Download Apply encryption to network and system security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Next-Generation Secure Computing Base wikipedia , lookup

Information security wikipedia , lookup

Project 25 wikipedia , lookup

Information privacy law wikipedia , lookup

Stingray phone tracker wikipedia , lookup

Security-focused operating system wikipedia , lookup

Quantum key distribution wikipedia , lookup

Computer security wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Wireless security wikipedia , lookup

Data remanence wikipedia , lookup

Digital signature wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Block cipher wikipedia , lookup

One-time pad wikipedia , lookup

Public-key cryptography wikipedia , lookup

Certificate authority wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Web of trust wikipedia , lookup

Cryptanalysis wikipedia , lookup

Mobile security wikipedia , lookup

Diffie–Hellman key exchange wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Cryptography wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

History of cryptography wikipedia , lookup

Transcript
Reading: Apply encryption to network and system security
Apply encryption to network and
system security
Inside this reading:
What is Encryption?
2
Encryption Methods
3
Authentication
8
Secure Data Transmission
11
Secure Data Storage
14
Threats to Encryption Systems
15
Implementing Encryption Solutions
17
Summary
18
769832839
© State of New South Wales, Department of Education and Training 2006
-1-
Reading: Apply encryption to network and system security
What is Encryption?
Encryption is the process of taking some information or data, manipulating
or changing its format in a way that stops it from being used or read by
unauthorized people or systems. Encryption involves scrambling data so
that it needs to be unscrambled, or decrypted, to be read. Encryption can be
applied to data in storage (file systems, media, etc) or in transit via network
or Internet connections.
Encryption can be useful to achieve appropriate levels of network security
required by organisations. For example, an organisation using the Internet
to perform financial transactions will want to ensure that details like bank
account numbers, passwords, etc are kept secure and only accessed by
intended recipients. Encryption can achieve this level of security by
ensuring data confidentiality and integrity.
769832839
© State of New South Wales, Department of Education and Training 2006
-2-
Reading: Apply encryption to network and system security
Encryption Methods
Information encrypted needs to be decrypted by authorised systems or
people for it to be of any use. To decrypt, the receiver may need some
additional information.
For example you are given a coded message on a piece of paper. To read it
you need to know how it was coded. It may use a simple method of
substituting numbers for letters but to decipher the message you need to
know what letter equates to what number. This is the 'key' that will unlock
the code.
Computer systems encrypt information the same way but use more
sophisticated and complicated codes. Consider the following diagram:
Figure 1: Encryption process
769832839
© State of New South Wales, Department of Education and Training 2006
-3-
Reading: Apply encryption to network and system security
The encryption process requires the following:

Original information – This is the data or information prior to being
encrypted (may be referred to as plain or clear text)

An algorithm – a mathematical formula or process that accepts the
input of original information and key data to produce an output or
coded information (called cipher text)

Key data – data used by an encryption algorithm to encrypt or
decrypt information

Cipher text – this is the encrypted original information produced by
the encryption algorithm and key data.
The algorithm may work in both directions meaning that information can be
encrypted and decrypted with the correct keys. Knowing any three items
will allow you to derive the fourth. However encryption methods are
designed to make discovering keys and algorithms extremely difficult.
Ciphering
Ciphering is the process of how data or the original information is converted
into cipher text. The process uses algorithms and encryption processes, but
more specifically this refers to how the raw data is managed. There are
generally two cipher methods.

Stream cipher is a relatively simple method where each bit of data
in the original information is sequentially encrypted using one bit of
the key. If the key is of a fixed length it may be possible to
mathematically deduce the key by analysing the cipher text. Using a
variable length key or continually changing the key in the stream
cipher process can theoretically produce an unbreakable encryption
system. One-Time pad is the process of continually varying the
encryption key with random numbers. This method is not
commonly used because of overheads and encrypting efficiency.

Block cipher encrypts the original information into chunks.
Depending upon the encryption system, the size of these chunks or
blocks will be fixed. Each block is processed by an algorithm and
key to produce blocks of cipher text. These cipher text blocks can be
further used with encryption keys to strengthen the encryption.
Block cipher processes more data than stream cipher on each pass
and is more commonly used today.
Private Key Encryption
Private key encryption is also known as symmetric encryption or single
key encryption. This encryption method requires the use of one key to both
encrypt and decrypt information. All people and systems accessing the
769832839
© State of New South Wales, Department of Education and Training 2006
-4-
Reading: Apply encryption to network and system security
cipher text must use the same key to decipher that was used to encrypt the
data.
Figure 2: Private key encryption
The security of data using this method depends upon the security of the key.
Only authorised people and systems should have the key. It should be kept
private and secret. If anyone else knows the key, the security of the data is
compromised and all data should be encrypted using a new key. The new
key needs to be distributed to all authorised people and systems. This may
present operational difficulties if the locations are geographically diverse,
distant and many.
Examples of private key encryption include:

Advanced Encryption Standard (AES: Rijndael)

International Data Encryption Algorithm (IDEA)

Data Encryption Standard (DES)

Triple Data Encryption Standard (3DES)

HmacSHA1

Blowfish

HmacMD5

TripleDES.
For more information on each of these systems, go online and search for
each term through your preferred search engine (such as Google:
www.google.com).
769832839
© State of New South Wales, Department of Education and Training 2006
-5-
Reading: Apply encryption to network and system security
Public Key Encryption
Public key encryption, also known as asymmetrical encryption, uses two
keys known as a key pair. One key is a private key and it is kept secret,
only known to one person or system. A second key, known as the public
key, is generated (mathematically derived) from the private key. The public
key is not kept secret and is freely distributed to people or systems that wish
to use encryption.
Figure 3: Public key encryption
Information encrypted with the public key can only be decrypted using the
private key of the key pair. Therefore only the owner of the private key can
decipher the information. The public key used to encrypt will not decrypt
the cipher text it produces. It's a one way process. Public keys are used to
encrypt and private keys are used to decrypt. Information encrypted with the
private key can be decrypted using the public key for authentication
purposes (using 'digital signatures' - this is discussed later).
This encryption method addresses the problem of distributing keys to people
that require them. Public keys do not need to be kept private, so there is no
need for special secure delivery methods and they can be made freely
available using the internet.
Examples of public key encryption systems include:

Diffie-Helman

RSA

ElGamal

Elliptic Curve Encryption.
769832839
© State of New South Wales, Department of Education and Training 2006
-6-
Reading: Apply encryption to network and system security
For more information on each of these systems, go online and search for
each term through your preferred search engine (such as Google:
www.google.com).
769832839
© State of New South Wales, Department of Education and Training 2006
-7-
Reading: Apply encryption to network and system security
Authentication
If encrypted information is transmitted or stored, how can we be sure that it
was sent or stored by a specific person? How can we be certain that the
information hasn't been altered, modified or originated from some other
source?
We can use a number of methods to authenticate data and information.
Digital Signatures
Using public key or asymmetrical encryption, information such as
messages, documents, files etc. are encrypted using a public key and
decrypted using the private key of a key pair. The public key is not secret
and freely available so anyone could have encrypted the original data or
information.
The originator can authenticate their data by using their private key. This is
done by using the originator's private key to encrypt information about the
original data (usually checksum information). This encrypted information is
kept with or appended to the original data. This is known as a digital
signature.
This digital signature can only be decrypted using the user's public key. If
decryption of the information (the digital signature) is successful and
compares correctly with that data being accessed (checksum, etc) we can be
reasonably confident of the originator's identity and that the data has not
been modified since the digital signature was added. This is most useful
when downloading data from the internet.
The purpose of digital signatures is to certify information, not conceal it.
Digital Certificates
Public key encryption works using pairs of keys. Anyone wishing to send
an encrypted message must use the recipient's public key to encrypt the
message. If the recipient of the message wishes to verify the digital
signature they must use the sender's public key. Where do we find these
keys and how can we be sure that we are using the correct key of a pair?
769832839
© State of New South Wales, Department of Education and Training 2006
-8-
Reading: Apply encryption to network and system security
Digital Certificates provide a means of identifying and managing public
keys. A digital certificate is a password protected and encrypted file that
contains information about an individual's identity and their public key.
A certificate server stores digital certificates and is used as a central location
for users requiring public keys. This is known as a Certificate Authority
(CA) and is a trusted authority providing certified public key information.
CA can be setup with in an organisational network or are a service available
on the internet. CAs can work in a hierarchy or mesh fashion to provide
certificates from other CAs.
Reflect: Australian CAs
What Australian organisations act as Certificate Authorities (CAs)? To find
out more, go online and search for the phrase ' Australian Digital Certificate
Authority' through your preferred search engine (such as Google:
www.google.com). You will find large organisations such as Australia Post
and VeriSign Australia act as CAs. What other organisations also act as
CAs?
Public Key Infrastructure (PKI)
Public Key Infrastructure provides a means for users of an insecure network
to exchange data securely and privately. It is a complete infrastructure
using public key encryption to provide the end to end security,
confidentiality and accountability required for information exchange.
Various vendors provide PKI products and solutions.
A public key infrastructure consists of:

A certificate authority (CA) that issues and verifies digital
certificates. A certificate includes the public key or information
about the public key

A registration authority (RA), a network authority that verifies user
requests for a digital certificate and tells the certificate authority
(CA) to issue it.

Locations where the certificates (with their public keys) are held

A certificate management system
For an overview of PKI try the Section 6 networks website
(www.section6.net). Go to the Tutorials section and search for 'Digital
certificates'.
769832839
© State of New South Wales, Department of Education and Training 2006
-9-
Reading: Apply encryption to network and system security
Reflect: PKI users in Australia
Who is using PKI in Australia? To find out more, go online and search for
the phrase 'Users of PKI Australia' through your preferred search engine
(such as Google: www.google.com).
Kerberos
Kerberos is an authentication protocol that uses secret-key encryption to
verify client identity and exchange information securely.
When a user attempts to logon to a server or system, a local agent sends an
authentication request to the Kerberos server. The server responds by
sending encrypted credentials for the user back to the requesting server or
system. These credentials are then decrypted using the user-supplied
password. If this is successful, the user is issued Kerberos authentication
tickets and a set of cipher keys to encrypt data sessions.
Kerberos is a cross platform system developed by Massachusetts Institute of
Technology (MIT) and has been incorporated into numerous products by
vendors. See the website: web.mit.edu/kerberos/
Reflect: Kerberos
Find out more about who uses Kerberos. Use your preferred search engine
(for example Google: www.google.com.au) to search for information about
which products use Kerebos. Does Windows use it? What about Eudora or
SAP?
769832839
© State of New South Wales, Department of Education and Training 2006
- 10 -
Reading: Apply encryption to network and system security
Secure Data Transmission
There are a number of methods that use encryption to ensure that data
transmission on a network is secure.
Internet Protocol Security (IPSec)
This protocol defines encryption, authentication and key management for
TCP/IP transmissions. It secures data in transmission by various means at
the IP packets level.
The key components of IPSec are:

Authentication Header (AH) This component authenticates and
validates data packets. Each packet basically contains a digital
signature

Encapsulation Security Payload (ESP) This component encrypts the
data payload of the packet.

Internet Key Exchange (IKE) The above components AH and ESP
use asymmetric encryption. IKE manages the public/private key
exchanges for encryption and decryption.
IPSec can operate in two modes:

'Transport' mode encrypts communications between two hosts.

'Tunnel' mode places an encrypted IP packet into a traditional IP
packet to ‘tunnel through' to a destination. This is used to support
VPN transmissions.
For more information, go online and search for the term 'IPSec' through
your preferred search engine (such as Google: www.google.com). You
could also try the NetBSD project website (www.netbsd.org - enter 'IPSec'
in the search tool and find the 'IPSec FAQ' document).
Point-to-Point Tunnelling Protocol (PPTP)
The original Point-to-Point Protocol (PPP) is an encapsulation protocol for
transporting IP traffic over point-to-point connections.
769832839
© State of New South Wales, Department of Education and Training 2006
- 11 -
Reading: Apply encryption to network and system security
The Point-to-point Tunnelling Protocol (PPTP) is an expansion of the
existing Point-to-Point Protocol (PPP). PPTP uses the same principle of
encapsulating other protocol packets so that they can be transported via a
switched network (the Internet) to a specific destination. The destination
receives the PPTP packet and extracts the encapsulated data. PPTP also
supports encryption and authentication.
This protocol is a proprietary Microsoft development and is widely used in
conjunction with VPN (see below). There are open source alternatives that
will also work with PPTP (for example 'PPTP Client' - see the Sourceforge
website: pptpclient.sourceforge.net).
Layer 2 Tunnelling Protocol (L2TP)
This protocol is similar to PPTP but developed by a number of industry
consortia. This protocol has become the method of choice for Microsoft
Windows VPN
L2TP is just a tunnelling protocol. It is generally used with IPSec to
provide encryption.
Virtual Private Network (VPN)
Virtual Private Networks are basically a secure connection through a
network (Internet, WAN, etc) that connects either computers or networks
together. These connections make remote users appear that they are on one
single network.
The main functions provided by VPNs are tunneling, data security, data
integrity and authentication. This is usually provided by a number of
protocols, IPSec, PPTP and L2TP.
Secure Sockets Layer (SSL)
This is a method of encrypting TCP/IP transmissions between hosts. It is
used for the encrypt web pages and data on web forms reroute. The
encryption method uses public key encryption. It requires Digital
Certificates
URLs prefixed with 'HTTPS' initiate an SSL session between the web
browser and web server. Most online banking facilities will direct you to a
secure site with 'HTTPS' at the beginning of the address.
769832839
© State of New South Wales, Department of Education and Training 2006
- 12 -
Reading: Apply encryption to network and system security
Secure Shell (SSH)
This provides a secure means of establishing remote connections to a host.
It provides authentication via the exchange of digital certificates and uses
public key encryption. It is mainly used in Unix/Linux environment and is a
means of using insecure protocols (telnet, ftp, etc) in a secure fashion.
Pretty Good Privacy (PGP)
This is one of the most popular encryption programs. This is a public key
encryption system that provides authentication and encryption. It is
commonly used for email transmissions and supports a wide range of
operating systems. Both commercial and open source versions are
available.
See the website: www.pgp.com for PGP information.
769832839
© State of New South Wales, Department of Education and Training 2006
- 13 -
Reading: Apply encryption to network and system security
Secure Data Storage
Encryption may be used to protect the confidentiality, integrity and
authenticity of data in storage, such as that on a hard disk drive or tape.
Encryption methods as discussed previously may be used but careful
consideration must be given to the consequence of this.
Encrypting and decrypting data creates a significant overhead in terms of
time and effort and will affect the accessibility and management of the data.
There may be key management issues – numerous key pairs required, digital
signatures and CA (certificate authority) required. Implementation will be
determined by the business or organisation needs and requirements.
Most operating systems and storage systems have inbuilt encryption
facilities. Implementing these may be more efficient but does place a
reliance on the operating system.
769832839
© State of New South Wales, Department of Education and Training 2006
- 14 -
Reading: Apply encryption to network and system security
Threats to Encryption Systems
The security that an encryption provides may be vulnerable because of
possible deficiencies or circumstances.
Deficiencies in human and business processes or
procedures
No matter how good an encryption system is it still requires some sort of
management. Security relies on keeping private keys secret. If keys are
stored or delivered ad hoc there is a good chance that the private keys will
be compromised. Management and maintenance processes need to be
checked to ensure security.
Users need to be aware of security issues. For example an encryption
system may be doing its job well, but if a user leaves a logged on computer
unattended the confidentiality of information may be compromised by
someone else accessing the logged on computer.
Deficiencies in the cipher algorithm or process
Original data may be deciphered from cipher text by exploiting some
weakness in the cipher algorithm. Algorithms that are publicly known, have
been available for some period of time and have had public scrutiny have
generally proved their security. Systems that are new or rely on secrecy are
possibly vulnerable.
Brute force attacks against the key
This is where attempts are made to gain the original text from the cipher text
by using every possible combination of the key or password. The longer a
key is (i.e. the more bits used in encryption) the more possible combinations
there are. The larger the number of keys used to create the cipher text the
more number of keys need to be tried.
Brute force attacks will eventually succeed if enough time and resources are
used. For example, it took 312 hours using 3,500 computers to find a RC5
key. (RC5 is a block cipher method that uses 64bit symmetric keys) A key
769832839
© State of New South Wales, Department of Education and Training 2006
- 15 -
Reading: Apply encryption to network and system security
is considered strong if the cost of finding the key outweighs the cost of the
data being protected.
769832839
© State of New South Wales, Department of Education and Training 2006
- 16 -
Reading: Apply encryption to network and system security
Implementing Encryption Solutions
Encryption systems can be provided by network operating systems and
devices or by third party products and services.
Inbuilt encryption systems provided by operating systems and devices may
be cost effective. However if these are propriety systems, using them may
lock the organisation into a significant dependence on the operating system
or device.
Third party encryption solutions are usually built on industry standards and
generally operate independent of any operating system or devices. These
solutions can be expensive.
In all cases, any implementation of encryption solutions will be governed by
the security requirements for an organisation or process. The benefits of
encryption need to be weighed against the real threats to data security,
implementation requirements and costs.
769832839
© State of New South Wales, Department of Education and Training 2006
- 17 -
Reading: Apply encryption to network and system security
Summary
Investigating and implementing encryption facilities and the appropriateness
of this for organisational network security requires a sound understanding of
encryption methods, practices and standards. We have covered the main
components – symmetrical and asymmetrical encryption, digital signatures,
and digital certificates. Secure transmission methods such as SSL, VPN,
and IPSec have also been discussed.
769832839
© State of New South Wales, Department of Education and Training 2006
- 18 -