Network Security: Network Security and Network Protocols

Goals

  • Network Protocols
    • Understand security protocol design goals
    • Appreciate difficulty of protocol design
    • Internalize best practices
    • Understand properties and limitations of standard protocols

Protocol Basics

  • What properties do security protocols provide?
  • What is a typical adversary model?
  • What properties might we expect from an authentication protocol?

Protocol Flaws

  • How does the Needham-Schroeder attack work?
  • How does a type-flaw attack work?
  • How can an adversary exploit parallel sessions to attack a protocol?
  • What are the core design principles for creating a secure protocol?
  • Should you design your own protocol?
  • What tools are available to vet security protocols?

TLS

  • What are the security goals for TLS?
  • Where is it used?
  • Why is it so complex?
  • Explain the different phases of the TLS handshake
  • What assumptions are necessary for TLS to be secure?
  • How secure is TLS in practice?