Network Security Protocols
Network Security Protocols
• Security Properties:
• Secrecy.
• Authentication.
• Integrity.
• Non-repudiation.
• Anonymity.
• Fairness.
• Availability.
• Money atomicity.
• Good atomicity.
• Certified delivery
Cryptographic Protocols
• A protocol is a set of rules or conventions that govern the
exchange of information between principals (computers, hosts,
humans, telephones, etc.).
• Cryptographic protocols are a subclass of protocols that use
cryptographic techniques to achieve security objectives.
• A protocol is a precisely defined sequence of communication
and computation steps.
• A communication step transfers a message from one principal
(sender) to another (receiver), while a Computation step
updates a principal’s internal state.
Examples of Cryptographic Protocols
• Goods atomicity:
• Transactions with good atomicity are money-atomic and
also ensure that goods-atomic transactions provide an
atomic swap of the electronic goods and funds.
Certified Delivery
• Certified delivery transactions are goods-atomic
while allowing both the consumer and merchant to
prove exactly what was delivered.
• If there is a dispute, this evidence can be shown to
a judge to prove exactly what goods were
delivered.
Types of Cryptographic Protocols
• In general, we distinguish between:
• Authentication protocols.
• Key distribution protocols.
• E-commerce protocols.
• Secure group protocols.
• Fair-exchange protocols.
• Contract-signing protocols.
• Anonymity protocols.
1.
4.
3. 2.
Lessons from
Needham-Schroeder
• Classic man-in-the-middle attack.
• Exploits participants’ reasoning to fool them:
• A is correct that B must have decrypted {A, Na}Kb message, but this does
not mean that {Na, Nb} Ka message came from B
• The attack has nothing to do with cryptography!
• It is important to realize limitations of protocols
• The attack requires that A willingly talk to adversary.
• In the original setting, each workstation is assumed to be well
behaved, and the protocol is correct!
• Wouldn’t it be great if one could discover attacks like this
automatically?
More attack scenario:
Oracle Flaws
• Oracle flaws occur when the cryptographic
protocol dialog allows an adversary to know some
secret information or to foretell the content of some
encrypted messages.
• We can distinguish two subclasses of oracle flaws:
• Single oracle flaws and,
• Multi-role oracle flaws.
Fixing the attack
• The most famous example of a single role oracle flaw was given by
Shamir, Rivest and Adelman. It consists of the following three-steps
protocol:
• At step one of the first protocol run, the intruder intercepts the message
{Na}kab and uses it as its own challenge in the first step of the second
protocol run.
Multi-Role Oracle Flaws
• Therefore, it is not surprising that the principal playing the
role A will answer by sending the message {Na +
1}kab in step two of the second protocol run.
• Furthermore, this message is also the necessary one to
finish the first run.
• Finally, the principal playing the role A is convinced that the
principal playing the role B is operational, however this
principal may not exist any longer in the system.