Lecture 14: 30th October 2019 Flashcards Preview

CS4203 Computer Security > Lecture 14: 30th October 2019 > Flashcards

Flashcards in Lecture 14: 30th October 2019 Deck (31)
Loading flashcards...
1

What is key exchange?

Methods by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

2

What is PKI?

PKI = Public Key Infrastructure = A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption to aid trusted communication by verifying the authenticity, integrity, and configuration of messages.

3

How does key exchange work?

Alice asks Cathy to talk to Bob and uses a nonce. Cathy replies with a packet for Bob introducing Alice to Bob. Cathy then passes messages with Alice contacting Bob and Bob replying with a nonce.

4

What is Needham-Schroeder?

A protocol that uses PKI to exchange cryptographic keys on an insecure network.

5

How does Needham-Schroeder key exchange work?

A wants to talk to B and C is a TTP (server).

1. A ->C: A, B, NA; NA is a nonce, a number used once, e.g. clock time.

2. C->A: {NA, B, KAB, {KAB, A}KBC }KAC; KAB = key for A to use with B, KAC = key for A to use with C, A = identity of A, B = identity of B

3. A->B: {KAB, A}KBC: KBC is key for B to use with C, given by C

4. B->A: {NB}KAB: challenge response - use a ley and expect a nonce back to verify you can exchange data

5. A->B: {NB-1}KAB: respond to the above challenge; note -1 is just a known operation in the protocol. After B verifies the response, secure comms and trust has been established between A and B via the TTP C.

6

What is a network session?

A temporary series of interactions and information exchanges between two or more communicating devices, or between a computer and user, during a single connection.

7

What is a nonce?

"number only once": random number used to identify a communications exchange and establish secure communications; ~ a session key

8

How and why are nonces used in Needham-Schroeder key exchange?

They are given by the opening host because they mitigate replay attacks in which people pretend to be a TTP.

9

What are the limitations of Needham-Schroeder key exchange?

Alice may stockpile keys for communication with various people. Cathy has no way to revoke those keys. If KAC is compromised, the attacker can obtain more keys or authority. Cathy must keep records of all keys issued.

Malicious attackers can be in the middle of the opening host and TTP, and then pose as the other host trying to be contacted. They return the response from the TTP as if the opening host was trying to contact them before or instead of the one to contact the other host they actually want to.

10

How can you authenticate users and control access in distributed systems?

With a user identity, user network address, or an access operation

11

What is a LSA?

LSA = Local Security Authority = A Microsoft Windows protected subsystem that is part of the Windows Client Authentication Architecture which authenticates users and creates logon session to the local computer.

12

Why are LSAs used over password prompts in modern systems?

They are more secure.

13

Why do modern protocols use asymetric encryption over Needham-Schroeder?

They are more secure. There are many issues: aliveness, freshness, replay, message integrity, hijacking (MITM), header and body encryption, cipher suites, strength, old standards.

14

What is Kerberos?

The distributed Access Control system which was the default option in Windows 2000.

15

What are the types of TTPs in Kerberos?

Kerberos has 2 types of TTP: authentication servers to which users log on and ticket granting servers that issues time-limited tickets for access to resources

16

What are ticket granting servers?

Specialised computers that issue time-restricted tokens granting users access to resources.

17

What are some general issues with asymetric key cryptography?

There are many issues: aliveness, freshness, replay, message integrity, hijacking (MITM), header and body encryption, cipher suites, strength, standards.

18

What are authentication servers?

A computer running applications which verify the identities of users before they are allowed to access resources in a session.

19

How does ticket granting work in Kerberos?

The protocol for ticket granting is a variant of Needham-Schroeder:

Alice logs onto server Sam using a password and requests resource B:

1. A ->S: A, B

The client software in her PC fetches a ticket encrypted under her password and which contains the key KAS. For access to resource B, the ticket KAB with timestamp TS and lifetime L is given.

2. S->A: {TS, L, KAB, B, {TS, L, KAB, A}KBS }KAS

Alice gets a copy of the ticket to read encrypted under KAS. She verifies the ticket by sending the timestamp TA to B which confirms its liveness by sending back the timestamp incremented by 1.

3. A->B: {TS, L, KAB , A}KBS , {A, TA}KAB

4. B->A: {TA + 1}KAB

20

Why were nonces replaced with timestamps in Needham-Schroeder?

The random nonce of the Needham-Shroeder are replaced by timestamps to ensure freshness and aliveness.

21

What are some problems with timestamps and time synchronisation that may explain why they weren't included in Needham-Schroeder?

time zones giving different timestamps, timeouts, clock mismatches, and clocks changing every time

22

What is DSSA?

DSSA = Distributed System Security Architecture = a computer security architecture that provides a suite of functions including login, authentication, and access control in a distributed system. The architecture covers user and system authentication, mandatory and discretionary security, secure initialization and loading, and delegation in a general-purpose computing environment of heterogeneous systems where there are no central authorities, no global trust, and no central controls.

23

What is DSSA/SPX?

DSSA/SPX is the authentication protocol of DSSA.

24

What is DASS?

DASS = Distributed Authentication Security Service = the name DSSA/SPX was adopted under.

25

What is GSS-API?

An application programming interface for programs to access security services. For a distributed system the service layer is the most appropriate location for security enforcement.

26

What is CORBA?

CORBA = Common Object Request Broker Architecture = a standard defined by the Object Management Group designed to facilitate the communication of heterogeneous systems.

27

What is ORB?

ORB = Object Request Broker = a middleware which allows program calls to be made from one computer to another via a computer network, providing location transparency through remote procedure calls. It handles interactions between users and objects, and objects themselves. The ORB library contains object services such as naming, concurrency, querying, trading etc.

28

What is RADIUS protocol?

A networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. It carries information related to authentication, authorization, and configuration between a Network Access Server that desires to authenticate its links and a shared Authentication Server.

29

What are some issues with complex exchange mechanisms?

issues with key handling; freshness; CA vulnerabilities; etc.

30

What is a CDC?

CDC = Certificate Distribution Centre = The CDC is a certificate granting server within DSSA/SPX. Certificates are tickets signed by CA which contains the public key of the party being certified. Since the CDC is merely distributing previously signed certificates, it is not necessary for it to be trusted.