53
CRYPTOGRAPHY BITS F463 Lecture 1

Crypto basics

Embed Size (px)

DESCRIPTION

Some basics on crypto

Citation preview

  • CRYPTOGRAPHY BITS F463 Lecture 1

  • BITS Pilani, Hyderabad Campus

    Learning Objectives

    Cryptography is an indispensable tool for protecting information in computer

    systems

    Learning to reason about the security of cryptographic constructions and to apply

    this knowledge to real-world applications

    forms the crux of this course

  • BITS Pilani, Hyderabad Campus

    Course Material Textbooks:

    T1: Cryptography and Network Security: Principles and Practice,

    William Stallings, Fifth Edition, Pearson Education

    Reference books:

    R1: Cryptography and Network Security, Behrouz A. Forouzan,

    McGraw-Hill, 2007

    R2: Applied Cryptography, Bruce Schneier, Wiley Student Edition,

    Second Edition, Singapore, 2010

    R3: Handbook of Applied Cryptography: Alfred Menezes, Paul van

    Oorschot, and ScoF Vanstone, CRC Press, NY

    R4: Cryptography: Theory and Practice, Douglas Stinson, Chapman

    and Hall/CRC, 3rd Edition, 2005.

    R5: Cryptography and E-Commerce: A Wiley Tech Brief, Jon C. Graff,

    John Wiley & Sons, 2000

    Online Study Material:

    http://online.stanford.edu/course/cryptography, https://www.coursera.org/course/crypto

  • BITS Pilani, Hyderabad Campus

    Course Administration and Evaluation

    Evaluation

    Component

    Weightage Date & Time Mode

    Test-1 20% Closed Book

    Test-2 20% Closed Book

    Assignments/

    Term Projects

    (Take Home)

    20% Open Book

    Comprehensive 40% Closed Book

  • BITS Pilani, Hyderabad Campus

    Roadmap

    Cryptographic algorithms

    symmetric ciphers

    asymmetric encryption

    hash functions

    Mutual Trust

  • BITS Pilani, Hyderabad Campus

    Cryptographic algorithms: This is the study of techniques for ensuring the secrecy and/or authenticity

    of information. The three main areas of study in this

    category are: 1. symmetric encryption, 2. asymmetric

    encryption, and 3. cryptographic hash functions, with the

    related topics of message authentication codes and

    digital signatures

    Mutual trust: This is the study of techniques and algorithms for providing mutual trust in two main areas.

    First, key management and distribution deals with

    establishing trust in the encryption keys used between

    two communicating entities. Second, user authentication

    deals with establish trust in the identity of a

    communicating partner

    What would you learn?

  • BITS Pilani, Hyderabad Campus

    Standards Organizations

    National Institute of Standards & Technology (NIST)

    Internet Society (ISOC)

    International Telecommunication Union Telecommunication Standardization Sector (ITU-T)

    International Organization for Standardization (ISO)

    RSA Labs (de facto)

  • BITS Pilani, Hyderabad Campus

    Computer Security

    the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications)

    ->NIST95 definition

  • BITS Pilani, Hyderabad Campus

    Key Security Concepts (CIA triad)

  • BITS Pilani, Hyderabad Campus

    Confidentiality (covers both data confidentiality and privacy): preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information.

    Integrity (covers both data and system integrity): Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.

    Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system.

    Authenticity: The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.

    Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

    CIA triad

  • BITS Pilani, Hyderabad Campus

    Levels of Impact

    3 levels of impact from a security breach

    Low

    Moderate

    High

  • BITS Pilani, Hyderabad Campus

    Low Impact

    The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.

    A limited adverse effect means that, for example, the loss of confidentiality, integrity, or availability might

    (i) cause a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced;

    (ii) result in minor damage to organizational assets;

    (iii) result in minor financial loss; or

    (iv) result in minor harm to individuals.

  • BITS Pilani, Hyderabad Campus

    Moderate Impact

    The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.

    A serious adverse effect means that, for example, the loss might

    (i) cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced;

    (ii) result in significant damage to organizational assets;

    (iii) result in significant financial loss; or

    (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries.

  • BITS Pilani, Hyderabad Campus

    High Impact

    The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

    A severe or catastrophic adverse effect means that, for example, the loss might

    (i) cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions;

    (ii) result in major damage to organizational assets;

    (iii) result in major financial loss; or

    (iv) result in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries.

  • BITS Pilani, Hyderabad Campus

    Examples of Security Requirements

    confidentiality student grades

    integrity patient information

    availability authentication service

    authenticity admission ticket

    non-repudiation stock sell order

  • BITS Pilani, Hyderabad Campus

    Computer Security Challenges not simple easy to get it wrong

    must consider potential attacks

    procedures used counter-intuitive

    involve algorithms and secret info

    must decide where to deploy mechanisms

    battle of wits between attacker / admin

    not perceived on benefit until fails

    requires regular monitoring

    a process, not an event

    too often an after-thought

    regarded as impediment to using system

    Unusable security is not secure

  • BITS Pilani, Hyderabad Campus

    What is security all about?

    Security is protecting assets Prevention, detection, reaction are the protective measures

    Computer security rests on the basic aspects

    -- Confidentiality

    -- Integrity

    -- Availability

  • BITS Pilani, Hyderabad Campus

    How to realize Security?

    models

    mechanisms

    policies

  • BITS Pilani, Hyderabad Campus

    What is a security policy? A security policy is a statement that

    partitions the states of the system into a set of authorized or secure states and a set of unauthorized or non secure states (security policy theorem)

    A security policy sets the context in which we can define a secure system

    A secure system is one which starts in an authorized state and cannot enter an unauthorized state

  • BITS Pilani, Hyderabad Campus

    What is a security model?

    A Security Model is a formal description of a security policy

    A security policy captures the security requirements of an enterprise and describes the

    steps that have to be taken to achieve security in

    the form of a model

    Security models are used in security evaluation, also as proofs of security

    Among all the security models, Bell-LaPadula model is treated as a milestone in computer

    security

  • BITS Pilani, Hyderabad Campus

    What is a security mechanism?

    secure precise broad

    set of reachable states set of secure states

  • BITS Pilani, Hyderabad Campus

    Security Objectives

    Security objectives should include

    Availability (of systems and data for intended use only)

    Integrity (of system and data)

    Confidentiality (of data and system information)

    Accountability (to the individual level)

    Assurance (that the other four objectives have been adequately met)

  • BITS Pilani, Hyderabad Campus

    Security Objective Dependencies

    confidentiality

    confidentiality

    integrity

    confidentiality integrity

    accountability

    confidentiality

    availability

    assurance

    integrity

    integrity

  • BITS Pilani, Hyderabad Campus

    More on basics of security

    Authorization Accounting

    Authentication

    Verify credentials

    Grant rights Unauthorized

    access

    auditing repudiation

    Verify identity ID spoofing

    ID Masquerade

    Content modification

  • BITS Pilani, Hyderabad Campus

    More on basics of security contd..

    Availability Confidentiality

    Integrity

    Continuity

    Punctuality Interruption

    delay

    exclusivity divulging

    Correctness

    Completeness

    Validity

    Authenticity

    Non-repudiation

    manipulation

    destruction

    Falsification

    repudiation

  • BITS Pilani, Hyderabad Campus

    Classification of Security Services

    Support. These services are generic and underlie most information technology security capabilities. Prevent. These services focus on preventing a security breach from occurring Recover. The services in this category focus on the detection and recovery from a security

  • BITS Pilani, Hyderabad Campus

    Security Services Model

  • BITS Pilani, Hyderabad Campus

    Security Life Cycle

    Threats

    Policy

    Specification

    Design

    Implementation

    Operation

  • BITS Pilani, Hyderabad Campus

    Computer Security - generic name for the collection of policies/tools/mechanisms designed to protect data and to thwart hackers

    Network Security - measures to protect data during their transmission

    Internet Security - measures to protect data during their transmission over a collection of interconnected networks

    The focus is on measures to deter, prevent, detect and correct security violations that involve the transmission & storage of information

    Definitions

  • BITS Pilani, Hyderabad Campus

    Observed security trends, growth in sophistication of attacks contrasting with decrease in skill & knowledge needed to mount an attack.

    Security Trends

  • BITS Pilani, Hyderabad Campus

    We need a systematic way of defining the requirements for security and characterizing the

    approaches to satisfy those requirements

    ITU-T2 recommendation X.800 Security Architecture for OSI defines a systematic way of defining and providing security requirements

    It provides a useful overview of concepts

    OSI Security Architecture

  • BITS Pilani, Hyderabad Campus

    security attack

    security mechanism

    security service

    Aspects of Security

  • BITS Pilani, Hyderabad Campus

    The OSI security architecture focuses on security attacks,

    mechanisms and services. These can be defined briefly as

    follows:

    Security attack: Any action that compromises the security of

    information owned by an organization.

    Security mechanism: A process (or a device incorporating

    such a process) that is designed to detect, prevent, or

    recover from a security attack.

    Security service: A processing or communication service that

    enhances the security of the data processing systems and

    the information transfers of an organization. The services

    are intended to counter security attacks and they make

    use of one or more security mechanisms to provide the

    service.

    OSI Security Architecture & Aspects

  • BITS Pilani, Hyderabad Campus

    Any action that compromises the security of information owned by an organization

    Information security is about how to prevent attacks, or failing that, to detect attacks on

    information-based systems

    often threat & attack used to mean same thing

    have a wide range of attacks

    can focus on generic types of attacks passive

    active

    Security Attack

  • BITS Pilani, Hyderabad Campus

    Threat:

    A potential for violation of security, which exists when

    there is a circumstance, capability, action or event that

    could breach security and cause harm.

    Attack:

    An assault on system security that derives from an

    intelligent threat; an intelligent act that is a deliberate

    attempt (method/technique) to evade security services

    and violate the security services and violate the security

    policy of a system

    Threat and Attack

  • BITS Pilani, Hyderabad Campus

    A potential occurrence that can have an undesirable effect on the system assets or resources

    Primary threats

    Unauthorized access

    User masquerading

    Denial of service

    Physical attacks

    Secondary threats

    Introduction of malware

    Bad security administration

    Bad architecture, implementation

    misconfiguration

    Threats

  • BITS Pilani, Hyderabad Campus

    Passive Attack - Interception

  • BITS Pilani, Hyderabad Campus

    Passive Attack: Traffic Analysis

    Observe traffic pattern

  • BITS Pilani, Hyderabad Campus

    Active Attack: Interruption

    Block delivery of message

  • BITS Pilani, Hyderabad Campus

    Active Attack: Fabrication

    Fabricate message

  • BITS Pilani, Hyderabad Campus

    Active Attack: Replay

  • BITS Pilani, Hyderabad Campus

    Active Attack: Modification

    Modify message

  • BITS Pilani, Hyderabad Campus

    Handling Attacks

    Passive attacks focus on Prevention

    Easy to stop

    Hard to detect

    Active attacks focus on Detection and Recovery

    Hard to stop

    Easy to detect

  • BITS Pilani, Hyderabad Campus

    Security Service

    enhance security of data processing systems and information transfers of an organization

    intended to counter security attacks

    using one or more security mechanisms

    often replicates functions normally associated with physical documents

    which, for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed

  • BITS Pilani, Hyderabad Campus

    Security Services

    X.800: a service provided by a protocol layer of

    communicating open systems, which ensures adequate security of the systems or of data transfers

    RFC 2828: a processing or communication service provided by

    a system to give a specific kind of protection to system resources

  • BITS Pilani, Hyderabad Campus

    Security Services (X.800)

    Authentication - assurance that communicating entity is the one claimed have both peer-entity & data origin authentication

    Access Control - prevention of the unauthorized use of a resource

    Data Confidentiality protection of data from unauthorized disclosure

    Data Integrity - assurance that data received is as sent by an authorized entity

    Non-Repudiation - protection against denial by one of the parties in a communication

    Availability resource accessible/usable

  • BITS Pilani, Hyderabad Campus

    Security Mechanism

    a.k.a. control

    feature designed to detect, prevent, or recover from a security attack

    no single mechanism that will support all services required

    however one particular element underlies many of the security mechanisms in use: cryptographic techniques

    hence our focus on this topic

  • BITS Pilani, Hyderabad Campus

    Security Mechanisms (X.800)

    specific security mechanisms: encipherment, digital signatures, access controls,

    data integrity, authentication exchange, traffic padding, routing control, notarization

    pervasive security mechanisms: trusted functionality, security labels, event

    detection, security audit trails, security recovery

  • BITS Pilani, Hyderabad Campus

    Model for Network Security

  • BITS Pilani, Hyderabad Campus

    Model for Network Security

    using this model requires us to: 1. design a suitable algorithm for the security

    transformation

    2. generate the secret information (keys) used by the algorithm

    3. develop methods to distribute and share the secret information

    4. specify a protocol enabling the principals to use the transformation and secret information for a security service

  • BITS Pilani, Hyderabad Campus

    Model for Network Access Security

  • BITS Pilani, Hyderabad Campus

    Model for Network Access Security

    using this model requires us to: 1. select appropriate gatekeeper functions to

    identify users

    2. implement security controls to ensure only authorised users access designated information or resources

    note that model does not include: 1. monitoring of system for successful penetration

    2. monitoring of authorized users for misuse

    3. audit logging for forensic uses, etc.

  • BITS Pilani, Hyderabad Campus

    Summary

    topic roadmap & standards organizations

    security concepts:

    confidentiality, integrity, availability

    X.800 security architecture

    security attacks, services, mechanisms

    models for network (access) security