the iso/osi security architecture cits3002 computer networks · the iso/osi security architecture...

26
CITS3002 Computer Networks 1 next CITS3002 help3002 CITS3002 schedule The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range of terminologies forming their ISO/OSI Security Architecture. It includes the requirements: data confidentiality - protects data as it traverses the network from being disclosed to incorrect parties. Even the presence of particular communication sequences between parties should not be identified. data integrity - protects the data from modification or removal while in the network, data origin authentication - validates the sender of the data, data receiver authentication - validates the receiver of the data, peer-entity authentication - validates all network components, such as hardware routers and peer software components through which a data stream must travel, and non-repudiation - creates and verifies evidence that the claimed sender sent the data, that the intended receiver did receive it, and that neither can deny that this occurred. NOTE: the core TCP/IP internetworking suite meets none of the requirements of the ISO/OSI Security Architecture. Support for additional services is evolving, primarily at the Application Layer, but changes cannot be easily made to lower layers. CITS3002 Computer Networks, Lecture 12, Cryptography's role in networking, p1, 27th May 2020. "Remote exploit + local root exploit remote root exploit." — Olde saying handed down through the ages.

Upload: others

Post on 11-Jul-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

1 next→ CITS3002 help3002 CITS3002schedule

TheISO/OSISecurityArchitecture

Aswellasdefiningtheirseven-layeredmodel,theISO/OSIgroupalsodefinedarangeofterminologiesformingtheirISO/OSISecurityArchitecture.Itincludestherequirements:

dataconfidentiality-protectsdataasittraversesthenetworkfrombeingdisclosedtoincorrectparties.Eventhepresenceofparticularcommunicationsequencesbetweenpartiesshouldnotbeidentified.

dataintegrity-protectsthedatafrommodificationorremovalwhileinthenetwork,

dataoriginauthentication-validatesthesenderofthedata,

datareceiverauthentication-validatesthereceiverofthedata,

peer-entityauthentication-validatesallnetworkcomponents,suchashardwareroutersandpeersoftwarecomponentsthroughwhichadatastreammusttravel,and

non-repudiation-createsandverifiesevidencethattheclaimedsendersentthedata,thattheintendedreceiverdidreceiveit,andthatneithercandenythatthisoccurred.

NOTE:thecoreTCP/IPinternetworkingsuitemeetsnoneoftherequirementsoftheISO/OSISecurityArchitecture.Supportforadditionalservicesisevolving,primarilyattheApplicationLayer,butchangescannotbeeasilymadetolowerlayers.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p1,27thMay2020.

"Remoteexploit+localrootexploit⇒remoterootexploit."— Oldesayinghandeddownthroughtheages.“

Page 2: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 2 next→ CITS3002 help3002 CITS3002schedule

Cryptography'sRoleinNetworking

Theneedforcryptographytoprovidesecurityariseswiththepossibilityofstolenhardware,wiretapping,thebroadcastmechanismsofLANsandWLANs,andnetworktrafficpassingthroughforeignnetworks.

Weassumethatanadversaryisableto:

Copydatafromdiskstorageforremoteanalysis,Passivelylisten(only)onbroadcastchannels(suchaswired-EthernetandWiFi),Aggressivelymonitortrafficthoughintermediateroutersorworkstations(situatedanywhereonamessage'spath),Activelyreplay,modifyorinserttheirownmessagesintothemessagestream.

Cryptographyprovidessolutionstomostoftheseproblems.

Sowhereshouldtheencryptionbeperformed?

Usersencryptingindividualfilesstoredinastandardfile-system,File-systemsencryptingalldatabeforewritingittodisk,DatalinkandNetworklayers:inswitchesandrouters(e.g.VPNs),SessionLayer:withend-to-enddataconversion(e.g.SSL),ApplicationLayer:inprogramssuchasemailagents(e.g.PGP).

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p2,27thMay2020.

"Cryptographyisthescienceofmakingthecostofimproperlyacquiringoralteringdatagreaterthanthepotentialvaluegained.Thevalueofinformationusuallydropswithtime,andcryptographymakesthetimerequiredtoobtaindatainunauthorizedwayslongenoughtodecreaseitsvaluewellbelowthemoneyspentonobtainingit."— JalahFeghhi,DigitalCertificates

Page 3: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 3 next→ CITS3002 help3002 CITS3002schedule

BasicCryptographicTerminologyWeuseanencryptionfunctionandakeytoconverttheplaintext(theinput)intotheciphertext(theoutput).

Theintendedreceiverhopestoquicklyandcorrectlyreversetheprocess-somethingthatadversariesshouldbeunabletodo.

Weassumethattheadversaryknowstheencryptionfunction(process)beingused,andthatthekeyissecretandchangedfrequently.Thekeylengthisexpressedinbits:

Technology Keylengths Possiblekeys Keylength

ATMPIN 4decimaldigits 10,000 14bits

old-styleUnixpasswords 8characters 1268=6.3x1016 56bits

UnixpasswordswithMD5

anynumberofcharacters

unlimited,thoughduplicates 128bits

Thefollowingattacksagainstcryptographyarecommon.Eachhasthegoalofdeterminingthecryptographickey(s),sothatexistingdatamaybeexposed,orfuturemessagesdecryptedwithouttherepeatedeffort:

Knownplaintextattack-thecryptanalyst(fancynameforanadversarywithaMathsdegree)has(ordetermines)ablockofplaintextanditscorrespondingblockofciphertext.Thismayseemunlikely,butregularlyexchangedencryptedmessageshavefixedorpredictablepayloads(e.g.emailheaders,VPN-sessionestablishment).

Chosenplaintextattack-thecryptanalystcanhavetheirintendedvictimunknowinglyencryptfixed,knownblocksofdata.

Differentialanalysis-akindofplaintextattackinvolvingmanyverysimilarplaintextsbeingencrypted,andtheirresultingciphertextsbeingcompared.

Ifthereisnoseparateintegritycheckontheencrypteddata-anattackermaybeabletoalteritsothatitdecryptstodataoftheattacker'schoice.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p3,27thMay2020.

Page 4: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 4 next→ CITS3002 help3002 CITS3002schedule

SimpleSubstitution:

CaesarCipher:ch = (char)((ch + K) % 26);

PT : abcdefghijklmnopqrstuvwxyz CT : DEFGHIJKLMNOPQRSTUVWXYZABC

HereK = 3.

MonoalphabeticSubstitution:Eachsymbolmapstosomeothersymbol.Thekeyissimplya26letterstringfromthealphabet.

PT : abcdefghijklmnopqrstuvwxyz CT : QWERTYUIOPASDFGHJKLZXCVBNM

Herethereare26!=4x1026possiblekeys.

At1msecpersolution,abruteforceapproachwouldtake1013years.

However,inEnglishandmanyothernaturallanguages,textstatisticsareavailableonthemostfrequentlyusedletters,(262)digraphs,(263)trigraphsandwords.Tobreaksimplecodeswe:

countfrequenciesofeachletterandmatche's,t's,etc.countdigraphs(th,er,on,an,re,he,in,ed,nd,ha,at,en,es,of,or...)andtrigraphs(he,and,tha,ent,ion,tio,for,nde,has,nce...)matchth,the,in,and,...

ThemovieWindtalkersfocusesontheuseofthenaturallanguageofNavajoIndiansasacodeinWWII.SpeakersofKlingonclaimthattheirlanguageis,forotherreasons,indecipherable(inpractice).

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p4,27thMay2020.

Page 5: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 5 next→ CITS3002 help3002 CITS3002schedule

TheInfluenceofComputersonCryptographyThefirstroleofcomputerswastogatherstatisticsandperform'brute-force'searchesofciphertextusingsomeheuristics.

Traditionally,convoluted,obscure,andundisclosedalgorithmsrequiringlongkeyswereusedtoencrypttext.Morerecentlythefocushaschangedtosupportsimple,openalgorithms,butwithcomplex'solutions'.

Thealgorithmicinversesthemselvesareintendedtobesocomplexthatbrute-forcetechniquestakemillionsofyearstosucceed.

Analgorithm'sstrengthisnotsimplyderivedfromitskeys'length,butfromitspeerevaluationandpublicreview.

Aweakalgorithmisonewhosealgorithmandimplementationarenotavailable,andwhosestrengthwouldbecompromisediftheseweremadepublic.

In1883AugusteKerckhoffstatedasoneofhissixaxiomsofcryptography:

"Ifthemethodofenciphermentbecomesknowntoone'sadversary,thisshouldnotpreventonefromcontinuingtousethecipheraslongasthekeyremainsunknown."

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p5,27thMay2020.

Page 6: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 6 next→ CITS3002 help3002 CITS3002schedule

SymmetricCiphersTheDataEncryptionStandard(DES,1976)isknownasasymmetriccipher,oftenaprivatekeyalgorithm-inwhichthesenderandreceiverusethesamekeythatmustbekeptprivate.

Ingeneral,longerkeysprovidestrongerencryption,butitisamistaketoimplythestrengthofanencryptionalgorithmintermsofbitsalone.Bruteforceattacksarethemostsuccessful.

Somepopularexamplesofsymmetricciphers:

DES:ablockbasedcipherof64bitblocksin,64bitblocksout,56bitkeyfilledto64bits(8odd-paritybits).

Triple-DES:encryptsthesameplaintextwithDESthreetimes.Threeortwokeysareprovided,theplaintextisencryptedwiththe1stkey,decryptedwiththesecond,andfinallyencryptedwiththethird(or1stagain).

Adouble-DESscheme(withonly2keys)doesnotrequire22nbrute-forcetestsbut2n+1testswithameet-in-the-middleattack.

RonRivest'sRC2blockcipheremployskeysupto1024bits,andexecutesataspeedindependentofkeylength.

RonRivest'sRC4streamcipher(asusedinWiFi'sWEPencryption)employskeysof40to256bits,buthasthepropertythatiftwomessagesareencryptedwiththesameRC4key,theirencryptionsarerelatedinaknownway.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p6,27thMay2020.

Page 7: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 7 next→ CITS3002 help3002 CITS3002schedule

TheDESAlgorithmAsanexampleofthefirstofficialdeploymentofencryption,we'llconsidertheDataEncryptionStandard,DES.

In1977theUSGovernmentadoptedaproductcipherfromIBMandlaterthatyearwasdefinedasastheofficialencryptionstandardbytheUSStandardsBureau.

DESsoftwareispubliclyavailable(seeDES-crypt.c),butismoreefficientlyimplementedinhardware.Usersareconfidentofitssecurity(theywillopenlysaywhenitisinuse-forexample,Unixpasswords).

Dataisencryptedin64bitblocks.Ciphertextisoutputin64bitblocks.A56bitkeyisused.Thesamekeyisusedforbothencryptionanddecryption.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p7,27thMay2020.

Page 8: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 8 next→ CITS3002 help3002 CITS3002schedule

ProductandSubstitutionCipherBoxesEach'box'isparameterizedbythepairingsofinput->outputwires,andeachinput->outputmappingininvertible.Analgorithmis,then,furtherparameterizedbythearrangementofP-andS-boxes,andisalsoinvertible.

TheSubstitutionStages

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p8,27thMay2020.

Page 9: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 9 next→ CITS3002 help3002 CITS3002schedule

TheStepsoftheDESAlgorithmThealgorithmhas19stepsforencryption;decryptionsimplyperformsthestepsinthereverseorder.

Step1.Transpositionofplaintext,independentofkey.Step19.InverseofStep1.Step18.Exchangeleft32bitswithright32bits.Steps2-17.Useafunctionofthekeyforeachstage,whichweshallcallKi.

Left out := Right inRight out := XOR(left in, f(Right in, Ki)) where f is a 4 step function.

Whatarethestepsofthismagicfunctionf?

1. E:=R1(whichis32bits)expandedto48bits.2. D:=XOR(E,Ki).3. DivideDinto8x6bits;

feedeachofthese6bitsintoadifferentSboxeachproducing4bits.

4. Feedthese8x4bits(=32bits)throughaPbox.

HowistheDESkeyused?K0:=56transpositioncipherofK.DivideK0into2x28bits.ROLefteachpart.Ki:=56bittransitionofthenumberformed.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p9,27thMay2020.

Page 10: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 10 next→ CITS3002 help3002 CITS3002schedule

TripleDESDESisstillinusetoday,inanextendedformcalledtriple-DES,or3DES.WhereastheoriginalDESusedonlyone56-bitkey,3DESusesuptothree56bitkeys(plusoneparitybyte)inordertoincreasethedifficultyofbreakingthecipher:

3DES_encrypt(key1, key2, key3, message) =

DES_encrypt(key1, DES_decrypt(key2, DES_encrypt(key3, message)))

Theencrypt-decrypt-encryptapproachisusedtomakethealgorithmcompatiblewithsingleDES,inthespecialcasewhenkey1 = key2 = key3.

DESunderUnixinsoftwareAnumberofroutinesareprovidedwhicharetypicallyusedforencryptingpasswordsandfiles.

char *crypt(char *key, char *salt);

setkey(char *key);

encrypt(char *buf, int edflag);

ImplementationsofUnixsupportingremotefile-systemsandremote-loginsoftensupportDESencryptionoftransfers(suchaswithRPC/XDRauthentication)usingtheuser'sloginpasswordasthekeyfortheencryption.

AttheCrypto'94conference,M.MatsuipresentedaDES-breakingtechniquetermed'linear-cryptanalysis'.Using243knownciphertexts,hewasabletodetermineasingleDESkeyin50daysona100MHzdesktopmachine.

Asthecrackingprocessislinear,comparabletimesoncontemporarymachinesaremeasuredinhours.

In1998EFF's(then)US$250,000DEScrackingmachinecontained1,856customchipsandcouldbruteforceall256DESkeysin9days.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p10,27thMay2020.

Page 11: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 11 next→ CITS3002 help3002 CITS3002schedule

DESModes-ElectronicCodeBook(ECB)Traditionally,eachblockofciphertextisindependentofotherblocksandismostfrequentlyusedforthecodingofdataonsomestoragemedium(suchasadiskortransmittedviaanetwork).

DESModes-CipherBlockChaining(CBC)Thenotionofchainingensuresthateachblockisdependentonearlierblocks:

Now,anintrudercanneitherinsertnordeleteanyblockwithoutdetection.Cipherblockchainingishencetypicallyusedinnetworkingapplications.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p11,27thMay2020.

Page 12: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 12 next→ CITS3002 help3002 CITS3002schedule

ExchangingEncryptionKeysDespitecenturiesofevolutionofsymmetrickeycryptography,thefundamentalproblemofsecurekeydistributionremains:

"Howcantwopeople(ormachines)encryptanddecryptmessagesusingakeyiftheyarenotsurethatthekeyitselfissecure?"

Diffie-Merkle-HellmanKeyexchangeIn1976DiffieandHellman,fromStanfordUniversity,wrotethepaperMulti-UserCryptographicTechniques,proposingamethodofexchangingkeys.

TheDiffie-Hellmankeyexchangetechniqueenablestwoactiveparticipants(whomayneverhavemet)toagreeonanew,temporary,sessionkeywithwhichtheywillexchangeamessage.

Moreover,anyoneeavesdroppingontheiragreementdiscussion,willnotbeabletofurthereavesdroponthemessageexchange.

Asimple(physical)analogyofhowkeyscanbeexchanged:

AwantstosendakeytoB.AputsthekeyinasecureboxandlocksitwithA'spadlock.BdoesnothavethekeytoA'spadlock,soinstead,BreceivestheboxandaddsB'sownpadlocktotheboxandreturnsittoA.AremovesA'spadlockwithA'sownkeyandsendstheboxbacktoB.BcannowremoveB'sownpadlockandremovethekeywhichisnowsharedbyAandB.

TheworkofDiffieandHellmanwasrevolutionaryinthewaywethinkaboutcryptography.Previouslyitwas'intuitivelyobvious'thatthekeyneededtoencodeanddecodeamessageneededtobethesame(ortriviallyrelated).

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p12,27thMay2020.

Page 13: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 13 next→ CITS3002 help3002 CITS3002schedule

PublicKeyCryptographyUsingpublickeyencryptionweusetwokeysratherthanjustone.

Thepublickey,E,maybeopenlypublished.

Theprivatekey,D,isknownonlybytheintendedrecipient.

Theplanistochoosekeyssuchthatevenknowingthepublickeydoesnotrevealtheprivatekey:

AandBopenlypublishtheirpublickeys(viewedasalgorithms)EAandEB.

AsendsEB(Plaintextmessage)toB.

BcalculatesDB(EB(Plaintextmessage))=Plaintextmessage.

BcanthenreplywithEA(Plaintextreply)forAtoread.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p13,27thMay2020.

Page 14: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 14 next→ CITS3002 help3002 CITS3002schedule

TheMIT/RSAAlgorithmIn1978,RonRivest,AdiShamir,andLeonardAdleman,allofMIT,publishedtheimaginativelynamedRSAalgorithmforthegenerationofencryption/decryptionfunctionsfromnumbertheory.

ThedifficultyariseswhenchosingthealgorithmsEAandDAsuchthattheyareinversesofoneanotherandyetdifficulttocrack.

Keylength Factorizationtimes With107x1GHzmachines429-bits(RSA-129) 4,600MIPS-years 14.5secs

512-bits 420,000MIPS-years 22minutes

700-bits 4.2x109MIPS-years 153days

1024-bits 2.8x1015MIPS-years

280,000years

Wechoosetwoverylargeprimenumbers,pandq,eachover100digits.WedefineEAtobethepair(e,n)wheren=pxq(forp,qbeing100digitprimes,nwilltypicallyatleast200decimaldigits).WedefineDAtobethepair(d,n)where(exd)mod((p-1)x(q-1))=1

Wethenuse:

Encryptionfunction:C:=PemodnDecryptionfunction:P:=Cdmodn

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p14,27thMay2020.

Page 15: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 15 next→ CITS3002 help3002 CITS3002schedule

AsymmetricciphersRSAisanexampleofanasymmetriccipher,employingdifferentkeysforencryptionanddecryption.Therelationshipbetweenkeyssimplifiesanattack.

RSAhasbecomeubiquitous.ItiscommonlyusedinapplicationssuchasMicrosoftInternetExplorerandFirefoxforimplementingsecurity(SSL),withinmailclientsforsigningandencryptingemails(S/MIME),withinpaymentsystems,andforencryptingtrafficbetweenVPNgateways.

Keysforasymmetricciphersneedtobelongerthankeysforsymmetriccipherstoachievesimilarresistancetobrute-forceattacks:

SymmetricKeyLength

AsymmetricKeyLength

56bits 384bits

64bits 512bits

80bits 768bits

112bits 1792bits

128bits 2304bits

The17-yearpatentonRSAwasduetoexpireonSeptember20,2000,butwasreleasedintothepublicdomaintwoweeksearlyonSeptember6,2000.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p15,27thMay2020.

"BecausetheRSAalgorithmremainsoneofthemostwidelyusedmethodsofimplementingpublickeycryptography,theexpirationoftheRSApatentisgoodnewsforsoftwarecompanies,e-commerce,andusersofprivateorsecurecommunications.Thefundamentalpatentsonpublickeycryptographyhaveallnowexpired,andweshouldexpectanexplosionofnewandpowerfulimplementationsofthistechnology.IexpecttherewillbeexpirationpartiesfromPaloAltotoPerthastechnologycompaniesrolloutnewapplicationsofthisimportanttechnology!"— PatFinn,"HandbookofIntellectualPropertyClaimsandRemedies"

Page 16: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 16 next→ CITS3002 help3002 CITS3002schedule

StrongEncryptionisnotenough-theneedforDigitalSignaturesThepushforeCommercehasdemonstratedtheneed,notforgreaterbandwidth,nor(strictly)forgreaterend-to-endsecurity,butforauthenticationandauthorizationoftheendplayers.

DigitalsignatureswerefirstdiscussedbyDiffieandHellmanintheir1976'NewDirectionsinCryptography',buteCommerceisonlyrecentlydemonstratingtheirworthtoawideraudience(andtheirpatenthasexpired!).

Unliketraditionalsignatures,adigitalsignaturecannotbeaconstant;itmustbeafunctionofthedocumentthatitsigns.

Adigitalsignaturepreventstwotypesoffraud-

theforgingofasignaturebythereceiver(oranythirdparty),andtherepudiationofthetransmissionofamessagebythesender.

Twocategoriesofdigitalsignatureareidentified:

Truesignatures,signedbythesender,verifiedbythereceiver.Arbitratedsignaturemayonlybesentandverifiedthroughatrustedthirdparty.Therecipientisunabletoverifythesender'ssignaturedirectly,butisassuredofitsvaliditythroughthemediationofthearbitrator.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p16,27thMay2020.

Page 17: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 17 next→ CITS3002 help3002 CITS3002schedule

MessageDigests-basicbuildingblocksAmessagedigestisa16-,20-,32-byte'fingerprint'ofamessage.

Messagedigestsarecentraltodigitalsignatures.Whenamessageissigned,itscontentsarefirsthashedtogiveamessagedigest.Thedigestisthenencryptedwiththesender'ssecretkey,givingaproofofthesender'sidentity.

Agooddigestmusthavetheproperties:

Anabsenceofcollisions.Unlikesimplerfilechecksums,whichquicklydemonstratefileordataintegrity,itmustbehardtofindtwomessageswiththesamedigest.Mustnotbeinvertible.Digestsaredeterministicmany-to-onefunctions.Auniformdistributionofresults.Achangeinjustoneinputbitshouldaffectatleasthalftheoutputbits.

Simplechangestoevenasinglebyte(evenasinglebit)shouldresultindramaticchangestothedigest:

ThewinnerisSydney2f8eff80630eb401b0038d8df420719b

ThewinnerisSydeyf2b91cf6f8ad805a127182e8a46d450f

Somepopularmessagedigests:

MD2andMD5:developedbyRSA,producing16-bytehashes.Researchin1994foundweaknessesincollisionfrequencies.RIPEMD-160:TheEuropeanstandardproducing20-bytehashes.SHA-1,SHA-2andSHA-256arespecifiedbytheUSgovernmentfortheirDSA,outputting20-bytehashes.

From2004:MD5ToBeConsideredHarmfulSomeday.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p17,27thMay2020.

Page 18: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 18 next→ CITS3002 help3002 CITS3002schedule

(Old)performanceofthebasicbuildingblocksMessagedigestalgorithms(on233MHzPentium-II,butspeedscaleslinearly):

Algorithms Calculation(KB/sec)MD5 36,250

SHA-1 20,428

Symmetrickeyalgorithms(233MHzPentium-II):

Algorithms Setup(ms) Encryption(KB/sec) Decryption(KB/sec)DES(56bit) 6.3 4,386 4,557

Triple-DES(112bit) 22 1,596 1,620

RC4(128bits) 29.8 27,325 28,132

RC5(128bit) 352 4,576 4,691

Asymmetrickeyalgorithms(233MHzPentium-II):

512bits(KB/s)

1024bits(KB/s)

2048bits(KB/s)

RSAencryption 10.5 4.23 0.436

RSAdecryption 5.28 2.87 1.4

Thecommand-lineopensslprogramprovidesspeedsoncontemporarymachines:

linux> openssl OpenSSL> speed md5 To get the most accurate results, try to run this program when this computer is idle. Doing md5 for 3s on 16 size blocks: 1722968 md5's in 2.80s Doing md5 for 3s on 64 size blocks: 1469874 md5's in 2.80s .... type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes md5 9833.40k 33603.65k 92756.49k 167532.74k 217651.97k

Forlargeamountsofdata,wefirstencryptthedatawithasymmetricalgorithmandthenencryptthesymmetrickeywithanasymmetricalgorithm.Hybridprotocolsareusedinmostcurrentcryptographicarchitectures,suchasSSL.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p18,27thMay2020.

Page 19: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 19 next→ CITS3002 help3002 CITS3002schedule

DigitalsignaturegenerationDigitalcertificatesareoftenconfusedwithdigitalsignatures.

Likeamessagedigest,adigitalsignatureisa'summary'oftheoriginalmessage,butalsoprovidesanassurancethattheoriginalcreatorofthesignaturehastheprivatekeymatchingthepublickeyusedtogeneratethesignature.

Butwhoholdsthepublicandprivatekeys?

Whatifthepublickeyhadbeenreplacedwithanother?

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p19,27thMay2020.

Page 20: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 20 next→ CITS3002 help3002 CITS3002schedule

DigitalcertificatesDigitalcertificateshavebeenlooselydescribedasthedriver'slicensefortheInternet.

Adigitalcertificateprovidesabindingbetweenanentity'spublickey,andoneormoreattributestoitsidentity.

Anentitymaybeaperson,aexecutingpieceofsoftware,oradevicesuchasarouterorasmart-card.Acertificationauthority(CA)atteststotheauthenticityoftheentity'spublickeybydigitallysigningamessagewithitsownprivatekey.The'quality'ofthecertificatedependsonthedetailofinformationprovidedtotheCA(morelater).Either,publicandprivatekeysmaybeissuedbytheCA,ortheCAmaychallengetheentity'spublickey.

Thesuccessfuluseofdigitalcertificatesappearswithinalargecommunity-littleisgainedbyissuingone'sown.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p20,27thMay2020.

Page 21: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 21 next→ CITS3002 help3002 CITS3002schedule

DigitalcertificateencodingToday,certificatesaredefinedbytheISOX.509protocolandappearsasanapplication/x-x509-user-certMIMEtype.

ThedataisencodedusingAbstractSyntaxNotation(ASN.1),encodingandtransmittedinASCIIusingbase64encoding.

(18bitdata->24bitrepresentation).

Earlydebatecentredonwhetherthecertificateitselfneededtobeencrypted(nownot).

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p21,27thMay2020.

Page 22: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 22 next→ CITS3002 help3002 CITS3002schedule

BrowsersupportfordigitalcertificatesDigitalcertificatesaremanagedbyallcommonbrowsers:Firefox,Safari,Opera,NetscapeNavigator,MicrosoftInternetExplorer...

IfvisitingasitewiththesecureHypertextTransportProtocol,aswithhttps://secure.csse.uwa.edu.au/wecanviewdigitalcertificateinformationviathe'padlocked'icon.

Unfortunately,thereareoftenfewCAsfromAustraliainmostcommonbrowsers.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p22,27thMay2020.

Page 23: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 23 next→ CITS3002 help3002 CITS3002schedule

Browsersupportfordigitalcertificates

Thebrowserwilldisplaythedigitalcertificatefromthecurrentpage-hereshowing:

Thesubjectofthecertificate,Theissuer(CA)ofthecertificate,Theserialnumberofthecertificate,Theperiodofvalidityofthecertificate,andThemessagedigestofcertificate.

Iftheissuerofasite'sdigitalcertificateisalreadyknownbythebrowser(either'hard-wired'ormanuallyadded),theissuer'scertificatemaybeviewedandverified.

Version3ofX.509introducedextensionfields-theassociationofadditionalinformationwithacertificate.Eachextensionhas:

anextensiontypeprovidingsemanticsandtypingoftheextension(e.g.astring),anextensionvalue",suchasanemailorIPaddress,andacriticalityindicatorindicatingifthewholecertificateshouldbeignoredifanextensionisnotrecognized.

Standardextensions(?)nowdescribethe'strength'andpurposeofthecertificate-digitalsignature,non-repudiation,keyencipherment,dataencipherment,certificatesigning,etc.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p23,27thMay2020.

Page 24: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 24 next→ CITS3002 help3002 CITS3002schedule

CertificatePathvalidationCAsareorganizedinhierarchies-eachparentCAsignsacertificatevouchingforasubordinateCA'spublickey.

Whenvalidatingachainofcertificates,thecertificatepath,thepathisfolloweduntilthetopofthechainisreached(when?).

Thereisnoautomatedwayofverifyingthetopofacertificatechainotherthanverifyingthatitisoneofalistofdirectlyknown(andimplicitlytrusted)certificates(suchasinabrowser).

Severalcompanies,suchasVeriSign,Thwaite,Baltimore,AT&T,andagrowingbandofgovernmentdepartmentshavepositionedthemselves'atthetop'.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p24,27thMay2020.

Page 25: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

CITS3002ComputerNetworks

←prev 25 CITS3002 help3002 CITS3002schedule

CertificateRevocationListsAcertificaterevocationlist(CRL)allowsclientsandserverstocheckwhethertheentitytheyaredealingwithhasavalidcertificate.

Trustbreaksdown,andCRLsarerequired,when:

asubject'sprivatekeyisexposed,aCA'sprivatekeyisexposed,andtherelationshipbetweenthesubjectandCAchanges(e.g.thesubjectisnolongeremployedbytheCA,orstopspayingmoneytotheCA).

Certificaterevocationplaysacrucialpartintheauthenticationprocess:

Obtainthesubject'sdigitalcertificateandverifyitsvalidity.Extracttheserialnumberofthecertificate.FetchthecurrentCRLfromtheCA.VerifytheCRL'sdigitalsignature,andrecorditspublicationtimeandwhenthenextCRListobepublished.ExaminetheCRLtodetermineiftheintendedcertificatebeenrevokedorsuspended(basedonthecertificateserialnumber).Alerttheuserifthecertificateisrevoked.

LimitationsofCertificateRevocationInalargepublickeyinfrastructurecommunity,CRLsarebothlargeandmustbedownloaded

Page 26: The ISO/OSI Security Architecture CITS3002 Computer Networks · The ISO/OSI Security Architecture As well as defining their seven-layered model, the ISO/OSI group also defined a range

frequently.

ApplicationscanbesignificantlyslowedbytheneedtoretrievethelatestCRLfromaheavilytaxeddirectoryserver(orotherdistributionpoint).

Thereexistsacompromisebetweenalwaysbeingup-to-date,versustheriskoffalsecertificateacceptance.

CITS3002ComputerNetworks,Lecture12,Cryptography'sroleinnetworking,p25,27thMay2020.