Vocabular / Concepts Flashcards
What is the purpose of the Diffie-Hellman protocol ? (2 points)
- securely establish a shared secret key between two parties over an insecure communication channel
- allows two parties to generate a common key without having to transmit the key itself, thus preventing interception by eavesdroppers
What is a digital signature ?
Message authentication + a measure to counter repudiation by the source
(Threat, Security Service, Comments, Mechanism)
Interception
Security Service : confidentiality
Comments : information is accessible only to authorized users
Mechanism : encryption
(Threat, Security Service, Comments, Mechanism)
Fabrication
Security Service : authentication
Comments : ensuring the identity of an entity / message not altered
Mechanism : authentication protocols
(Threat, Security Service, Comments, Mechanism)
Modification
Security Service : integrity
Comments : message is not tampered with
Mechanism : digital signature (e.g. RSA)
(Threat, Security Service, Comments, Mechanism)
Repudiation
Security Service : non-repudiation
Comments : the entity can’t deny sending/receiving a message
Mechanism : digital signature
(Threat, Security Service, Comments, Mechanism)
Unauthorized access
Security Service : access control
Comments : prevention of unauthorized use of resources
Mechanism : access control list, roles
(Threat, Security Service, Comments, Mechanism)
Interruption / Denial of service
Security Service : availability
Comments : services always available to authorized users
Mechanism : replication, more bandwidth, better hardware
Type of attack : Traffic analysis
Passive
Type of attack : Release of content
Passive
Type of attack : Replay
(intercept a transmission and repeat it, e.g. for ID theft)
Active
Type of attack : Modification of messages
Active
Type of attack : Denial of service
Active
Type of attack : Masquerade
(steal ID to pretend to be someone else)
Active
Outline a Man-in-middle attack for the Diffie-Hellman protocol
- Darth prepares for the attack by generating two random private keys Xd1 and Xd2 and then computing the corresponding public keys Yd1 and Yd2
- Alice transmits Ya to Bob
- Darth intercepts Ya and transmits Yd1 to Bob. Darth also calculates K2 = YAXd2 mod q
- Bob receives Yd1 and calculates K1 = Yd1Xb mod q
- Bob transmits Yb to Alice
- Darth intercepts Yb and transmits Yd2 to Alice. Darth calculates K1 = YbXd1 mod q
- Alice receives Yd2 and calculates K2 = Yd2Xa mod q
Sample Kerberos Exchange
C→AS : Hi, Jain would like to use the network today.
C←AS : Here is a day pass for Jain.
C→TGS : Jain would like to communicate with PrintServer. Attached is his day pass.
C←TGS : Here is the ticket for Jain to communicate with PrintServer. It includes a session key.
C→PrintServer : Hi, Jain wants to communicate with you, here is the ticket.
C←PrintServer : Perfect, let us use the session key that was in your ticket.
Where is SSL used ?
Widely in web, to secure HTTP
What are the layers of the SSL protocol ?
Two layers :
- SSL Record Protocol : secure, reliable channel
- upper layer = carrying : Handshake, Alert protocol, HTTP, Any other app.
What is a “session” in the SSL protocol ?
- 1 client + 1 server
- to define a set of cryptographic / security parameters shared among multiple connections
- used to avoid the expensive negotiation of new security parameters for each connection
What is a “connection” in the SSL protocol ?
- 2 peers (equal roles)
- transient (temporary and short-lived)
- 1 connection associated with 1 session
What are the 4 phases of the SSL Handshake Protocol ?
- Establishing security capabilities
- Server authentication and key exchange
- Client authentication and key exchange
- Finalizing the Handshake protocol