Jaringan Komputer - Dr. Tb. Maulana Kusuma

advertisement
Internet dan Jaringan Komputer
The Internet and
Network Security
Dr. Tb. Maulana Kusuma
mkusuma@staff.gunadarma.ac.id
http://staffsite.gunadarma.ac.id/mkusuma
Magister Manajemen Sistem Informasi
0
An Overview of Telecommunications
and Networks
Telecommunications: the electronic
transmission of signals for
communications
Telecommunications medium: anything
that carries an electronic signal and
interfaces between a sending device and a
receiving device
Magister Manajemen Sistem Informasi
1
An Overview of Telecommunications
and Networks (continued)
Magister Manajemen Sistem Informasi
2
Use and Functioning of the Internet
Internet: a collection of interconnected
networks, all freely exchanging information
ARPANET


The ancestor of the Internet
A project started by the U.S. Department of
Defense (DoD) in 1969
Internet Protocol (IP): communication
standard that enables traffic to be routed
from one network to another as needed
Magister Manajemen Sistem Informasi
3
How the Internet Works
The Internet transmits data from one computer
(called a host) to another
If the receiving computer is on a network to
which the first computer is directly connected, it
can send the message directly
If the receiving computer is not on a network to
which the sending computer is connected, the
sending computer relays the message to
another computer that can forward it
Magister Manajemen Sistem Informasi
4
How the Internet Works (continued)
Magister Manajemen Sistem Informasi
5
How the Internet Works (continued)
Data is passed in chunks called packets
Internet Protocol (IP): communications
standard that enables traffic to be routed from
one network to another as needed
Transmission Control Protocol (TCP): widely
used transport-layer protocol that is used in
combination with IP by most Internet
applications
Uniform Resource Locator (URL): an assigned
address on the Internet for each computer
Magister Manajemen Sistem Informasi
6
Accessing the Internet
Connect via a LAN server
Connect via Serial Line Internet Protocol
(SLIP)/Point-to-Point Protocol (PPP)
Connect via an online service
Other ways to connect
Magister Manajemen Sistem Informasi
7
Accessing the Internet
(continued)
Magister Manajemen Sistem Informasi
8
Internet and Telecommunications
Services
E-mail and instant messaging
 Instant messaging: a method that allows two
or more individuals to communicate online,
using the Internet
Internet cell phones and handheld computers
Career information and job searching
Web log (blog): a Web site that people can
create and use to write about their observations,
experiences, and feelings on a wide range of
topics
Magister Manajemen Sistem Informasi
9
Internet and Telecommunications
Services (continued)
Chat rooms: enable two or more people to
engage in interactive “conversations” over the
Internet
Internet phone and videoconferencing services
Content streaming: a method for transferring
multimedia files over the Internet so that the data
stream of voice and pictures plays more or less
continuously without a break, or very few of
them
Shopping on the Web
Magister Manajemen Sistem Informasi
10
Internet and Telecommunications
Services (continued)
Web auctions
Music, radio, and video on the Internet
Other Internet services and applications
Magister Manajemen Sistem Informasi
11
Intranets and Extranets
Intranet



Internal corporate network built using Internet
and World Wide Web standards and products
Used by employees to gain access to
corporate information
Slashes the need for paper
Magister Manajemen Sistem Informasi
12
Intranets and Extranets (continued)
Extranet
 A network based on Web technologies that links
selected resources of a company’s intranet with its
customers, suppliers, or other business partners
Virtual private network (VPN): a secure connection
between two points across the Internet
Tunneling: the process by which VPNs transfer
information by encapsulating traffic in IP packets over
the Internet
Magister Manajemen Sistem Informasi
13
Intranets and Extranets (continued)
Magister Manajemen Sistem Informasi
14
Net Issues
Management issues
 No centralized governing body controls the
Internet
Service and speed issues
 Web server computers can be overwhelmed by
the amount of “hits” (requests for pages)
 More and more Web sites have video, audio clips,
or other features that require faster Internet
speeds
Magister Manajemen Sistem Informasi
15
Net Issues (continued)
Privacy
 Spyware: hidden files and information trackers that
install themselves secretly when you visit some
Internet sites
 Cookie: a text file that an Internet company can place
on the hard disk of a computer system
Fraud
 Phishing
Magister Manajemen Sistem Informasi
16
Security Threats
Magister Manajemen Sistem Informasi
17
Passive Attacks
Eavesdropping on transmissions
To obtain information
Release of message contents
 Outsider learns content of transmission
Traffic analysis
 By monitoring frequency and length of messages,
even encrypted, nature of communication may be
guessed
Difficult to detect
Can be prevented
Magister Manajemen Sistem Informasi
18
Active Attacks
Masquerade

Pretending to be a different entity
Replay
Modification of messages
Denial of service
Easy to detect

Detection may lead to deterrent
Hard to prevent
Magister Manajemen Sistem Informasi
19
Net Issues (continued)
Security with encryption and firewalls
 Cryptography: converting a message into a secret
code and changing the encoded message back to
regular text
 Digital signature: encryption technique used to verify
the identity of a message sender for processing
online financial transactions
 Firewall: a device that sits between an internal
network and the Internet, limiting access into and out
of a network based on access policies
Magister Manajemen Sistem Informasi
20
Net Issues (continued)
Cryptography is the process of converting a message
into a secret code and changing the encoded message
back into regular text.
Magister Manajemen Sistem Informasi
21
An Introduction To
PUBLIC
KEY
INFRASTRUCTURE
Tb. Maulana Kusuma
mkusuma@staff.gunadarma.ac.id
Magister Manajemen Sistem Informasi
22
Outline
Introduction
How to build the trust ?
Basic Cryptography
One way hashing
Digital Signature
Certification Authority
CA Component
Future Technology
Magister Manajemen Sistem Informasi
23
Electronic Commerce
Traditional Trading
• Paper Based
• Based on Trust
EDI (Electronic Data Interchange)
• Secure
• Closed
• Proprietary
Internet
• Not Secure
• Open
• Open
System
Magister
Manajemen Sistem Informasi
24
Electronic Commerce : The Problem
Paper Based Trading
EDI (Electronic Data Interchange)
Internet Based E-Commerce
How to build the TRUST ?
Magister Manajemen Sistem Informasi
25
The Problem (cont’d)
Information over the Internet is Free,
Available, Unencrypted, and Untrusted.
Not desirable for many Applications
 Electronic Commerce
 Software Products
 Financial Services
 Corporate Data
 Healthcare
 Subscriptions
 Legal Information
Magister Manajemen Sistem Informasi
26
Another Problem
Magister Manajemen Sistem Informasi
27
Multiple Security Issues to be Solved
Privacy
Authentication
Interception
Spoofing
Integrity
Nonrepudiation
Modification
Proof of parties involved
Magister Manajemen Sistem Informasi
28
Trust in conducting e-commerce
AUTHENTICATION
to identify the parties involved
CONFIDENTIALITY
to keep the information private
INTEGRITY
to prevent the manipulation of
information
NON-REPUDIATION
to prevent the denial of information
by the owner
Magister Manajemen Sistem Informasi
29
Trust in paper based commerce
AUTHENTICATION
wrote a letter and sign
CONFIDENTIALITY
put the letter in envelope and seal it
INTEGRITY
send it by certified mail, make a copy
and send it twice
NON-REPUDIATION
have a witness verified that our
signature was authentic
Magister Manajemen Sistem Informasi
30
Technology Outline
Basic Cryptography
• Symmetric Cryptography
• Asymmetric Cryptography
One Way Hashing
Digital Signature
C.A. & Digital Certificate
Magister Manajemen Sistem Informasi
31
Cryptography Concepts
Encryption :
Ksjdksjdkskjksd
Kepada Yth Bapak Asep
jsdkjsk
di Tempat
ksjdksjdksj
Dengan hormat ….
ksdjksdjskjdskjd skdj
ksjdk sjd ksdjsj
Kami ingin
memberitahukan bahwa
gaji
ksjdksjdksj dksjd
jskdj sk
bapak naik 100 %
terhitung dari sekarang
jsdkjskdjskjd
Terimakasih
cipher text
Decryption :
Ksjdksjdkskjksd
Kepada Yth Bapak Asep
jsdkjsk
di Tempat
ksjdksjdksj
Dengan hormat ….
ksdjksdjskjdskjd skdj
ksjdk sjd ksdjsj
Kami ingin
memberitahukan bahwa
gaji
ksjdksjdksj dksjd
jskdj sk
bapak naik 100 %
terhitung dari sekarang
jsdkjskdjskjd
Terimakasih
Algorithm
Requires : an ALGORITHM and a KEY
Magister Manajemen Sistem Informasi
32
Symmetric Cryptography
Encryption
Kepada Yth
Bapak Asep
Kepada Yth
Bapak Asep
di Tempat
di Tempat
Dengan hormat
….
Algorithm
Dengan hormat
….
Kami ingin
memberitahuka
n
Kami ingin
memberitahuka
n ak naik 100
Decryption
Kepada Yth
Bapak Asep
Kepada Yth
Bapak Asep
di Tempat
di Tempat
Dengan hormat
….
Algorithm
Kami ingin
memberitahuka
n ak naik 100
Dengan hormat
….
Kami ingin
memberitahuka
n
Requires : SHARED KEY
Example : DES,IDEA,Red Pike,RC2,RC4
Magister Manajemen Sistem Informasi
33
Symmetric Cryptography (cont’d)
Characteristic :
• High Performance
• Useful for Fast Encryption /
Decryption
• Key management is not practical
Magister Manajemen Sistem Informasi
34
Asymmetric Cryptography
Encryption
Kepada Yth
Bapak Asep
Kepada Yth
Bapak Asep
Private Key
di Tempat
di Tempat
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
Algorithm
Dengan hormat
….
Kami ingin
memberitahuka
n
Decryption
Kepada Yth
Bapak Asep
Public Key
Kepada Yth
Bapak Asep
di Tempat
di Tempat
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
Algorithm
Magister Manajemen Sistem Informasi
Dengan hormat
….
Kami ingin
memberitahuka
n
35
Asymmetric Cryptography (cont’d)
Also known as Public Key Cryptography
• Public Key is distributed to public
• Private Key is kept private
• IF Private Key is used to encrypt
then ONLY Public Key can decrypt
• IF Public Key is used to encrypt
then ONLY Private Key can decrypt
Magister Manajemen Sistem Informasi
36
Asymmetric Cryptography (cont’d)
Public Key & Private Key :
• Generated as a pair of keys
• Derived from very large prime
number
• It’s impossible to determine one
knowing each other
• Strength of Key :
512 bit, 1024 bit, 2048 bit ……
• Example : RSA, ECC, DSA
Magister Manajemen Sistem Informasi
37
One Way Hash
Kepada Yth
Bapak Asep
A0 B0 C0 E0 G0 D0
F0 80 87 80 70 30
di Tempat
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
One way hash
function
DIGEST /
FINGERPRINT
• Produce unique fingerprint of data
(128/160 bits)
• No Key is used
• Irreversible
• A one bit change in the message affects at
least half the bits in the digest
• Used to determine if data has been
Magister Manajemen Sistem Informasi
changed
38
One Way Hash (cont’d)
Kepada Yth
Bapak Asep
di Tempat
A0 B0 C0 E0
30 70 80 A0
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
One way hash
function
A0 B0 C0 E0
30 70 80 A0
Kepada Yth
Bapak Asep
di Tempat
A0 B0 C0 E0
30 70 80 A0
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
One way hash
function
A0 B0 C0 E0
30 70 80 A0
equal ?
Example : MD5, SHA-1
Magister Manajemen Sistem Informasi
39
Digital Signature
Kepada Yth
Bapak Asep
A0 B0 C0 E0 G0 D0
F0 80 87 80 70 30
di Tempat
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
One way hash
function
Sender’s
Private Key
DIGITAL SIGNATURE
Magister Manajemen Sistem Informasi
ENCRYPT
XX B0 XX E0 XX D0
F0 XX 87 XX 70 30
40
Whole Mechanism
Kepada Yth
Bapak Asep
Kepada Yth
Bapak Asep
Kepada Yth
Bapak Asep
di Tempat
di Tempat
Dengan hormat
….
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
Kami ingin
memberitahuka
n ak naik 100
Kami ingin
memberitahuka
n ak naik 100
A0 B0 C0 E0
30 70 80 A0
A0 B0 C0 E0
30 70 80 A0
di Tempat
Dengan hormat
….
A0 B0 C0 E0
30 70 80 A0
A0 B0 C0 E0
30 70 80 A0
Kepada Yth
Bapak Asep
A0 B0 C0 E0
30 70 80 A0
A0 B0 C0 E0
30 70 80 A0
A0 B0 C0 E0
30 70 80 A0
di Tempat
Dengan hormat
….
Kami ingin
memberitahuka
n ak naik 100
Equal ?
A0 B0 C0 E0
30 70 80 A0
Budi
Private Key
Magister Manajemen Sistem Informasi
Public Key
Asep
Private Key
41
Public Key
Achieving 4 Cornerstones of Trust
 AUTHENTICATION
the use of private key to encrypt digest - only
sender’s public key can decrypt
 CONFIDENTIALITY
encrypt the message with recepient public key only sender’s private key can decrypt
 INTEGRITY
comparing the digest from decrypting digital
signature
 NON-REPUDIATION
digital signature do the job
Magister Manajemen Sistem Informasi
42
Public Key Technology
NON-REPUDIATION
INTEGRITY
AUTHENTICATION
PRIVACY
Public Key Security
Services
Technology
Digital Certificates
Certification Authorities
Infrastructure
Security Management
• Public Key Technology Best Suited to Solve Business Needs
• Infrastructure = Certification Authorities
Magister Manajemen Sistem Informasi
43
About the Key
• Pseudo Random Number
• Key size is vital. The longest is the
strongest.
• Private Key must be kept private :
• File based storage (using PIN/
PassPhrase
• SmartCard storage (using PIN as
the protection
Magister Manajemen Sistem Informasi
44
The Problem of Distributing Public Key
MAN IN THE MIDDLE OF ATTACK
Magister Manajemen Sistem Informasi
45
The Problem of Distributing Public Key
How do I know who the public key
belongs to ?
• Digital Certificates
• Certification Authority
Magister Manajemen Sistem Informasi
46
Digital Certificate
• A certificate binds a public key to an
owner
• It is the envelope to distribute public
key
• The trusted CA digitally sign the
certificate to verify the ownership
of the key itself
Magister Manajemen Sistem Informasi
47
Digital Certificate (cont’d)
Contain :
• Detail about Owner
• Detail about certificate issuer (CA)
• Public Key
• Validity and Expiration dates
• Digital Signature of the certificate by
the CA
• Time Stamp
Distributed through Directory Server /
LDAP (Lightweight Directory Access
Protocol)
Magister Manajemen Sistem Informasi
48
Digital Certificate (cont’d)
Before two parties exchange data using Public Key
cryptography, each wants to be sure that the other party
is authenticated.
~~~~
~~~~
~~~~
Digital
Signature
Before B accepts a message with A’s Digital Signature, B
wants to be sure that the public key belongs to A and not
to someone masquerading as A on an open network.
One way to be sure, is to use a trusted third party to
authenticate that the public key belongs to A. Such a
party is known as a Certification Authority (CA).
Once A has provided proof of identity, the Certification
Authority creates a message containing A’s name and
public key. This message is known as a Digital
Certificate. Magister Manajemen Sistem Informasi
49
Digital Certificate (cont’d)
• A Digital Certificate is simply an X.509 defined data
structure with a Digital Signature. The data
represents who owns the certificate, who signed the
certificate, and other relevant information.
• When the signature is
X.509 Certificate
Version #
Serial #
Signature Algorithm
Issuer Name
Validity Period
Subject Name
Subject Public Key
Issuer Unique ID
Subject Unique ID
Extensions
Digital Signature
generated by a Certification
Authority (CA), the signature
can be viewed as trusted.
• Since the data is signed, it
can not be altered without
detection.
• Extensions can be used to
tailor certificates to meet the
needs of end applications.
Magister Manajemen Sistem Informasi
50
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
30:fa:e0:de:85:a3:72:a3:9e:07:03:23:05:77:8c:4b:3d:2b:49:70
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=AVITrust DEMO Certification/Email=avinanta@staff.gunadarma.ac.id, OU=DEMO Certification, O=AVITrust,
C=ID
Validity
Not Before: Mar 23 04:36:01 2001 GMT
Not After : May 22 04:36:01 2001 GMT
Subject: O=PHPCA, C=ID, CN=Avinanta Tarigan/Email=avinanta@staff.gunadarma.ac.id
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:b1:66:84:83:fa:7d:c4:c9:40:c3:af:b6:0b:79:
c0:06:d0:8e:d8:96:2f:66:64:a3:8f:ef:7b:e0:3b:
4a:e7:27:d7:48:28:e6:99:ef:2f:2d:45:a0:45:c6:
89:de:35:71:10:52:9e:87:40:40:46:a0:be:cd:68:
a6:8c:a9:75:81:19:81:f6:14:d1:8f:b7:b0:51:21:
eb:d3:aa:38:58:ca:f5:24:52:0a:6e:aa:60:79:09:
d7:2d:42:64:84:4e:b4:82:11:48:6d:2d:ea:fe:87:
56:05:49:e0:33:df:ad:82:60:2b:34:9a:fc:7d:46:
de:97:b9:e8:ce:6c:4f:da:8d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation
X509v3 Extended Key Usage:
TLS Web Client Authentication, E-mail Protection
Netscape Cert Type:
SSL Client, S/MIME
Netscape Comment:
AVITrust Demo Certificate, for Cheating Purposes ONLY
X509v3 Subject Key Identifier:
1C:39:81:38:6D:E0:DE:49:D6:E9:A1:D3:BF:1A:87:CB:86:8F:95:12
X509v3 Authority Key Identifier:
keyid:2B:81:22:E4:D4:D1:28:4E:7C:E5:86:32:BF:29:35:54:99:FB:AA:8B
Signature Algorithm: sha1WithRSAEncryption
46:65:b0:ad:33:d3:17:b6:5c:4a:9d:0b:fd:4b:d2:80:ee:3b:
cb:b3:30:f7:5a:fd:b3:24:79:45:d7:0a:b3:66:60:d8:8a:a0:
40:db:ea:39:0b:9e:d4:a7:a5:59:75:50:11:03:6a:ed:96:3f:
f3:16:a3:f5:eb:f9:10:1f:47:4d:7a:3d:c8:ac:af:fa:2f:3d:
4c:1f:55:9a:30:ce:fb:e7:0a:ab:79:ab:4a:b2:cb:da:21:d4:
59:9e:75:f2:b6:76:42:62:51:48:7f:5c:f0:e4:b4:8d:b8:a3:
45:3f:9c:5d:f7:c7:73:8e:7a:56:11:3f:f5:4b:eb:fc:21:0c:
54:0f:7c:a8:11:b9:fd:64:e7:b4:11:24:57:02:2e:00:87:8a:
fa:56:bf:cf:9b:36:65:40:21:4a:51:8b:7f:49:ab:e5:77:a1:
51:67:c6:7c:ed:45:59:61:a2:11:52:21:d9:75:ff:bd:15:ea:
eb:a4:fb:1c:0e:a6:89:86:98:67:12:15:34:41:d6:67:02:ce:
b0:10:13:87:26:88:02:03:5e:b3:92:f2:f7:df:0d:16:9b:ed:
dc:a1:11:a3:e3:34:c7:cb:1f:94:c2:b2:0c:f5:d0:89:a1:50:
Magister Manajemen Sistem Informasi
27:89:f3:92:ce:49:d1:cd:3a:b8:d6:42:8f:2c:7f:4b:fe:7e:
b2:fd:ef:28
51
Magister Manajemen Sistem Informasi
52
Magister Manajemen Sistem Informasi
53
Magister Manajemen Sistem Informasi
54
Magister Manajemen Sistem Informasi
55
What is a Certification Authority?
What’s Important
Certification Authority
• Trusted (Third) Party
• Enrolls and Validates
• Operational Experience
• High Assurance Security
Subscribers
Architecture
• Issues and Manages
Certificates
• Manages Revocation and
Renewal of Certificates
• Establishes Policies &
Procedures
•
•
•
•
•
Scalability
Flexibility / Tailorability
Interoperability
Outsource vs. Inhouse
Trustworthiness
Certification Authority = Basis of Trust
Magister Manajemen Sistem Informasi
56
Certification Authority (cont’d)
• Authoring the Certificates
• Responsible in validating the owner of the
public key
• Distribute the Certificates in CA’s Directory
Server
• Create CRL (Certification Revocation List)
• Usually Government Institution or National
Chamber of Commerce
Magister Manajemen Sistem Informasi
57
Trusted CA’s
• When someone receives a
certificate, why should
they trust the signature?
~~~~
~~~~
~~~~
Digital
Signature
?
• Trusted CAs are required in order to verify a
signature. If you Trust the CA that signed the
certificate, you can trust the certificate.
• Many Companies are embedding Trusted CA
Certificates in their Certificate Enabled products
– Netscape Navigator (Options, Security Preferences, Site Cert)
– Microsoft Internet Explorer (Tool, Internet Options, Content, Cert)
• Some products refer to Trusted CAs as Trusted Site
Certificates.
Magister Manajemen Sistem Informasi
58
Public Key Infrastructure
Typically consist of :
• Certification Authorities
• Registration Authorities
• Directories
• PKI-Enabled Applications
• Policies & Procedures
Usually :
• 20 % technology
• 80 % policy
Magister Manajemen Sistem Informasi
59
Future Enhancement
Stronger Non-Repudiation :
• What do you have ?
The use of smartcard to store private key
• What do you know ?
Protecting the smartcard with PIN
• When
The use of global timestamp server
• Who you are ?
Biometrics Validation to activate SmartCard :
• Fingerprint Scan
• Retina Scan, Voice Recognition
• DNA Validation, etc.
Magister Manajemen Sistem Informasi
60
Conclusion
PKI brings 4 basic principle in building the
trust from paper based
The CA is needed to verify public key by
envelope it in Digital Certificate
PKI : 20% technology, 80% policy
Stronger Non-Repudiation is supported
PKI is an umbrella for E-Commerce
Magister Manajemen Sistem Informasi
61
Conclusion (cont’d)
Symmetric Key vs. Public Key Encryption - Public key
is easier to manage than symmetric key. Easier to
recover when compromised.
Digital Signature - Provides a digital seal indicating who
signed the data. Can be used in many applications.
Digital Certificate - Identity data signed by a Certification
Authority. Provides a Trusted source of identification.
Authentication/Access Control - Digital Certificates can
be used to identify users and limit access to
information, systems, etc. on Open Networks.
Magister Manajemen Sistem Informasi
62
Download