• No results found

Public-Key Cryptography

N/A
N/A
Protected

Academic year: 2021

Share "Public-Key Cryptography"

Copied!
20
0
0

Loading.... (view fulltext now)

Full text

(1)

Public-Key Cryptography

• Separate keys are used for encryption and

decryption. 1 encrypt decrypt ciphertext plaintext public key private key Communication channel Sender Recipient Attacker (eavesdropping) plaintext plaintext

Public Key Distribution

• Only one key is needed for each recipient

n key pairs

private private

public public public public

(2)

Digital Certificates

certificate authority

(CA) digitally signs a

binding between an identity and the public key for that identity.

3

Passwords

• A short sequence of characters used as a

means to authenticate someone via a secret that they know.

• Userid: _________________

(3)

How a password is stored?

Password file User Butch:ASDSA 21QW3R50E ERWWER323 … … hash function Dog124

How a password is stored?

Password file User Butch:ASDSA 21QW3R50E ERWWER323 … … hash function Dog124

(4)

7

Strong Passwords

• What is a strong password

–UPPER/lower case characters –Special characters

–Numbers

• When is a password strong?

–Seattle1 –M1ke03 –P@$$w0rd –TD2k5secV

Password Complexity

• A fixed 6 symbols password: – Numbers

106 = 1,000,000

– UPPER or lower case characters 266 = 308,915,776

– UPPER and lower case characters 526 = 19,770,609,664

– 32 special characters (&, %, $, £, “, |, ^, §, etc.) 326 = 1,073,741,824

• 94 practical symbols available

– 946 = 689,869,781,056

• ASCII standard 7 bit 27 =128 symbols

(5)

9

Password Length

• 26 UPPER/lower case characters = 52 characters

• 10 numbers • 32 special characters • => 94 characters available • 5 characters: 945 = 7,339,040,224 • 6 characters: 946 = 689,869,781,056 • 7 characters: 947 = 64,847,759,419,264 • 8 characters: 948 = 6,095,689,385,410,816 • 9 characters: 949 = 572,994,802,228,616,704

Password Validity: Brute Force Test

• Password does not change for 60 days

• how many passwords should I try for each

second? –5 characters: 1,415 PW /sec –6 characters: 133,076 PW /sec –7 characters: 12,509,214 PW /sec –8 characters: 1,175,866,008 PW /sec –9 characters: 110,531,404,750 PW /sec

(6)

Secure Passwords

• A strong password includes characters from at

least three of the following groups:

• Use pass phrases eg. "I re@lly want to buy 11

Dogs!"

11

Social Engineering

Pretexting: creating a story that convinces an

administrator or operator into revealing secret information.

Baiting: offering a kind of “gift” to get a user

or agent to perform an insecure action.

Quid pro quo: offering an action or service

(7)

Section 2 : Physical Security

Digital security often begins with physical security…

13

Physical Intrusion

Hardware Attacks

Eavesdropping

Physical Interface Attacks

Section 2.2 – Locks and Keys

Digital security often begins with

(8)

Prevention of Physical Intrusion

• Any physical object that creates a barrier to

unauthorized access

• This includes: locks, latches, safes, alarms,

guards, guard dogs, doors, windows, walls, ceilings, floors, fences, door strikes, door frames and door closers

15

Is Physical Security An IT Concern?

• You have been working hard to secure your

network from cyber attacks

–Redundant layers of antivirus programs, firewalls and intrusion detection systems should protect against every possible electronic method of entry

• But what if an attacker gains access to the

server room or network wiring closet ...

(9)

Destructive vs. Nondestructive Entry

• Destructive entry

– Involves using force to defeat physical security

– Methods involve crowbars, bolt cutters and sledge hammers

– Negative impact on IT resources is apparent

– Remediation steps also obvious • Nondestructive entry

– Compromises security without leaving signs of a breach

– Defeats intrusion detection

– Greater and long-term threat

17

Compromising Locks

• For centuries, the lock has been one of the

cornerstones of physical security

– We rely on dozens of them every day to protect people and assets

• The trust most people place in locks is unwarranted – Most locks can be easily compromised with nondestructive

methods

– Sometimes within seconds and with readily available tools

(10)

Lock Picking

• Lock picking had been the exclusive art of

locksmiths, professional thieves, spies and magicians for hundreds of years

• However, with the advent of the Internet,

information about lock picking methods and tools has become readily available

–E.g., YouTube has many lock picking videos

19

Lock Picking in Movies

• Genuine lock picking in

movies used to be prohibited

• Before 1967, the Hayscode (Motion Picture Production Code) required censorship of Hollywood movies

– “All detailed (that is, imitable) depiction of crime must be removed, such as lock picking or mixing of chemicals to make explosives”

(11)

LOCK TYPES

21

Image from http://commons.wikimedia.org/wiki/File:Ancient_warded_lock_open.jpg used with permission under Gnu Free Documentation License 1.2

TSA Lock

• The U.S. government has

established a set of rules for the inspection of baggage without the presence of passengers

• Special TSA-approved locks allow both inspection and protection against theft

• An important element is that the inspection must be easily

(12)

Warded Locks

• Locks of this type were

used in ancient times

• The key moves the bolt assisted by a support spring

• Security relies on the fact that not all keys pass through the key hole

23

Skeleton

Key

• Usually in old style doors

or desks

• Different concentric

obstructions

• Easy to lock pick with Skeleton

keys

(13)

Pick vs. Bypass

Break open a lock in a nondestructive manner can be achieved either through:

•Pick: acting on the lock mechanism

simulating the operation of the key

•Bypass: manipulation of the bolt without

using the lock

25

1860: Yale Pin Tumbler Lock

• Key pins: variable length

• Driver pins: attached to

springs

• Correct key alligns key

• Modern version of the Egyptian single-pin design

• Utilizes two pins:

(14)

1. When a key is not present, the pin stacks are pushed down by the springs so that the driver (top) pins span the plug and the outer casing, preventing the plug from rotating.

2. When the correct key is inserted, the ridges of the key push up the pin stacks so that the cuts of the pin stacks are aligned with the shear line.

3. The alignment of the cuts with the shear line allows the plug to be rotated.

27

Images from http://en.wikipedia.org/wiki/File:Pin_tumbler_with_key.svg used with permission under Gnu Free Documentation License 1.2

How Does a Pin Tumbler Lock Work?

• If an inappropriate key is insered, then the pins do not align along the shear line and the lock does not turn.

(15)

LOCK PICKING

29

Photo by Dan Rosenberg included with permission.

Terminology

shell or hull pin tumbler spring sheer line cylinder or plug top or driver bottom or key driver

(16)

Lockpicking Tools

• Feelers

• Scrubbers

• Tension tools

31

Photo by Jennie Rogers included with permission.

Feeler Picking

• Apply light tension • Lift one pin at a time

– Identify binding pin

– (the one with most friction!)

• Lift binding pin until it reaches the shear line • Setting the binding pin will

rotate the lock slightly • Find next pin and repeat the

(17)

Scrubbing / Raking

• Apply light tension

• Work over pins back to front in a circular motion

– attempting to pop them into the shear line with the combination of tension

• Good for beginners

• Usually employ snake pick or half diamond

33

Photo by Jennie Rogers included with permission.

The Math of Lock Picking

• Suppose we have

– 40 different kinds of key blanks

– 7 pin positions

– 8 different possible pin heights

• Then the total number of possible locks is

– 40 x 87 = 83,886,080

(18)

Tubular lock

• Usually on car alarms or vending

machines

• 6-8 pins

• Easy to pick with special tool

• The tool could become a new key

35

Images from http://en.wikipedia.org/wiki/File:Tubular_locked.png used with permission under Gnu Free Documentation License 1.2

Statistics

• 4-6 pins, 4-10 levels

• 106 = 1,000,000 possible keys!

• The angular positions of the cylinders allow to

obtain about 180 different positions (18010)6

= 3.4012224 × 1019

• (Un) fortunately there is a need for some

(19)

Combination Locks

• There are locks that do not

require a physical key to be opened but a code

• Number of combinations is nL

– n: number of digits

– L: length of combination

37

Images from http://en.wikipedia.org/wiki/File:Combination_unlocked.png and

http://commons.wikimedia.org/wiki/File:Electronic_lock_yl88.jpg used with permission under Gnu Free Documentation License 1.2

Combination Locks

• Inexpensive combination padlocks allow attacks based on reducing the space of possible combinations to try

– The gears have a higher tolerance of the external disk combination

– Nominal number of combinations is 403 = 64,000

– Possibilities can be reduced to about

(20)

Side Channel Attacks

• Rather than attempting to directly bypass security measures, an attacker instead goes around them by exploiting other

vulnerabilities not protected by the security mechanisms.

• Side channel attacks are sometimes surprisingly simple to perform.

39 High security lock

Cheap hinges

References

Related documents

Digital signatures using public-key cryptography....

Poster presented at the 12th Biennial Conference of the Society for Community Research and Action, Montclair, NJ, USA..

In order to explain the adhesion phenomenon and biofilm formation, cell surface properties of cells grown in artificial saliva growth medium without and with subMIC concentrations

Highest percentage (56.9%) of respondents preferred to bury their placenta at home. The practice of burying human parts as a way of disposing them is common in Nigeria. In

for n which gives surprisingly accurate results 25. Figures 37 shows the densities this method gives compared with n measured with microwaves. Also shown are the values given by

Laboratorijski pokazatelji upale koji pozitivno koreliraju s ĉesticama kvalitete ţivota (SF-36) su koncentracija albumina u serumu, vrijednosti trombocita,

(A) The coordination number of each type of ion in a CsCl crystal is eight (B) A metal that crystallizes in a bcc structure has coordination number of twelve (C) A unit cell of an

nurse residency programs and their importance in the promotion of safety and quality of care by the new graduate, further studies investigating the effectiveness of nurse