Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Anisha Raghu
Agenda
PGP S/MIME SSL TLS IPSec
PGP
Pretty Good Privacy
Introduction
Developed by Phil Zimmermann Uses Public Key Encryption
E-mail security
Basic Services
Authentication Confidentiality Compression Radix 64 conversion for e-mail compatibility Segmentation
Authentication
Message
Senders Private key SHA-1
To compression stage
encrypt RSA
encrypt
IDEA encrypt
Message+ signature
To conversion stage
encrypted message + key
Radix 64 conversion
E-mail compatibility
Radix-64 conversion A group of three octets of binary data is mapped into four ASCII characters. Each 6 bits is encoded as follows:
0 to 25 : A to Z 26 to 51 : a to z 52 to 61: 0 to 9 62: +, 63: /, padding: =
Results in expansion of message by 33%. Some level of confidentiality since text after conversion is not readable
10
Combining services
X := file signature?
no yes
encryption?
no
yes
radix 64 X := R64(X)
Message Format
Session key
Receivers public key Key ID Session key Timestamp Senders public key Key ID Leading 2 octets of message digest Message digest Filename Timestamp Encrypt with receivers public key
Signature
Radix 64
Message
Data
Key IDs
a user may have several public key private key pairs
which private key to use to decrypt the session key? which public key to use to verify a signature?
transmitting the whole public key would be wasteful associating a random ID to a public key would result in management burden PGP key ID: least significant 64 bits of the public key
unique within a user with very high probability
Agenda
PGP S/MIME SSL TLS IPSec
S/MIME
Secure/Multipurpose Internet Mail Extension
Introduction
Security enhancement to MIME Developed by RSA Data Security Inc. MIME Multipurpose Internet Mail Extension
supports non-text data
Text Image Video Audio Application (Post Script or octet-stream).
Functions
Enveloped data Signed data Clear-signed data Signed and enveloped data
Enveloped Data
Generate key
Session key
3-DES
Recipient Info
encrypt
Message
Enveloped Data
encode
To Receiver
Signed Data
Senders Private key
SHA digest
DSS encrypt
encode
Comparison
Key Issues
Main Usage
S/MIME
Company, enterprise Certification Authority E-mail security
PGP
personal
Web of trust
Key storage
Key certificates
Agenda
PGP S/MIME SSL TLS IPSec
SSL
Secure Socket Layer
Introduction
Developed by Netscape Client/server applications Port 443 https://www.mywebpage.com
Deployment Layer
SSL Protocols
Handshake Protocol Change Cipher Spec Protocol Alert Protocol Record Protocol
SSL Architecture
Handshake Protocol
Server Authentication
Record Protocol
Application Data Fragment
Compress (optional)
Agenda
PGP S/MIME SSL TLS IPSec
Agenda
PGP S/MIME SSL TLS IPSec
IPSec
Internet Protocol Security
33
IP is not Secure!
IP protocol was designed in the late 70s to early 80s
Part of DARPA Internet Project Very small network
All hosts are known! So are the users! Therefore, security was not an issue
34
Security Issues in IP
source spoofing replay packets no data integrity or confidentiality
DOS attacks
Introduction to IPSec
Framework for security operating at network layer. Based on standards developed by the Internet Engineering Task Force (IETF) Services provided
Access Control Connectionless integrity Data origin authentication Rejection of replayed packets Data Confidentiality Limited traffic flow confidentiality.
38
IPSec Architecture
ESP Encapsulating Security Payload AH
Authentication Header
IPSec Security Policy
Security Protocols
Two security protocols introduced
Authentication Header (AH)
Security Protocols
Two security protocols introduced
Authentication Header (AH)
Connectionless integrity Data Origin authentication Anti replay services
Modes of operation
Transport Mode
Router
Router
Tunnel Mode
Encrypted/ Authenticated
A
Orig IP Header IPSec Header TCP Data
Data
Orig.IP header
AH
TCP
Data
Orig.IP header
Data
Data
ESP trlr
ESP auth
Encrypted/ Authenticated
A
New IP Header IPSec Header Orig IP Header TCP Data
New IP hdr
AH
Orig.IP header
TCP
Data
Data
ESP trlr
ESP auth
Key exchange
Key management
Key Management
handles key generation & distribution typically need 2 pairs of keys
2 per direction for AH & ESP
Oakley
a key exchange protocol based on Diffie-Hellman key exchange
ISAKMP
Internet Security Association and Key Management Protocol provides framework for key management defines procedures and packet formats to establish, negotiate, modify, & delete SAs independent of key exchange protocol, encryption alg, & authentication method