Three challenges with secret key encryption:

advertisement
Name: Osama Jaradeh
CIS534 Midterm
1. What is “brute-force attack”? How the “brute-force attack” is related to
Keyspace (the range of possible value of the Key)? Why the issue of number of bit
required in a key to ensure secure encryption is controversial?
A brute -force attack is applying all possible value of a key to the algorithm until you
succeed in deciphering the message. The longer the key space the more difficult is to
learn the key in brute force attack. The issue of the number of bits required in a key to
ensure secure encryption is controversial because the longer the number of bits the more
computationally expensive the encryption and the decryption process can be. The goal is
to make breaking a key cost more than the value of the information the key is protecting.
2. Very briefly describe the three types of cryptographic functions (Symmetric,
Asymmetric and Hash) that enable authentication, integrity, and confidentiality.
Symmetric encryption or secret key encryption uses a common key and the same
cryptographic algorithm to scramble and unscramble a message. For example, Caesar
Cipher. Some secret key algorithms operate on fixed length message blocks. Therefore, it
is necessary to break larger message into n-bit blocks and somehow chain them together.
Example of secret key algorithm:
Data Encryption Standard (DES)
3DES
Rivest Cipher (RC4)
International Data Encryption Algorithm (IDEA)
Advanced encryption standard (AES)
Asymmetric encryption or public key encryption uses a pair of keys, a public key and a
private key. It can use either the same algorithm, or different but complementary
algorithms to scramble or unscramble data. Public key encryption algorithms are rarely
used for data confidentiality because of their performance constraints. Public key
encryption algorithms are typically used in applications involving authentication using
digital signatures and key management.
Some of the common public key algorithms are RonRivest, Adi Shamir, Adi Shamir, and
Leonard Adleman (RSA) algorithm and El Gamal algorithm.
Public key encryption is slow compared to symmetric encryption and vulnerable to manin-the-middle attack.
Hash Function:
A hash function takes an input message of arbitrary length and outputs fixed-length code.
The fixed-length output is called the hash, or the message digest, of the original input
message. One way hash functions are typically used to provide the finger print of a
message. A hash finger print is unique and thereby proves the integrity and authenticity
of the message. Common hash functions are:
Message Digest 4 (MD4) algorithm
Message Digest 5 (MD5) algorithm
Secure Hash Algorithm (SHA)
3. What are three challenges with secret key encryption?
Three challenges with secret key encryption:
Changing the secret keys frequently to avoid the risk of compromising the keys
Securely generating the secret keys
Securely distributing the secret keys
4. What are the improvements of 3DES (Data Encryption Standard) over DES?
Why the 3DES with one key is used at all?
3DES has longer key length makes brute force attack more difficult, 3 DES can use one,
two or three keys.
3DES with one key is used for backward compatibility with DES.
5. A centralized key distribution model relies on what entity to issue keys?
A centralized key distribution model relies on a trusted third party, Key distribution
center (KDC) to issue the keys.
6. Which algorithm is commonly used to create secret session keys in a distributed
manner?
Diffie-Hellman algorithm is commonly used to create secret session keys in a distributed
manner.
7. What transport protocol is commonly used for SSL? Why?
SSL assume that the underlying packets delivery is reliable. SSL uses TCP as its
transport.
8. List three things that are part of an IPSec security association (SA)?
The ESP encryption algorithm and key(s)
The AH authentication algorithm and key
A shared session key
9.What is the primary reason for classifying VPNs into access VPNs, Intranet VPNs,
and extranet VPNs?
The primary reason is the security policy variations. A good security policy details
corporate infrastructure, information authentication mechanism and access privileges.
This will vary depending on how the corporate resources are accessed.
10. What is NAT, why it is used, and what is its security issue?
NAT stands for Network Address Translation which is often used in environments that
have private IP address space as opposed to ownership of globally unique IP address.
NAT will translate the unregistered IP address into legal IP addresses that are routable in
the outside public network. When IPSec session runs through NAT, security is often
compromised.
The IPSec Authentication header (AH) protects entire IP packets, including header
against modification in transit. NAT modifies the IP header, so is inherently incompatible
with AH.
11. Security Technology protocols are grouped according to their shared attributes
of:
a. Identity Technologies
b. Security in TCP/IP structured layers
c. Virtual Private Dial-up security Technologies
d. Public Key Infrastructure and distribution models
Name and briefly describe one example for each of the above four Security
Technology group.
A-Identity Technology:
Token Password Authentication
Token authentication systems generally require the use of a special smart card or token
card. Although some implementations are dome using software to alleviate the problem
of loosing the smart card or token this types of authentication mechanisms are based on
one or two alternatives schemes:
Challenge-Response
Time-Synchronous Authentication
Steps for authentication:
Step1: The user dials into an authentication server, which then issues a prompt for a user
id.
Step2: The user provides the ID to the server, which then issues a challenge a random
number that appears on the user’s screen.
Step3: The user enters that challenge number into the token or smart card, a credit-cardlike device, which then encrypts the challenge with the user’s encryption key and
displays a response.
Step4: The user types this response and sends it to the Authentication server. While the
user is obtaining a response from the token, the Authentication server calculates what the
appropriate response should be based on its database of user keys.
Step5: When the server receives the user’s response, it compares that response with the
one it has calculated
If the two responses match, the user is granted access to the network. If they do not match
access is denied..
B-Security in TCP/IP structured layers
Secure Shell Protocol:
The Secure Shell (SSH) is a protocol for secure remote login and other secure network
services over an insecure network. It provides support for secure remote login, secure file
transfer, and the secure forwarding of TCP/IP and X Windows system traffic.
The SSH protocol consists of three major components:
The Transport layer protocol, which provides server authentication, confidentiality,
and integrity with perfect forward secrecy. Optionally, it may also provide compression
The user authentication protocol, which authenticates the client to the server.
The connection protocol, which multiplexes the encrypted tunnel into several logical
channels.
C-Virtual Private Dial-up security Technologies
Enable large enterprises to extend their private networks across dial-up lines. Instead of
incurring large costs to ensure security by dialing into a campus site from any where in
the world or lessening security by dialing in locally and using the Internet as the transport
to get to the main enterprise campus. Example:
Point to point Tunneling Protocol:
Was initiated by Microsoft. It is a client/server architecture that allows the Point-to-Point
Protocols (PPP) to be tunneled through an IP network and decouples functions that exist
in current NASs.
D-Public Key Infrastructure and distribution models
The purpose of a Public Key Infrastructure (PKI) is to provide trusted and efficient key
and certificate management to support these protocols. A PKI is defined by the Internet
X.509 Public Key Infrastructure PKIX Roadmap “work in progress” document as follow:
The set of hardware, software, people, policies, and procedures needed to create,
manage, store, distribute, and revoke certificates based on public-key cryptography
A PKI consists of the following five types of components:
1. Certification Authorities (CAs) that issue and revoke certificates.
2. Organizational Registration Authorities (ORAs) that vouch for the binding
between public keys, certificate holder identities, and other attributes.
3. Certificate holders that are issued certificates and that can sign digital documents.
4. Clients that validated digital signatures and their certification paths from a known
public key of a trusted CA.
5. Repositories that store and make available certificates and Certificate Revocation
Lists (CRLs)
The function of the PKI can be as following:
Registration: The process where a subject first makes itself known to Certificate
Authorities (CA)
Initialization: the user or client system gets value it needs to begin communication with
PKI.
Certification: The process in which CA issues a certificate for a subject public key and
return the certificate to the subject.
Key Pair Recovery: The CA must provide a system for key recovery without
compromising the private key.
Key Generation: Depending on the CA Policy, the private/public key pair can either be
generated by the user in the local environment or generated by the CA
Key update: All key pairs are updated regularly.
Cross Certification: A certificate is issued by one CA to another CA
Revocation: Some circumstances may cause a certificate to become invalid for example
change of name and compromise or suspected compromise of the private key. The CA
revoke the certificate under this conditions.
12. What is Denial of Service attack? Briefly describe 3 types of common DoS
attacks.
Denial of service attack is any action that prevents any part of a network or a host system
from functioning in accordance with is intended purpose.
TCP SYN attack:
TCP SYN attack exploits the three way handshake design for TCP connection
establishment by having an attacking source host generate TCP SYN packets with
random source toward a victim host. The victim destination host sends a SYN/ACK to
the random source address and adds an entry to the connections queue. Because the
SYN/ACK is destined for an incorrect or nonexistent host, the last part of the three ways
handshake is never completed, and the entry remain in the connection queue until a timer
expire. By generating phony TCP SYN packets from random IP address at a rapid, an
intruder can fill up the connection queue until a timer and deny TCP services to
legitimate users.
Land.c attack
The Land.c attack sends TCP SYN packet giving the target host’s address as both the
source and destinations and using the same port on the target host as both the source and
destinations. This can cause may operating system to hang.
The smurf attack and Fraggle Attack
The smurf attack is performed by sending an ICMP echo request ping packet with the
victim’s address as the source address to a network’s broadcast address. The fraggle
attack is similar except it uses UDP packets. If the network router and network servers
are configured to respond to a network address ping packet, all the servers on that subnet
will respond to the forge source IP address, flooding the victim’s site
Download