40
The Role of Cryptography in Cyberscurity International Colloquium on ICT 19 November 2014, Brussels

The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

  • Upload
    hatu

  • View
    213

  • Download
    1

Embed Size (px)

Citation preview

Page 1: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

The Role of Cryptography

in Cyberscurity

International Colloquium on ICT

19 November 2014, Brussels

Page 2: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Cybersecurity

Page 3: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Cyberspace

Page 4: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Cyberspace is becoming the real space

Page 5: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Hackers of the 1980’s, 1990’s

Page 6: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Advanced Persistent Threats of 2010’s

Page 7: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Communications security

• Basic Internet protocols do not have adequate security

o TCP/IP

o DNS

• Reluctance to modify successful protocols

• In theory, however, these problems can be solved

Page 8: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Computer security

• Data at rest

o Database security

o OS security

• Secure execution

o basic PC components do not have adequate security

o Sandboxing

o Correctness of execution

Difficult problems, even in theory

Page 9: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Data confidentiality

Alice Bob

Eve

Page 10: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Entity authentication

BobEve

Hello,

I am Alice

Page 11: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Data authentication

Page 12: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Nonrepudiation (origin)

Alice

Page 13: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Nonrepudiation (receipt)

Page 14: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Denial of service

Page 15: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Cryptography: the setup

E D#!C& #!C&

Page 16: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Kerckhoffs’ principle

A cryptosystem should be secure, even if everything about

the system, except the key, is public knowledge

Page 17: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Perfect secrecy: One Time Pad

• Red telephones

• Fresh random symbol

added to each data symbol

• Problems:

• Production of random

symbols

• Transport

Page 18: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Non-perfect security

Short key

Random-like

sequence

Expansion

01100011…

01100

(to replace true

randomness)

Page 19: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Conventional cryptography

• Partners share a short secret key

• Public algorithms provide confidentiality, authentication

• Military and government applications

• Communication points are known and fixed

• What if this is not the case?

o E.g. commercial environments

Page 20: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Limitation of symmetric cryptology

• Reduce security of information to security of keys

• But: how to establish these secret keys?

o cumbersome and expensive

o or risky: all keys in 1 place

• Do we really need to establish secret keys?

Page 21: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Shamir’s 3-pass protocol

Page 22: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Asymmetric cryptography

Page 23: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Asymmetric mathematics

• “Easy problem”: find integer numbers x, k satisfying

• “Difficult problem”: find integer numbers y, l satisfying

• Discrete logarithm problem

o Computationally infeasible when prime number > 10600

17483

= x + k × 23497

17y

= 811+ l × 23497

Page 24: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Diffie-Hellman key agreement protocol

Alice and Bob agree on large prime number and on base z

Alice generates a,

computes A = za

Bob generates b,

computes B = zb

Alice computes Ka = Ba Bob computes Kb = Ab

Ka = Ba = zba = zab = Ab = Kb

A

B

• Alice and Bob compute the same

key!

• Eve sees only A, B

Page 25: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Asymmetric encryption: the principle

• Store A, B, … in a public database

• When sending message to user:

1. Generate random x

2. Obtain U from public database and compute Ku = Ux

3. Encrypt message with symmetric cryptography using Ku

4. Transmit encrypted message and X = zx

• User computes Xu = Ku and decrypts message

Page 26: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Asymmetric encryption: the application

• Everyone can encrypt messages

• Only one person can decrypt

o Using the private key

• We don’t need to transmit or share secret keys

• We only need to share public keys

• Public-key cryptography

Page 27: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Asymmetric encryption: caveat

• How can we be sure that A is indeed the public key of

Alice?

• How can we be sure that any digital document is not

forged or modified?

o Data authentication

Page 28: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Data authentication

• Can’t attach a scan of hand-written signature

• Electronic signature should be different for every new

document

o Only way to avoid cut-and-paste

• Desired properties?:

o Only one person can create signature

o Everyone can verify the signature

• Sounds familiarly asymmetric?

Page 29: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Digital signature

“Asymmetric encryption backwards”

• In order to sign message m:

o Use private key to “decrypt” message m

o Output = signature s

• In order to verify signature s on message m

o Use public key to “encrypt” s and check if m reappears

• (Details may vary)

Page 30: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Electronic signatures

The law distinguishes:

1. Electronic signatures

o Basically, anything that is electronic

2. Advanced electronic signatures

o Should use asymmetric cryptography

3. Qualified electronic signatures

o Should use asymmetric cryptography

o “Hardware” must guarantee that private key remains

private

Page 31: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Guarantee correctness of signature

Page 32: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Guarantee correctness of public key

• Put the public key in a file, together with information

allowing to uniquely identify the owner

• Place an electronic signature on the file

Mr. Jan Peeters of

Peeters Book shop

Has public key 12A5678.

Signed,

Yvo Bros

Some official

Page 33: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Certificate chain

Now we only need to guarantee the correctness of the key

that was used to sign the certificate ;-)

Peeters Book Shop

Clark at the city hall

Home office

Page 34: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Public Key Infrastructure (PKI)

Page 35: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Root key

• Endpoint of the chain must be authenticated by different

means

• Easy in closed environments

o Root key is initialized during set-up

• Difficult in open environments

o No clear hierarchy

o Root keys “trusted” by the browser, the OS, …

Page 36: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Applications of cryptography

• Authenticity of software updates, of web sites (https),

DNSsec, IPsec, …

o Digital signatures

• Strengthening of password-based mechanisms

o Diffie-Hellman techniques

• Trusted computing & Remote attestation

o Digital signatures with extra properties

Page 37: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Cryptography complicates

• Packet-filter firewalls

o Because the packets are encrypted

• Recovery of data when people leave the organization or

forget their password

• Law-enforcement access

• Tuning

Page 38: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Most common cryptography problem

• Cryptography decreases processing speed

o Often not in a significant way!

• Changing standard cryptographic mechanisms in order to

improve performance is usually a BAD IDEA

o WEP (IEEE 802.11)

o Debian (Linux) key generator

o …

Page 39: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Cryptographic protection works only if …

• Software vendor, website owner, … update timely their

cryptographic algorithms

o Some industry code is not upgradable

• People don’t install software without valid electronic

signature

o Cf. phishing emails

• No false root keys have been installed

Page 40: The Role of Cryptography in Cyberscurity - · PDF file · 2014-12-01The Role of Cryptography in Cyberscurity ... • Basic Internet protocols do not have adequate security o TCP/IP

Conclusion

�Communication security in closed environment

�Open environment

�Computer security

� “Fool-proof”