Non-PKI Methods for Public Key Distribution

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 Digital Signatures Authentication.
By Md Emran Mazumder Ottawa University Student no:
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Mutual Authentication and Key Exchange Protocol (MAKEP) Reporter: Jung-Wen Lo ( 駱榮問 ) Date: 2008/4/18.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Three-Party Encrypted Key Exchange Without Server Public-Keys C. L. Lin, H. M. Sun, M. Steiner, and T. Hwang IEEE COMMUNICATIONS LETTER, VOL. 5, NO.12,
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Cryptographic Techniques Instructor: Jerry Gao Ph.D. San Jose State University URL: May,
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
Improvement of Hwang-Lo-Lin scheme based on an ID-based cryptosystem No author given (Korea information security Agency) Presented by J.Liu.
1 Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing From : ePrint (August 2005) Author : Junghyun Nam, Seungjoo.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Computer Science Public Key Management Lecture 5.
Public Key Model 8. Cryptography part 2.
A Risk Analysis Approach for Biometric Authentication Technology Author: Arslan Brömme Submission: International Journal of Network Security Speaker: Chun-Ta.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Password-only Authenticated Key Agreement Protocols Based on Self-certified Approach Tzong-Chen Wu and Yen-Ching Lin Department of Information Management.
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
COEN 351 E-Commerce Security
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Password-based user authentication and key distribution protocols for client-server applications Authors: Her-Tyan Yeh and Hung-Min Sun Sources: The Journal.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Key Management Network Systems Security Mort Anvari.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
1 Example security systems n Kerberos n Secure shell.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Web Applications Security Cryptography 1
Public Key Infrastructure (PKI)
Reporter :Chien-Wen Huang
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
Cryptanalysis on Mu–Varadharajan's e-voting schemes
CMSC 414 Computer and Network Security Lecture 15
Source: IEEE Communications Letters, Vol. 8, No. 3, March 2004
CS480 Cryptography and Information Security
Chapter 15 Key Management
Efficient password authenticated key agreement using smart cards
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
Security of a Remote Users Authentication Scheme Using Smart Cards
Methods for Preventing Unauthorized Software Distribution
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Information Security message M one-way hash fingerprint f = H(M)
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Network Security (contd.)
Strong Password Authentication Protocols
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
Key Management Network Systems Security
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Asymmetric Cryptographic Algorithms
SPIRAL: Security Protocols for Cerberus
Chapter 15 Key Management
Secure Diffie-Hellman Algorithm
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Non-PKI Methods for Public Key Distribution Authors: Mohammad Peyavian, Allen Roginsky and Nevenko Zunic Source: Computers & Security, Vol.23, pp.97-103, 2004. Adviser: Min-Shiang Hwang Speaker: Chun-Ta Li Date: 2004/10/28

Outline Introduction The first proposed scheme The second proposed scheme The third proposed scheme Conclusions Comments

Archived public key distribution without CA Introduction Server 1 2 3 3 2 CA Client 1 The X.509 PKI requires a huge and expensive infrastructure with complex operations. Archived public key distribution without CA

Introduction (cont.) ID: client’s user id -- not a secret value PKc: initial public component of the client’s public key pair SKc: initial secret component of the client’s public key pair PKs: initial public component of the server’s public key pair SKs: initial secret component of the server’s public key pair EPK(B): data B encrypted with an asymmetric public key PK. ESK(B): data B signed by an asymmetric secret key SK.

The first proposed scheme Public key distribution Client Server (1) generates (ID, PW) (2) sends (ID, PW) to client (3) sends ID, PKc, H(ID, PKc, PW) to server (4) sends ID, PKs, H(ID, PKs, PW) to server // PW used only once for authenticating the flows from the client and server

The first proposed scheme (cont.) The first scheme can be added to the top of current SSL implementations (PW-based authentication). PWc: client generates a password Client sends PWc to the server (e.g. on-line banking) Client Server (1) generates PWc (2) sends ID, ePKs(PWc), eSKc(H(ID, PWc)) to server

The first proposed scheme (cont.) Public key change if client’s SKc is compromised Client Server (1) sends ID, “SKc compromised”, eSKc(H(ID, “SKc compromised”) to server The client and server do not do any further exchange Until the client generates and sends a new public key to server The sending of a new public key is done as “Public key distribution” // If server public key is compromised, contrariwise

The first proposed scheme (cont.) Regular client public key change (periodically) Client Server (1) sends ID, new_PKc, eSKc(H(ID, new_PKc) to server Both the client and server start using the new client’s public key They won’t accept any message with the old public key // If server generates a new public key, contrariwise

The second proposed scheme P: prime modulus for Diffie-Hellman algorithm Rc: generates random number from the client Rs: generates random number from the server D: Diffie-Hellman public key S: symmetric secret key derived from Diffie-Hellman algorithm Given that the client and server share an ID and PW One-sided: Only the client needs to get the server’s public key (PKs). Two-sided: Both client and sever need to exchange public keys.

The second proposed scheme (cont.) Public key exchange protocol Client Server (1) generates P, Rc and computes public key Dc Dc = PWRc mod P (2) sends ID, Dc, P to server (3) computes public key Ds Ds = PWRs mod P (4) computes symmetric secret key S S = DcRs mod P = PWRcRs mod P (5) sends ID, [PKs], Ds, H(ID, Dc, P, [PKs], Ds, S) to client (6) computes symmetric secret key S S = DsRc mod P = PWRcRs mod P (7) verifies H(ID, Dc, P, [PKs], Ds, S) using the S value that is derived (8) sends ID, [PKc], H(ID, PKs, Ds, [PKc], new_PW, S), [eS(new_PW)] to server

The second proposed scheme (cont.) Public key change if client secret key is compromised Client Server (1) sends ID, “SKc compromised”, eSKc (H(ID, “SKc compromised”) to server The client and server do not do any further exchange Until the client generates and sends a new public key to server The sending of a new public key is done as “Public key distribution” // If server public key is compromised, contrariwise

The second proposed scheme (cont.) Regular client public key change (periodically) Client Server (1) sends ID, new_PKc, eS (H(ID, new_PKc) to server Both the client and server start using the new client’s public key They won’t accept any message with the old public key // If server generates a new public key, contrariwise

The third proposed scheme Public key exchange protocol Given that the client and server share an ID and PW Client Server (1) sends ID, PKc, H(ID, PKc, PW, Rc) to server (2) sends ID, PKs, H(ID, PKs, PW, Rs) to server (3) sends ID, ePKs(Rc) to server (4) sends ID, ePKc(Rs) to server // PW used only once for authenticating the flows from the client and server

The third proposed scheme (cont.) The third scheme can be added to the top of current SSL implementations (PW-based authentication). PWc: client generates a password Client sends PWc to the server (e.g. on-line banking) Client Server (1) generates PWc (2) sends ID, ePKs(PWc, Rc), eSKc(H(ID, PWc, Rc)) to server

Conclusions The proposed scheme can distribute the public key without CA. This paper is to present alternative simpler solutions to the X.509 PKI to save storage, bandwidth and to reduce the complexity of the operations.

Comments How to send the PKs and PKc to the client and the server in secure? (The first scheme) Attacker can masquerade server and client to send the wrong PKs` (pair of SKs`) and wrong PKc` (pair of SKc`) Attacker will require the PKc Attacker will require the PWc , because of the client encrypt it by using the wrong PKs`

Client Attacker Server Comments (cont.) Man-in-the-middle attack (The second scheme) Public key exchange protocol Client Attacker Server (1) generates P, Rc and computes public key Dc Dc = PWRc mod P (2) sends ID, Dc`, P to server (3) computes public key Ds Ds = PWRs mod P Dc` = DcRt = PWRcRt mod P (4) computes symmetric secret key S` S` = Dc`Rs mod P = PWRcRtRs mod P Ds` = DsRt = PWRsRt mod P (5) sends ID, [PKs], Ds`, H(ID, Dc, P, [PKs], Ds`, S`) to client (6) computes symmetric secret key S S` = Ds`Rc mod P = PWRsRtRc mod P (7) verifies H(ID, Dc, P, [PKs], Ds`, S`) using the S` value that is derived (8) sends ID, [PKc], H(ID, PKs, Ds, [PKc], new_PW`, S`), [eS`(new_PW`)] to server

Comments (cont.) How to send the PKs and PKc to the client and the server in secure? (The third scheme) Attacker can masquerade server and client to send the wrong PKs` (pair of SKs`) and wrong PKc` (pair of SKc`) Attacker will require the PKc Attacker will require the PWc , because of the client encrypt it by using the wrong PKs`

Thanks for your attention

Cryptanalysis of the first proposed scheme Public key distribution Client Attacker Server (1) generates (ID, PW) (2) sends (ID, PW) to client (3) sends ID, PKc, H(ID, PKc, PW) to server (3`) sends ID, PKc`, H(ID, PKc`, PW) to server (4) sends ID, PKs, H(ID, PKs, PW) to server (4`) sends ID, PKs`, H(ID, PKs`, PW) to server // PW used only once for authenticating the flows from the client and server

Cryptanalysis of the first proposed scheme (cont.) The first scheme can be added to the top of current SSL implementations (PW-based authentication). PWc`: attacker generates a password Attacker sends PWc` to the server Client Server without change (1) generates PWc (2`) sends ID, ePKs(PWc`), eSKc`(H(ID, PWc`)) to server (2) sends ID, ePKs(PWc), eSKc(H(ID, PWc)) to server

Cryptanalysis of the third proposed scheme Public key exchange protocol Given that the client and server share an ID and PW Client Attacker Server (1) sends ID, PKc, H(ID, PKc, PW, Rc) to server (1`) sends ID, PKc`, H(ID, PKc`, PW, Rc`) to server (2) sends ID, PKs, H(ID, PKs, PW, Rs) to server (2`) sends ID, PKs`, H(ID, PKs`, PW, Rs`) to server (3) sends ID, ePKs(Rc) to server (3`) sends ID, ePKs(Rc`) to server (4) sends ID, ePKc(Rs) to server (4`) sends ID, ePKc(Rs`) to server // PW used only once for authenticating the flows from the client and server

Cryptanalysis of the third proposed scheme (cont.) The third scheme can be added to the top of current SSL implementations (PW-based authentication). PWc`: attacker generates a password Attacker sends PWc` to the server Client Attacker Server (1) generates PWc (2) sends ID, ePKs(PWc, Rc), eSKc(H(ID, PWc, Rc)) to server (2`) sends ID, ePKs(PWc`, Rc`), eSKc`(H(ID, PWc`, Rc`)) to server without change