Network Security Protocols
Aspects of Security
2
Security Attacks
3
Passive: Release Message Contents
4
Example: Bob sends company secrets from his office to Alice’s office. Darth intercepts the messages and can use those secrets for his competitor company.
Passive: Traffic Analysis
5
Example: Bob is a local business man and Alice is a known terrorist. Darth, the local police officer, can determine that Bob is communicating with Alice on a regular basis, even though Darth cannot read the contents of the messages.
Active Attack: Masquerade
6
Example: Darth sends a message to Alice that says:
“Please transfer 1,000,000 Baht into my bank account number 123456. From Bob”
Darth is pretending to be Bob.
Active Attack: Replay
7
Example: On Tuesday, Bob sends a message to Alice that says:
“Please leave your car keys on your office desk at lunch time – I need to drive to the bank again. Love Bob”
On Wednesday, Darth replays the same message, and steals Alice’ car.
Active Attack: Modification
8
Example: Bob, the Head of School, sends a message to Alice in the Finance Department
“Please pay Darth 10,000 Baht for the extra work he did on lectures”
Darth intercepts and modifies the message before it reaches Alice, changing 10,000 to 100,000.
Active Attack: Denial of Service
9
Example: The server is a company web server that clients access on a regular basis to buy products. Bob normally spends 100,000 Baht a day via the website.
Darth sends a lot of traffic to the server, so that the server becomes busy – it can no longer process Bob’s purchases. The company loses money from lost sales.
Security Services
10
Model for Network Security
11
Encryption for Network Security
Symmetric Key Encryption
Public Key Encryption
Encryption
13
Symmetric Key Encryption
ITS 413 - Internet Technologies and Applications
14
A Simple Example: Caesar Cipher
15
Plain (p): a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher (C): D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Cipher: VHFXULWBDQGFUBSWRJUDSKB
Plain: ?
Attacks
16
Another Example: Monoalphabetic Ciphers
17
Plain (p): a b c d e … w x y z
Cipher (C): D Z G L S … B T F Q
Real Symmetric Key Algorithms
18
Public Key Encryption
ITS 413 - Internet Technologies and Applications
19
Public Key Encryption
20
Public Key Authentication
to issue/validate Public/Private keys
e.g. Verisign, Thawte
21
Public Key Algorithms
22
Symmetric vs Public Key
23
Often Public Key encryption is used to exchange Symmetric Secret keys,
then Symmetric key encryption to encrypt data
Authentication and Data Integrity
Data Integrity
25
Hash Algorithms
26
Algorithm | Name | Hash Length | Block Size |
MD4 | Message Digest Algorithm | 128 | 512 |
MD5 | Message Digest Algorithm | 128 | 512 |
SHA | Secure Hash Algorithm | 160 | 512 |
SHA-1 | Correction of SHA | 160 | 512 |
MCCP | Banking key management system | Variable | Variable |
DSMR | DS Scheme giving Message Recovery | Variable | Variable |
RIPEMD-160 | Extension of MD4 | 160 | 512 |
Sourced from: S. Aidarous and T. Plevyak (Ed.), “Managing IP Networks”, IEEE Press, 2003, page 225.
Internet Security
Internet Security
28
Internet Security
29
Internet Security
30
Local network
Firewall
Internet
Inside
Outside
Thak You
31