SAML assisted Diffie-Hellman MIKEY

Slides:



Advertisements
Similar presentations
Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Public Key Algorithms …….. RAIT M. Chatterjee.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
SIP-SAML assisted Diffie-Hellman MIKEY IETF 65 MSEC Mar 21, 2006 Robert Moskowitz.
Computer Science Public Key Management Lecture 5.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Computer and Network Security - Message Digests, Kerberos, PKI –
King Mongkut’s University of Technology Network Security 8. Password Authentication Methods Prof. Reuven Aviv, Jan Password Authentication1.
Key Management Network Systems Security Mort Anvari.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Chapter 5 Network Security Protocols in Practice Part I
Web Applications Security Cryptography 1
Outline The basic authentication problem
Reviews Rocky K. C. Chang 20 April 2007.
Public Key Infrastructure (PKI)
Basics of Cryptography
Tutorial on Creating Certificates SSH Kerberos
Zueyong Zhu† and J. William Atwood‡
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Protocol Analysis.
Cryptography and Network Security
CSE 4905 IPsec II.
CMSC 414 Computer and Network Security Lecture 15
Authentication.
Authentication Applications
Basic Network Encryption
Tutorial on Creating Certificates SSH Kerberos
S/MIME T ANANDHAN.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
SECURITY IN DISTRIBUTED FILE SYSTEMS
Digital Signatures Last Updated: Oct 14, 2017.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Just Fast Keying (JFK) Protocol
Message Security, User Authentication, and Key Management
CS 465 TLS Last Updated: Oct 31, 2017.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Protocol ap1.0: Alice says “I am Alice”
Key Management Network Systems Security
Homework #4 Solutions Brian A. LaMacchia
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Key Establishment Protocols ~
Link Setup Flow July 2011 Date: Authors: Name Company
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
FTM Frame Exchange Authentication
Basic Network Encryption
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Advanced Computer Networks
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
EAP Method Requirements for Emergency Services
Link Setup Flow July 2011 Date: Authors: Name Company
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

SAML assisted Diffie-Hellman MIKEY IETF 64 MSEC Nov 8, 2005 Robert Moskowitz

Requirements to think about Provides mutual authentication of the parties. Both parties are actively involved in session key generation. Is able to provide full perfect forward secrecy (PFS). Supports distribution of group session keys. Provides liveliness test when the UA does not have a reliable clock. Supports limited UAs.

Observations Items 2 and 3 are naturally provided by a Diffie-Hellman exchange. Item 1 can be provided by a SAML attribute cert of the UAs ID and DH key signed by the UA’s SIP server. An optional second round trip extension to MIKEY, encrypted with the Diffie-Hellman derived session key can provide items 4, 5, and 6. All of these components together create a relatively easy to deploy secure VoIP environment.

Scenarios for MIKEY peer-to-peer simple one-to-many small-sized groups If we design the MIKEY exchange to first create a peer-to-peer session key that can be extended to securely transmit another key, the one-to-many and small groups exchanges are simply handled as special cases of the peer-to-peer exchange.

Trusted UA Credentials For any successful MIKEY exchange, the parties SHOULD have trusted credentials. These credentials SHOULD contain: UA Identity DH Public key Proof of Trust Time range for trusting credential

Low Latency and Computational overhead MIKEY has to occur after call 'pickup' and before talking. Latency here would be very apparent to the users. Thus a MIKEY exchange SHOULD be completed in one round trip. Additonal round trips should be optional for additional features.

Low Latency and Computational overhead A hidden latency cost is credential validation. If the UA received its SAML certificate from its domain's SIP server it is trusting the server implicitly thus it can extend that trust to relying on it to validate the other party's SAML certificate. This not only eliminates the hidden validation latency, but also its computational cost to the UA.

Low Latency and Computational overhead A common practice in generating a DH session key is to use the DH key in a keyed hash over random nonces and other data: TGK is HMACx(RAND1|RAND2) where x = g(xi* xr) This construct allows for a long-lived Diffie-Hellman key pair as it is never used to encrypt any transmitted data rather to generate the actual key.

Low Latency and Computational overhead Consider Diffie-Hellman key size Recommendation is 4096 bits to equal 128 bits for AES key This will be too expensive for many SIP phones Use ECC Diffie-Hellman? Use optional smaller Diffie-Hellman key size 512 bits SIP phone could have mechanism to get new key periodically from PC or PDA Remember Diffie-Hellman key is used in an HMAC to produce session key.

Next Generate interest Finish the Internet Draft Used as the source for much of this presentation! Get ‘buy in’ from SIP server vendors and SIP phone vendors

What about Legal Intercept If both parties are registered to the same SIP domain The SIP server can LIE and generate 2 SAML certs to place itself as the Man-in-the-Middle If the parties are in different domains The SIP servers can COLLUDE Each generating 2nd SAML certs Allowing either of both servers to be the Man-in-the-middle

What about security risks See prior slide! SIP phone MIGHT get its SAML cert for a 3rd party that will not participate in a Diffie-Hellman attack

Questions?