CH 5
CH 5
4/13/15
DNS
DNS can run over either UDP or TCP.
DNS server handles
processing functions
following
Information-
DNS
Naming a host that processes incoming mail
for the
designated target.
Finding the host type and the operating
system
information.
Finding an alias for the real name of a host .
Mapping IP addresses to host names.
separated by
dots and is read from the node up to the
root.
Name/Address Mapping
Each host that needs to map an address to a
name or vice versa should access the closest
DNS server with its request.
Mapping can be
Recursive
Iterative
Recursive mapping
The client host makes the request to its corresponding
DNS server which is responsible for finding the answer
recursively.
The requesting client host asks for the answer through
its local DNS server.
Finally, .com server sends the query to the local DNS
server of the requested place and finds the answer.
Iterative approach
In this case, if it does not have the name to provide,
the server returns to the client host.
In Figure, the host sends the query to its own local
DNS server, thus trying the root DNS server first and
then tries .com server
Finally it ends up with the local DNS server of the
requested place: dns.company2.com.
4/13/15
13
TELNET(terminal network)
It is a TCP/IP standard for establishing a connection to
a remote system.
TELNET allows a user to log in to a remote machine
across the Internet by first making a TCP connection
and then pass the detail of the application from the user
to the remote machine.
The remote logging operation is based on timesharing,
whereby an authorized user has a login name and a
password.
Local Log-in
Log-in is performed with a username and a
password.
Keystrokes accepted at the terminal driver and
passed to the
operating system.
Operating system interprets the keystrokes and
performs an
action
Remote Log-in
Terminal Driver accepts keystrokes and passes
them to the TELNET client
Client transforms characters to network virtual
terminal (NVT) character and delivers them to
TCP/IP protocol stack
Passed online to the servers TCP/IP stack and
then to the TELNET server which deciphers the
NVT characters
The decoded characters are passed to a pseudoterminal driver because the Operating System is
only designed to receive characters from a
terminal driver.
NVT
Uses two sets of characters one for data and the
other for control
Data characters are represented with the same 7
lowest-order bits as ASCII and the highest-order
bit is 0.
Control characters highest-order bit is 1
4/13/15
21
FTP
FTP File transfer protocol. Commonly used
over the Internet.
Numerous FTP servers over the world allow
people anywhere on the Internet to log in and
download whatever files they have placed on
the FTP server, or upload other files.
Uses two TCP ports (20 data channel and 21
control channel) this is in active mode. In
passive FTP mode, it uses 21 for the control
channel, and an ephemeral port for the data
channel.
Not a secure protocol
24
SMTP
SMTP is a simple ASCII protocol.
After establishing the TCP connection to port
25, the sending machine, operating as the
client, waits for the receiving machine,
operating as the server, to talk first.
The server starts by sending a line of text
giving its identity and telling whether or not
it is prepared to receive mail.
If it is not, the client releases the connection
and tries again later.
25
SMTP
SMTP
27
WWW ARCHITECTURE
The WWW today is a distributed client/server
service, in which a client using a browser
can access a service using a server.
However, the service provided is distributed
over many locations called sites.
27.28
Architecture of WWW
27.29
Browser
27.30
URL
27.31
WEB DOCUMENTS
The documents in the WWW can be grouped
into three broad categories: static, dynamic,
and active. The category is based on the time
at which the contents of the document are
determined.
27.32
HTTP
The Hypertext Transfer Protocol (HTTP) is a
protocol used mainly to access data on the
World Wide Web. HTTP functions as a
combination of FTP and SMTP.
27.33
HTTP transaction
27.34
27.35
27.36
28.37
28.38
28.39
28.40
28.41
Integrity
Detecting that the data is not tampered with
Authentication
Establishing proof of identity
Nonrepudiation
Ability to prove that the sender actually sent the data
Access Control
Access to information resources are regulated
Availability
Computer assets are available to authorized parties
when needed
44
DES Structure
The encryption process is made of two permutations (Pboxes), which we call initial and final permutations, and
sixteen Feistel rounds.
DES Advantages
Secure: hard to attack
Classic case: given ciphertext, get plaintext
Also: given both, get key
Achieved through diffusion, confusion
Easy to analyze
Prove that certain attacks fail
7/3/01
DEScription: Overview
plaintext
INITIALPERMUTATION
ROUND1
ROUND2
...
ROUND16
INITIALPERMUTATION1
ciphertext
7/3/01
7/3/01
Li1
Li
Ri1
Ri
DEScription: InsiDES
Expand right side from 32
to 48 bits (some get
reused)
Add 48 bits of key (chosen
by schedule)
S-boxes: each set of 6 bits
reduced to 4
P-box permutes 32 bits
Ri1
Expansion
EightSboxes
Pbox
Output
7/3/01
Ki
Li Ri 1
Ri Li 1 f Ri 1
In other words:
Ri 1 Li
Li 1 Ri f Li
So decryption is the
same as encryption
Last round, no swap:
really is the same
Li1
Li
Ri1
Ri
AES
AES is a non-Feistel cipher that encrypts and
decrypts a data block of 128 bits. It uses 10,
12, or 14 rounds. The key size, which can be
128, 192, or 256 bits, depends on the number
of rounds.
Similar to DES: block cipher (with different
modes), but 128-bit blocks
128-bit, 192-bit, or 256-bit key
Mix of permutations, S-boxes
S-boxes based on modular arithmetic with
polynomials:
Non-linear
Easy to analyze, prove attacks fail
7/3/01
AES Security
AES was designed after DES. Most of the known
attacks on DES were already tested on AES.
Brute-Force Attack
AES is definitely more secure than DES due to
the larger-size key.
Statistical Attacks
Numerous tests have failed to do statistical
analysis of the ciphertext.
Differential and Linear Attacks
There are no differential and linear attacks on
AES as yet.
RSA (continued)
Randomly choose a public key E that has no
factors in common with T = (P-1)*(Q-1).
Compute a private key D so that E*D leaves a
remainder of 1 when divided by T.
We say E*D is congruent to 1 modulo T
RSA (continued)
If N is any number that is not divisible by M,
then dividing NE*D by M and taking the
remainder yields the original value N.
This is a relatively deep mathematical theorem,
which we can write as NE*D mod M = N.)
Message Authentication
message authentication is concerned with:
protecting the integrity of a message
validating identity of originator
non-repudiation of origin (dispute resolution)
Hash Algorithms
Hash Functions
Examples:
MD4, MD5, SHA1
SHA Overview
1. pad message so its length is 448 mod 512
2. append a 64-bit length value to message
3. initialize 5-word (160-bit) buffer (A,B,C,D,E) to
(67452301,efcdab89,98badcfe,10325476,c3d2e1f0)
4.
Digital Signatures
have looked at message authentication
but does not address issues of lack of trust
IP Security (IPSec)
IPSec is a framework of open standards
developed by the Internet Engineering Task Force
(IETF).
Creates secure, authenticated, reliable
communications over IP networks
Confidentiality (encryption)
Assurance that users traffic is not examined by nonauthorized parties.
Access control
Prevention of unauthorized use of a resource.
TCP
Header
Data
IP
Transport Mode
protected packet Header
IPSec
Header
TCP
Header
Data
protected
payload
New IP
Tunnel Mode
protected packetHeader
IPSec
Header
Original
IP
Header
TCP
Header
protected
Data
Authentication Header
76
So what is WEP?
77
Message
CRC
78
Keystream
IV
Key
CRC
Ciphertext
Keystream
Ciphertext
Keystream
Key
CRC
Keystream
Firewalls
Effective means of protection a local system
or network of systems from network-based
security threats while affording access to the
outside world via WAN`s or the Internet
Henric Johnson
83