Perfect Forward Secrecy: - Consider This "Issue"
Perfect Forward Secrecy: - Consider This "Issue"
Part 3 ¾ Protocols
36
Naïve Session Key Protocol
E(KS, K)
E(messages, KS)
Alice, K Bob, K
Bob, b
Bob, b
Perfect Forward Secrecy
E(ga mod p, K)
E(gb mod p, K)
Alice: K, a Bob: K, b
Part 3 ¾ Protocols
40
But … Diffie-Hellman is subject to man-in-the-middle
attack, isn’t it?
Alice Bob
Part 3 ¾ Protocols
43
Public Key Authentication with
Timestamp T
“I’m Alice”, {[T, K]Alice}Bob
Alice Bob
Public Key Authentication with
Timestamp T
“I’m Alice”, {[T, K]Alice}Bob
{[T, K]Bob}Alice
Alice Bob
Part 3 ¾ Protocols
45
Public Key Authentication with
Timestamp T
“I’m Alice”, [{T, K}Bob]Alice
[{T, K}Alice]Bob
Alice Bob
[{T, K}Trudy]Bob
Trudy Bob
Part 3 ¾ Protocols
47
Public Key Authentication with
Timestamp T
[{T}Alice]Bob
Alice Bob
Part 3 ¾ Protocols
48
Real-World Protocols
• Some real secure protocols
• SSH ¾ relatively simple & useful protocol
• Mutual authentication, session key and PFS
• SSL ¾ practical security on the Web
• IPSec ¾ security at the IP layer
• GSM ¾ mobile phone (in)security
Secure Shell (SSH)
Part 3 ¾ Protocols
50
SSH
• Creates a “secure tunnel”
• Insecure command sent thru SSH “tunnel” are then
secure
• SSH is a relatively simple protocol
Part 3 ¾ Protocols
51
SSH
• SSH authentication can be based on:
• Public keys, or
• Digital certificates, or
• Passwords
• Here, we consider certificate mode
• We consider slightly simplified SSH…
Part 3 ¾ Protocols
52
Simplified SSH
Alice, CP, RA
CS, RB
ga mod p
gb mod p, certificateB, SB
RB RB
ga mod p gt mod p
Part 3 ¾ Protocols
54
Secure Socket Layer
Part 3 ¾ Protocols
55
Socket layer
• “Socket layer”
lives between Socket application
User
application and “layer”
transport layers transport
OS
• SSL usually
network
between HTTP
and TCP
link
NIC
physical
Part 3 ¾ Protocols
56
What is SSL?
• SSL is the protocol used for majority of secure
Internet transactions today
• For example, if you want to buy a book at
amazon.com…
• You want to be sure you are dealing with Amazon
(authentication)
• Your credit card information must be protected in
transit (confidentiality and/or integrity)
• No mutual authentication.
• Use password, instead.
Simplified SSL Protocol
Can we talk?, cipher list, RA
certificate, cipher, RB
{S}Bob, E(h(msgs,CLNT,K),K)
h(msgs,SRVR,K)