Network Security: Network Security and Network Protocols
Goals
- Network Protocols
- Understand security protocol design goals
- Appreciate difficulty of protocol design
- Internalize best practices
- Understand properties and limitations of standard protocols
Protocol Basics
- What properties do security protocols provide?
- What is a typical adversary model?
- What properties might we expect from an authentication protocol?
Protocol Flaws
- How does the Needham-Schroeder attack work?
- How does a type-flaw attack work?
- How can an adversary exploit parallel sessions to attack a protocol?
- What are the core design principles for creating a secure protocol?
- Should you design your own protocol?
- What tools are available to vet security protocols?
TLS
- What are the security goals for TLS?
- Where is it used?
- Why is it so complex?
- Explain the different phases of the TLS handshake
- What assumptions are necessary for TLS to be secure?
- How secure is TLS in practice?