Infosec K02 Merged
Infosec K02 Merged
Pengenalan
Keamanan Informasi
II3230 – Keamanan Informasi
Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung
Budi Rahardjo
2020
Course Arrangement
▪ II3230 – Keamanan Informasi
▪ 3 SKS
▪ Pengampu
▪ Yudistira Asnar ([email protected])
▪ Yusuf Kurniawan ([email protected])
▪ Moda komunikasi
▪ MS Team/Edunex
▪ Jadwal
▪ Rabu 08.00-10.00
▪ Jumat 08.00-09.00
2/22/2024 II3230 - Keamanan Informasi - Budi Rahardjo (c) 3
Definition
Information Security (ISO 27000-series 2018)
▪ Preservation of confidentiality, integrity and availability of
information
▪ Note : In addition, other properties, such as authenticity,
accountability, non-repudiation, and reliability can also be
involved.
▪ The attacks were outlined in a government briefing this morning, which stated that the hack was “not
the work of casual hackers or criminal gangs.” It’s not yet known who was behind the attack, but local
media reports that it’s believed to be state-sponsored. “This was a deliberate, targeted, and well-
planned cyberattack,” said the Singapore government.
▪ "“Perhaps they were hunting for some dark state secret”"
▪ Prime Minister Lee expanded on this in a Facebook post, saying: “I don’t know what the attackers were
hoping to find. Perhaps they were hunting for some dark state secret, or at least something to
embarrass me. If so, they would have been disappointed. My medication data is not something I would
ordinarily tell people about, but there is nothing alarming in it.” He added that whoever the hackers
were, they were “extremely skilled and determined” and had “huge resources” behind them.
https://www.theverge.com/2018/7/20/17594578/singapore-health-data-hack-sing-health-prime-minister-lee-targeted
2/22/2024 II3230 - Keamanan Informasi - Budi Rahardjo (c) 29
WannaCry Ransomware (Mei 2017)
https://en.wikipedia.org/w/index.php?curid=54032765
2/22/2024 II3230 - Keamanan Informasi - Budi Rahardjo (c) 30
DNS DDos Attack
https://www.secureworks.com/blog/dns-amplification-variation-used-in-recent-ddos-attacks-update
2/22/2024 II3230 - Keamanan Informasi - Budi Rahardjo (c) 31
Masalah di (2014)
▪ bash bug
▪ heartbleed
Crowther, K. G., & Rust, B. (2020). Built-In Cybersecurity: Insights Into Product Security
for Cyberphysical Systems at a Large Company. IEEE Security & Privacy, 18(5), 74–79.
2/22/2024 II3230 - Keamanan Informasi 39
Beberapa Sebab Masalah
Keamanan Informasi Menjadi
“Populer”
naik
Windows 95 1997 15 milion
lubang keamanan
Windows XP 2001 40 milion
Pengenalan
Keamanan Informasi
II3230 – Keamanan Informasi
Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung
Budi Rahardjo
2020
Enterprise Architecture
Organization
Procedure Application
Framework Information
Software
Infrastructure
Policy Database
Engine
Computer Network
Data Process
External
Engine
Control
Manusia (people /
personel security)
Internet - Asset
- Vulnerability
- Threat
Web Site
Users
credential, Userid,
Password, www.bank.co.id
PIN, credit card #
Internet
network
Network Network
security sniffed, flood, MiTM sniffed,
attacked
Web Site
Users application
Trojan horse security
Virus Applications
Malware (database,
Ransomware Web server)
credential, Userid, hacked
Password, www.bank.co.id OS hacked
PIN, credit card #
computer security
computer security
2/22/2024 II3230 - Keamanan Informasi – Budi Rahardjo (c) 9
Information Security Definition
Information Security (ISO 27000-series 2018)
▪ Preservation of confidentiality, integrity and availability of
information
▪ Note : In addition, other properties, such as authenticity,
accountability, non-repudiation, and reliability can also be
involved.
▪ Techniques:
▪ Hashing (MD5, SHA-1, …), Checksums (CRC…)
▪ Message Authentication Codes (MACs)
▪ Different From Confidentiality:
▪ A -> B: “The value of x is 1” (not secret)
▪ A -> M -> B: “The value of x is 10000” (BAD)
▪ A -> M -> B: “The value of y is 1” (BAD)
2/22/2024 IAS/YA/2-2022-2023 26
Integrity (integritas)
▪ Data (sistem) tidak dapat dubah oleh pihak yang tidak berhak
▪ Sebagai contoh
▪ Saldo rekening bank kita tidak boleh berubah jika tidak ada
transaksi yang sah
▪ Pilihan di pemilu (e-voting) harus dapat dipastikan tetap
sampai di pusat
▪ Untuk sistem transaksi, aspek integritas ini merupakan aspek
yang sangat penting
2/22/2024 IAS/YA/2-2022-2023 30
Authentication
▪ Meyakinkan keaslian identitas {seseorang / mesin / komputer / server /
sumber data}
▪ Masalah ketika tidak ada kontak fisik (lack of physical contact)
▪ Siapa yang mengakses layanan (internet banking)?
▪ Faktor otentikasi
▪ sesuatu yang dimiliki | what you have: kartu identitas, kunci
▪ sesuatu yang diketahui | what you know: userid (identitas), password,
PIN
▪ sesuatu yang melekat | what you are: biometric
▪ Example: Passwords
▪ Pros:
▪ Simple to implement
▪ Simple for users to understand
▪ Cons:
▪ Easy to crack (unless users choose strong
ones)
▪ Passwords are reused many times
2/22/2024 IAS/YA/2-2022-2023 35
Something you ARE
Technique Effectiveness Acceptance
▪ Biometrics Palm Scan 1 6
Iris Scan 2 1
Retinal Scan 3 7
Fingerprint 4 5
Voice Id 5 3
Facial Recognition 6 4
▪ Pros: “raises the bar” Signature Dynamics 7 2
▪ Cons: false negatives/positives, social acceptance, key management
▪ false positive: authentic user rejected
▪ false negative: impostor accepted
2/22/2024 IAS/YA/2-2022-2023 36
Multi-Authentication
▪ Two-factor Authentication: Methods can be combined (i.e. ATM card &
PIN)
▪ Who is authenticating who?
▪ Person-to-computer?
▪ Computer-to-computer?
▪ Three types (e.g. SSL):
▪ Client Authentication: server verifies client’s id
▪ Server Authentication: client verifies server’s id
▪ Mutual Authentication (Client & Server)
▪ Authenticated user is a “Principal”
▪ How about OTP?
2/22/2024 IAS/YA/2-2022-2023 37
Availability
▪ Uptime, Free Storage
▪ Ex. Dial tone availability, System downtime limit, Web server
response time
▪ Solutions:
▪ Add redundancy to remove single point of failure
▪ Impose “limits” that legitimate users can use
▪ Requirements:
▪ Secure Timestamping (OS vs. Network)
▪ Data integrity in logs & audit trails, must not be able to
change trails, or be able to detect changes to logs
▪ Otherwise attacker can cover their tracks
2/22/2024 IAS/YA/2-2022-2023 43
Non-Repudiation
▪ Undeniability of a transaction
2/22/2024 IAS/YA/2-2022-2023 44
Non-repudiation
▪ Tidak dapat menyangkal (telah melakukan sebuah transaksi)
▪ Serangan
▪ Transaksi palsu, spoofing
▪ Menghapus jejak
▪ Perlindungan
▪ message authentication code, hash function
▪ digital signature
▪ logging
B2B
Bob
PCs-R-US website
orders parts DVD-
Factory
Is DVD-Factory Secure?
2/22/2024 49
Network Information Gathering
Yudistira Asnar
[email protected]
28/02/2024 1
Full Credits
- This slides are adapted from:
28/02/2024 2
Definition of Casing the Joint
a Slang
▪ to look at a place with the intention of stealing from it later:
▪ He looked around shiftily, as if he was casing the joint.
▪ If they had been casing the joint, they'd have found that the
property was more secure than Fort Knox.
▪ I can't stand here for too long or they'll think I'm casing the
joint!
[Cambridge Dictionary]
28/02/2024 3
Objective
▪ Students can perform information gathering on a security target
▪ Students can identify the challenges of profiling
28/02/2024 4
Cyber Kill Chain
▪ Developed by Lockheed Martin
▪ https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
© https://medium.com/cycraft
28/02/2024 5
Reconnaissance and Information Gathering
▪ Purpose: To discover as much information about a target
(individual or organization) as possible without actually making
network contact with said target.
▪ Methods:
▪ Organization info discovery
▪ Google search
▪ Website browsing
▪ OSINT
28/02/2024 6
Various Types of Reconnaissance
▪ Scanning
▪ Finding some openings from the target
▪ Footprinting
▪ Collecting information about the target
▪ Profiling
▪ Analyzing the characteristics/behavior of the target
28/02/2024 7
Table Target
▪ Just an illustration
… …
28/02/2024 8
WHOIS Results for itb.ac.id
28/02/2024 9
Whois 167.205.59.96
28/02/2024 10
Whois
▪ Identify the owner of domain or IP
▪ Identify
▪ Individual
▪ Organization
Who owned and managed the Internet Resources
▪ The results might vary depends on the WHOIS server that you
asked
28/02/2024 11
Network Enumeration and Scanning
▪ Purpose: To discover existing networks owned by a target as
well as live hosts and services running on those hosts.
▪ Methods:
▪ Scanning programs that identify live hosts, open ports,
services, and other info (Nmap, autoscan)
▪ DNS Querying
▪ Route analysis (traceroute)
28/02/2024 12
NMap Results
▪ nmap -sS 127.0.0.1
▪ 1
▪ 2
▪ 3 Starting Nmap 4.01 at 2006-07-06 17:23 BST
▪ 4 Interesting ports on chaos (127.0.0.1):
▪ 5 (The 1668 ports scanned but not shown below are in state: closed)
▪ 6 PORT STATE SERVICE
▪ 7 21/tcp open ftp
▪ 8 22/tcp open ssh
▪ 9 631/tcp open ipp
▪ 10 6000/tcp open X11
▪ 11
▪ 12 Nmap finished: 1 IP address (1 host up) scanned in 0.207
▪ 13 seconds
28/02/2024 13
NMap
▪ nmap -sn 167.205.0.0/24
▪ Sending syn package to check up hosts
▪ nmap -sS 167.205.0.1 or nmap -sV 167.205.0.1 -A
▪ To fingerprint OS
▪ It can be used to scan for some vulnerability
▪ vulnscan
28/02/2024 14
A Tale of a Software System
APPLICATION
ATTACK Your security “perimeter” has huge holes
at the application layer
Application Layer
Legacy Systems
Human Resrcs
Web Services
Directories
Databases
Custom Developed
Billing
Application Code
App Server
Web Server
Network Layer
Hardened OS
Firewall
Firewall
You can’t use network layer protection (firewall, SSL, IDS, hardening)
to stop or detect application layer attacks
OWASP
28/02/2024 15
Data-data dari domain name
▪ Menggunakan whois, dig, nslookup, host, bahkan search engine
▪ Data-data server dari target (Name Server), alamat kantor,
nomor IP, MX record
▪ Komputer-komputer dan nomor Ipnya
▪ Sebagian besar dari data-data ini tersedia untuk publik (sama
dengan alamat dari sebuah perusahaan)
28/02/2024 16
Program “nslookup”
▪ Nslookup untuk mencari informasi domain
▪ Unix% nslookup ns @dns.server domain.name
▪ Zone transfer dengan nslookup
Unix% nslookup
> server 167.205.21.82
> set type=any
> ls –d Acme.net >> /tmp/zone_out
> ctrl-D
more /tmp/zone_out
28/02/2024 17
Program “host”
28/02/2024 18
Masih Tentang DNS
▪ Zone transfer harusnya dibatasi
▪ Zone transfer via web
http://us.mirror.menandmice.com/cgi-bin/DoDig
Name server:
Domain name:
Query type: Zone Transfer (AXFR)
28/02/2024 19
Routing
▪ Traceroute untuk mengetahui routing
▪ Unix
traceroute 167.205.21.82
▪ Windows
DOS> tracert 167.205.21.82
▪ Web
▪ http://visualroute.visualware.com
28/02/2024 20
http://visualroute.visualware.com
28/02/2024 21
Tabel target
▪ Mulai terisi
Fileserver.bank. 10.10.1.143 … … …
co.id
mail.bank.com 10.10.1.25 … … …
… …
28/02/2024 22
Server hidup?
▪ Ping, gping, hping
mencari host yang hidup (alive)
▪ Unix% gping 192 168 1 1 254 | fping –a
192.168.1.254 is alive
192.168.1.227 is alive
192.168.1.1 is alive
192.168.1.190 is alive
▪ Membutuhkan ICMP traffic
▪ Unix% hping 192.168.1.2 –S –p 80 -f
28/02/2024 23
Masih tentang ping
▪ Unix% nmap –sP 192.168.1.0/24
28/02/2024 24
ICMP Query
▪ Mencari informasi dengan mengirimkan paket ICMP
▪ Unix% icmpquery –t 192.168.1.1
192.168.1.1 : 11:36:19
▪ Unix% icmpquery –m 192.168.1.1
192.168.1.1 : 0xFFFFFFE0
28/02/2024 25
Tabel target
▪ Mulai terisi
Fileserver.bank. 10.10.1.143 ? … …
co.id
mail.bank.com 10.10.1.25 ya … …
… …
28/02/2024 26
Servis di Internet
▪ /etc/services
echo 7/tcp
echo 7/udp
discard 9/tcp sink null
discard 9/udp sink null
systat 11/tcp users
ftp 21/tcp
ssh 22/tcp
telnet 23/tcp
28/02/2024 27
Servis via inetd
▪ Serivis dicatat dalam berkas /etc/inetd.conf :
# contoh
# <service_name> <sock_type> <proto> <flags> <user> <server_path>
<args>
28/02/2024 28
Scanning / Probing
▪ UNIX
▪ Strobe
strobe 192.168.1.10
▪ Nmap
nmap –sS 192.168.1.1
nmap –sF 192.168.1.0/24 –oN outfile
▪ Netcat:
nc –v –z –w2 192.168.1.1 1-140
nc –u –v –z –w2 192.168.1.1 1-140
▪ udp_scan
28/02/2024 29
Scanning Tools: Windows
▪ NetScan Tools Pro 2000
▪ SuperScan
28/02/2024 30
Jenis Scan
28/02/2024 31
Deteksi Scanning
▪ Syslog, icmplog
▪ root# tail /var/log/syslog
May 16 15:40:42 epson tcplogd: "Syn probe"
notebook[192.168.1.4]:[8422]>epson[192.168.1.2]:[635]
May 16 15:40:42 epson tcplogd: "Syn probe"
notebook[192.168.1.4]:[8423]>epson[192.168.1.2]:ssl-ldap
May 16 15:40:42 epson tcplogd: "Syn probe"
notebook[192.168.1.4]:[8426]>epson[192.168.1.2]:[637]
May 16 15:40:42 epson tcplogd: "Syn probe"
notebook[192.168.1.4]:[8429]>epson[192.168.1.2
28/02/2024 32
Penangkal Scanning
▪ Langsung melakukan pemblokiran
▪ access control list (/etc/hosts.deny)
▪ mengubah routing table (drop)
▪ mengubah rule dari firewall
▪ Contoh software: portsentry
28/02/2024 33
Tabel target
▪ Mulai terisi
… …
28/02/2024 34
OS Fingerprinting
▪ Menentukan jenis OS dengan melihat implementasi TCP/IP
stack
▪ Queso
▪ Nmap
nmap –O 192.168.1.1
▪ ICMP
▪ X (passive OS detection)
28/02/2024 35
Application fingerprinting
▪ Banner grabbing: dari aplikasi (misal SMTP)
telnet server.name 25
▪ echo -e "GET /index.html HTTP/1.0\n\n" | nc 192.168.1.3 80 |
less
28/02/2024 36
Deteksi melalui SNMP
▪ indocisc% snmpget 192.168.0.1 public system.sysDescr.0
system.sysDescr.0 = Linux agumon 2.4.18 #1 SMP Web Apr
24 04:33:13 WIT 2002 i686
▪ Syntax: snmpwalk target community oid
▪ indocisc% snmpwalk 192.168.0.1 public system
indocisc% snmpwalk 192.168.0.1 public
interfaces.ifTable.ifEntry.ifDescr
interfaces.ifTable.ifEntry.ifDescr.1 = lo
interfaces.ifTable.ifEntry.ifDescr.2 = eth0
28/02/2024 37
Enumerasi di sistem Windows
▪ C:\WINDOWS> net view
\\KOMPUTERKU Pentium III
C:\WINDOWS> net view \\komputerku
Sharename Type Comment
-------------------------
C Disk
▪ C:\WINDOWS> nbtstat –a 192.168.1.1
▪ C:\WINDOWS> nbtscan 192.168.1.0/24
28/02/2024 38
Langkah Selanjutnya?
▪ Memenuhi “tabel” target data-data
Nama No IP Alive OS Services
www.bank.com 10.10… ya Win NT SP 6 http
xyz. 10.10.10.1 Ya Win 2000, NetBIOS, ftp, http (IIS)
SP3
mail.bank.com SMTP
▪ Melakukan searching untuk membandingkan target dengan daftar eksploitasi. Atau
melakukan vulnerabiliy mapping
▪ Selanjutnya: initial access (mulai masuk)
▪ Issues
▪ Security policy. Apakah scanning termasuk hal yang illegal? Di beberapa tempat:
ya
28/02/2024 39
Cryptography
Yudistira Asnar
[email protected]
Adapted From
Keamanan Informasi
Pengantar Kriptografi
Ir. Budi Rahardjo, M. Sc., Ph.D
http://www.spectrum.ieee.org/print/5280/
http://en.wikibooks.org/wiki/Cryptography:Transposition_ciphers
http://www.ccisource.com/content/resources/articles/Jan01/symmetric.htm
BUDI = exgl
Tabel dapat digeser n huruf ke kiri
atau ke kanan. n dan arah menjadi kunci
▪ Monoalphabetical cipher, satu huruf selalu digantikan
oleh huruf yang sama
Dalam contoh di atas, huruf “B” selalu menjadi “e”
2021 BUDI RAHARDJO - PENGANTAR KRIPTOGRAFI 20
Pemecahan Caesar Cipher
▪ Al Kindi menggunakan statistik untuk memecahkan
Caesar Cipher
▪ Cari huruf yang paling sering muncul dalam ciphertext
dan luruskan (align) dengan huruf yang paling sering
muncul dalam plaintext
▪ Huruf apa yang sering muncul dalam
▪ Bahasa Inggris
▪ Bahasa Indonesia
▪ Bahasa Daerah lainnya?
2021 BUDI RAHARDJO - PENGANTAR KRIPTOGRAFI 21
ROT13
▪ Menggeser huruf sebanyak 13 huruf
▪ Karena jumlah huruf ada 26, maka algoritma (geser13)
bisa digunakan untuk enkripsi dan dekripsi
▪ Lihat situs http://www.rot13.com
▪ Dapat digunakan untuk tebak-tebakan
Jawaban:
Xnynh unaqcubar, abxvn. Xnynh zbalr, ah xvrh
d e f g h i j k l m n o p q r s t u v w x y z a b c
g h i j k l m n o p q r s t u v w x y z a b c d e f
m n o p q r s t u v w x y z a b c d e f g h i j k l
http://www.xat.nl/enigma-e/desc/index.htm
3/8/2024 29
Crypto Component (2)
▪ Initialization Vector – Random values used with ciphers to
ensure no patterns are created during encryption
▪ Cryptosystem – The combination of algorithm, key, and key
management functions used to perform cryptographic
operations
3/8/2024 30
Cryptography
▪ Encryption algorithm also called a cipher
▪ Cryptography has evolved so that modern encryption and
decryption use secret keys
▪ Cryptographic algorithms can be openly published
▪ Only have to protect the keys
plaintext ciphertext plaintext
Encryption Decryption
Key KA Key KB
3/8/2024 31
Cryptography
▪ Symmetric Cryptography
▪ KA and KB is the same
▪ ! Key distribution problem
▪ Asymmetric Cryptography
▪ KA and KB is different
plaintext ciphertext plaintext
Encryption Decryption
Key KA Key KB
Cryptography
▪ Hybrid
▪ Combines strengths of both methods
▪ Asymmetric distributes symmetric key
▪ Also known as a session key
▪ Symmetric provides bulk encryption
▪ Example:
▪ SSL negotiates a hybrid method
Public key cryptography
+ Bob’s public
K
B key
- Bob’s private
K
B key
3/8/2024 IAS/YA/2-2020-2021 34
Illustration
▪ Public Key
▪ Motivation
▪ Key Proliferation – adding 1 user need in n user system
requires 5 key generation
▪ Schema
▪ P = D(kPRIV, E(kPUB, P))
▪ P = D(kPUB, E(kPRIV, P)
▪ Example
▪ RSA, DSA
3/8/2024 IAS/YA/2-2020-2021 35
Symmetric vs Asymmetric Cryptography
Symmetric vs Asymmetric Cryptography
Symmetric Asymmetric
▪ DES
▪ Modes: ECB, CBC, CFB, OFB, CM
▪ RSA
▪ 3DES ▪ DES
▪ AES
▪ IDEA ▪ Deffie Helman
▪ Blowfish
▪ RC4
▪ Elliptic Curve Cryptography
▪ RC5
▪ CAST
▪ SAFER
▪ Twofish
Penggunaan Kripto Kunci Publik
▪ Secure Socket Layer (SSL)
▪ HTTPS
▪ SSH
▪ STUNNEL
▪ Pretty Good Privacy (PGP) dan GNU Privacy Guard
(GPG)
Versi
Nomor Seri Sertifikat
Signature Algorithm Identifier (untuk signature dari CA)
Nama X.500 dari CA
Digital
Perioda validitas (mulai dan berakhirnya) Signature
Nama X.500 dari Subjek Sertifikat dibuat
dengan
Informasi Kunci Publik milik Subjek
menggunakan
Agoritma yang digunakan kunci
privat CA
Isi Kunci Publik
4
Kunci simteris disepakati
3/8/2024 IAS/YA 46
SSL/TLS Protection
▪ Certificate
▪ Proof/Credential about what/who you are
▪ Require
▪ Structure/Hierarchy
▪ Infrastructure
3/8/2024 IAS/YA 47
Message Digest
▪ Menghasilkan rangkuman (summary, digest) dari
sebuah pesan (file, stream data)
▪ Menggunakan hash function untuk menghasilkan digest
tersebut
large
H: Hash
message
Function
m
H(m)
Kiriman Kiriman
datang datang
Senin Senin
pagi pagi
ohx76@#
hash af005c0810eeca2d5
Enkripsi (dg kunci privat pengirim)
ohx76@#
sama?
dekripsi
ohx76@# af005c0810eeca2d5
3/8/2024 IAS/YA/2-2020-2021 58
Permasalahan Hash
▪ Ini sudah dibuktikan dengan pecahnya MD5 dan SHA-1
▪ http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
▪ MD5 (1992) merupakan penyempurnaan dari MD4 (1990)
▪ SHA merupakan buatan NSA (1993) yang mirip dengan MD5
▪ http://shattered.it
▪ Meskipun dua data yang dipetakan itu tidak mudah dibuat dan
kadang-kadang completely useless
▪ Pernyataan di atas sudah tidak tepat untuk pemecahan SHA-1
3/8/2024 IAS/YA/2-2020-2021 62
Hash-based MAC
▪ Popular MAC standard
▪ Addresses some subtle security flaws
3/8/2024 IAS/YA/2-2020-2021 63
Hash-based Message Authentication Code (HMAC)
s
s = shared secret
message
s
message
message
H( )
H( ) compare
▪ Authenticates sender
▪ Verifies message integrity
▪ No encryption !
▪ Also called “keyed hash”
▪ Notation: MDm = H(s||m) ; send m||MDm
3/8/2024 IAS/YA/2-2020-2021 64
End-point authentication
▪ Want to be sure of the originator of the message – end-point
authentication.
▪ Assuming Alice and Bob have a shared secret, will MAC provide
message authentication.
▪ We do know that Alice created the message.
▪ But did she send it?
3/8/2024 IAS/YA/2-2020-2021 65
Playback/Replay Attack
MAC =
f(msg,s) Transfer $1M
from Bill to Trudy MAC
3/8/2024 IAS/YA/2-2020-2021 66
Defending against playback attack: nonce
“I am Alice”
R
MAC =
f(msg,s,R) Transfer $1M
from Bill to Susan MAC
3/8/2024 IAS/YA/2-2020-2021 67
Digital Signature
▪ Hash of message encrypted with private key
▪ Digital Signature Standard (DSS)
▪ DSA/RSA/ECD-SA plus SHA
▪ DSS provides
▪ Sender authentication
▪ Verification of message integrity
▪ Nonrepudiation
3/8/2024 IAS/YA/2-2020-2021 68
Digital Signature
▪ It must be unforgeable. If person P signs message M with signature S(P,M), it is
impossible for anyone else to produce the pair [M, S(P,M)].
▪ It must be authentic. If a person R receives the pair [M, S(P,M)], R can check that the
signature is really from P. Only P could have created this signature, and the signature
is firmly attached to M.
▪ It is not alterable. After being transmitted, M cannot be changed by S, P, or an
interceptor.
▪ It is not reusable. A previous message
presented again will be instantly detected by R.
3/8/2024 IAS/YA/2-2020-2021 69
Digital Signature
▪ Cryptographic technique analogous to hand-written signatures.
▪ sender (Bob) digitally signs document, establishing he is
document owner/creator.
▪ Goal is similar to that of a MAC, except now use public-key
cryptography
▪ verifiable, nonforgeable: recipient (Alice) can prove to someone
that Bob, and no one else (including Alice), must have signed
document
3/8/2024 IAS/YA/2-2020-2021 70
Digital Signature
Simple digital signature for message m:
▪ Bob signs m-by encrypting with his private
- key KB, creating
“signed” message, KB(m)
-
Bob’s message, m KB Bob’s private -
KB(m) = s
key
Dear Alice
Bob’s message,
Oh, how I have missed Public key
you. I think of you all the
m, signed
time! …(blah blah blah) encryption (encrypted) with
algorithm his private key
Bob
Dear Alice
Oh, how I have missed you. I think of
you all the time! …(blah blah blah) s
Bob
3/8/2024 IAS/YA/2-2020-2021 71
Digital Signature = signed message digest
Alice verifies signature and integrity
Bob sends digitally signed
of digitally signed message:
message:
large
message H: Hash encrypted
m function H(m)
msg digest
-
KB(H(m))
Bob’s digital large
private signature message
- m Bob’s digital
key KB (encrypt)
public
+ signature
key KB
encrypted H: Hash (decrypt)
msg digest function
-
+ KB(H(m))
H(m) H(m)
equal
?
72
E-mail Security Protocols
▪ Privacy Enhanced Email (PEM)
▪ Pretty Good Privacy (PGP)
▪ Based on a distributed trust model
▪ Each user generates a key pair
▪ S/MIME
▪ Requires public key infrastructure
▪ Supported by most e-mail clients
3/8/2024 IAS/YA/2-2020-2021 73
Attributes of Strong Encryption
▪ Confusion
▪ Change key values each round
▪ Performed through substitution
▪ Complicates plaintext/key relationship
▪ Diffusion
▪ Change location of plaintext in ciphertext
▪ Done through transposition
3/8/2024 IAS/YA/2-2020-2021 74
Masalah Seputar Kripto
▪ Memastikan keamanan algoritma enkripsi
▪ Algoritma harus dievaluasi oleh pakar
▪ Algoritma yang tertutup (tidak dibuka kepada publik)
dianggap tidak aman
▪ Membuat algoritma yang aman tidak mudah
▪ Code maker vs code breakers akan terus berlangsung
3/8/2024 IAS/YA/2-2020-2021 76
Cryptanalysis
▪ Kerckhoff’s Principle
▪ The only secrecy involved with a cryptosystem should be the
key
▪ Cryptosystem Strength
▪ How hard is it to determine the secret associated with the
system?
3/8/2024 IAS/YA/2-2020-2021 77
Cryptanalysis Attacks
▪ Brute force
▪ Trying all key values in the keyspace
▪ Frequency Analysis
▪ Guess values based on frequency of occurrence
▪ Dictionary Attack
▪ Find plaintext based on common words
3/8/2024 IAS/YA/2-2020-2021 78
Cryptanalysis Attacks
▪ Replay Attack
▪ Repeating previous known values
▪ Factoring Attacks
▪ Find keys through prime factorization
▪ Ciphertext-Only
▪ Known Plaintext
▪ Format or content of plaintext available
3/8/2024 IAS/YA/2-2020-2021 79
Cryptanalysis Attacks
▪ Chosen Plaintext
▪ Attack can encrypt chosen plaintext
▪ Chosen Ciphertext
▪ Decrypt known ciphertext to discover key
▪ Differential Power Analysis
▪ Side Channel Attack
▪ Identify algorithm and key length
3/8/2024 IAS/YA/2-2020-2021 80
Cryptanalysis Attacks
▪ Social Engineering
▪ Humans are the weakest link
▪ RNG Attack
▪ Predict IV used by an algorithm
▪ Temporary Files
▪ May contain plaintext
3/8/2024 IAS/YA/2-2020-2021 81
Bahan Bacaan
▪ Simon Singh, "Code Book: the secret history of codes & code-breaking," Fourth Estate,
1999.
▪ Bruce Schneier, "Applied Cryptography: protocols, algorithms, and source code in C,"
2nd edition, John Wiley & Sons, Inc., 1996.
▪ Steven Levy, "crypto: how the code rebels beat the government - saving privacy in the
digital age," penguin books, 2001
▪ Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied
Cryptography”
http://www.cacr.math.uwaterloo.ca/hac/
▪ Cryptography Research Crypto FAQ:
http://www.cryptography.com/faq/index.html
▪ Basic Cryptanalysis
http://www.umich.edu/~umich/fm-34-40-2/
previous hash
34d5853c02351999525194d0c9a69345 41cff38a782117a21817cd493f1958ff
34d5853c02351999525194d0c9a69345 41cff38a782117a21817cd493f1958ff
Paper Contract
Cory agrees to pay $20K for the
car. Once Claire gets the deposit,
she will transfer the vehicle
ownership to Cory by handling him
over the car documents and the
car.
Signature
▪ Private blockchains tend to be smaller and do not utilize a token or cryptocurrency. Their
membership is closely controlled. These types of blockchains are
favored by consortiums that have trusted members and trade confidential
information.
▪ ---
▪ Permissioned blockchains control roles that individuals can play within the network. They’re
still large and distributed systems that use a native token. Their core code may or may not be
open source.
38
Crypto Currency
▪ Cryptocurrency
A special kind of digital currency. The most popular Cryptocurrency
is Bitcoin.
Asset tracking Loyalty tracking Claims management Bond Issuance Licensing and ID Personalized
medicine
Real time auction for Product provenance MBS/Property Trade Finance Benefit distribution
supplier contracts Payments Records sharing
Logistics Loan Syndication Aid tracking
Supply chain management Fraud detection Compliance
transparency Post Trade Military security
Automated Settlement
underwriting
Cross Border
Payments
Land title registry Details and historic records related to real estate and property transactions.
Supply chain management, inventorying Tracking an asset from its creation, transportation, purchase, and inventorying.
Benefits, entitlements, and aid Social security, medical benefits payments, domestic and international aid.
Anticipatory/automated payments could be automated through Smart Contracts.
Contract and vendor management Tracking and paying vendors, managing purchase commitments and transactions,
and monitoring schedule performance. Can allow for perfect transparency of
government expenditures.
Voting Enabling new methods of digital voting, ensuring eligibility, accurate counting, and
auditing (e.g., to avoid ballot-rigging).
Streamlining interagency processes Blockchains and smart contracts can automate transaction handling and improve
information sharing – allows each agency to better focus on their own mission and
tech without as much need to consider others tech.
Potential Use Cases
▪ Solution:
▪ Vehicle Wallet is a partnership between payment service provider and the Danish Tax
Administration. It is a supply chain management tool where data concerning the car is saved
in one distributed ledger and creates one agreed and shared record of the vehicle history as it
is transferred across the supply chain. This reduces risks for buyers and sellers, and helps
ensure Denmark receives all proper taxes.
Example 2: BenBen (Ghana)
▪ Problem:
▪ For land property, Ghana lacked a systemic way to determining the legal existence of parcels
and to track land ownership titles. This prevented authorities and property owners from having
clear certainty and visibility over what belongs to whom, resulting in regular disputes. In
addition, because previous processes were on paper, it could take over a year to register the
sale/purchase of a property, which was a fraud risk for both sellers and buyers.
▪ Solution:
▪ BenBen provides an Ethereum-run digital register system of all land registries across Ghana. It
is able to certify land information through the cross-cutting of satellite imagery and on-the-
ground verifications, working hand-in-hand with local stakeholders in the land market. It
aggregates all the information such that financial institutions and the Lands Commission have
real-time access to the data. Property transaction times have been reduced by 75% and court
disputes have been reduced.
▪ Solution:
▪ MAS partnered with R3– a consortium of banks and regulators to create a
prototype for a Blockchain-based digital Singaporean dollar to facilitate digital
transactions. This would allow for incorruptibility of records through a
decentralised trust system, but also 24 hour processing with no centralised – i.e.
human-based – checks required. The partnership has successfully developed
software prototypes of three different models for decentralised inter-bank
payment that are now being explored. MAS has published the source code as open
source software on GitHub.
Exploring how payments can be instantaneously swapped by Verifying customer identity by creating a permissioned blockchain to
incorporating blockchain into virtual trade settlements comply with Know Your Customer (KYC) requirements
Building a business network for global certification system that Exploring blockchain to transform logistics value and IoT through
tracks life span of diamonds, art and luxury goods tracing cargo
Developing application for securities lending using blockchain to PoC to reduce post-trade settlements by automating the end-to-end
securely trade and transfer assets multi party interactions from execution to settlement on the
blockchain
64 20/11/2019 Yudis - Trend on Blockchain
22/03/2024 Yudistira Asnar @ Blockchain 65
Common issues in having Production-scale
Blockchain
Keamanan Email
Ir. Budi Rahardjo, M. Sc., Ph. D
MUA MUA
SMTP
internet
POP MTA MTA
IMAP
▪ Header
Seperti amplop dalam email konvensional
Berisi informasi tentang alamat pengirim dan yang dituju
▪ Body
Isi dari surat
Dipisahkan dari header dengan sebuah baris kosong
-- budi
--
To: [email protected]
From: [email protected]
Subject: email palsu
nih palsu
.
• Eye-catching or attention-grabbing offers designed to attract people’s attention immediately. For instance, a
claim that you have won an iPhone, a lottery, or some other prize.
Sense of Urgency
• Act fast because the super deals are only for a limited time.
• Your account will be suspended unless you update your personal details immediately.
Hyperlinks
Attachments
• An attacker calls their target and uses an automated recording designed to generate
fear. The recording will ask the target to call a number to resolve the issue.
• An attacker tries to trick you into giving them your private information by sending you
a text message.
#! /usr/bin/perl
#
for ($i=0; $i < 10 ; $i++) {
system(“/usr/sbin/sendmail
[email protected] < junkmail.txt”);
}