modelling and analysing of security protocol: lecture 14 some real life protocols

22
Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols Tom Chothia CWI

Upload: pomona

Post on 12-Jan-2016

15 views

Category:

Documents


0 download

DESCRIPTION

Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols. Tom Chothia CWI. Today. What you can’t do with protocol: global consensus Activities that require global consensus Global consensus using probability or Trusted Third Party. BREAK Some commonly used protocol - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Modelling and Analysing of Security Protocol: Lecture 14

Some Real Life Protocols

Tom Chothia

CWI

Page 2: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Today

• What you can’t do with protocol: global consensus

• Activities that require global consensus• Global consensus using probability or

Trusted Third Party.BREAK• Some commonly used protocol• Extracting a protocol from a RFC

Page 3: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Skills not Memorisation

• What you have learn on this course (hopefully) are skill to design and analyse all (including future) protocols.

• Not what protocols people are using at the moment...but here are some anyway

Page 4: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Common Encryption

• AES:– Symmetric encryption

• RSA:– Public key encryption scheme

• OpenPGP– Public key encryption package

Page 5: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Diffie-Hellman

• Cross between a protocol and Crypto method.

• Common base for many protocols

Page 6: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Common Protocols

• Kerberos– Which you should know well

• SSL/TLS– Secure web-browsing

• IPsec– Encrypted Internet packets (VPNs)

• SSH– Remote secure login

• PKI– Public Key Distribution without a central TTP

Page 7: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Real Life Protocols

• Real Life Protocols include a lot of implementation details:– Negotiation of encryption schemes.– Versions numbers.– Data format.– Header layout.– Transmission speed.

Page 8: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IPsec

• A “suite” of protocols for secure Internet traffic.– IKEv2 protocol used for key establishment.

• It assumes that both parties have the public key of the other.

• Mostly used for Virtual Private Networks (logging into work from your laptop)

Page 9: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

RFCs

• RFC are Requests For Comments.

• They define the Internet.

• For engineers and hackers, not computer scientists.

• Extracting a protocol from an RFC is a skill.

Page 10: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IKEv2

• Key establishment for IPsec, RFC 4306

1. A B : (ga mod p, Na)

2. B A : (gb mod p, Nb)

K = f(gab mod p, Na, Nb)

Page 11: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IKEv2

• Key establishment for IPsec, RFC 4306

1. A B : (ga mod p, Na)

2. B A : (gb mod p, Nb)

K = f(gab mod p, Na, Nb)

3. A B : {SignK(A,SignA(M1,M2), gc mod p, Na2) }K

Page 12: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IKEv2

• Key establishment for IPsec, RFC 4306

1. A B : (ga mod p, Na)

2. B A : (gb mod p, Nb)

K = f(gab mod p, Na, Nb)

3. A B : {SignK(A,SignA(M1,M2), gc mod p, Na2) }K

Page 13: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IKEv2

• Key establishment for IPsec, RFC 4306

1. A B : (ga mod p, Na)

2. B A : (gb mod p, Nb)

K = f(gab mod p, Na, Nb)

3. A B : {SignK(A,SignA(M1,M2), gc mod p, Na2) }K

Page 14: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IKEv2

• Key establishment for IPsec, RFC 4306

1. A B : (ga mod p, Na)

2. B A : (gb mod p, Nb)

K = f(gab mod p, Na, Nb)

3. A B : {SignK(A,SignA(M1,M2), gc mod p, Na2) }K

Page 15: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IKEv2

• Key establishment for IPsec, RFC 4306

1. A B : (ga mod p, Na)

2. B A : (gb mod p, Nb)

K = f(gab mod p, Na, Nb)

3. A B : {SignK(A,SignA(M1,M2), gc mod p, Na2) }K

Page 16: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

IKEv2

• Key establishment for IPsec, RFC 4306

1. A B : (ga mod p, Na)

2. B A : (gb mod p, Nb)

K = f(gab mod p, Na, Nb)

3. A B : {SignK(A,SignA(M1,M2), gc mod p, Na2) }K

4. B A : {SignK(B,SignB(M1,M2), gd mod p, Nb2) }K

First session key = f(gcd mod p, Na2, Nb2)

Page 17: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

SSH

• Remote Secure Log in.

Page 18: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Course Summary

• The whole point of the course:– YOU don’t design a bad protocol– and YOU don’t use/accept a bad protocol

Page 19: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Course Summary

• The whole point of the course:– YOU don’t design a bad protocol– and YOU don’t use/accept a bad protocol

• Analysis of Protocols is a Science:– Attacker Model– Protocol Goals– Protocol Assumptions

Page 20: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Tools

• You have tools to help you analysis

• BAN logic:– Always think about the rules

• ProVerif:– If you designing a protocol use it (or something

like it)

• Model Checking: – Very useful, not just for protocols.

Page 21: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Today

• What you can’t do with protocol: global consensus

• Activities that require global consensus• Global consensus using probability or

Trusted Third Party.BREAK• Some commonly used protocol• Extracting a protocol from a RFC

Page 22: Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols

Presentations

• E-mail me ASAP.