Algorithms and Architecture For Security
Algorithms and Architecture For Security
• Aspects
– Physical connectivity -> sabotage or outages
– Availability -> Denial of service attacks
– Correct routing -> address spoofing
• Encryption is not always necessary (Minitel/i-Mode, First
Virtual, micropayments, etc.)
• Encryption is more important in open or decentralized
networks co-managed by distinct administrative entities
• Security depends on
– nature of money
– instrument of payment
– legal requirements
– value,
– support (container) of the value
– location of the value store
• Architecture of the payment system must reflect the
security needs
Intruder
Protocols for Secure Electronic
© M. H. Sherif
Commerce (2nd ed.) 9
Active Attacks
– Masquerade and message modification
¤ Intruder obtains the user ID and password of a legitimate user
and logs on to the network to obtain additional privileges or to
modify the data being transmitted.
¤ Denial of service (DoS)
¤ Rendering a server unavailable to others
¤ DoS attacks can be done by flooding a server with multiple bogus
connection requests.
Info. source Info. destination
Normal flow
Intruder
93%
100% 85%
73%
57%
47%
50% 35%
28%
16% 21% 21% 20%
13% 12% 12%
5% 3%
0%
Virus
abuse service
-50% Network Denial of System
Theft of access penetraion Sabotage
Laptop theft
Unauthorized Telecom fraud
proprieary info Financial fraud
-75% -79%
-100%
• Confidentiality
– Symmetric cryptography
– Public key cryptography (for small messages, e.g,
symmetric key)
• Data Integrity (through a "fingerprint" or "signature" of
the message)
• Blind-signature is a special type of signature of a
message without knowing the content (used for digital
money)
• Encryption
– to ensure confidentiality
• Authentication
– Verification of user's identity
– Access control lists for authorized access to network
resources
– Dynamic password assignment
• Message Authentication
• Non repudiation
– Digital signature, time stamping, etc.
Tunnel Endpoints
Transit
Internetwork
Header
Payload Payload
Transit Internetwork
Tunnel
Tunneled
Payload
Address assigned by
the ISP
• Transport mode
– Encapsulates just the payload
– Typically used for end-to-end communication between two
hosts
• Tunnel Mode
– Encapsulates the whole packet
– Used when one or both ends of the connection is a security
gateway, such as a firewall router.
Public
Networ
k
IPSec Host
Firewall Firewall
Transport Mode
(ESP)
outer IP header with inner IP header
gateway IP address
AH
authenticated
ESP encrypted
authenticated
Encryption Key
Ciphertext
Encryption Decryption
Sender Receiver
k k
64-bit 64- bit 64-bit
plaintext ciphertext plaintext
DES DES
Source Destination
64 -bit E0 E1 E2
plaintext M0 M1 M2 Key
64 bits
ciphertext
E0 E1 E2 M0 M1 M2
IV = initialization vector
e il
The The
leftmost leftmost
n bits mil
n bits
e il
The The
leftmost leftmost
n bits mil
n bits
E D E
K1 K2 K1
Destination
D E D
Public
key of Private
recipient Encrypted message E key of
E=Ek1(M) M=Dk2(E) recipient
(k1)
(k2)
Encryption Decryption
ed ≡1 (mod φ )
Public key is (N, e), private key is d
Suggested values for e in practice are 3 or 216 +1
Encryption
Session Key
Session Key
Sender Recipient
h h
Data
Sender Receiver
Signature
E D
Comparison
h h
Data
Sender Receiver
Protocols for Secure Electronic
© M. H. Sherif
Commerce (2nd ed.) 47
Integrity Verification with Symmetric
and Public Key Encryptions
• Symmetric cryptography and hash functions
– Hash function --> Message Authentication Code (MAC) or
Hashed Message Authentication Code (HMAC)
– Encrypt the MAC with a symmetric algorithm
– This is called a "signature"
• The legitimate recipient can verify the integrity; others
cannot
• With public key cryptography, if the MAC is encrypted
with the sender's private key; anyone having the public
key can verify the integrity
• In one step:
– with symmetric cryptography
– with biometric recognition
• In two steps with public key cryptography
• In public cryptography, requires a certification
infrastructure
• Identification systems
– centralized data base
– used with badge, password
• Verification system
– distributed architecture
– compare actual data with data stored on a card
– verify privileges
Bio reader
Data Data
base base
Bio reader
Reference pattern
Smart card
• Identification systems
– rate of mix-up of identities
– percent rejects of authorized identities
• Verification systems
– rate of false rejects
– rate of false acceptances
• Handwritten signature
• Voice
• Keystroke dynamics
• Gait
• Photo image
• Fingerprint
• Iris scan
• Retina
• Dental imprints
• Shape of the hand, the ear, etc.
• DNA
• Performance
– rate of false rejects in commercial systems (3%)
– false acceptance (1 in a million)
• Phenomenon used to record the s minutia
– Capacitance (Infineon, Secugen)
– Electric field (Authentec, Veridicom)
– Optical and optoelectronic (Identix, Who?Vision)
– Temperature (Thomson-CSF)
PC
Yes/No
Features
Sensor Image processing
extraction Matching
Bio reader
Reference pattern
Smart card
• Certificate issued by a
Certification Authority
Name : “Richard”
• Verifies the identity of Public Key:
the holder of a public key Serial # : 29483756
Expires : 6/18/02
• Structure governed by Signed : CA’s Signature
ITU Recommendation
X.509
• Generation of proofs
• Recording of proofs
• Verification of proofs
• Retrieval and re-verification of the proofs
2 - Ticket
acquisition
• Types of Certificates:
– Identity
– Privileges or attributes
• SDSI (Simple Distributed Security Infrastructure)
• SPKI (Simple Public Key Infrastructure): for privileges
• Online management of certification
– CMP (Certificate Management Protocol): key exchange and
cross-certification (Entrust and IBM, as part of PKIX): RFC
2510
– OCSP (Online Certification Status Protocol): RFC 2560
DSP
DSA
Authority
A
Subject = Authority A
Public key of A
Authority
Signature of RA
Subject = B
Authority B
Public key of B
Signature of A
User
Subject = Authority C
Subject = User
Public key of C
Public key of user
Signature of B
Authority
Signature of C C
U«V»
V «U»
V«W» V
V«Y»
W«V»
Y«V»
Y
W
W«X»
X «W» Y«Z»
X«Z» Z «Y»
X Cross- Z Z «X»
certification
C A B
X «C» X «A» Z «B»
Z «B» = Z certifies B
Protocols for Secure Electronic
© M. H. Sherif
Commerce (2nd ed.) 95
Banking Applications
• Bank-Led Organizations:
– The Global Trust Authority (GTA) 800 banks
– IDENTRUS (infrastructure for the TrustAct services from
SWIFT)
• VeriSign (acquired Thawte Certification)
• Scotiabank (Entrust)
– North America's biggest bank certification authority
– 150,000 digital certificates
– >500,000 online banking transactions
Message
TrustAct
to the
acquirer Enterprise A Enterprise B
bank