SecurityProtocols doc

30 237 0
SecurityProtocols doc

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Security Protocols: They’re so NOT Security Protocols: They’re so NOT Easy! Easy! Lecture Motivation Lecture Motivation  In the last lecture we looked at some high-level descriptions of key distribution and agreement schemes.  These protocols cannot be used as they were stated.  In implementation of the actual protocol, there are many situations one should be careful of.  In this lecture, we will look at some common protocol failures that arise when trying to implement security protocols  We will then look at some specific examples of security protocols Lecture Outline Lecture Outline  Some stories from the Dark Side…  Design Principles for building security protocols  Key tools for building robust security protocols – Naming – Encryption – Signing – Timestamps and nonces  Examples as we go… – Wide-Mouthed Frog – Denning-Sacco – Woo-Lam – Needham-Schroeder  We’ll end with a look at Kerberos Tales from the Dark Side of Security… Tales from the Dark Side of Security…  Prepayment in Electricity Meter Systems: – Present a (purchased) digital token to a power meter. – Digital token would convey an ID so it could not be duplicated or forged… – Problem was that the rate information was not protected  Bank Fraud: – A bank would allow customers to present a bank card which had a PIN code encrypted and stored on the magnetic strip – Teller had a copy of the encryption key and could check the PINs. – Flaw in design: adversary could alter the account number on the card to someone else’s, while using his own PIN number… he would check out ok… but the money would be drawn from someone else’s account! – Flaw in design: PIN number was not connected to account #. Tales from the Dark Side of Security, pg. 2 Tales from the Dark Side of Security, pg. 2  Pay-Per-View TV Hacks: – Decoders are personalized with a smart card. Smart card cannot decrypt bulk content, so the bulk decryption is done on the decoder. – Many decoders have a microcontroller which passes messages between the cryptoprocessor and the smart card – Attackers can go in and modify or replace the microcontroller, or can introduce a PC between the decoder and the card in order to manipulate messages exchanged. – Kentucky Fried Chip hack: ◆ When a customer stops paying subscription, the system sends a message to the decoder to disable the card. ◆ The KFC hack replaced the microcontroller with a a version that would block this message. ◆ It was able to do this because the system message was sent in the clear! Caveat Cryptor: Designer Beware! Caveat Cryptor: Designer Beware!  The lesson learned from this last story is: The adversary can be very powerful and clever!  We must assume that the adversary has complete control over the network… – Be paranoid! Alice should not blindly trust what she is getting from “Bob”! And vice-versa! – If we can build a system that we trust in this Seriously Caustic environment, then we can trust it in more general (day-to-day) computing scenarios  So, who are the entities? – Alice and Bob may be users, or may be smart cards, or devices – Eve can be the compromised decoder, or the network, or a hacker – When needed, Trent will be a trusted third party server Security is not easy… Security is not easy…  Building secure systems and protocols is not easy.  In general, its not an easy matter to prove that some protocol is indefinitely secure. – Denning-Sacco protocol took 12 years for a protocol failure to be exposed – Needham-Schroeder survived for 17 years before a man-in-the-middle attack was found  Attacks of today must always be considered when building systems – Attacks of tomorrow aren’t known yet… – That’s the challenge!  What can we do? – Formal verification logics? – Basic design guidelines? Basic Guidelines Basic Guidelines  Needham has given several guidelines for building secure systems 1. Be clear of security goals and assumptions 2. When using encryption, know why you are using it (secrecy? Authenticity? Binding? PRNG?) . Encryption is not security! 3. Be careful about temporal associations 4. Don’t assume the identity of a participant can be excluded from a message. Generally, it should be explicitly included in a message! 5. Have redundancy in your message! 6. Know the properties and weaknesses of the cryptographic protocols you are using. 7. Signatures do not imply that the signer knows what the message is that he is signing! 8. Don’t trust others to keep their secrets secret! 9. When responding to queries, be careful about encrypting, decrypting, or signing. You might be used as an oracle by an adversary! 10. Decryption is not the same as digital signatures- they have different purposes! 11. Distinguish between different runs of the protocol! Other Considerations Other Considerations  KISS (Keep It Simple Stupid) is often desirable from an engineering point of view… – Its generally BAD from a security point of view! – Removing some data fields because they seem like they can be inferred (and thus shorten the message) can result in severe protocol failures!  Formal methods are helpful, but are at still at a young stage of development – For information on formal models, look Kailar’s logic in R. Kailar, “Reasoning about accountability in protocols for electronic commerce,” 1995 IEEE Symposium on Security and Privacy Why these rules? How to use them? Why these rules? How to use them?  The previous two slides gave guidelines, but not did not say why we should follow these guidelines.  We are going to look at several examples of protocols that, at first glance, looked OK… but flaws were uncovered later.  These examples will illustrate why we need to be careful, and why these rules are important.  In order to carry out these guidelines, we need some tools, so we will introduce various tools in the process to fix these protocols.

Ngày đăng: 23/03/2014, 00:20

Từ khóa liên quan

Mục lục

  • Security Protocols: They’re so NOT Easy!

  • Lecture Motivation

  • Lecture Outline

  • Tales from the Dark Side of Security…

  • Tales from the Dark Side of Security, pg. 2

  • Caveat Cryptor: Designer Beware!

  • Security is not easy…

  • Basic Guidelines

  • Other Considerations

  • Why these rules? How to use them?

  • Wide-Mouthed Frog Protocol

  • Failure in the Wide-Mouthed Frog Protocol

  • Denning-Sacco Public Key Exchange

  • Failure in Denning-Sacco

  • Failure in Denning-Sacco, pg. 2

  • Woo-Lam Authentication Protocol

  • Woo-Lam Protocol Failure

  • Slide 18

  • Some fixes to Woo-Lam

  • Needham-Schroeder

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan