Sem in A Rio
Sem in A Rio
Sem in A Rio
Q: Why do everybody agree that network security is very important, but not many providers are welling to implement it?
Answer: Not understood very well and too complex to implement effectively
Seminar outline
Introduction to security basics Examples of security systems in communication network Overview to IPSec and secure multicast Impact of using IPSec on middle entities such as Performance Enhancing Proxies (PEPs) Security issues in challenged networks such as Delay Tolerant Networks (DTN)
Transport layer
SSL/TLS
Transport layer
Network Layer
IPsec
Network Layer
Link layer
ATM/DVB
Link layer
Physical layer
Physical layer
Data Communications
4
Security attacks
Passive attacks: eavesdropping on transmission or monitor and analyze the network traffic. Active attacks: modification of information, interruption of information transmission and fabrication of messages:
Denial-of-service (DoS) Masquerade Man-in-the-middle Replay
Public-key algorithm:
Asymmetric: different keys are used for encryption and decryption RSA (Rivest, Shamir and Adleman)
secret key
secret key
plaintext
Ciphertext
plaintext
Encryption Algorithm Decryption Algorithm
(a)
10
Message authentication
A methodology to assure data integrity and to authenticate the data origin. One-way hash function:
A one-way hash function takes an arbitrarily long input message and produces a fixed-length, pseudorandom output called a hash Knowing a hash, it is computationally difficult to find the message that produced that hash It is almost impossible to find different messages that will generate the same hash
11
12
Public-key system
Public key:
Publicly available to anyone
Private key:
Only users themselves know their own private keys
13
Two large prime numbers p and q are chosen 'at random' and multiplied together to form a modulus n n = p.q Since it is not possible to factorise large numbers - the modulus can be published without disclosing p and q.
Public Key e
Private Key d
A pair of keys, e = encryption key, d = decryption key, are found by solving the following equation e.d mod (p-1)(q-1) = 1 A message M may then be enciphered with the encryption key e by raising M to the power e modulo n Ciphertext C = Me mod n This message may be recovered by raising the cipher text C to the power d modulo n M = C d mod n Simple example Choose p = 3, q = 11, then n = 33 now (p-1)(q-1) = 20 so e.d mod 20 = 1 choose d = 7 then e = 3 if M = 5 (the message)
Message M
Encrypt
Ciphertext C
Decrypt
Message M
Secret Key d
Private Key e
plaintext
Ciphertext
plaintext
Encryption Algorithm Decryption Algorithm
15
Digital certificates
Certificates bind a public key to a named entity Relies on the trust of the certificate authority A possible certificate and its signed hash, may look like this:
17
The main weakness of Diffie-Hellman protocol is that neither Alice nor Bob can authenticate the origin of messages M2 and M1 respectively. One solution is to add Alices digital signature to message M1 and Bobs digital signature to M2.
20
21
The scrambling/descrambling function aims to make the service incomprehensible to unauthorised users:
Descrambling can be achieved by any receiver having an appropriate descrambler and holding a secret Control Word (CW).
The CW is encrypted with a service key and sent inside a dedicated message (DVB tables) called Entitlement Control Messages (ECMs). The service key is encrypted with the smart card key and sent inside a dedicated message called Entitlement Management Messages (EMMs).
22
Mux
DVB Scrambler
EMM
ECM Encryption
Encryption
CW Smart card processing system Subscriber Authorization System (SAS) Control Word (CW) generator
Subscriber
23
Tuner
CW
24
Radio Interface
Wireless Network
Random Number Generator (128-bit) Key Database
A8 Algo.
A3 Algo.
Response (SRES) (32-bit)
Reject No
A3 Algo.
SRES COUNT (22 bits)
A8 Algo.
Ki (128-bit)
=? Kc
Plain text
COUNT (22 bits) Yes Accept
Kc
Plain text
A5 Algo.
A5 Algo.
XRES
CK
IK
AK
AK || AMF || MAC
26
AK
Master Key (K) (128-bit) f1: MAC algorithm
MS: Mobile Station HE: Home Environment SHE SMS
SQN
XMAC
yes
SQNMS
SHE>SMS
=?
No
yes
RES
CK
IK
RES
No
28
29
30
IPSec overview
IPSec provides a set of security services for traffic at the IP layer, in IPv4 and IPv6, through the use of IP Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols. Important IPsec databases:
Security Policy Database (SPD): Defined the protection offered by IPsec: PROTECTed using IPsec security services, DISCARDed, or allowed to BYPASS Security Association Database (SAD): Which encryption and integrity keys are associated with each IP packet
Authentication Header Authentication Header (AH) RFC 4302 (AH) RFC 4302
Encapsulating Security Encapsulating Security Payload (ESP) RFC 4303 Payload (ESP) RFC 4303
IPsec ISAKMP DOI IPsec ISAKMP DOI RFC 2407 RFC 2407 ISAKMP ISAKMP RFC 2408 RFC 2408
NULL Encryption NULL Encryption Algorithm Algorithm RFC 2410 RFC 2410 CBC-mode Cipher CBC-mode Cipher Algorithm Algorithm RFC 2451 RFC 2451
32
Internet Key Exchange Internet Key Exchange RFC 4306 RFC 4306 OAKLEY OAKLEY RFC 2412 RFC 2412
DES-CBC (with DES-CBC (with explicit IV) explicit IV) RFC 2405 RFC 2405
Transport mode:
coverage of authentication (except for mutable fields) IPv4 and IPv6: Encapsulating IP header AH Original + ext IP header fields TCP Data
Tunnel mode:
33
coverage of confidentiality Transport mode: IPv6: Original IP header Hop-by-hop extensions SPI Seq Nr. End-to-end extensions TCP Data Padding Auth Data coverage of authentication ESP header ESP payload ESP trailer
Tunnel mode:
Original IP datagram
SPI
Seq Nr.
TCP
Data
Padding
34
IPSec applications
End-to-end security VPN (virtual private network) with IPsec (Satellite example) End-to-end with VPN security Secured remote access
35
36
37
38
39
3G mobile
MSEC is an IETF Working Group focusing on standardizing building blocks and protocols for secure group communications and multicast. In addition, there is a Research Group called GSEC which is an IRTF (Internet Research Task Force) group formed to discuss research issues related to multicast security.
41
Critical issues:
Secure group management Key distribution for large groups
42
Policy server
Receiver
Sender
Policy server
Policy server
Receiver
Sender
Receiver
44
45
Server rekey
46
47
M K ey hierarchy A K ey A B C D E F
U sers 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 (a)
48
U sers 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 (b)
O
Send
Group key
M Key hierarchy
Send
I
Send
Group members 1 2 3 4 5 6
49
9 10 11 12 13 14 15 16
O
Unchanged
Group key
Unchanged
M Key hierarchy
Group members 1 2 3 4 5 6
50
9 10 11 12 13 14 15 16
Group key
Unchanged
Rekey
M Key hierarchy
Rekey Unchanged
I
Unchanged Rekey
Group members 1 2 3 4 5 6
51
9 10 11 12 13 14 15 16
Rekey messages = 2log2N 1 16 users = 24 2048 users = 211 131072 users = 217 1 million users = 220
52
53
Satellite Independent Service Access Point (SI-SAP) defined as a common interface between the upper and lower layers. The lower layers contain the satellite specific functions:
The lower layers are closely tied to the payload capability of the satellite
54
A d d re s s T a b le
BSM A d d r e s s R e s o lu t io n
BSM R o u t in g A d a p t a t io n
BSM C o n n e c t io n CTRL
BSM Q oS A d a p t a t io n
BSM QoS M gm t
BSM S e c u r it y M gm t
S IA F
IP P a c k e t F o r w a r d in g
S I- U - S A P
S I- C - S A P
S I- M - S A P
S e g m e n t a t io n / e n c a p s u la t io n SDAF
BSM A d d r e s s R e s o lu t io n
BSM C o n n e c t io n CTRL
S a te llite D a ta U n it S w itc h in g
BSM R e s o u rc e M gm t
BSM S e c u r it y M gm t
S a te llite L in k C o n tr o l ( S L C )
S a te llite M e d iu m A c c e s s C o n tr o l ( S M A C )
S a te llite P h y s ic a l ( S P H Y )
55
This implies that IPSec and SSL can be applied in limited cases. Satellite link layer security can be applied transparently to T-PEPs and A-PEPs.
58
SI-SAP
S- MAC S-PHY
L-layer Ethernet
Internet
59
SI-SAP
BSM GW IPsec
S-MAC
IPsec
S-MAC
IP layer
Link layer
Host/Hosts
Content Provider
60
SI-SAP
Link layer
Ethernet1 Ethernet2
Ethernet
Host/Hosts
Content Provider
61
SI-SAP
BSM GW IP layer
S-MAC L-security Link layer
Host/Hosts
Content Provider
62
A solution Multi Layer IPSec (ML-IPSec): divides the IP datagram into several zones and apply different protection schemes to each zone.
63
IP HEADER
TCP/UDP HEADER
TCP/UDP DATA
Zone 1
Zone 2
IP HEADER
ESP HEADER
TCP/UDP HEADER
ESP TRAILER 1
TCP/UDP DATA
ESP TRAILER 2
ESP AUTH
Zone 1 (k1)
Zone 2 (k2)
Encrypted
64
M Key hierarchy
Users U1 U2 U3 U4 U5 U6 U7 U8
65
66
67
67
Internet
DTN-G3
DTN-G2
DTN
WSN
DTN-Peer Sensor
WSN
DTN-Peer
68
69
71
72
73
74
Lightweight key management Lightweight AAA-like architecture for authentication/authorisation Resilience to Denial of Service (DoS) attacks Providing anonymity to end users for some services/applications
75
Major advantages
Major disadvantages
76
IP Network layer
Yes (IP address) Yes (IP address) No Yes (IPSec IP tunnel) Yes Yes (IPSec IP tunnel) Yes
Transport layer
No No Yes No Yes No Yes
Application layer
No No Yes No Yes No Yes
77