mohammed alali | cs 69995 – dr. rothstein

18
INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEM BY ANTHONY GABRIELSON HAIM LEVKOWITZ Mohammed Alali | CS 69995 – Dr. Rothstein Summer 2013

Upload: sage

Post on 24-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Integrating Network Cryptography into the Operating System by Anthony Gabrielson Haim Levkowitz. Summer 2013. Mohammed Alali | CS 69995 – Dr. Rothstein. Content. Introduction Problems with the current implementation Third part libraries Proposed solution - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Mohammed Alali  |  CS 69995 – Dr. Rothstein

INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEMBY ANTHONY GABRIELSON HAIM LEVKOWITZ

Mohammed Alali | CS 69995 – Dr. RothsteinSummer 2013

Page 2: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Content Introduction Problems with the current implementation

Third part libraries Proposed solution

Operating system integration Network layer exploitation TCP/UDP enhancement

More details. Advantages Disadvantages Conclusion

Page 3: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Introduction Cryptography is essential in today’s

network communications. Most of OS’s today are “natively” lacking

(development wise). Currently deployed cryptography

implementations are often not secure. General-purpose network cryptography

library is needed.

Page 4: Mohammed Alali  |  CS 69995 – Dr. Rothstein

The current approach Third-party libraries:

SSL Kerberos PGP Many others.

Page 5: Mohammed Alali  |  CS 69995 – Dr. Rothstein

The current approach: problems

Inflexibility: Non-intuitive. Difficult to use (Steep learning curve.) Diverse implementation

Compatibility: Servers and clients have to match

Security: Many security flaws Design flaws: “4 a.m. design decisions.”

Page 6: Mohammed Alali  |  CS 69995 – Dr. Rothstein

The current approach: problems

As a result, developers tend to Incorrectly implement them, or Avoid them.

“In either case, security is compromised.”

Page 7: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution The authors introduce and define: A new general-purpose network cryptography library that integrates directly with the Operating System.

They argue that the best place for cryptography to be implemented is at the Operating System level rather than the current application-layer approach.

Page 8: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution: OS Integration I

Currently developers must directly link their application to a cryptography library to enable secure communication.

Page 9: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution: OS Integration II The proposed solution is the general-

purpose network cryptography that integrates with the OS’s kernel .

Page 10: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution: Network stack exploitation I Both transport and internet layers are

utilized. From the Internet Layer:

Host info found in IP header is utilized to lookup cryptography keys.

From host info, only “Destination Address”is need.

No changes needed toInternet Layer. IP

Host Info

TCP/UDPPort Info

Page 11: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution: Network stack exploitation II

From the Transport Layer: Port info found in TCP header is utilized to

lookup cryptography keys. From Port info, only

“Destination Port”is need.

So both “Destination Address + Destination Port” are needed for cryptography keys lookup.

Transport layer needs to be changed to natively support cryptography.

Page 12: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution: TCP/UDP Enhancements I Transport Layer (TCP/UDP) needs to be evolved:

Appending cryptography in the TCP header.

The new fieldsto be added (Taken from PGPheader) :

Page 13: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution: TCP/UDP Enhancements II

TCP will also require an additional modification to streamline the key transfer process. The three-way handshake TCP uses can be

enhanced to also transmit cryptography primitives.

Originator Destination

Page 14: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Proposed solution: More details The system described in this paper works with

the Encryption Key System (EKS). This system creates a chain of trust with a priori

knowledge that is used to securely lookup keys. The system leverages two distinct IDs to enable

more security (DNS and EKS lookup). This system also leverages a novel technique

they called: “port-based sandboxing.” enables the use of separate key pairs for individual

services and users.

Page 15: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Advantages1. Shifts community focus.

More security More flexibility.

2. Offers smaller number of implementations which means fewer potential issues.

3. Easier for developers to use w/ existing socket API

4. Port-aware library supporting existing protocols. 5. Always up-to-date – same way w/ network

sockets. 6. Available out of the box.

Page 16: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Disadvantages1. Each host on the network requires a priori

information, i.e., the EKS servers IP address and public key. How to securely transfer the server’s public key?

2. Certain types of protocols, like components of email, will need to be updated.

3. Some applications would require small changes while other would require larger changes.

Page 17: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Conclusion A general-purpose cryptography library

has been proposed. It is the only way to resolve the security

and flexibility problems currently being experienced on the Internet.

It provides a unified library that is easier to adopt by developers.

It complements the existing transmission protocols; it does not replace them.

Page 18: Mohammed Alali  |  CS 69995 – Dr. Rothstein

Thank you