DOC PREVIEW
UT CS 395T - Design and Analysis of Security Protocols

This preview shows page 1-2-3-27-28-29 out of 29 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Design and Analysis of Security ProtocolsCourse LogisticsGradingComputer SecurityClass PollSecurity ProtocolsCorrectness vs SecuritySecurity AnalysisTheme #1: Protocols and PropertiesTheme #2: Formal Analysis MethodsVariety of Tools and TechniquesExample: Needham-SchroederNeedham-Schroeder Public-Key ProtocolWhat Does This Protocol Achieve?Anomaly in Needham-SchroederLessons of Needham-SchroederImportant Modeling DecisionsFundamental TradeoffExplicit Intruder MethodMurj [Dill et al.]Making the Model FiniteApplying Murj to Security ProtocolsNeedham-Schroeder in Murj (1)Needham-Schroeder in Murj (2)Needham-Schroeder in Murj (3)Try Playing With MurjStart Thinking About the ProjectSome IdeasWatch This SpaceDesign and Analysis of Security Protocols Vitaly ShmatikovCS 395Thttp://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/Course LogisticsLectures•Monday, Wednesday 3:30-5pm •Project presentations in the last two weeksThis is a project course•The best way to understand security is by getting your hands dirty •There will be one short homework and one read-and-present a research paper assignment•Most of your work will be project, writeup and in-class presentation Please enroll!GradingHomework: 10%Read and present a research paper: 15%Project: 75%•Projects are best done individually•Two-person teams are Ok, but talk to me first•Project proposal due around 5th week of the course–More details later•I’ll provide a list of potential project ideas, but don’t hesitate to propose your ownComputer SecurityCryptographic primitivesProtocols and policiesImplementationBuilding blocksBlueprintsSystemsAlgorithmicnumber theoryComputationalcomplexityRSA, DSS, SHA-1…SSL, IPSec, access control…Firewalls, intrusiondetection…Class PollCryptography?•Public-key and symmetric encryption, digital signatures, cryptographic hash, random-number generators?•Computational complexity?Systems security?•Buffer overflows, Web security, sandboxing, firewalls, denial of service?Formal methods and verification?•Model checking, theorem proving?… this course doesn’t require any of these Security ProtocolsThe focus of this course is on secure communications…•Two or more parties•Communication over insecure network•Cryptography used to achieve some goal–Exchange secret keys, verify identity, pay for a service……and formal analysis techniques for security •Analyze protocol design assuming cryptography, implementation, underlying OS are correctLater in the course will talk about privacy protection in databases and trusted computingCorrectness vs SecurityProgram or system correctness: program satisfies specification•For reasonable input, get reasonable outputProgram or system security: program properties preserved in face of attack•For unreasonable input, output not completely disastrousMain differences•Active interference from adversary•Refinement techniques may fail–Abstraction is very difficult to achieve in security: what if the adversary operates below your level of abstraction?Security AnalysisModel systemModel adversaryIdentify security propertiesSee if properties preserved under attackResult•Under given assumptions about system, no attack of a certain form will destroy specified properties•There is no “absolute” securityTheme #1: there are manynotions of what it meansfor a protocol to be “secure”Theme #2: there are manyways of looking for security flawsTheme #1: Protocols and PropertiesAuthentication•Needham-Schroeder, KerberosKey establishment•SSL/TLS, IPSec protocols (IKE, JFK, IKEv2)Secure group protocols•Group Diffie-Hellman, CLIQUES, key trees and graphsAnonymity•MIX, Onion routing, Mixmaster and MixminionElectronic payments, wireless security, fair exchange, privacy…Some of these are excellenttopics for a project orthe paper-reading assignmentTheme #2: Formal Analysis MethodsFocus on special-purpose security applications•Some techniques are very different from those used in hardware verification•In all cases, the main difficulty is modeling the attackerSimple, mechanical models of the attackerNo cryptanalysis!•In this course, we’ll assume that cryptography is perfect•Search for design flaws, not cryptographic attacksWe’ll talk about the relationship between formal and cryptographic models late in the courseVariety of Tools and TechniquesExplicit finite-state checking•Mur model checker•There will be a small homework!Infinite-state symbolic model checking•SRI constraint solverProcess algebras•Applied pi-calculus• Secrecy• Authentication• AuthorizationProbabilistic model checking•PRISM probabilistic model checker• AnonymityGame-based verification•MOCHA model checker• FairnessExample: Needham-SchroederVery (in)famous example•Appeared in a 1979 paper•Goal: authentication in a network of workstations•In 1995, Gavin Lowe discovered unintended property while preparing formal analysis using FDR systemBackground: public-key cryptography•Every agent A has a key pair Ka, Ka-1•Everybody knows public key Ka and can encrypt messages to A with it (we’ll use {m}Ka notation)•Only A knows secret key Ka-1, therefore, only A can decrypt messages encrypted with KaA’s reasoning:• The only person who could know NonceA is the person who decrypted 1st message• Only B can decrypt message encrypted with Kb• Therefore, B is on the other end of the line B is authenticated! Needham-Schroeder Public-Key ProtocolA BA’s identityFresh random numbergenerated by AB’s reasoning:• The only way to learn NonceB is to decrypt 2nd message• Only A can decrypt 2nd message• Therefore, A is on the other endA is authenticated! Kb{ NonceB}Ka{ NonceA, NonceB }Kb{ A, NonceA }What Does This Protocol Achieve?A BKb{ NonceB}Ka{ NonceA, NonceB }Kb{ A, NonceA }Protocol aims to provide both authentication and secrecyAfter this the exchange, only A and B know Na and NbNa and Nb can be used to derive a shared keyB can’t decrypt this message,but he can replay itAnomaly in Needham-SchroederA B{ A, Na }KcC{ A, Na }Kb{ Na, Nc }Ka{ Na, Nc }Ka{ Nc }KbEvil agent B trickshonest A into revealingC’s private value NcC is convinced that he is talking to A![published by Lowe]Evil B pretendsthat he is ALessons of Needham-SchroederClassic man-in-the-middle attackExploits participants’ reasoning


View Full Document

UT CS 395T - Design and Analysis of Security Protocols

Documents in this Course
TERRA

TERRA

23 pages

OpenCL

OpenCL

15 pages

Byzantine

Byzantine

32 pages

Load more
Download Design and Analysis of Security Protocols
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Design and Analysis of Security Protocols and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Design and Analysis of Security Protocols 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?