CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf ·...

75
Security Handshake Pitfalls CNT4406/5412 Network Security Security Handshake Pitfalls Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 24

Transcript of CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf ·...

Page 1: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls

CNT4406/5412 Network SecuritySecurity Handshake Pitfalls

Zhi Wang

Florida State University

Fall 2014

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 24

Page 2: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Introduction

Introduction

Secure communication almost always includes an initialauthentication handshakeà in addition to integrity protection and/or encryption of data

Designing a secure authentication handshake is not trivialà different protocols have different trade-offsà different situations require different protocols

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 24

Page 3: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Introduction

Introduction

Secure communication almost always includes an initialauthentication handshakeà in addition to integrity protection and/or encryption of dataDesigning a secure authentication handshake is not trivialà different protocols have different trade-offsà different situations require different protocols

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 24

Page 4: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication

Weakness:Authentication is not mutual

Trudy may hijack the conversation after initial exchange (if this is theentire protocol)An eavesdropper could mount an off-line password-guessing attackTrudy may compromise Bob’s database and later impersonate Alice

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)∗

∗f is a secret key crypto or a hash functionZhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 24

Page 5: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication

Weakness:Authentication is not mutualTrudy may hijack the conversation after initial exchange (if this is theentire protocol)

An eavesdropper could mount an off-line password-guessing attackTrudy may compromise Bob’s database and later impersonate Alice

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)∗

∗f is a secret key crypto or a hash functionZhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 24

Page 6: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication

Weakness:Authentication is not mutualTrudy may hijack the conversation after initial exchange (if this is theentire protocol)An eavesdropper could mount an off-line password-guessing attack

Trudy may compromise Bob’s database and later impersonate Alice

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)∗

∗f is a secret key crypto or a hash functionZhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 24

Page 7: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication

Weakness:Authentication is not mutualTrudy may hijack the conversation after initial exchange (if this is theentire protocol)An eavesdropper could mount an off-line password-guessing attackTrudy may compromise Bob’s database and later impersonate Alice

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)∗

∗f is a secret key crypto or a hash functionZhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 24

Page 8: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: A Variant

Differences from the previous scheme:Function f needs to be reversible (cryptography but not hash)

Trudy can mount a dictionary attack without eavesdroppingà R needs to be verifiable, such as having a structureà e.g., R is a 32-bit random number padded on the right zeros

Alice Bob

I’m Alice

KAlice−Bob{R}

R

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 24

Page 9: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: A Variant

Differences from the previous scheme:Function f needs to be reversible (cryptography but not hash)Trudy can mount a dictionary attack without eavesdroppingà R needs to be verifiable, such as having a structureà e.g., R is a 32-bit random number padded on the right zeros

Alice Bob

I’m Alice

KAlice−Bob{R}

R

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 24

Page 10: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: More Variant

It is simpler to replace sending cleartext password

The protocol is more efficient than the originalà one message v.s. three messages; no states to keep for BobTrudy can impersonate Alice within the acceptable clock skewà to the same server; to other servers (how to prevent?)Trudy can reuse encrypted timestamps if Bob sets his clock backHow to use hash instead of encryption in this protocol?à “I’m Alice, timestamp, hash(KAlice−Bob, timestamp)”

Alice BobI am Alice, KAlice−Bob{timestamp}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 24

Page 11: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: More Variant

It is simpler to replace sending cleartext passwordThe protocol is more efficient than the originalà one message v.s. three messages; no states to keep for Bob

Trudy can impersonate Alice within the acceptable clock skewà to the same server; to other servers (how to prevent?)Trudy can reuse encrypted timestamps if Bob sets his clock backHow to use hash instead of encryption in this protocol?à “I’m Alice, timestamp, hash(KAlice−Bob, timestamp)”

Alice BobI am Alice, KAlice−Bob{timestamp}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 24

Page 12: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: More Variant

It is simpler to replace sending cleartext passwordThe protocol is more efficient than the originalà one message v.s. three messages; no states to keep for BobTrudy can impersonate Alice within the acceptable clock skewà to the same server; to other servers (how to prevent?)

Trudy can reuse encrypted timestamps if Bob sets his clock backHow to use hash instead of encryption in this protocol?à “I’m Alice, timestamp, hash(KAlice−Bob, timestamp)”

Alice BobI am Alice, KAlice−Bob{timestamp}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 24

Page 13: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: More Variant

It is simpler to replace sending cleartext passwordThe protocol is more efficient than the originalà one message v.s. three messages; no states to keep for BobTrudy can impersonate Alice within the acceptable clock skewà to the same server; to other servers (how to prevent?)Trudy can reuse encrypted timestamps if Bob sets his clock back

How to use hash instead of encryption in this protocol?à “I’m Alice, timestamp, hash(KAlice−Bob, timestamp)”

Alice BobI am Alice, KAlice−Bob{timestamp}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 24

Page 14: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: More Variant

It is simpler to replace sending cleartext passwordThe protocol is more efficient than the originalà one message v.s. three messages; no states to keep for BobTrudy can impersonate Alice within the acceptable clock skewà to the same server; to other servers (how to prevent?)Trudy can reuse encrypted timestamps if Bob sets his clock backHow to use hash instead of encryption in this protocol?

à “I’m Alice, timestamp, hash(KAlice−Bob, timestamp)”

Alice BobI am Alice, KAlice−Bob{timestamp}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 24

Page 15: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Shared Secret Authentication: More Variant

It is simpler to replace sending cleartext passwordThe protocol is more efficient than the originalà one message v.s. three messages; no states to keep for BobTrudy can impersonate Alice within the acceptable clock skewà to the same server; to other servers (how to prevent?)Trudy can reuse encrypted timestamps if Bob sets his clock backHow to use hash instead of encryption in this protocol?à “I’m Alice, timestamp, hash(KAlice−Bob, timestamp)”

Alice BobI am Alice, KAlice−Bob{timestamp}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 24

Page 16: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Public Key Authentication

Two variants: V1: R →[R]Alice , V2: {R}Alice→R

Reading Bob’s database is no longer security sensitive, why?à unauthorized modification still isTrudy can trick Alice to provide a service to her (as a RPC):à to sign something in V1; to decrypt something in V2à use structures to distinguish types of messages (e.g., PKCS)à use different keys for different purposes (e.g., auth, email...)

Alice Bob

I’m Alice

R/{R}Alice

[R]Alice/R

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 24

Page 17: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Public Key Authentication

Two variants: V1: R →[R]Alice , V2: {R}Alice→RReading Bob’s database is no longer security sensitive, why?à unauthorized modification still is

Trudy can trick Alice to provide a service to her (as a RPC):à to sign something in V1; to decrypt something in V2à use structures to distinguish types of messages (e.g., PKCS)à use different keys for different purposes (e.g., auth, email...)

Alice Bob

I’m Alice

R/{R}Alice

[R]Alice/R

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 24

Page 18: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Public Key Authentication

Two variants: V1: R →[R]Alice , V2: {R}Alice→RReading Bob’s database is no longer security sensitive, why?à unauthorized modification still isTrudy can trick Alice to provide a service to her (as a RPC):

à to sign something in V1; to decrypt something in V2à use structures to distinguish types of messages (e.g., PKCS)à use different keys for different purposes (e.g., auth, email...)

Alice Bob

I’m Alice

R/{R}Alice

[R]Alice/R

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 24

Page 19: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Public Key Authentication

Two variants: V1: R →[R]Alice , V2: {R}Alice→RReading Bob’s database is no longer security sensitive, why?à unauthorized modification still isTrudy can trick Alice to provide a service to her (as a RPC):à to sign something in V1; to decrypt something in V2

à use structures to distinguish types of messages (e.g., PKCS)à use different keys for different purposes (e.g., auth, email...)

Alice Bob

I’m Alice

R/{R}Alice

[R]Alice/R

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 24

Page 20: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Login Only (One-way Authentication)

One-way Public Key Authentication

Two variants: V1: R →[R]Alice , V2: {R}Alice→RReading Bob’s database is no longer security sensitive, why?à unauthorized modification still isTrudy can trick Alice to provide a service to her (as a RPC):à to sign something in V1; to decrypt something in V2à use structures to distinguish types of messages (e.g., PKCS)à use different keys for different purposes (e.g., auth, email...)

Alice Bob

I’m Alice

R/{R}Alice

[R]Alice/R

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 24

Page 21: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Mutual Authentication

Bob and Alice challenge each other to achieve mutual authentication

The protocol is inefficient à reduce it into three messages (flaw?)

Alice Bob

I’m Alice

R1

f (KAlice−Bob , R1)

R2

f (KAlice−Bob , R2

Alice Bob

I’m Alice, R2

R1, f (KAlice−Bob , R2)

f (KAlice−Bob , R1)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 7 / 24

Page 22: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Mutual Authentication

Bob and Alice challenge each other to achieve mutual authenticationThe protocol is inefficient à reduce it into three messages (flaw?)

Alice Bob

I’m Alice

R1

f (KAlice−Bob , R1)

R2

f (KAlice−Bob , R2Al

ice Bob

I’m Alice, R2

R1, f (KAlice−Bob , R2)

f (KAlice−Bob , R1)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 7 / 24

Page 23: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Reflection Attack

Trudy connects to Bob and receives the challenge (R1) from Bobà Trudy doesn’t know how to respond it without KAlice−Bob

Trudy starts a second session and tricks Bob to encrypt R2 for herà Trudy can now impersonate Alice on the first connection

Trud

y

Bob

I’m Alice, R2

R1, f (KAlice−Bob , R2)

new session

Trud

y

Bob

I’m Alice, R1

R3, f (KAlice−Bob , R1)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 8 / 24

Page 24: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Reflection Attack

Trudy connects to Bob and receives the challenge (R1) from Bobà Trudy doesn’t know how to respond it without KAlice−Bob

Trudy starts a second session and tricks Bob to encrypt R2 for herà Trudy can now impersonate Alice on the first connection

Trud

y

Bob

I’m Alice, R2

R1, f (KAlice−Bob , R2)

new session

Trud

y

Bob

I’m Alice, R1

R3, f (KAlice−Bob , R1)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 8 / 24

Page 25: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Reflection Attack...

LessonDon’t have Alice and Bob do exactly the same thing!

Use different keys to authenticate Alice from Bobà two keys or a transformation of the shared key (e.g., −KAlice−Bob)Encode the challenges in different structures (e.g., Bob|R)Make sure the initiator be the first to prove its identityà assumption: Trudy is more likely to be the initiatorà the five-message scheme doesn’t have the problem!

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 24

Page 26: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Reflection Attack...

LessonDon’t have Alice and Bob do exactly the same thing!

Use different keys to authenticate Alice from Bobà two keys or a transformation of the shared key (e.g., −KAlice−Bob)

Encode the challenges in different structures (e.g., Bob|R)Make sure the initiator be the first to prove its identityà assumption: Trudy is more likely to be the initiatorà the five-message scheme doesn’t have the problem!

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 24

Page 27: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Reflection Attack...

LessonDon’t have Alice and Bob do exactly the same thing!

Use different keys to authenticate Alice from Bobà two keys or a transformation of the shared key (e.g., −KAlice−Bob)Encode the challenges in different structures (e.g., Bob|R)

Make sure the initiator be the first to prove its identityà assumption: Trudy is more likely to be the initiatorà the five-message scheme doesn’t have the problem!

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 24

Page 28: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Reflection Attack...

LessonDon’t have Alice and Bob do exactly the same thing!

Use different keys to authenticate Alice from Bobà two keys or a transformation of the shared key (e.g., −KAlice−Bob)Encode the challenges in different structures (e.g., Bob|R)Make sure the initiator be the first to prove its identityà assumption: Trudy is more likely to be the initiator

à the five-message scheme doesn’t have the problem!

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 24

Page 29: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Reflection Attack...

LessonDon’t have Alice and Bob do exactly the same thing!

Use different keys to authenticate Alice from Bobà two keys or a transformation of the shared key (e.g., −KAlice−Bob)Encode the challenges in different structures (e.g., Bob|R)Make sure the initiator be the first to prove its identityà assumption: Trudy is more likely to be the initiatorà the five-message scheme doesn’t have the problem!

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 24

Page 30: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Password Guessing

Another weakness: Trudy can mount an offline password-guessingwithout needing to eavesdrop

To fix it, make sure the initiator is the first to prove its identityà assumption: Trudy is more likely to be the initiator

Trud

y

Bob

I’m Alice, R2

R1, f (KAlice−Bob , R2)

f (KAlice−Bob , R1)

Alice Bob

I’m Alice

R1

f (KAlice−Bob , R1), R2

f (KAlice−Bob , R2)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 24

Page 31: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Password Guessing

Another weakness: Trudy can mount an offline password-guessingwithout needing to eavesdropTo fix it, make sure the initiator is the first to prove its identityà assumption: Trudy is more likely to be the initiator

Trud

y

Bob

I’m Alice, R2

R1, f (KAlice−Bob , R2)

f (KAlice−Bob , R1)Al

ice Bob

I’m Alice

R1

f (KAlice−Bob , R1), R2

f (KAlice−Bob , R2)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 24

Page 32: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Mutual Authentication with Public Key

Distribution of public keys is a critical issuesà store Bob’s public key encrypted with Alice’s passwordà store a certificate (signed by Alice’s key) for Bob’s public key

Alice Bob

I’m Alice, {R2}Bob/R2

R2/[R2]Bob , {R1}Alice )/R1

R1/[R1]Alice

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 24

Page 33: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Mutual Authentication with Timestamps

Alice and Bob’s clocks should be reasonably synchronized

Alice and Bob should do different things, how?à use different keys (two keys or key transformation)à indicate the sender in the message (e.g., Bob|timestamp+1)

Alice Bob

I’m Alice, f (KAlice−Bob , timestamp)

f (KAlice−Bob , timestamp + 1)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 24

Page 34: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Mutual Authentication with Timestamps

Alice and Bob’s clocks should be reasonably synchronizedAlice and Bob should do different things, how?

à use different keys (two keys or key transformation)à indicate the sender in the message (e.g., Bob|timestamp+1)

Alice Bob

I’m Alice, f (KAlice−Bob , timestamp)

f (KAlice−Bob , timestamp + 1)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 24

Page 35: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mutual Authentication

Mutual Authentication with Timestamps

Alice and Bob’s clocks should be reasonably synchronizedAlice and Bob should do different things, how?à use different keys (two keys or key transformation)à indicate the sender in the message (e.g., Bob|timestamp+1)

Alice Bob

I’m Alice, f (KAlice−Bob , timestamp)

f (KAlice−Bob , timestamp + 1)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 24

Page 36: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Data Integrity/Encryption: Session Key

Communication after mutual authentication should be protectedà establish a session key to avoid authentication key being overusedà use the session key protect data integrity and secrecy

Session key should be different for each sessionSession key should be unpredictableBreach of the authentication key should not reveal the session keyà Diffie-Hellman key exchange

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 24

Page 37: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Data Integrity/Encryption: Session Key

Communication after mutual authentication should be protectedà establish a session key to avoid authentication key being overusedà use the session key protect data integrity and secrecySession key should be different for each session

Session key should be unpredictableBreach of the authentication key should not reveal the session keyà Diffie-Hellman key exchange

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 24

Page 38: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Data Integrity/Encryption: Session Key

Communication after mutual authentication should be protectedà establish a session key to avoid authentication key being overusedà use the session key protect data integrity and secrecySession key should be different for each sessionSession key should be unpredictable

Breach of the authentication key should not reveal the session keyà Diffie-Hellman key exchange

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 24

Page 39: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Data Integrity/Encryption: Session Key

Communication after mutual authentication should be protectedà establish a session key to avoid authentication key being overusedà use the session key protect data integrity and secrecySession key should be different for each sessionSession key should be unpredictableBreach of the authentication key should not reveal the session keyà Diffie-Hellman key exchange

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 24

Page 40: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Secret Key

Modify KAlice−Bob and encrypt R with the modified key. Use the result asthe session key (e.g., (KAlice−Bob + 1){R} or (−KAlice−Bob){R})

Can we use KAlice−Bob{R} as the session key?Can we use KAlice−Bob{R + 1} as the session key?à Trudy can store the data encrypted with KAlice−Bob{R + 1},impersonate Bob, and challenge Alice with R + 1

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 24

Page 41: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Secret Key

Modify KAlice−Bob and encrypt R with the modified key. Use the result asthe session key (e.g., (KAlice−Bob + 1){R} or (−KAlice−Bob){R})

Can we use KAlice−Bob{R} as the session key?

Can we use KAlice−Bob{R + 1} as the session key?à Trudy can store the data encrypted with KAlice−Bob{R + 1},impersonate Bob, and challenge Alice with R + 1

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 24

Page 42: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Secret Key

Modify KAlice−Bob and encrypt R with the modified key. Use the result asthe session key (e.g., (KAlice−Bob + 1){R} or (−KAlice−Bob){R})

Can we use KAlice−Bob{R} as the session key?Can we use KAlice−Bob{R + 1} as the session key?

à Trudy can store the data encrypted with KAlice−Bob{R + 1},impersonate Bob, and challenge Alice with R + 1

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 24

Page 43: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Secret Key

Modify KAlice−Bob and encrypt R with the modified key. Use the result asthe session key (e.g., (KAlice−Bob + 1){R} or (−KAlice−Bob){R})

Can we use KAlice−Bob{R} as the session key?Can we use KAlice−Bob{R + 1} as the session key?à Trudy can store the data encrypted with KAlice−Bob{R + 1},impersonate Bob, and challenge Alice with R + 1

Alice Bob

I’m Alice

R

f (KAlice−Bob , R)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 24

Page 44: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for One-way Public Key

In some cases (e.g., SSL), only one party has a public/private key à it’sonly necessary to authenticate the server

Alice selects R and sends {R}Bob to Bob. R is the session key

à Trudy can decrypt the (recorded) conversation if she gets Bob’s keyAlice and Bob do a Diffie-Hellman exchange with Bob signing his TB

Alice is not authenticated, but entire session is with a single party

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 24

Page 45: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for One-way Public Key

In some cases (e.g., SSL), only one party has a public/private key à it’sonly necessary to authenticate the server

Alice selects R and sends {R}Bob to Bob. R is the session keyà Trudy can decrypt the (recorded) conversation if she gets Bob’s key

Alice and Bob do a Diffie-Hellman exchange with Bob signing his TB

Alice is not authenticated, but entire session is with a single party

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 24

Page 46: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for One-way Public Key

In some cases (e.g., SSL), only one party has a public/private key à it’sonly necessary to authenticate the server

Alice selects R and sends {R}Bob to Bob. R is the session keyà Trudy can decrypt the (recorded) conversation if she gets Bob’s keyAlice and Bob do a Diffie-Hellman exchange with Bob signing his TB

Alice is not authenticated, but entire session is with a single party

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 24

Page 47: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for One-way Public Key

In some cases (e.g., SSL), only one party has a public/private key à it’sonly necessary to authenticate the server

Alice selects R and sends {R}Bob to Bob. R is the session keyà Trudy can decrypt the (recorded) conversation if she gets Bob’s keyAlice and Bob do a Diffie-Hellman exchange with Bob signing his TB

Alice is not authenticated, but entire session is with a single party

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 24

Page 48: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key

Alice picks R and sends {R}Bob to Bob

à Trudy can hijack (is it MITM?) the session by picking her RT

Alice picks R and sends [{R}Bob]Alice to Bobà Trudy can decrypt the (recorded) session if she steals Bob’s keyà Can she do so by stealing Alice’s key assuming Alice forgets R?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 24

Page 49: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key

Alice picks R and sends {R}Bob to Bobà Trudy can hijack (is it MITM?) the session by picking her RT

Alice picks R and sends [{R}Bob]Alice to Bobà Trudy can decrypt the (recorded) session if she steals Bob’s keyà Can she do so by stealing Alice’s key assuming Alice forgets R?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 24

Page 50: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key

Alice picks R and sends {R}Bob to Bobà Trudy can hijack (is it MITM?) the session by picking her RT

Alice picks R and sends [{R}Bob]Alice to Bob

à Trudy can decrypt the (recorded) session if she steals Bob’s keyà Can she do so by stealing Alice’s key assuming Alice forgets R?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 24

Page 51: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key

Alice picks R and sends {R}Bob to Bobà Trudy can hijack (is it MITM?) the session by picking her RT

Alice picks R and sends [{R}Bob]Alice to Bobà Trudy can decrypt the (recorded) session if she steals Bob’s key

à Can she do so by stealing Alice’s key assuming Alice forgets R?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 24

Page 52: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key

Alice picks R and sends {R}Bob to Bobà Trudy can hijack (is it MITM?) the session by picking her RT

Alice picks R and sends [{R}Bob]Alice to Bobà Trudy can decrypt the (recorded) session if she steals Bob’s keyà Can she do so by stealing Alice’s key assuming Alice forgets R?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 24

Page 53: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key...

Alice picks R1 and sends {R1}Bob to Bob, Bob picks R2 and sends{R2}Alice to Alice, the session key is R1 ⊕ R2

à Is it necessary to sign {R1}Bob and {R2}Alice ?Alice and Bob do a Diffie-Hellman exchange, each signs its Tà Trudy cannot decrypt session even she steals both private keysà what’s the assumption ?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 24

Page 54: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key...

Alice picks R1 and sends {R1}Bob to Bob, Bob picks R2 and sends{R2}Alice to Alice, the session key is R1 ⊕ R2à Is it necessary to sign {R1}Bob and {R2}Alice ?

Alice and Bob do a Diffie-Hellman exchange, each signs its Tà Trudy cannot decrypt session even she steals both private keysà what’s the assumption ?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 24

Page 55: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key...

Alice picks R1 and sends {R1}Bob to Bob, Bob picks R2 and sends{R2}Alice to Alice, the session key is R1 ⊕ R2à Is it necessary to sign {R1}Bob and {R2}Alice ?Alice and Bob do a Diffie-Hellman exchange, each signs its T

à Trudy cannot decrypt session even she steals both private keysà what’s the assumption ?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 24

Page 56: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Session Key

Session Key Establishment for Two-way Public Key...

Alice picks R1 and sends {R1}Bob to Bob, Bob picks R2 and sends{R2}Alice to Alice, the session key is R1 ⊕ R2à Is it necessary to sign {R1}Bob and {R2}Alice ?Alice and Bob do a Diffie-Hellman exchange, each signs its Tà Trudy cannot decrypt session even she steals both private keysà what’s the assumption ?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 24

Page 57: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mediated Authentication (with KDC)

Mediated Authentication with KDC

Some concerns:Trudy may claim to be Alice and talk to KDCà Trudy may mount an offline dictionary attack if KAB is structured

Messages from Alice may get to Bob before he gets KAB from KDCIt is inconvenient for KDC to connect to Bobà Alice is going to connect to Bob anyway

Alic

e

KD

C

Bob

Alice wants Bob

KAlice{use KAB for Bob} KBob{use KAB for Alice}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 18 / 24

Page 58: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mediated Authentication (with KDC)

Mediated Authentication with KDC

Some concerns:Trudy may claim to be Alice and talk to KDCà Trudy may mount an offline dictionary attack if KAB is structuredMessages from Alice may get to Bob before he gets KAB from KDC

It is inconvenient for KDC to connect to Bobà Alice is going to connect to Bob anyway

Alic

e

KD

C

Bob

Alice wants Bob

KAlice{use KAB for Bob} KBob{use KAB for Alice}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 18 / 24

Page 59: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mediated Authentication (with KDC)

Mediated Authentication with KDC

Some concerns:Trudy may claim to be Alice and talk to KDCà Trudy may mount an offline dictionary attack if KAB is structuredMessages from Alice may get to Bob before he gets KAB from KDCIt is inconvenient for KDC to connect to Bobà Alice is going to connect to Bob anyway

Alic

e

KD

C

Bob

Alice wants Bob

KAlice{use KAB for Bob} KBob{use KAB for Alice}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 18 / 24

Page 60: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mediated Authentication (with KDC)

Mediated Authentication with KDC...

KDC gives Alice a ticket (containing KAB) to be forwarded to Bob

à Alice and Bob must authenticate each other after this

α

KD

C

β

Alice wants Bob

KAlice{Bob, KAB}

KBob{Alice, KAB}

KBob{Alice, KAB}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 19 / 24

Page 61: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Mediated Authentication (with KDC)

Mediated Authentication with KDC...

KDC gives Alice a ticket (containing KAB) to be forwarded to Bobà Alice and Bob must authenticate each other after this

α

KD

C

β

Alice wants Bob

KAlice{Bob, KAB}

KBob{Alice, KAB}

KBob{Alice, KAB}

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 19 / 24

Page 62: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder

Needham-Schroeder is a classic protocol for authentication with KDCà many protocols have been modeled after it (e.g., Kerberos)

A complete protocol: mediated authentication+mutual authenticationNonce is a number that is used only once to prevent replay attacks

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 24

Page 63: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder

Needham-Schroeder is a classic protocol for authentication with KDCà many protocols have been modeled after it (e.g., Kerberos)A complete protocol: mediated authentication+mutual authentication

Nonce is a number that is used only once to prevent replay attacks

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 24

Page 64: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder

Needham-Schroeder is a classic protocol for authentication with KDCà many protocols have been modeled after it (e.g., Kerberos)A complete protocol: mediated authentication+mutual authenticationNonce is a number that is used only once to prevent replay attacks

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 24

Page 65: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder: A Limitation

The ticket to Bob (KAB) is valid even after Alice changes her key

Trudy steals Alice’s key, and impersonates AliceAlice finds it and changes her keyTrudy can still impersonate Alice to Bob because KAB remains valid

à To prevent it, make sure Alice has talked to KDC (using her active key)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 21 / 24

Page 66: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder: A Limitation

The ticket to Bob (KAB) is valid even after Alice changes her keyTrudy steals Alice’s key, and impersonates Alice

Alice finds it and changes her keyTrudy can still impersonate Alice to Bob because KAB remains valid

à To prevent it, make sure Alice has talked to KDC (using her active key)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 21 / 24

Page 67: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder: A Limitation

The ticket to Bob (KAB) is valid even after Alice changes her keyTrudy steals Alice’s key, and impersonates AliceAlice finds it and changes her key

Trudy can still impersonate Alice to Bob because KAB remains validà To prevent it, make sure Alice has talked to KDC (using her active key)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 21 / 24

Page 68: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder: A Limitation

The ticket to Bob (KAB) is valid even after Alice changes her keyTrudy steals Alice’s key, and impersonates AliceAlice finds it and changes her keyTrudy can still impersonate Alice to Bob because KAB remains valid

à To prevent it, make sure Alice has talked to KDC (using her active key)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 21 / 24

Page 69: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Needham-Schroeder: A Limitation

The ticket to Bob (KAB) is valid even after Alice changes her keyTrudy steals Alice’s key, and impersonates AliceAlice finds it and changes her keyTrudy can still impersonate Alice to Bob because KAB remains valid

à To prevent it, make sure Alice has talked to KDC (using her active key)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 21 / 24

Page 70: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Expanded Needham-Schroeder

The first two messages assure Bob that Alice has talked to KDC since hegenerates NB

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 22 / 24

Page 71: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Otway-Rees Protocol

How does KDC make sure it is really Alice and Bob?

How does Alice make sure it is really KDC and Bob?How does Bob make sure it is really KDC and Alice?How does this protocol invalidate tickets?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 23 / 24

Page 72: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Otway-Rees Protocol

How does KDC make sure it is really Alice and Bob?How does Alice make sure it is really KDC and Bob?

How does Bob make sure it is really KDC and Alice?How does this protocol invalidate tickets?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 23 / 24

Page 73: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Otway-Rees Protocol

How does KDC make sure it is really Alice and Bob?How does Alice make sure it is really KDC and Bob?How does Bob make sure it is really KDC and Alice?

How does this protocol invalidate tickets?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 23 / 24

Page 74: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Otway-Rees Protocol

How does KDC make sure it is really Alice and Bob?How does Alice make sure it is really KDC and Bob?How does Bob make sure it is really KDC and Alice?How does this protocol invalidate tickets?

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 23 / 24

Page 75: CNT4406/5412 Network Security - Florida State Universityzwang/files/cnt5412/fall2014/Lec8.pdf · 2014-08-19 · Security Handshake Pitfalls CNT4406/5412 Network Security Security

Security Handshake Pitfalls Needham-Schroeder and Otway-Rees

Summary

One-way AuthenticationMutual AuthenticationSession Key EstablishmentMediated AuthenticationNeedham-Schroeder and Otway-Rees Protocols

Next lecture: PKI

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 24 / 24