Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University Fall 2005 Internet Security - ComSec Services & Mechanisms 2 Fall 2005 What is Communication Security? To provide safe communication over unsafe medium Alice Bob Eve Safe Communication Alice can send a message to Bob that only Bob can understand Confidentiality Nobody can tamper with message content during communication Integrity Bob can know for sure it was Alice who sent the message Authentication Unsafe Medium Medium over which passive and active attacks are possible Internet Security - ComSec Services & Mechanisms 3 Outline What types of services do we need to protect communication? What kinds of mechanisms do we use to protect communication? Fall 2005 4 Internet Security - ComSec Services & Mechanisms Fall 2005 ISO 7498-2 : Security Framework Architecture Security Services Service Types Service Layer Mapping Security Mechanisms Mechanism Definition Service - Mechanism Mapping Internet Security - ComSec Services & Mechanisms 5 Communication Security Services Confidentiality Data Confidentiality Traffic Confidentiality Data Integrity Primary Services Authentication Data Origin Authentication Peer Authentication Access Control Non-Repudiation Non-Repudiation of Origin Non-Repudiation of Reception Audit Availability – an after-thought but increasingly important Note: all services are defined here in context of Communication Security Fall 2005 6 Internet Security - ComSec Services & Mechanisms Fall 2005 Confidentiality Protection of information from disclosure to unauthorized entities (organizations, people, machines, processes). Information includes data contents, size, existence, communication characteristics, etc. Service Types Data Confidentiality / Disclosure Protection Connection Oriented Connectionless Selective Field Traffic Flow Confidentiality Origin Destination Association Message Size Transmission Patterns Accompanied with Data Integrity Protection Mechanisms Data Encryption Symmetric (Secret-Key) Asymmetric (Public-Key) 7 Internet Security - ComSec Services & Mechanisms Fall 2005 Integrity Protection of data against creation, alteration, deletion, duplication, reordering by unauthorized entities (organizations, people, machines, processes). Integrity violation is always caused by active attacks. Service Types Message Integrity Associated with connectionless communication Message Stream Integrity Associated with connection oriented communication Protection Mechanisms Message Digests (Hashing) Sequence Numbers Nonce ID (Random Number) Time Stamps 8 Internet Security - ComSec Services & Mechanisms Fall 2005 Authentication Communicating entities are provided with assurance & information of relevant identities of communicating partners (people, machines, processes). Personnel Authentication requires special attention. Service Types Data Origin Authentication Associated with Connectionless Communication Peer Entity Authentication Associated with Connection Oriented Communication Fundamental for access control hence, confidentiality & integrity Protection Mechanisms Password Manual One-Time Password Key Sharing Manual Symmetric Key (Tickets) Asymmetric Key (Certificates) Challenge – Response Nonce Based Zero Knowledge Proof Internet Security - ComSec Services & Mechanisms 9 Fall 2005 Access Control Protection of information resources or services from access or use by unauthorized entities (organizations, people, machines, processes). Privileges – rights to access or use resources or services Principles – entities own access control privileges Subjects – entities exercise access control privileges Objects / Targets – resources or services accessed/used by subjects Delegation – transfer of access control privileges among principals Authorization – transfer of access control privileges from principals to subjects Service Types Subject Based Typing Identity Based Role Based Enforcement Based Typing Mandatory Access Control ― Management Directed Discretionary Access Control ― Resource Owner Directed Protection Mechanisms Access Control Lists (ACLs) Object Based Specification Ex.: UNIX File System Capabilities Subject Based Specification Issue Tickets/Certificates 10 Internet Security - ComSec Services & Mechanisms Fall 2005 Non-Repudiation Protection against denial of participation by communicating entities in all or part of a communication. Service Types Non-Repudiation of Origin Non-Repudiation of Reception Protection Mechanisms Notarization Time Stamp Digital Signature Internet Security - ComSec Services & Mechanisms 11 Fall 2005 Audit Recording & analyses of participation, roles and actions in information communication by relevant entities. Service Types Off-line Analysis (Computer Forensic) On-line Analysis (Real-time Intrusion Detection) Protection Mechanisms “Syslog” Intrusion Monitors / Sensors Common Intrusion Detection Framework (CIDF) Common Information Model (CIM) Internet Security - ComSec Services & Mechanisms 12 Fall 2005 Layers of Protocol Protection APPLICATION MSP, PEM KEY MGMT PRESENTATION SESSION TRANSPORT NETWORK TLSP NLSP, IPSP DATA LINK SILS PHYSICAL Secure Signaling Security Protection is provided in multiple protocol layers. 13 Internet Security - ComSec Services & Mechanisms Fall 2005 Service vs. Layer Mapping Service / Layer 1 Confidentiality, Connectionless Confidentiality, Connection Y 2 3 4 Y Y Y Y Y Y Y Y Confidentiality, Selected Field Confidentiality, Traffic Flow 6 Y Y Authentication, Data Origin 7 Y Y ? Authentication, Peer Entity Y Y Y Y Y Y Integrity, Message Y Y Y Y Integrity, Message Stream ? Y Y Y Access Control ? Y Y Y Non-Repudiation, Origin Y Non-Repudiation, Receipt Y ? = difference between IEEE802 and ISO 14 Internet Security - ComSec Services & Mechanisms ISO 7498-2 : Security Architecture Security Services Service Types Service Layer Mapping Security Mechanisms Mechanism Definition Service - Mechanism Mapping Fall 2005 15 Internet Security - ComSec Services & Mechanisms Security Mechanisms Encipherment – with Secret / Public Key Cryptography Data Integrity – with One-Way Hash Function Authentication – with Public-Key Challenge/Response Access Control Digital Signature – with Public-Key Cryptography Traffic Padding Notarization Fall 2005 Internet Security - ComSec Services & Mechanisms 16 Fall 2005 Symmetric / Secret Key Encipherment Algorithms use same keys for encryption & decryption : Symmetric / Secret Key must be dispatched in secret Used for bulk encryption / decryption Also used in following security services : Authentication Random Number Generator Clear Text Symmetric Key Encryption Engine Cipher Text Symmetric Key Clear Decryption Text Engine Internet Security - ComSec Services & Mechanisms 17 Fall 2005 Asymmetric / Public Key Encipherment Algorithms use different keys for encryption & decryption Public Key is disclosed but Private Key is kept secret Computationally intensive - based on large prime numbers Also used in following security services : Digital Signatures Authentication Key Exchange Public Key Clear Text Encryption Engine Cipher Text Private Key Decryption Engine Clear Text Internet Security - ComSec Services & Mechanisms 18 Fall 2005 Data Encryption & Key Distribution Public Key Private Key Encryption Engine { Symmetric Key Random Number Generator Clear Text Symmetric Key Encryption Engine Cipher Text Decryption Engine Symmetric Key Decryption Engine Clear Text Internet Security - ComSec Services & Mechanisms 19 Fall 2005 Message Digest or Hash Message Originator Message Computes a fixed-length message digest from the message using a one-way hash transformation Message Recipient MD5 Digest Validate message integrity by computing the message hash and comparing with the message digest Internet Security - ComSec Services & Mechanisms 20 Fall 2005 Challenge-Response Authentication Challenger sends a challenge of random number to Responder Responder creates a response by digitally signing the challenge with its private key and returns the response to the Challenger Challenger processes the response with public key of legitimate Responder and compare it with original challenge Random Number Generator Decryption Engine Challenge Private Key Response Same? = Challenge (Recovered) Encryption Engine Public Key Internet Security - ComSec Services & Mechanisms 21 Fall 2005 Digital Signature Message Signature is public-key encrypted hash of a document and its relevant parameters MD5 Message Signed Document Private Key Hash Decryption Engine Digital Signature Internet Security - ComSec Services & Mechanisms 22 Fall 2005 Digital Signature Validation Message recipients can validate the signature by “encrypting it” with the public key and comparing with document’s hash value Signed Document MD5 Message Public Key Digital Signature Encryption Engine Hash = Hash Valid? 23 Internet Security - ComSec Services & Mechanisms Fall 2005 Service - Mechanism Mapping Single security services may need to be implemented by multiple and different security mechanisms. Service: Data Confidentiality Mechanism [1]: Encipherment Service: Peer Authentication Mechanism [1]: Challenge+Response Symmetric (Secret-Key) Cipher Nonce (Random Number) Based Asymmetric (Public-Key) Cipher Zero-Knowledge Proof Mechanism [2]: Integrity Message Digest / Digital Hash Mechanism [3]: Key Management Key Distribution Centers (Secret-Key) Public Key Infrastructure (Public-Key) Manual Keying Mechanism [2] Integrity Message Digest / Digital Hash