29
NETWORK NETWORK SECURITY SECURITY

NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Embed Size (px)

Citation preview

Page 1: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

NETWORK NETWORK SECURITYSECURITY

Page 2: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

OverviewOverview

Need for E-Mail security

Threats to E-Mail

Pretty good privacy

Recommended web sites

Page 3: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Need for E-Mail SecurityNeed for E-Mail Security

E-mail is necessary for

E-Commerce

Daily communication

E-Mail is also very public, allowing for access at

each point form the sender’s computer to the

recipient’s screen.

Page 4: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Pretty Good PrivacyPretty Good Privacy

1991 – Creation of a single person, Phil

Zimmermann

Provides confidentiality and authentication

services for electronic mail and file storage

applications

Page 5: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Pretty Good PrivacyPretty Good Privacy

Selected best available cryptographic

algorithms

Integrated these algorithms into a general

purpose application

Source code and doc freely available on the

net

Agreement with company (Viacrypt) for low

cost commercial version

Page 6: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Phil ZimmermannPhil Zimmermann

“PGP has spread like a prairie fire, fanned by countless people who fervently want their privacy restored in the information age” - Phil Zimmermann, 1996

Page 7: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Why Is PGP Popular?Why Is PGP Popular?

It is availiable free on a variety of platforms.

Based on well known algorithms.

Wide range of applicability

Not developed or controlled by governmental or

standards organizations

Page 8: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Operational DescriptionOperational Description

PGP Consists of five services:

Authentication

Confidentiality

Compression

E-mail compatibility

Segmentation and Reassembly

The last three are transparent to the user

Page 9: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP: Authentication stepsPGP: Authentication steps

Sender: Creates a message Hashes it to 160-bits using SHA1 Encrypts the hash code using her private key,

forming a signature PGP prompts the user for the passphrase to

recover the private key Attaches the signature to message

Page 10: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP: Authentication stepsPGP: Authentication steps

Receiver:

Decrypts attached signature using sender’s

public key and recovers hash code

Recomputes hash code using message and

compares with the received hash code’

If they match, accepts the message

Page 11: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

M = original messageH = hash function| | = concatenation (join)Z = compressionZ-1= decompression

EP = public key encryption

DP = public key decryption

KRa = A’s private key

KUa = A’s public key

Authentication steps

Page 12: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP: ConfidentialityPGP: Confidentiality

Sender: Generates message and a random number

(session key) only for this message Encrypts message with the session key using

AES, 3DES, IDEA or CAST-128 Encrypts session key itself with recipient’s

public key using RSA Attaches it to message

Page 13: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP: ConfidentialityPGP: Confidentiality

Receiver:

Recovers session key by decrypting using his

private key PGP prompts the user for the passphrase to

recover the private key

Decrypts message using the session key.

Page 14: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

EC = symmetric encryption

DC = symmetric decryption

Ks = session key

Z = compression

Z-1 = Decompression

Confidentiality

Page 15: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Confidentiality & Confidentiality & AuthenticationAuthentication

Authentication and confidentiality can be combined

A message can be both signed and encrypted

That is called authenticated confidentiality

Encryption/Decryption process is “nested” within the

process shown for authentication alone

Page 16: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Confidentiality & Confidentiality & AuthenticityAuthenticity

Page 17: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites
Page 18: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

CompressionCompression

PGP compresses the message after applying the

signature but before encryption

Saves space for transmission and storage

To speed up the process (less data to encrypt)

The placement of the compression algorithm is

critical.

The compression algorithm used is ZIP (described in

appendix 5A)

Page 19: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP Email compatibilityPGP Email compatibility

PGP is designed to be compatible with all email

systems

Output of encryption and compression functions is

divided into 6-bit blocks

Each block is mapped onto an ASCII Character

This is called RADIX-64 encoding

Has the side-effect of increasing the size of the

data by about 33%

Page 20: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

E-mail CompatibilityE-mail Compatibility

The scheme used is radix-64 conversionThe use of radix-64 expands the message by 33%.

6 6

888

66

8888

Page 21: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

RADIX-64 encodingRADIX-64 encoding

Page 22: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites
Page 23: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Summary of PGP ServicesSummary of PGP Services

Function Algorithm Used Digital Signature DSS/ SHA or

RSA/ SHA Message Encryption

CAST or I DEA or three-key triple DES with Diffi e-Hellman or RSA

Compression ZI P E-mail Compatibility

Radix-64 conversion

Segmentation -

Page 24: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Cryptographic Keys and Cryptographic Keys and Key RingsKey Rings

PGP makes use of 4 types of keys:

One-time seeeion symmetric keys

Public keys

Private Keys

Passphrase-based symmetric Keys

Page 25: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

Key RequirementsKey Requirements

A Means of generating unpredictable session keys is

needed

A user is allowed to have multiple public/private key

pairs and there must be a way to indetify particular

keys

Each PGP entity must maintain a file of its own

public/private key pair as well as those of its

correspondents (通信者 )

Page 26: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP Key IdentifiersPGP Key Identifiers

What is a key identifier Consider this:

A user may have many public/private key pairs He wishes to encrypt or sign a message using one

of his keys How does he let the other party know which key he

has used? Attaching the whole public key every time is

inefficient Solution: Generate a key identifier (least significant

64-bits of the key)

Page 27: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP Key RingsPGP Key Rings

PGP uses key rings to identify the key pairs that a

user owns or trusts

Private-key ring contains public/private key pairs

of keys he owns

Public-key ring contains public keys of others he

trusts

Page 28: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP Public key managementPGP Public key management

Key rings are different from certificate chains used in X.509 There the user only trusts CAs and the people

signed by the CAs Here he or she can trust anyone and can add

others signed by people he trusted Thus, users do not rely on external CAs

A user is his/her own CA

Page 29: NETWORK SECURITY. Overview Need for E-Mail security Threats to E-Mail Pretty good privacy Recommended web sites

PGP Public key managementPGP Public key management

Approaches to minimize the risk that user’s public key ring contains false public keys: A physically gets key from B Verify key by phone Get B’s public key from mutually trusted

individual Obtain B’s key from trusted certifying authority