CS166 Network Protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

studying for finalll :,)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards
<p></p>

Secure Shell (SSH)

  • creates a secure tunnel for private info to be sent across the network

  • can be based on public key, digital certificate, passwords, etc.

  • perfect forward secrecy

  • protected against MiM attacks by encrypting g^(ab)modp parts

2
New cards
<p></p>

Secure Socket Layer (SSL)

  • socket layer (part of application layer)

  • majority of internet transactions use this

  • does not need mutual authentication because clients don’t need authentication

  • 6 keys derived from K = h(S, Ra, Rb)

    • 2 encryption keys

    • 2 integrity keys

    • 2 IVs

    • ^each for client and server

  • Why different keys in different directions? To prevent reflection attacks

  • MiM attack works if Trudy sends her own cert or a fake cert and Alice ignores the warning and doesn’t verify the cert

  • has open session protocol (to establish session key) and then subsequent connections protocol (cheaper)

3
New cards

IPSec

  • network layer

  • the overengineered protocol…

  • 2 parts: IKE and ESP/AH

4
New cards

Internet Key Exchange (IKE)

  • establishes mutual authentication and session key

  • has 2 phases:

    • Phase 1 (comparable to SSL session)

    • Phase 2 (comparable to SSL connection)

5
New cards

IKE Phase 1

  • establishes mutual authentication and session key

  • has 4 key options, each with main mode and agressive mode

    • public key encryption (original)

    • public key encryption (improved)

    • public key signature

    • symmetric key

  • all key options have perfect forward secrecy

6
New cards
<p></p>

IKE Phase 1 public key encryption main mode

7
New cards
term image

IKE Phase 1 public key encryption aggressive mode

  • PLAUSIBLE DENIABILITY: Anyone can deny a conversation ever took place, because Trudy can use other people’s public keys to impersonate a conversation between 2 people (using her own a, b, Ra, Rb)

  • has anonymity despite being aggressive

8
New cards
term image

IKE Phase 1 digital signature main mode

9
New cards
term image

IKE Phase 1 digital signature aggressive mode

10
New cards
term image

IKE Phase 1 symmetric key main mode

  • CATCH-22: Bob must know to use K_ab to decrypt Alice’s 5th message (which contains Alice’s encrypted identity), but Bob can have shared keys with multiple people and thus not know which to use.

  • Solution: Alice’s IP address used as ID

    • However, this does not protect anonymity because it would need a static IP address to work

11
New cards
term image

IKE Phase 1 symmetric key aggressive mode

12
New cards
<p></p>

IKE Phase 2

  • cheaper than Phase 1, assumes session key is already established

13
New cards

IPSec Transport Mode

designed for host-to-host

  • original header remains, attacker can see who’s talking

<p>designed for host-to-host</p><ul><li><p>original header remains, attacker can see who’s talking</p></li></ul><p></p>
14
New cards

IPSec Tunnel Mode

designed for firewall-to-firewall

  • new IP header from firewall to firewall, attacker cannot see who’s talking

<p>designed for firewall-to-firewall</p><ul><li><p>new IP header from firewall to firewall, attacker cannot see who’s talking</p></li></ul><p></p>
15
New cards

Encapsulating Security Payload (ESP)

provides confidentiality and integrity for everything beyond IP header

  • exception is when you use ESP with NULL encryption

16
New cards

Authentication Header (AH)

provides integrity only for everything beyond IP header and some fields of header

17
New cards

Kerberos

  • authentication protocol that uses symmetric keys and timestamps

  • statelessness and efficiency are top priorities

  • uses Trusted Third Party (TTP) caled Key Distribution Center (KDC) to make N keys for N users (so, security depends on TTP)

    • master key K_kdc

  • Uses tickets system, with Ticket Granting Ticket (TGT) to obtain tickets

  • TGT contains session key, user’s ID, and expiration date

18
New cards
term image

Kerberized Login

19
New cards
term image

(Kerberos) Alice requests “Ticket to Bob”

20
New cards
term image

(Kerberos) Alice uses “Ticket to Bob”

21
New cards
term image

Wired Equivalent Privacy (WEP)

  • goal is to make wireless LAN as secure as wired LAN (not that secure)

  • uses one symmetrical key shared with all users and access port

  • uses RC4 for confidentiality

  • uses CRC for “integrity” —> CRC is for error detection tho…

22
New cards
term image

Global System for Mobile Communications (GSM)

  • goal is to make cellphones as secure as landlines (not that secure), and to prevent cloning

  • authentication is not mutual because base station is not authenticated

  • Ki is ONLY known to mobile and home network and never leaves those spots (if Trudy gets it, she can clone!)