Chapt. 10 – Key Management Dr. Wayne Summers

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Computer Security Key Management
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Cryptographic Technologies
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Chapter 9: Key Management
Slide #9-1 Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
1 Chapter 9: Key Management All algorithms we have introduced are based on one assumption: keys have been distributed. But how to do that? Key generation,
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security fundamentals Topic 5 Using a Public Key Infrastructure.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Key management issues in PGP
Chapter 9. Key management
Cryptography: an overview
Cryptography: an overview
Basics of Cryptography
Key Management Session and Interchange Key Key Exchange
Computer Communication & Networks
Information Security.
e-Health Platform End 2 End encryption
CS480 Cryptography and Information Security
Cryptography and Security Technologies
Information and Network Security
S/MIME T ANANDHAN.
IS3230 Access Security Unit 9 PKI and Encryption
Message Security, User Authentication, and Key Management
Chapter 14: Representing Identity
Public Key Infrastructure
Ch. 11 – Cipher Techniques Dr. Wayne Summers
Security at the Application Layer: PGP and S/MIME
Pooja programmer,cse department
ELECTRONIC MAIL SECURITY
Secure Electronic Transaction (SET) University of Windsor
ELECTRONIC MAIL SECURITY
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
Key Management Network Systems Security
Bishop: Chapter 10 Key Management: Digital Signature
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Public-Key, Digital Signatures, Management, Security
Advanced Computer Networks
Fluency with Information Technology Lawrence Snyder
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University Summers_wayne@colstate.edu http://csc.colstate.edu/summers

10.1 Session and Interchange Keys Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and the generation, maintenance, and revoking of such keys Solves problem of propagating authentication Interchange key – cryptographic key associated with a principal to a communication Session key - cryptographic key associated with the communication

10.2 Key Exchange Goal is two allow two parties to communicate secretly using a shared cryptographic key Key cannot be transmitted in the clear (must be encipher when sent or derived without an exchange of data used to derive the key) Sender and receiver may decide to trust a third party Cryptosystems and protocols are publicly known. The only secret data is the keys involved.

10.4 Cryptographic Key Infrastructures Certificate- token that binds an identity to a cryptographic key X.509: Directory Authentication Framework – defines certificate formats and certification validation (see Bishop pg. 257 for details) Certification authority (CA) – entity that issues certificates PGP (Pretty Good Privacy) – enchipherment program widely used to provide privacy for electronic mail (see Bishop pg. 259 for details)

10.5 Storing and Revoking Keys If stored in a file, easy to compromise, even if enchiphered Store on one or more smart cards (ROM) Key escrow system – system where a third party can recover a cryptographic key Should not depend on encipherment algorithm Privacy protections must work throughout, including the user interface Requirements (legal/business) must map to the key exchange protocol All parties must authenticate themselves System must ensure that keys are valid while message is observable

10.6 Digital Signatures Digital signatures – authenticates both the origin and content of a message Uses public key cryptography Provides nonrepudiation RSA Digital Signature (some problems) El Gamal Digital Signature (similar to Diffie- Hellman)