Information Security Management Lectures
Information Security Management Lectures
Fig.
Digital Certificate
Subject Name: Vivek Kapoor
Public Key: <#^&89>
Serial No.: 103467
Other Data: [email protected]
Valid from: 1 Jan 2001
Valid to: 31 Dec 2004
Issuer Name: VeriSign
…
….
05/13/22 Vivek Kapoor 4
Certification Authority (CA)
Fig.
Version Version 1
Certificate Serial No.
Issuer Name Version 2
Validity ( Not Before/Not after)
Subject public key info. Version 3
Issuer Unique identifier
Subject unique identifier
Extensions
Certification Authority Digital Signature All Versions
• Fig.
Key Generation
Registration
Verification
Certificate Creation
• This step is required when user generates key in the first step.
• Here subject sends public key along with other information &
evidences to the RA.
• For this software provides wizard in which all users enters the data
and submits it. It is called certificate signing request.
• This is one of the public key cryptographic standards which we will
study latter.
Yes No
Message Digest (MD2) Valid
05/13/22 Vivek Kapoor Invalid 18
Accept it Reject it
Certificate Hierarchies & Self-Signed
Certificates
• Suppose Alice received Bob’s certificate & she wants to verify it. For
Alice wants to design the bob’s certificate using Bob’s CA public
key.
• How will Alice know Bob’s CA public key?
• If their CA’s are same then there is no problem ? But if they are
different then the problem arises.
• To resolve this type of problem Certification Authority Hierarchy is
created. This is also called Chain of Trust. In other terms CA’s are
grouped into multiple level of CA hierarchy.
• CA hierarchy begins with the root CA.
• The root CA has one or more 2nd level CA, which in turn have one or
more third level CA’s and so on.
• This type of hierarchy relieves the root CA from having to mange all
the possible digital certificates.
3rd Level CA B1 3rd Level CA B2 3rd Level CA B10 3rd Level CA B11
….
05/13/22 Alice Vivek Kapoor … Bob 21
…
Certificate Hierarchies & Self-Signed
Certificates
• If Alice has obtained her certificate from a third level CA & Bob has
obtained his certificate from other third level CA, How can Alice verify
Bob’s certificate?
• Clearly Bob in addition to his own certificate Bob will send certificate
of his CA (i.e B11) to Alice. This would tell Alice the public key of
B11.
• Using the public key of B11, Alice can design and verify Bob’s
certificate.
• Now question arises how will Alice will trust B11 certificate.
• For this Alice will required A3 certificate since B11 certificate has
obtained certificate from A3 and this will go so on until it reaches the
root certificate.
• The root CA’s are considered to be trusted CA’s, for this Alice web
browser contains pre programmed, hard coded certificate of the root
certificate
• Root certificate is self signed certificate i.e root signs its owns
certificate
05/13/22 Vivek Kapoor 22
Certificate Hierarchies & Self-Signed
Certificates
• But in actual sequence of operations Bob will send all certificates up
to the root CA in the first message to Alice. This is called Push
Model.
• Alice will verify all the certificates. This is called Pull Model.
• It is possible that Alice & Bob live in different countries i.e their root
CA’s will be different.
• In fact, in one country can have multiple root CA’s.
• Root CA’s in US are VeriSign, Thawte & US postal service.
• This could lead us to the same old story of a never ending chain of
certification authority hierarchy and their validations.
• Alternative to this problem is cross-certification.
• Because single monolithic CA certifying every possible user in the
world is quiet unlikely. This is a concept of decentralization. Of CA’s
for different countries.
• It helps CA’s not only to work with smaller population but also work
independently.
Alice
…. …. Bob
• Fig.
CA: XYZ
Certification revocation List (CRL)
This CRL: 1 Jan 2002, 10.00AM
Next CRL: 12 Jan 2002, 10.00AM
• Fig.
Version Header
Fields
Signature Algorithm identifier
This update (Date and Time)
Next update (Date and Time)
User Certification Sr. No. Revocation Date CRL Entry Ext. Repeating
……… …………. …………… entries
• Not all digital certificates have same status and cost. Depending on
requirements they differ.
• Certificate types can be classified as follows:
# Email certificates: It includes the user’s email id. It is used to verify
that signer of an email message has an email id i.e is same as it
appears in user’s certificate.
# Server-side SSL certificates: These are for merchants who allow
buyers to purchase goods from their online website. They are
issued after careful scrutiny of merchant credentials.
# Client-side SSL certificates: It allow merchant to verify client.
# Code-signing certificates: These are used to sign java applets code
or Microsoft active X codes which are embedded over the web
page.
• Ca must plan & maintain history of the certificates & the keys of its
user’s.
• This helps us to inquire a document which is signed way back.
• It help to avert legal problems.
-----------------------------------------------------------
4. HTTP response
2. Invokes an
3. Program
application
executes &
program in
produce HTML
response to
output.
HTTP request
05/13/22 Vivek Kapoor 61
Active Web Pages
Fig.
1. HTTP request
2. HTTP response
contains
Communication link
05/13/22 Vivek Kapoor 63
Protocols & TCP/IP
Fig.
Application Application
Transport Transport
Network Network
Network Network
Data Link
Data Link Data Link Data link
Physical Physical
Physical Physical
Fig.
L5 Data H4 Transport
L5 Data H4
L4 Data H3 Internet
L4 Data H3
Fig.
L5 Data Application
L5 Data
L5 data SH SSL L5 data SH
L5 Data H4 Transport
L5 Data H4
L4 Data H3 Internet
L4 Data H3
Master
Secret
Symmetric
Key
• Before ending the communication each part should notify the other
close notify alert & end the connection from its side.
• The handshake protocol is quite complex & time consuming as it
use asymmetric key cryptography.
• Thus it is desired that client-server should reuse earlier connection,
rather than going for new connection.
• A SSL connection should not be used after 24 hrs in any case.
• Online payment requires that customer sends its credit card info.
To the merchant.
• There are two issue related to it i.e an intruder can get the no. and
use it for malicious intentions.
• Second is that credit card no. is made available to the merchant
who can misuse it in future.
• First issue is generally dealt by SSL, since SSL sends all the info.
In encrypted form hence an intruder cannot make any sense out
of it.
• Second issue is dealt bi SET since it hides credit card information
from the merchant.
• For this SET relies on the concept of digital envelope.
• The following steps illustrates the idea:
1. SET software prepares the payment info. (PI) on cardholder’s
computer.
05/13/22 Vivek Kapoor 88
How SET achieves its objectives
Fig.
Fig.
• Dual signature:
PI MD5 PIMD
+ MD5 POMD E
PIMD
+ MD5 POMD1
OI MD5 OIMD
Dual Signature
D POMD2
(DS)
OIMD
+ MD5 POMD1
PI MD5 PIMD
Dual Signature
D POMD2
(DS)
If Yes then
POMD1 = POMD2
accept else
reject
05/13/22 Vivek Kapoor 97
Purchase Request (Purchase response)
Here are:
a) Purchase Information
b) Authorization Information
Merchant c) Cardholder & my certificates Payment
Gateway
Authorization request
Fig.
Merchant Payment
Gateway
Authorization Response
Capture Request
Fig.
Merchant Payment
Gateway
Capture Response
CA 1 CA 2
Request for Request for
Certificate Certificate
Merchant Certificate Cardholders Certificate
Merchant Cardholder
Purchase Response
Purchase Request
Authorization Request
Payment
Authorization Response Gateway
• SET has one limitation, it does not prevent user from providing
someone else credit card no.
• New protocol called 3-D Secure protocol helps to achieve this.
• Here card holder who wish to participate in a payment transaction
has to enroll on the issuer bank’s Enrollment server.
• At the time of 3-D secure transaction when merchant receives a
payment instruction from cardholder, he forward this request to
issuer bank.
• Issuer bank ask cardholder for user id & password which was
created at the time of enrollment process.
• Cardholder provides the detail which is verified by the bank.
• If authenticated then it accept the card payment.
Fig.
Bank
Customer
$ 100 %^^A
• Fig.
Customer
%^^A $ 100
Fig.
$ 100
Bank Customer
SR 100 1.Bank generates the
serial no. & sends it
along with the e-money
to the customer.
$ 100
Customer Merchant 2. Customer spends
SR 100 the money, so the
merchant has it now.
3. Merchant en cash
$ 100 the e-money from the
Merchant Bank
SR 100 bank. The money still
has the same sreial no.
• Here there are two SMTP server's i.e Sender & receiver.
• Based on client’s request for an email transfer message, server
sends back READY FOR MAIL reply, indicating that it can accept an
email message from the client.
• Client sends HELO to the server & identifies itself.
• Client can now send one or more email messages to the server.
Email transfer begins with MAIL command that identifies the sender.
• Recipient allocates the buffers to store the in coming message &
sends back OK response to the client. Server also sends back
response code 250.
• Client now sends the list of intended recipients by one or more
RCPT commands ( one per recipient).
• The server must send back a 250 OK or 550.
• Client sends DATA command, informing server that client is ready
to start transmission of the email message.
Non Message
Encryption
Repudiation integrity
2. Digital Signature
3. Encryption
4. Base 64 Encoding
05/13/22 Vivek Kapoor 119
Privacy Enhanced Mail (PEM)
Canonical Conversion/Digital Signature
• There is a possibility that sender & receiver of email message use
computers that have different architectures & operating systems.
• In canonical representations regardless of the architecture & the
operating system of the sending & receiving computers, email
message travels in a uniform, independent format.
• Step: 2 (Digital Signature)
Email message 10001
MD5 01010 Digital
01010 Encrypt
Signature
Sender’s
private key
• Here original email & digital signature are encrypted together with a
symmetric key.
• For this DES or IDEA is used.
2. Compression
3. Encryption
4. Enveloping
5. Base 64 Encoding
05/13/22 Vivek Kapoor 124
Secure Multipurpose Internet Mail
Extensions (S/MIME)
• Traditional email systems are text based.
• If we want to send multimedia files over email then MIME system
provides the functionality.
• An MIME email contains normal text message along with some
special headers & formatted sections of text.
• Each section consist of ASCII-encoded portion of data.
• It starts with an explanation that how the data should be
interpreted/decoded at the recipient end.
• Suppose sender attach a graphics file to the email message.
• Figure shows that figure actually travels with the email.
• Content type MIME header shows that sender has attached a .GIF
file to the message.
• When open in an text format it will appear as gibberish.
• Recipient email system shall recognized it as .GIF file.
05/13/22 Vivek Kapoor 125
Secure Multipurpose Internet Mail
Extensions (S/MIME)
• MIME Headers:
MIME Version: Version which is used.
Content Type: Describes the data contained in the body of
message.
Content-Transfer-Encoding: Type o transformation.
Content-ID:
Content-Description:
• MIME Content Types: It specifies 7 content types & 15 content sub
types.
• S/MIMIE functionality:
Enveloping the data: Contains encrypted data & encryption key
encrypted with receiver's public key.
Signed data: Content & digital signature are both base 64 encoded.
Clear-signed data: Here digital signature is base 64 encoded.
Signed & Enveloped data: Vivek Kapoor
05/13/22 126
Chapter 3
User Authentic Mechanisms
• Here attacker may not be able to use the message digest to work
backwards to retrieve the original password.
• The attacker can simply listen to the communication between user &
the server involving login request-response pair.
• In this he would get the user id & message digest of password.
• Attacker will copy that information & submit them after some time to
the server as a new login request.
• This is called replay attack because attacker simply replay the
sequence of events of a normal user.
Step 4- User signs the random challenge with the message digest of
the password: Here message digest of the password is now used to
encrypt the random challenge received from the server.
Step 5- Server verifies the encrypted random challenge received
from the user: Server receives encrypted random challenge. In
order to verify server must perform following steps:
Server can decrypt the random challenge with the message digest
of the user password stored in the user data base . If decryption
matches the original random challenge available on the server, then
server can be assured.
Step 6- Server returns appropriate message back to the user.
• Random challenges are generally 16-bit random numbers.
• It is an authentication protocol.
• Basis of this protocol is another protocol called Needham-Shroeder.
• Kerberos means a multi-headed dog in greek mythology (apperently
used to keep outsiders away).
• Version 4 is used in practical implantations, version 5 is also out
now.
• There are four parties involved in Kerberos protocol:
• Alice: Client work station.
• Authentication server (AS): Verifies the user during login.
• Ticket Granting server (TGS): Issue tickets to certify proof of identity.
• Bob: Server offering services such as network printing, file sharing,
application program etc……………
KS + TGT
05/13/22 Vivek Kapoor 150
How does Kerberos Work? (Step 1)
Output
• Fig.
AS Alice
Output
Timestamp
Encrypted
Timestamp TGT Bob
Output
Alice KAB
Bob KAB
Session Encrypt
Key (KS)
Output
05/13/22 Vivek Kapoor 154
How does Kerberos Work? (Step 3)
-----------------------------------------------------------
Network Security
Data Link
Physical
• Fig.
20 to 60 bytes header consisting of the following fields
2 bytes 2 bytes 4 bytes 4 bytes
Source Destination Sequence Ack No.
port no. port no. no.
4 bytes 6 bytes 6 bytes 2 bytes
Header Reserved Flag Window
length Size
2 bytes 2 bytes 0 to 40 bytes
Checksum Urgent Options
pointer
DATA
Options(32 bits)
• Fig.
Internet
Corporate Network
• Advantages of packet filters are its simplicity & there fast operating
speed.
• Disadvantages are difficulties in setting up packet filter rules & lack
of support for authentication.
• Following types of attacks takes place in case of packet filters:
IP address spoofing: An intruder can send packet outside the
network having IP address equal to IP address with in the network.
Source routing attacks: Here attacker specify the route that a packet
should take as it moves with along the internet.
Tiny fragment attacks: IP packets pass through variety of networks
such as Ethernet, Token ring, X.25 etc…. So IP packets get
fragmented each time. Attacker feels that packet filter can be fooled,
so that after fragmentation, it checks only 1st fragment & by
intentionally creating the fragments he can intrude into the system.
05/13/22 Vivek Kapoor 166
Firewalls ( Packet filters)
• User thinks that a direct connection between itself & remote host
has been established.
• Thus computers from internal users are hidden from outside world.
• SOCKS server is an example of the real life implementation.
• Socks client runs on the internal hosts & server runs on the firewall.
• Thus application gateway act as a proxy of the actual end user &
remote host.
• It is more secure than packet filters.
• Rather examining every packet against number of rules, here we
simply detect that weather user is allowed to work with TCP/IP
application or not.
• Disadvantage is that there is a overhead in terms of connections.
• There are two sets of connections: between end user & application
gateway another between application gateway & remote host.
Application gateway
Packet filter
Internet
• Direct connection between internal host & packet filter are avoided.
Application gateway
Packet filter
Internet
• Two packet filters are used one between internet & application
gateway other between application gateway & internal network.
Packet filter
Application gateway
Packet filter
Internet
Internet
DMZ
Firewall
05/13/22 Vivek Kapoor 174
Limitations of firewall
• Insider intrusions.
• Direct internet traffic.
• Virus attacks.