Outline Announcement Authentication Cryptography Authentication Quiz 3 at

  • Slides: 37
Download presentation
Outline • Announcement • Authentication – Cryptography – Authentication • Quiz #3 at the

Outline • Announcement • Authentication – Cryptography – Authentication • Quiz #3 at the end of today’s class 9/25/2020 COP 5611 - Operating Systems 1

Announcement • You must do your demo before 4: 30 pm, April 29, 2003

Announcement • You must do your demo before 4: 30 pm, April 29, 2003 • Name server: program 1 • Prefix table Logical Prefix Server IP Server Port Remote directory / 128. 186. 120. 34 1281 /tmp/XXX/cop 5611 -DFS /program 1 128. 186. 120. 53 1282 /tmp/XXX/cop 5611 -DFS /linprog 1 128. 186. 120. 33 1280 /tmp/liux/cop 5611 -DFS /program 3 128. 186. 120. 55 1285 /tmp/XXX/cop 5611 -DFS • You need to have your servers running before you come to my office – I will test your system through your client program and based on your report 9/25/2020 COP 5611 - Operating Systems 2

Introduction • The fundamental problem to security in distributed systems is the use of

Introduction • The fundamental problem to security in distributed systems is the use of cryptographic techniques – Access matrix model can be used to prevent unauthorized accesses if the users that claimed to be are true – However, in distributed systems, the user authentication becomes a big problem 9/25/2020 COP 5611 - Operating Systems 3

Introduction – cont. 9/25/2020 COP 5611 - Operating Systems 4

Introduction – cont. 9/25/2020 COP 5611 - Operating Systems 4

Potential Threats • A threat to a system in which an intruder can have

Potential Threats • A threat to a system in which an intruder can have access to only the ciphertext is called a ciphertextonly attack • A threat to a system in which an intruder can have access to both ciphertext and a considerable amount of corresponding plaintext is called a known-plaintext attack • A threat to a system in which an intruder can obtain ciphertext corresponding to plaintext of his choice is referred to as a chosen-plaintext attack 9/25/2020 COP 5611 - Operating Systems 5

Design Principles • Shannon’s principle – Shannon’s principle of diffusion – Spread the correlation

Design Principles • Shannon’s principle – Shannon’s principle of diffusion – Spread the correlation and dependencies among key-string variables over substrings as much as possible – Shannon’s principle of confusion – Change a piece of information so that the output has no obvious relation to the input • Exhaustive search principle – The determination of the key requires an exhaustive search of the an extremely large space 9/25/2020 COP 5611 - Operating Systems 6

Private Key Cryptography • Data encryption standard (DES) – It is a block cipher

Private Key Cryptography • Data encryption standard (DES) – It is a block cipher that crypts 64 -bit data blocks using a 56 -bit key – Two basic operations • Permutation • Substitution – Three stages • Initial permutation stage • Complex transformation stage • Final permutation stage 9/25/2020 COP 5611 - Operating Systems 7

Private Key Cryptography – cont. 9/25/2020 COP 5611 - Operating Systems 8

Private Key Cryptography – cont. 9/25/2020 COP 5611 - Operating Systems 8

Private Key Cryptography – cont. 9/25/2020 COP 5611 - Operating Systems 9

Private Key Cryptography – cont. 9/25/2020 COP 5611 - Operating Systems 9

Private Key Cryptography – cont. 9/25/2020 COP 5611 - Operating Systems 10

Private Key Cryptography – cont. 9/25/2020 COP 5611 - Operating Systems 10

Public Key Cryptography • Private key cryptography and conventional cryptographic techniques require the distribution

Public Key Cryptography • Private key cryptography and conventional cryptographic techniques require the distribution of secret keys – Known as the key distribution problem • Public key cryptography solves the key distribution problem by making the encryption procedure and the associated key available in the public domain 9/25/2020 COP 5611 - Operating Systems 11

Public Key Cryptography – cont. • Now it is possible for two users to

Public Key Cryptography – cont. • Now it is possible for two users to have a secure communication even they have not communicated before • Implementation issues – One-way functions 9/25/2020 COP 5611 - Operating Systems 12

RSA Method • The encryption key is a pair (e, n) • The decryption

RSA Method • The encryption key is a pair (e, n) • The decryption key is a pair (d, n) 9/25/2020 COP 5611 - Operating Systems 13

RSA Method – cont. • Generating the private and public key requires four steps

RSA Method – cont. • Generating the private and public key requires four steps – Choose two very large prime numbers, p and q – Compute n = p x q and z = (p – 1) x (q – 1) – Choose a number d that is relatively prime to z – Compute the number e such that e x d = 1 mod z 9/25/2020 COP 5611 - Operating Systems 14

Authentication • In distributed systems, authentication means verifying the identity of communicating entities to

Authentication • In distributed systems, authentication means verifying the identity of communicating entities to each other – The assumption is that the communication network is not secure in that an intruder can copy and play back a message on the network – The textbook called it “interactive secure connections” 9/25/2020 COP 5611 - Operating Systems 15

Authentication – cont. • Authentication based on a shared secret key. 9/25/2020 COP 5611

Authentication – cont. • Authentication based on a shared secret key. 9/25/2020 COP 5611 - Operating Systems 16

Authentication – cont. • Authentication based on a shared secret key, but using three

Authentication – cont. • Authentication based on a shared secret key, but using three instead of five messages. 9/25/2020 COP 5611 - Operating Systems 17

Authentication – cont. • The reflection attack. 9/25/2020 COP 5611 - Operating Systems 18

Authentication – cont. • The reflection attack. 9/25/2020 COP 5611 - Operating Systems 18

Authentication Using a Key Distribution Center • The principle of using a KDC. 9/25/2020

Authentication Using a Key Distribution Center • The principle of using a KDC. 9/25/2020 COP 5611 - Operating Systems 19

Authentication Using a Key Distribution Center – cont. • Using a ticket and letting

Authentication Using a Key Distribution Center – cont. • Using a ticket and letting Alice set up a connection to Bob. 9/25/2020 COP 5611 - Operating Systems 20

Authentication Using a Key Distribution Center – cont. • The Needham-Schroeder authentication protocol. 9/25/2020

Authentication Using a Key Distribution Center – cont. • The Needham-Schroeder authentication protocol. 9/25/2020 COP 5611 - Operating Systems 21

Authentication Using a Key Distribution Center – cont. • Protection against malicious reuse of

Authentication Using a Key Distribution Center – cont. • Protection against malicious reuse of a previously generated session key in the Needham-Schroeder protocol. 9/25/2020 COP 5611 - Operating Systems 22

Authentication Using Public-Key Cryptography • Mutual authentication in a public-key cryptosystem. 9/25/2020 COP 5611

Authentication Using Public-Key Cryptography • Mutual authentication in a public-key cryptosystem. 9/25/2020 COP 5611 - Operating Systems 23

Message Integrity and Confidentiality • Message integrity means that messages are protected against modification

Message Integrity and Confidentiality • Message integrity means that messages are protected against modification • Confidentiality ensures that messages cannot be intercepted and read by eavesdroppers • Digital signatures – A user cannot forge the signature of other users – A sender of a signed message cannot deny the validity of his signature on the message – A recipient of a signed message cannot modify the signature in the message 9/25/2020 COP 5611 - Operating Systems 24

Digital Signatures • Digital signing a message using public-key cryptography. 9/25/2020 COP 5611 -

Digital Signatures • Digital signing a message using public-key cryptography. 9/25/2020 COP 5611 - Operating Systems 25

Digital Signatures – cont. 9/25/2020 COP 5611 - Operating Systems 26

Digital Signatures – cont. 9/25/2020 COP 5611 - Operating Systems 26

Digital Signatures – cont. • Digitally signing a message using a message digest. 9/25/2020

Digital Signatures – cont. • Digitally signing a message using a message digest. 9/25/2020 COP 5611 - Operating Systems 27

Key Establishment • The principle of Diffie-Hellman key exchange. 9/25/2020 COP 5611 - Operating

Key Establishment • The principle of Diffie-Hellman key exchange. 9/25/2020 COP 5611 - Operating Systems 28

Key Distribution 9/25/2020 COP 5611 - Operating Systems 29

Key Distribution 9/25/2020 COP 5611 - Operating Systems 29

Key Distribution – cont. 9/25/2020 COP 5611 - Operating Systems 30

Key Distribution – cont. 9/25/2020 COP 5611 - Operating Systems 30

Kerberos 9/25/2020 COP 5611 - Operating Systems 31

Kerberos 9/25/2020 COP 5611 - Operating Systems 31

Kerberos – cont. • Setting up a secure channel in Kerberos. 9/25/2020 COP 5611

Kerberos – cont. • Setting up a secure channel in Kerberos. 9/25/2020 COP 5611 - Operating Systems 32

Electronic Payment Systems • Payment systems based on direct payment between customer and merchant.

Electronic Payment Systems • Payment systems based on direct payment between customer and merchant. a) b) c) Paying in cash. Using a check. Using a credit card. 9/25/2020 COP 5611 - Operating Systems 33

Electronic Payment Systems – cont. • Payment systems based on money transfer between banks.

Electronic Payment Systems – cont. • Payment systems based on money transfer between banks. a) Payment by money order. b) Payment through debit order. 9/25/2020 COP 5611 - Operating Systems 34

E-cash 9/25/2020 COP 5611 - Operating Systems 35

E-cash 9/25/2020 COP 5611 - Operating Systems 35

Secure Electronic Transactions 9/25/2020 COP 5611 - Operating Systems 36

Secure Electronic Transactions 9/25/2020 COP 5611 - Operating Systems 36

Summary • Cryptography is a fundamental problem in security of distributed systems – Based

Summary • Cryptography is a fundamental problem in security of distributed systems – Based on private keys – Based on public keys • Authentication in distributed systems • There are still a lot of challenges and research issues in this area 9/25/2020 COP 5611 - Operating Systems 37