Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 4
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Computer Science Public Key Management Lecture 5.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Data Security and Encryption (CSE348) 1. Lecture # 21 2.
Cryptography and Network Security Chapter 14
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Key Management and Distribution Anand Seetharam CST 312.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Network Security Confidentiality Using Symmetric Encryption Chapter 7.
Key Management and Distribution
Key management issues in PGP
Computer and Network Security
Cryptography and Network Security
CS480 Cryptography and Information Security
Authentication Applications
Cryptography and Network Security
Cryptography and Network Security Chapter 14
Chapter 10: Key Management (Again) and other Public Key Systems
Digital Certificates and X.509
Key Management Network Systems Security
Cryptography and Network Security
Symmetric Key Distribution
Presentation transcript:

Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown

Key Distribution and Management u Symmetric key cryptography: fast implementations, good for encrypting large amounts of data; requires shared secret key u Asymmetric (public) key cryptography: inefficient for large data, good for authentication; no need to share a secret u How to share symmetric keys? u How to distribute public keys?

Symmetric Key Distribution using Symmetric Encryption u Objective: two entities share same secret key u Principle: change keys frequently u How to exchange a secret key? 1.A physically delivers key to B 2.Third party, C, can physically deliver key to A and B 3.If A and B already have a key, can securely transmit new key to each other, encrypted with old key 4.If A and B have secure connection with third party C, C can securely send keys to A and B

Symmetric Key Distribution using Symmetric Encryption u Option 1 and 2: manual delivery; feasible if number of entities is small (link encryption) u Option 3: requires initial distribution of key; discovery of initial key releases all subsequent keys. u Option 4: requires initial distribution of key with C; practical for large-scale systems (end-to-end encryption)

Link Encryption vs End-to-End Encryption u Link Encryption – Encrypt data over individual links in network – Each link end-point shares a secret key –Decrypt/Encrypt at each device in path –Requires all links/devices to support encryption u End-to-End Encryption – Encrypt data at network end-points (e.g. hosts or applications) –Each pair of hosts/applications share a secret key –Does not rely on intermediate network devices

How Many Keys Need To Be Exchanged? u Link-level encryption? u End-to-end encryption between hosts? u End-to-end encryption between applications?

Key Hierarchy u Key Distribution Centre (KDC) is trusted third party u typically have a hierarchy of keys –Data sent between end-systems encrypted with temporary session key –Session keys obtained from KDC over network; encrypted with master key –Master keys can be distributed using manual delivery

The Use of a Key Hierarchy

Key Distribution Scenario

KDC Scenario Notation u End-systems: A and B, identified by ID A and ID B u Master keys: K a, K b u Session key (between A and B): K s u Nonce values: N 1, N 2 u E.g. timestamp, counter, random value u Must be different for each request u Must be difficult for attacker to guess

Key Distribution Issues u Hierarchical Key Control –Use multiple KDCs in a hierarchy –E.g. KDC for each LAN (or building); central KDC to exchange keys between hosts in different LANs –Reduces effort in key distribution; limits damage if local KDC is compromised u Session Key Lifetime –Shorter lifetime is more secure; but increases overhead of exchanges –Connection-oriented protocols (e.g. TCP): new session –key for each connection –Connection-less protocols (e.g. UDP/IP): change after fixed period or certain number of packets sent

Decentralized Key Distribution u Alternative that doesn't rely on KDC u I Each end-system must manually exchange n – 1 master keys (K m ) with others

Symmetric Key Distribution using Asymmetric Encryption u Asymmetric encryption generally too slow for encrypting large amount of data u Common application of asymmetric encryption is exchanging secret keys u Three examples: –1. Simple Secret Key Distribution –2. Secret Key Distribution with Confidentiality and Authentication –3. Hybrid Scheme: Public-Key Distribution of KDC Master Keys

Simple Secret Key Distribution u Simple: no keys prior to or after communication u Provides confidentiality for session key u Subject to man-in-the-middle attack u Only useful if attacker cannot modify/insert messages

Public-Key Distribution of Secret Keys u Provides both confidentiality and authentication in exchange of secret key

Hybrid Scheme: Public-Key Distribution of KDC Master Keys u Use public-key distribution of secret keys when exchanging master keys between end-systems and KDC u Efficient method of delivering master keys (rather than manual delivery) u Useful for large networks, widely distributed set of users with single KDC

Distribution of Public Keys u By design, public keys are made public u Issue: how to ensure public key of A actually belongs to A (and not someone pretending to be A) u Four approaches for distributing public keys 1.Public announcement 2.Publicly available directory 3.Public-key authority 4.Public-key certificates

Uncontrolled Public-Key Distribution u Make public key available in open forum: newspaper, signature, website, conference,... u Problem: anyone can announce a key pretending to be another user

Public Announcement u users distribute public keys to recipients or broadcast to community at large –eg. append PGP keys to messages or post to news groups or list u major weakness is forgery –anyone can create a key claiming to be someone else and broadcast it –until forgery is discovered can masquerade as claimed user

Public-Key Publication u All users publish keys in central directory u Users must provide identification when publishing key u Users can access directory electronically u Weakness: directory must be secure

Publicly Available Directory u can obtain greater security by registering keys with a public directory u directory must be trusted with properties: –contains {name,public-key} entries –participants register securely with directory –participants can replace key at any time –directory is periodically published –directory can be accessed electronically u still vulnerable to tampering or forgery

Public-Key Authority u Improve security by tightening control over distribution of keys from directory u Has properties of directory u Assume each user has already security published publickey at authority; each user knows authorities public key u Does require real-time access to directory when keys are needed

Public-Key Authority u First 5 messages are for key exchange; last 2 are authentication of users u Although 7 messages, public keys obtained from authority can be cached u Problem: authority can be bottleneck u Alternative: public-key certificates

Public-Key Certificates u Assume public keys sent to CA can be authenticated by CA; each user has certificate of CA

Public-Key Certificates u certificates allow key exchange without real-time access to public-key authority u a certificate binds identity to public key –usually with other info such as period of validity, rights of use etc u with all contents signed by a trusted Public-Key or Certificate Authority (CA) u can be verified by anyone who knows the public- key authorities public-key

Public Key Certificates u A certificate is the ID and public-key of a user signed by CA u CA = E(PR auth ; [T|| ID A || PU a ]) u Timestamp T validates currency of certificate (expiration date) u Common format for certificates is X.509 standard (by ITU) –S/MIME (secure ) –IP security (network layer security) –SSL/TLS (transport layer security) –SET (e-commerce)

X.509 Certificates u issued by a Certification Authority (CA), containing: –version (1, 2, or 3) –serial number (unique within CA) identifying certificate –signature algorithm identifier –issuer X.500 name (CA) –period of validity (from - to dates) –subject X.500 name (name of owner) –subject public-key info (algorithm, parameters, key) –issuer unique identifier (v2+) –subject unique identifier (v2+) –extension fields (v3) –signature (of hash of all fields in certificate)  notation CA > denotes certificate for A signed by CA

X.509 Certificates

Obtaining a Certificate u any user with access to CA can get any certificate from it u only the CA can modify a certificate u because cannot be forged, certificates can be placed in a public directory