Chapter 9. Key management

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Computer Security Key Management. Introduction We distinguish between a session key and a interchange key ( long term key ). The session key is associated.
Computer Security Key Management
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #9-1 Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Chapter 9: Key Management
1 Key Management CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 1, 2004.
Authentication Advanced Software Engineering (CSE870) Instructor: Dr. B. Cheng Contact info: chengb at cse dot msu dot edu Eduardo Diaz Dan Fiedler Andres.
Computer Security1 Bishop: Chapter 9 Key Management.
Slide #9-1 Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
1 Chapter 9: Key Management All algorithms we have introduced are based on one assumption: keys have been distributed. But how to do that? Key generation,
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 10 Nov 8, 2007 Hash Functions Key Management.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Week 4 - Wednesday.  What did we talk about last time?  RSA algorithm.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 Nov 4, 2003 Introduction to Computer Security Lecture.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Slide #9-1 Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures.
1IS2150/TEL2810: Introduction to Computer Security Nov 1, 2005 Introduction to Computer Security Lecture 8 Key Management.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key management issues in PGP
Contents Introduction. 9.1 Session and Interchange Keys.
Chapter 5 Network Security Protocols in Practice Part I
Key Management October 26, 2006 Lecture 7
CSC 482/582: Computer Security
Key Management Session and Interchange Key Key Exchange
Computer Communication & Networks
Cryptography and Network Security
KERBEROS.
CS480 Cryptography and Information Security
Chapter 15 Key Management
Authentication Applications
Chapter 9: Key Management
Basic Cryptogrphy.
Information Security message M one-way hash fingerprint f = H(M)
Message Security, User Authentication, and Key Management
IS 2150 / TEL 2810 Introduction to Security
Chapter 10: Key Management
Chapt. 10 – Key Management Dr. Wayne Summers
Public Key Infrastructure (PKI)
Digital Certificates and X.509
CSC 482/582: Computer Security
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Overview Key exchange Cryptographic key infrastructure Key storage
Computer Security: Art and Science, 2nd Edition
Bishop: Chapter 10 Key Management: Digital Signature
CDK: Chapter 7 TvS: Chapter 9
Chapter 9: Key Management
Chapter 10: Key Management
AIT 682: Network and Systems Security
Presentation transcript:

Chapter 9. Key management 이 상 일

Key management? Key management ? distribution of cryptogtaph keys Representing Identity  Ch.13 Authentication  Ch.11 Ch.9 : Propagate

NOTATION XY : {Z}K X send to Y Encipherd message Z Key K

1. Session and Interchange Keys Def 9.1 Session Key – cryptograpphic key associated with communication it self Interchage Key – cryptographic key associated with principal to a communication Comuncation <-> Principal to communcation

Session Key Specifically to exchange information with someone Reduce eavesdrop, replay attack, forward search Discard when the session end

Interchange key Associated with a principal A can use the Key shares with B To Convince B the sender is A A can use it to all session

9.2 Key Exchange To A to communicate secretly B To using a shared cryptographic key Criteria 1. to share cannot be transmitted in the clear 2. A and B decide to trust a third party 3. Protocals are public known

9.2.1 Classical Cryptographic Key Exchange and Authentication Simple protocol 1. Alice  Cathy: {request for session key to Bob}kalice 2. Cathy  Alice: {Ksesison }Kalice || {Ksession}Kbob 3. Alice  Bob: {Ksession}Kbob Problem Bob cannot know to Whom Attacker can exchange message intercept 3. Eve  Bob: {Ksession}Kbob

9.2.1 Classical Cryptographic Key Exchange and Authentication Needham – Schroeder protocol 1. Alice  Cathy : { Alice || Bob || rand1 } 2. Cathy  Alice : { Alice || Bob || rand1 || ksession || {Alice || ksession} kBob } kAlice 3. Alice  Bob : { Alice || ksession } kBob 4. Bob  Alice : { rand2 } ksession 5. Alice  Bob : { rand2 – 1 }ksession Nonce – two random number(rand1, rand2)

9.2.1 Classical Cryptographic Key Exchange and Authentication If Eve got record Replay Attack to Needham – Schroeder 1. Eve  Bob : { Alice || ksession } kBob 2. Bob  Alice : { rand3 } ksession [intercepted by Eve] 3. Eve  Bob : { rand3 – 1 }ksession

9.2.1 Classical Cryptographic Key Exchange and Authentication Needham – Schroeder protocol with timestamp 1. Alice  Cathy : { Alice || Bob || rand1 } 2. Cathy  Alice : { Alice || Bob || rand1 || ksession || {Alice || T || ksession} kBob } kAlice 3. Alice  Bob : { Alice || T || ksession } kBob 4. Bob  Alice : { rand2 } ksession 5. Alice Bob : { rand2 – 1 }ksession

9.2.1 Classical Cryptographic Key Exchange and Authentication Otway-Rees protocol 1. Alice  Bob : num || Alice || Bob || { rand1 || num || Alice || Bob }kAlice 2. Bob  Cathy : num || Alice || Bob || { rand1 || num || Alice || Bob }kAlice || {rand2 || num || Alice || Bob }kBob 3. Cathy  Bob : num || { rand1 || ksession }kAlice || { rand2 || ksession } kBob 4. Bob  Alice : num || { rand1 || ksession }kAlice

9.2.2 Kerberos Needham – Schroeder protocol modified Denning and Sacco Alice wants to use server S Authenticate herself to Kerberos system Obtain ticket to use S

9.2.2 Kerberos TAlice,Barnum = Barnum || {Alice || Alice address || valid time || kAlice,Barnum}kBarnum TAlice,Barnum : ticket kBarnum : key Barnum shares with the authentication server valid time : the time interval during which the ticket is valid AAlice,Barnum = {Alice || generation time || kt}kAlice,Barnum AAlice,Barnum : Authenticator

9.2.2 Kerberos - Alice want Guttenbergs file using - authentication server is Cerberus - ticket granting server is Barnum 1. Alice  Cerberus: Alice || Barnum 2. Cerberus  Alice : { kAlice,Barnum} kAlice || TAlice,Barnum 3. Alice  Barnum : Guttenberg || AAlice,Barnum || TAlice,Barnum 4. Barnum  Alice : Alice || {kAlice,Guttenberg} kAlice,Barnum || TAlice,Guttenberg 5. Alice  Guttenberg : AAlice,Guttenberg || TAlice,Guttenberg 6. Guttenberg  Alice : { t + 1} kAlice,Guttenberg

9.2.3 Public Key Cryptographic Exchange and Authentication Alice  Bob : { ksession } eBob eBob is Bob’s public key

9.2.3 Public Key Cryptographic Exchange and Authentication Problem : who the message comes from 1. Alice  Peter : { send me Bob's public key } [ intercepted by Eve ] 2. Eve  Peter : { send me Bob's public key } 3. Peter  Eve : eBob 4. Eve  Alice : eEve 5. Alice  Bob : { ksession } eEve [ intercepted by Eve ] 6. Eve  Bob : { ksession } eBob Alice  Bob : Alice || { { ksession } dAlice } eBob

9.3 Cryptographic Key Infrastructures A certificate is a token that bind an identity to a cryptographic key Certificate structure Calice = {ealice || Alice || T}dCathy

9.3.1 Certificate Signature Chains X.509 : Directory Authentication Framework Components 1. Version – each version 2. Serial Number – unique certificate 3. Signature algorithm identifier – identify algorithm, parameters, used to sign certificate 4. Issuer’s Distinguished Name– unique issuer’s name 5. Validity Interval – valid time 6. Subject’s Distinguished Name – uniquely identify subject

9.3.1 Certificate Signature Chains Components 7. Subject’s public key information – identify the algorithm, parameters, subject’s public key 8. Issuer’s unique idenfier (ver 2,3 only) 9. Subject’s unique idenfier (ver 2,3 only) 10. Extensions – (version 3 only) extensions in the a 11. Sugnature – algorithm and parameters used to sign the certificate

9.3.1 Certificate Signature Chains A certification authority(CA) is an entity that issues certificates X<<Y>> : certificate that X generated for the subject Y Signature chain : Cathy<<Dan>>Dan<<Bob>>

9.3.1 Certificate Signature Chains PGP Certificate Signature Chain OpenPGP public key structure 1. Version 2. Time of creation 3. Validity period 4. public key algorithm and parameters 5. public key

9.3.1 Certificate Signature Chains OpenPGP ver.3 1. Version 3 2. Signature type 3. Creation time 4. Key identifier of the signer 5. Public key algorithm 6. Hash algorithm 7. Part of signed hash value 8. Signature Ver.4 is more complex

9.3.1 Certificate Signature Chains Difference of X.509 and PGP PGP’s single key may have multiple signature PGP have a notion of trust – single key may have different levels of trust

9.4 Storing and Revoking keys Secret keys (for classical cryptosystems) and private keys (for public key cryptosystems) must protected Expiration date keys must revoke

9.4.1 Key storage Attacker can get key on a multiuser system or network system Solution – enciphering Key Feasible Solution – Physical device More physical device

9.4.2 Key Revocation Expiration date  compromise, change It must be revoked 1. To ensure that the revocation is correct 2. to ensure timeliness of the revocation throughout the infrastructure A certificate revocation list is a list of certificates that are no longer valid

9.5 Digital Signature Digital Signature : Construct that authenticates both the origin and contents of a message in a manner that is provable to a disinterested third party Classical Signature – Private Key Public Key Signature – Public Key

9.5.1 Classical Signature Cathy is third party, and have KAlice & KBob 1. Alice  Bob : {m} KAlice 2. Bob  Cathy : {m} KAlice 3. Cathy  Bob : {m} KBob

9.5.2 Public Key Signatures It use Public Key Ex) Based on RSA system

9.5.2 Public Key Signatures Alice knows Sign m1 and m2 F(05) 05^17mod77 = 3 R(17) 17^17mod77 = 19 5*17mod77 = 8 3*19mod77 = 57 So I(08) = 57

9.5.2 Public Key Signatures (06^53mod77)^11mod95=63 Bob want the contract to be N(13) 13^r mod77 = 6 then r = 59 rebobmodnbob = 59*53mod60 = 7 Replace public key (7,77) Reset private key 43 Then, (63^59mod95)^43mod77 = 13