnt4403.S.2015.html

E-mail: [email protected]

Office Hours Bogdan: ECS 383, Tue. 3:30-4.30pm

What about you ?

Administrative Issues

Page 4: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 4

1 midterm worth: 35%

Date of exam: TBA

Time and place 2:00-3:15pm, ECS 132

Final worth: 35%

Date of exam: TBA

Time and place, TBA

Homework worth: 20%

Class participation: 10%

Extra credit: 10%

Class Grading (subject to changes)

Page 5: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 5

Administrative Issues

Rules of Engagement

Class Overview

Security and Privacy Overview

Outline

Page 6: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 6

Rule #1: 0 tolerance for cheating First occurrence: grade 0 (zero) for problems

involved Second occurrence:

Rule #2: The midterm and final exam are given only once, at

the time and place specified (at the proper time) on the web page

There is no make up exam Exception: medical condition, properly documented

Rules of Engagement

Page 7: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 7

Administrative Issues

Class Overview

Computer Security Overview

Outline

Page 8: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 8

Applied Cryptography – 2nd edition Bruce Schneier

Security In Computing – 4th edition

Pfleeger and Pfleeger

Cryptography and Network Security

William Stallings

http://www.wikipedia.org/

Papers assigned for reading

See class webpage

Textbooks

Page 9: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 9

Administrative Issues

Class Overview

Computer Security Overview

Outline

Page 10: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 10

Branch of computer technology known as information security as applied to computers and networks

Objective: protection of information and property Theft, corruption, or natural disaster, while allowing the

information and property to remain accessible and productive to its intended users

[Source: wikipedia]

Computer Security

Page 11: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 11

Security: protect information and information systems from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction.

Privacy: relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them

[Source: wikipedia]

Information Security & Privacy

Page 12: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 12

Personal Data is Abundant … and Growing

Page 13: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 13

It’s a jungle out there

3 Examples: Blue Security

Slammer Worm

Titan Rain

Many, many more …

Why Do We Care ?

Page 14: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 14

Anti-spam company “Blue Security”

Active approach against spam – Blue Frog Distributed Denial of service attack against spammers May 2006: attacked by PharmaMaster

Distributed denial of service attack (DDOS) Heavy network traffic (requests) against Blue Security Blue Security redirects traffic to its weblog, hosted by Six

Apart

Blue Security DoS

Page 15: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 15

Six Apart server farm collapses Makes 2,000 other blogs unreachable for several hours

Blue Security folds

Its clients were affected (down)

Find more details online (wiki?)

Blue Security DoS

Page 16: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 16

January 2003 Infects 90% of vulnerable computers within 10 minutes

Effect of the Worm Interference with elections

Cancelled airline flights

911 emergency systems affected in Seattle

13,000 Bank of America ATMs failed

No malicious payload!

Estimated ~$1 Billion in productivity loss

Slammer Worm

Page 17: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 17

Successful net intrusions on U.S. military Increasing in frequency since 2003

Originating from China, etc

Successful intrusion into… U.S. Army Information Systems Engineering Command at

Fort Huachuca, Arizona

Defense Information Systems Agency in Arlington, Virginia

Naval Ocean Systems Center in San Diego, California

United States Army Space and Strategic Defense installation in Huntsville, Alabama

more…

Titan Rain

Page 18: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 18

Goals: Protect

Confidentiality

Integrity

Availability

Integrity

Confidentiality

Availability

Information Security

Information Security

Page 19: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 19

Information about system or its users cannot be learned by an attacker

Data Confidentiality:

Private or confidential information is not revealed to unauthorized individuals

Privacy:

Users control what information about them can be Collected

Stored

By whom

Confidentiality

Confidentiality

Page 20: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 20

The system continues to operate properly, only reaching states that would occur if there were no attacker

Data Integrity

Information and programs are changed only in specified and authorized manner

System Integrity

System performs intended function free from unauthorized system manipulation

Integrity

Integrity

Page 21: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 21

Actions by an attacker do not prevent users from having access to use of the system

Enable access to data and resources

Timely response

Fair resource allocation

Availability

Availability

Page 22: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 22

Authenticity

Being able to be verified and trusted

Confidence in the validity of a message (originator)

Accountability

Actions of an entity can be traced to it

Tracing a security breach to a responsible party

More Required Concepts

Page 23: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 23

System

Security is about

Honest user (e.g., Alice, Bob, …)

Dishonest Attacker

How the Attacker Disrupts honest user’s use of the system (Integrity, Availability)

Learns information intended for Alice only (Confidentiality)

Alice Malory

General Picture

Page 24: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 24

Examples

Confidentiality

Student grades

Available only to student, parents, employer

Integrity

Patient information e.g., allergies

Can lead to loss of human life

Availability

Authentication service

Unavailability can lead to financial loss

Page 25: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 25

Passive Attacks

Learn and use information from a system without affecting system resources

Active Attacks

Attempt to affect and alter system resources

Security Attacks

Page 26: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 26

Passive Attacks

Alice

Bob Eavesdrop 2

Eve

M 1

Perform traffic analysis

on encrypted messages

3

Page 27: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 27

Impersonation

Replay

Modify messages

Denial of Service (DoS)

Active Attacks

Page 28: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 28

Impersonation

Alice

Bob Eavesdrop 2

Malory

Hi, A 1

Hi, “I’m A” 3

May enable M to obtain

A’s privileges

Page 29: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 29

Replay

Alice

Bob Eavesdrop 2

Malory

“You owe me $10” 1

You owe me $10 3

Bob owes Alice $20 or Bob owes Malory $10

Page 30: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 30

Message Modification

Alice

Bob Eavesdrop 2

Malory

Give Carol access 1

Give Malory acc 3

Note that A’s message is delayed or removed

Page 31: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 31

Denial of Service

Alice

Bob

Malory

Hi, I’m Alice 1

A can never talk to B

Send Key 2

Page 32: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 32

New Attack

Page 33: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 33

Building blocks that we will define and use in the next lectures

Will describe in more detail later

Encryption

Signature

Hash

Crash Course in Crypto

Page 34: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 34

Basic Terminology

Plaintext

Original message

Ciphertext

Coded message

Cipher or Encryption Algorithm

Algorithm for transforming plaintext to ciphertext

Key

Info used in cipher known only to sender/receiver

Page 35: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 35

Basic Terminology (cont’d)

Encrypt (encipher)

Converting plaintext to ciphertext

Decrypt (decipher)

Recovering plaintext from ciphertext

Page 36: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 36

Basic Terminology (cont’d)

Cryptography

Study of encryption principles/methods

Cryptanalysis (codebreaking)

Study of principles/ methods of deciphering ciphertext

without knowing key

Cryptology

Field of both cryptography and cryptanalysis

Page 37: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 37

Cryptosystem/Encryption System

Plaintext

Encryption

Algorithm

Encryption Key Decryption Key

Plaintext

Decryption

Algorithm

Ciphertext

Page 38: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 38

Symmetric Cryptosystems

Plaintext

Encryption

Algorithm

Encryption Key Decryption Key

Plaintext

Decryption

Algorithm =

Ciphertext

Page 39: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 39

1. Strong encryption algorithm

2. Secret key known only to sender / receiver

Mathematically:

Ciphertext = E(K, Plaintext) = EK(Plaintext)

Plaintext = D(K, Ciphertext) = DK(Ciphertext)

3. Assume encryption algorithm is known !

4. Assume a secure channel to distribute key

Requirements

Page 40: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 40

In Real Life

Alice

Bob

Malory

K - secret

Cannot Decrypt C !

M = Hi, A, B, “attack tomorrow”

C = E(K, M)

Intercept 2

K - secret

C’ 3

Cannot Produce C’ !

C’ = E(K, “Hi, A, B, postpone attack”)

Page 41: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 41

Objective:

Recover message given ciphertext

Recover key – more significant – why ?

General approaches:

Cryptanalytic attack

Brute-force attack

If either succeed all key use compromised

Cryptanalysis

Page 42: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 42

Ciphertext only

Only know algorithm & ciphertext

Assume you know or can identify plaintext

Known plaintext

Know/suspect plaintext & ciphertext

How ?

Perhaps know some protocol

Cryptanalytic Attack

Page 43: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 43

Chosen plaintext

Select plaintext and obtain ciphertext

Example: Encrypt 0

Encrypt 1

Encrypt 01, 10, etc

Chosen ciphertext

Select ciphertext and obtain plaintext

Chosen text

Select plaintext or ciphertext to en/decrypt

Cryptanalytic Attack (cont’d)

Page 44: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 44

Always possible to simply try every key

Work is a function of key size Given cipertext

1. Try every key until decryption is intelligible

2. Assume either know / recognise plaintext

Use cloud computing for parallelism

Use volunteer computing

SETI@Home, Folding@Home, Large prime search, RSA challenge

Cryptanalysis – Brute Force

Page 45: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 45

Key Size (bits) Number of Alternative

Keys

Time required at 1

decryption/µs

Time required at 106

decryptions/µs

32 232 = 4.3 109 231 µs = 35.8 minutes 2.15 milliseconds

56 256 = 7.2 1016 255 µs = 1142 years 10.01 hours

128 2128 = 3.4 1038 2127 µs = 5.4 1024 years 5.4 1018 years

168 2168 = 3.7 1050 2167 µs = 5.9 1036 years 5.9 1030 years

26 characters

(permutation)

26! = 4 1026 2 1026 µs = 6.4 1012 years 6.4 106 years

Brute Force Speed

Key size is essential !

Moore’s law:

As computers get faster, old ciphertexts become vulnerable

Page 46: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 46

Most significant advance in the 3000 year history of cryptography !

Uses two keys – a public and a private key

Asymmetric: parties are not equal

Public Key Cryptosystems (PKC)

Public invention Whitfield Diffie & Martin Hellman at Stanford University in

1976

Known earlier in classified community

Page 47: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 47

Addresses two key issues:

Key distribution – how to have secure communications in general without having to trust a KDC with your key

Digital signatures – how to verify a message comes intact from the claimed sender

Why Public Key ?

Page 48: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 48

PKC in a Nutshell

Plaintext

Encryption

Algorithm

Encryption Key Decryption Key

Plaintext

Decryption

Algorithm

Page 49: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 49

PKC in Real Life!

Alice

Bob

Malory

C= Encrypt(pubKeyB, M) 1

pubKeyB - public

privKeyB - private

pubKeyB - public

Cannot Infer privKeyB

from pubKeyB !

Intercept C 2

Cannot Obtain M !

M= Decrypt(privKeyB, C)

Has message M

Page 50: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 50

Unconditional security

No matter how much computer power or time is available, the cipher cannot be broken

The ciphertext provides insufficient information to uniquely determine the corresponding plaintext

Computational security

Given limited computing resources (e.g., time needed for calculations is greater than age of universe), the cipher cannot be broken

More Definitions

Page 51: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 51

Building blocks that we will define and use in the next lectures

Will describe in more detail in class 5, 6, 7

Encryption

Signature

Hash

Crash Course in Crypto

Page 52: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 52

Verify author, date & time of message

Authenticate message contents

Verifiable by third parties to resolve disputes

Digital Signatures

Page 53: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 53

Digital Signature Model

Plaintext

Signature

Algorithm

Private Key

Public Key

Verification

Algorithm

Plaintext

Valid !

Invalid !

Signature

Page 54: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 54

In Real Life

Alice

Bob

Malory

pubKeyB - public

privKeyB - private

pubKeyB - public

Cannot Forge

Bob’s Signature !

M = I owe Alice $1000

S = Sign(M, privKeyB)

M, S

Verify(M, S, pubKeyB) = true !

Intercept 2

M’ = I owe Malory $1000

for same S

M’ = I owe Malory $1000

for new S’

Page 55: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 55

In Real Life

Alice

Bob

pubKeyB - public

privKeyB - private

pubKeyB - public

Bob Cannot Deny

Signature S !

M = I owe Alice $1000

S = Sign(M, privKeyB)

M, S

Verify(M, S, pubKeyB) = true !

Page 56: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 56

Depend on the message signed

Use information unique to sender

Prevent both forgery and denial

Easy to generate

Easy to verify

Computationally infeasible to forge

New message for existing digital signature

Fraudulent digital signature for given message

Digital Signature Requirements

Page 57: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 57

Building blocks that we will define and use in the next lectures

Will describe in more detail in class 5, 6, 7

Encryption

Signature

Hash

Crash Course in Crypto

Page 58: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 58

Condenses message M to fixed size

h = H(M)

Hash Functions

M (L bits)

Hash H

Hash value h

(fixed length)

Assume hash function is public

Used to detect changes to message

Looks Random !

Page 59: CNT-4403 Introduction to Computer Security

CNT-4403: 13.January.2015 59

Hash Properties

Pre-image resistance:

Given value h, hard to find message M such that h = H(M)

Second pre-image resistance:

Given message M1, hard to find M2 such that H(M1)=H(M2)

Collision resistance:

Hard to find any M1 and M2 such that H(M1)=H(M2)