lecture 10: network security · 2015. 11. 28. · ‣ symmetric key encryption/decryption -alice...

68
Network Security Lecture 10:

Upload: others

Post on 01-Mar-2021

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Network Security Lecture 10:

Page 2: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Security properties

‣ Confidentiality

- only the sender and the receiver understand the contents of the message

‣ Authenticity

- the message is from whom it claims to be

‣ Integrity

- the message was not changed along the way

2

Page 3: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Outline

‣ Building blocks

‣ Providing security properties

‣ Securing Internet protocols

‣ Operational security

3

Page 4: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Outline

‣ Building blocks

‣ Providing security properties

‣ Securing Internet protocols

‣ Operational security

4

Page 5: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Encryption & decryption

5

Bob Alice

“Dear Bob, ...”

communication channel

“daghj2$%@^”

encryption algorithm

decryption algorithm

“Dear Bob, ...”

“daghj2$%@^” “daghj2$%@^”

Page 6: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Encryption & decryption

6

plaintext plaintext

Bob Alice

encryption algorithm

decryption algorithm

ciphertext ciphertext

Page 7: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Encryption & decryption

‣ Encryption algorithm: input: plaintext, output: ciphertext

‣ Decryption algorithm: input: ciphertext, output: plaintext

‣ Ciphertext: ideally, should reveal no information about the message

7

Page 8: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

key key

Symmetric key cryptography

8

plaintext plaintext

Bob Alice

encryption algorithm

decryption algorithm

ciphertext ciphertext

Page 9: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

key

Symmetric key cryptography

9

plaintext plaintext

encryption algorithm

decryption algorithm

ciphertext ciphertext

key

key{ } key{ } plaintext = plaintext

Page 10: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Symmetric key cryptography

‣ Alice and Bob share the same key

- used both for the encryption and decryption algorithm

‣ Used to “scramble” the plaintext

- RC4, AES, Blowfish

10

Page 11: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Symmetric key cryptography

‣ Challenge: how to share a key?

- out of band

- not always an option

11

Page 12: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Asymmetric key cryptography

12

key+

key-

plaintext plaintext

Bob Alice

encryption algorithm

decryption algorithm

ciphertext ciphertext

Page 13: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

key-{ } key+{ }

Asymmetric key cryptography

13

key+ key-

plaintext plaintext

encryption algorithm

decryption algorithm

ciphertext ciphertext

plaintext = plaintext

Page 14: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Asymmetric key cryptography

‣ Alice and Bob use different keys

- public (key+) and private (key-) key

‣ There is a special relationship between them

- key-{ key+{ plaintext } } = plaintext

- key+{ key-{ plaintext } } = plaintext

- RSA, DSA

14

Page 15: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Asymmetric key cryptography

‣ Challenge: computationally expensive

- sophisticated encryption/decryption algorithms based on number theory

15

Page 16: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Cryptographic hash function

16

Dear Bob, .................... .................... .................... Cheers, Alice

hash function

tru46hj#$%

hash

Page 17: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Cryptographic hash function

17

Dear Bob, .................... .................... .................... Cheers, Alice

hash function

Dear Bob,

hash

Dear Bob, .................... .................... .................... Thanks,

Celine

Dear Bob, .................... .................... .................... Best wishes, Dabir

Page 18: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Cryptographic hash function

18

Dear Bob, .................... .................... .................... .................... .................... .................... Cheers, Alice

hash function

tru46hj#$%

hash ?

Page 19: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Cryptographic hash function

‣ Maps larger input to smaller hash

‣ Hash should not reveal information on input

‣ Should be hard to identify 2 inputs that lead to the same hash

19

Page 20: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Building blocks

‣ Symmetric key encryption/decryption - Alice and Bob share the same key - challenge: exchanging the key

‣ Asymmetric key encryption/decryption - Alice and Bob use different keys - challenge: computationally expensive

‣ Cryptographic hash function - produces a hash of the original message

- that’s different from encryption 20

Page 21: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Outline

‣ Building blocks

‣ Providing security properties

‣ Securing Internet protocols

‣ Operational security

21

Page 22: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing confidentiality

22

key key

plaintext plaintext

Bob Alice

encryption algorithm

decryption algorithm

ciphertext ciphertext ciphertext

Eve

Page 23: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing confidentiality

23

plaintext plaintext

Bob Alice

encryption algorithm

decryption algorithm

ciphertext ciphertext

Bob_key+

Bob_key-

Page 24: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing confidentiality

24

plaintext plaintext

Bob Alice

encryption algorithm

decryption algorithm

ciphertext ciphertext

Bob_key+

Bob_key- Manuel

Page 25: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

plaintext

encryption algorithm

ciphertext

Man in the middle

25

Bob Alice

plaintext

decryption algorithm

ciphertext

plaintext

encryption algorithm

ciphertext

Bob_key+

Bob_key-

Manuel

plaintext

decryption algorithm

ciphertext

Manuel_key+

Manuel_key-

ciphertext ciphertext

Page 26: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing confidentiality

‣ With symmetric key crypto

- Alice encrypts message with shared key

- only Bob can decrypt it

‣ With asymmetric key crypto

- Alice encrypts message with Bob’s public key

- only Bob can decrypt it (with his private key)

- but beware of man-in-the-middle attacks

26

Page 27: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

27

Bob Alice Persa

Page 28: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

28

Bob Alice Persa

Page 29: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

29

Bob Alice

Page 30: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

30

Bob Alice

key{ I am Alice }

= hjdfk678vnx

Page 31: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

31

Bob Persa

key{ I am Alice }

!= hgdja54637452

Page 32: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

32

Bob Alice

Page 33: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

33

Bob Alice

hash{ key | I am Alice }

= 46873astubv

Page 34: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

34

Bob Alice

Message Authentication Code (MAC)

Page 35: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

35

Bob Alice

Alice_key+{ 687retwyw }

= I am Alice

Page 36: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

36

Bob Persa

Alice_key+{ ghdj67d%^& }

!= I am Alice

Page 37: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

37

Bob Alice

Page 38: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

38

Bob Alice

Digital signature

Page 39: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

39

Bob Alice

Page 40: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

40

Bob Alice

Page 41: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

41

Bob Alice

Message Authentication Code (MAC)

Page 42: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

42

Bob Alice

Page 43: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

43

Bob Alice

Digital signature

Page 44: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

44

Bob Alice

Page 45: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

45

Bob Alice

Page 46: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

‣ With symmetric key crypto

- Alice appends hash of message + shared key

- Bob verifies that it is correct (using shared key)

‣ With asymmetric key crypto

- Alice encrypts hash of message with her private key, appends to unencrypted message

- Bob verifies that it is correct (using Alice’s public key)

46

Page 47: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing authenticity

‣ Nonce for avoiding replay attacks

- Bob sends Alice a nonce (random number)

- Alice appends hash of message + shared key + nonce

47

Page 48: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing integrity

48

Bob Alice

Page 49: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing integrity

49

Bob Alice

Page 50: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Providing integrity

‣ With the same mechanisms that provide authenticity

50

Page 51: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

plaintext

encryption algorithm

ciphertext

Man in the middle

51

Bob Alice

plaintext

decryption algorithm

ciphertext

plaintext

encryption algorithm

ciphertext

Bob_key+

Bob_key-

Manuel

plaintext

decryption algorithm

ciphertext

Manuel_key+

Manuel_key-

ciphertext ciphertext

Page 52: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Public key certification

‣ Trusted certificate authority (CA) digitally signs that key+ is Bob’s public key

- using the CA’s private key

‣ CA’s public key is obtained out of band

- web browsers pre-configured with CA public keys

52

Page 53: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Outline

‣ Building blocks

‣ Providing security properties

‣ Securing Internet protocols

‣ Operational security

53

Page 54: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing email (confidentiality)

54

Alice

Bob_key+{ }

shared_key{ } message

shared_key

+

Page 55: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

shared_key{ }

Bob_key-{ }

Securing email (confidentiality)

55

Bob

Bob_key+{ }

shared_key{ } message

shared_key

-

Page 56: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Alice_key-{ } hash{ }

Securing email (auth & integrity)

56

Alice

message

message

+

Page 57: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Alice_key+{ }

Securing email (auth & integrity)

57

Bob -

Alice_key-{ } hash{ } message

message hash{ }

Page 58: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Alice_key-{ } hash{ }

Securing email

58

Alice

message

message

+ shared_key{ ... }

Bob_key+{ shared_key }

+

Page 59: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing TCP

59

online store Alice

Page 60: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing TCP

‣ Server sends its certificate

- includes its public key

‣ Client creates and sends a shared master key

- encrypts it with server’s public key

‣ Both use master key to create 4 session keys

- 1 key for encrypting client --> server data

- 1 key for creating MAC for client --> server data

- same for server --> client data

60

Page 61: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing TCP

61

online store Alice

Page 62: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing TCP

62

online store Alice

Page 63: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing TCP

‣ Client organizes data in records

- each record has a sequence number

‣ Creates MAC for each record + sequence #

- using one of the 4 session keys

‣ Encrypts the data + MAC for each record

- using (another) one of the 4 session keys

63

Page 64: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing IP

64

Bob Alice

IP packet

key1{ IP packet }, hash{ key2, key1{ IP packet } }

IP packet

Page 65: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Securing IP

‣ 2 IP routers establish a “secure tunnel”

- usually between branch offices of a company

‣ Source encrypts each IP packet

- using a shared key

‣ Source creates MAC for encrypted IP packet

- using another shared key

65

Page 66: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Key ideas

‣ Combination of symmetric/asymmetric keys - asymmetric key crypto to exchange shared keys

- symmetric key crypto for confidentiality, authenticity, & integrity

- symmetric key crypto is faster

‣ Seq. numbers to avoid reordering attacks - organize data in records with seq. numbers

- compute MAC on record data + seq. number

66

Page 67: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Outline

‣ Building blocks

‣ Providing security properties

‣ Securing Internet protocols

‣ Operational security

67

Page 68: Lecture 10: Network Security · 2015. 11. 28. · ‣ Symmetric key encryption/decryption -Alice and Bob share the same key -challenge: exchanging the key ‣ Asymmetric key encryption/decryption

Computer Networks, Fall 2015

Firewalls

68

action src IP dst IP src port dst port proto

allow 167.67/16

167.67/16

any TCP > 1023 80

allow any TCP 80 > 1023

deny all all all all all

flag

all

ACK

all