Conclusion

22
Conclusion 1 Conclusion

description

Conclusion. Course Summary. Crypto Basics, symmetric key, public key, hash functions and other topics, cryptanalysis Access Control Authentication, authorization, firewalls, IDS Protocols Simple authentication Real-World: SSL, IPSec, Kerberos, WEP, GSM Software - PowerPoint PPT Presentation

Transcript of Conclusion

Page 1: Conclusion

Conclusion 1

Conclusion

Page 2: Conclusion

Conclusion 2

Course Summary Crypto

o Basics, symmetric key, public key, hash functions and other topics, cryptanalysis

Access Controlo Authentication, authorization, firewalls, IDS

Protocolso Simplified authentication protocolso Real-World protocols

Softwareo Flaws, malware, SRE, development, trusted

OS

Page 3: Conclusion

Conclusion 3

Crypto Basics Terminology Classic ciphers

o Simple substitutiono Double transpositiono Codebooko One-time pad

Basic cryptanalysis

Page 4: Conclusion

Conclusion 4

Symmetric Key Stream ciphers

o A5/1o RC4

Block cipherso DESo AES, TEA, etc.o Modes of operation

Data integrity (MAC)

Page 5: Conclusion

Conclusion 5

Public Key Knapsack (insecure) RSA Diffie-Hellman Elliptic curve crypto (ECC) Digital signatures and non-

repudiation PKI

Page 6: Conclusion

Conclusion 6

Hashing and Other Birthday problem Tiger Hash HMAC Clever uses (online bids, spam

reduction, …) Other topics

o Secret sharingo Random numberso Information hiding (stego, watermarking)

Page 7: Conclusion

Conclusion 7

Advanced Cryptanalysis Enigma RC4 (as used in WEP) Linear and differential

cryptanalysis Knapsack attack (lattice reduction) RSA timing attacks

Page 8: Conclusion

Conclusion 8

Authentication Passwords

o Verification and storage (salt, etc.)o Cracking (math)

Biometricso Fingerprint, hand geometry, iris scan, etc.o Error rates

Two-factor, single sign on, Web cookies

Page 9: Conclusion

Conclusion 9

Authorization History/system certification ACLs and capabilities Multilevel security (MLS)

o BLP, Biba, compartments, covert channel, inference control

CAPTCHA Firewalls IDS

Page 10: Conclusion

Conclusion 10

Simple ProtocolsAuthentication

oUsing symmetric keyoUsing public keyoSession keyoPerfect forward secrecy (PFS)oTimestamps

Zero knowledge proof (Fiat-Shamir)

Page 11: Conclusion

Conclusion 11

Real-World ProtocolsSSHSSLIPSec

o IKEoESP/AH, tunnel/transport modes,

…KerberosWireless: WEP & GSM

Page 12: Conclusion

Conclusion 12

Software Flaws and Malware

Flawso Buffer overflowo Incomplete mediation, race condition, etc.

Malwareo Brain, Morris Worm, Code Red, Slammero Malware detectiono Future of malware, botnets, etc.

Other software-based attackso Salami, linearization, etc.

Page 13: Conclusion

Conclusion 13

Insecurity in Software Software reverse engineering

(SRE)o Software protection

Digital rights management (DRM) Software development

o Open vs closed sourceo Finding flaws (do the math)

Page 14: Conclusion

Conclusion 14

Operating Systems OS security functions

o Separationo Memory protection, access control

Trusted OSo MAC, DAC, trusted path, TCB, etc.

NGSCBo Technical issueso Criticisms

Page 15: Conclusion

Conclusion 15

Crystal BallCryptography

o Well-established fieldo Don’t expect major changeso But some systems will be brokeno ECC is a major “growth” areao Quantum crypto may prove

worthwhile…o …but for now it’s mostly (all?) hype

Page 16: Conclusion

Conclusion 16

Crystal Ball Authentication

o Passwords will continue to be a problemo Biometrics should become more widely usedo Smartcard/tokens will be used more

Authorizationo ACLs, etc., well-established areaso CAPTCHA’s interesting new topico IDS is a very hot topic

Page 17: Conclusion

Conclusion 17

Crystal Ball Protocols are challenging Difficult to get protocols right Protocol development often haphazard

o “Kerckhoffs’ Principle” for protocols?o Would it help?

Protocols will continue to be a source of subtle problem

Page 18: Conclusion

Conclusion 18

Crystal Ball Software is a huge security problem today

o Buffer overflows are on the decline…o …but race condition attacks might increase

Virus writers are getting smartero Botnetso Polymorphic, metamorphic, sophisticated

attacks, …o Future of malware detection?

Malware will continue to be a BIG problem

Page 19: Conclusion

Conclusion 19

Crystal Ball Other software issues

o Reverse engineering will not go awayo Secure development will remain hard o Open source is not a panacea

OS issueso NGSCB (or similar) might change

things…o …but, for better or for worse?

Page 20: Conclusion

Conclusion 20

The Bottom Line Security knowledge is needed today… …and it will be needed in the future Necessary to understand technical

issueso The focus of this class

But technical knowledge is not enougho Human nature, legal issues, business issues,

...o As with anything, experience is helpful

Page 21: Conclusion

Conclusion 21

A True Story The names have been changed… “Bob” took my information security

class Bob then got an intern position

o At a major company that does lots of security

One meeting, an important customer askedo “Why do we need signed certificates?”o “After all, they cost money!”

The silence was deafening

Page 22: Conclusion

Conclusion 22

A True Story Bob’s boss remembered that Bob had

taken a security classo So he asked Bob, the lowly intern, to answero Bob mentioned man-in-the-middle attack on

SSL Customer wanted to hear more

o So, Bob explained MiM attack in some detail The next day, “Bob the lowly intern”

became “Bob the fulltime employee”