1 number theory and advanced cryptography 9. authentication protocols chih-hung wang sept. 2011 part...

49
1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced Cryptography

Upload: grant-chester-jennings

Post on 08-Jan-2018

219 views

Category:

Documents


0 download

DESCRIPTION

3 Manipulation Detection Code

TRANSCRIPT

Page 1: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

1

Number Theory and Advanced Cryptography 9. Authentication Protocols

Chih-Hung WangSept. 2011

Part I: Introduction to Number TheoryPart II: Advanced Cryptography

Page 2: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

2

Basic Authentication Techniques Challenge-Response Mechanisms

Page 3: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

3

Manipulation Detection Code

Page 4: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

4

Applying Asymmetric Cryptographic Technique

Nonce Importance:

Page 5: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

5

Standardization of the Challenge-Response Mechanism

Unilateral entity authentication

ISO Two-Pass Unilateral Authentication Protocol

Page 6: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

6

Using a Cryptography Check Function (CCF)

Page 7: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

7

ISO Public Key Two-Pass Unilateral Authentication Protocol

Page 8: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

8

Timestamp Mechanism

Page 9: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

9

Using MDC

Page 10: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

10

Applying Asymmetric Cryptographic Techniques

Page 11: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

11

Standardization of Timestamp Mechanism

ISO Symmetric Key One-Pass Unilateral Authentication Protocol

Page 12: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

12

CCF & Public Key Techniques

Page 13: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

13

Non-standard Mechanisms

Page 14: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

14

Mutual Authentication

Page 15: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

15

Wiener’s Attack

Page 16: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

16

Involving Trusted Third PartyThe Woo-Lam Protocol

Page 17: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

17

Password-based Authentication

Page 18: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

18

Needham’s Password Protocol

Page 19: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

19

A One-time Password Scheme

Page 20: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

20

Attack of S/KEY: Man-in-the-Middle Attack

Page 371

Page 21: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

21

Encrypted Key Exchange (EKE) (1)

Off-lineDictionaryAttack

Page 22: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

22

Encrypted Key Exchange (EKE) (2)

Page 23: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

23

Authenticated Key Exchange The Station-to-Station (STS) Protocol

Mutual Entity Authentication Mutually Authenticated Key Agreement Mutual Key Confirmation Perfect Forward Secrecy (PFS) *Anonymity (Deniability)

Page 24: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

24

STS Protocol

Page 25: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

25

A Flaw in a Simplified STS protocol (1)

Page 26: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

26

A Flaw in a Simplified STS protocol (2)

Page 27: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

27

A minor Flaw of the STS Protocol

Perfect denial of serviceattack

Page 28: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

28

Typical Attacks on Authentication Protocols

Message Replay Attack (page 43,44)

Page 29: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

29

Message Replay Attack

Page 30: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

30

Parallel Session Attack (1)

Page 31: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

31

Parallel Session Attack (2)

Page 32: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

32

Reflection Attack

Page 33: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

33

Attack Due to Type Flaw (1)

Page 34: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

34

Attack Due to Type Flaw (2)

Page 35: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

35

Attack Due to Name Omission

Page 36: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

36

Attack Due to Misuse of Cryptographic Services Attack due to absence of data-integrity

protection Confidentiality failure due to absence of

“semantic security” protection

Page 37: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

37

A Minor Variation of the Otway-Rees Protocol

Page 38: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

38

An Attack

Page 39: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

39

Authentication Protocols for Internet Security

Internet Protocol Security (IPSec)

Page 40: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

40

Confidentiality Protection in IPSec Encapsulating Security Payload (ESP)

Page 41: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

41

The Internet Key Exchange (IKE) Protocol (1)

Page 42: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

42

The Internet Key Exchange (IKE) Protocol (2)

Page 43: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

43

Authentication Failure

Page 44: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

44

Signature-based IKE Phase 1 Aggressive Mode

Page 45: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

45

A Plausible Deniability Feature in IKE

Plausible Deniability:Permit an entity to deny “plausibly” the existence of a connection with aCommunication partner

Page 46: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

46

The Secure Shell (SSH) Remote Login Protocol (1) The SSH Architecture

The SSH Transport Layer Protocol Unilaterally authenticated secure channel from the

server to the client The SSH User Authentication Protocol

Unilateral authentication protocols to achieve entity authentication from a client-side user to the server

The SSH Connection protocol

Page 47: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

47

The Secure Shell (SSH) Remote Login Protocol (2)

Page 48: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

48

The Secure Shell (SSH) Remote Login Protocol (3)

Page 49: 1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept. 2011 Part I: Introduction to Number Theory Part II: Advanced

49

The Secure Shell (SSH) Remote Login Protocol (4)