Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996. 4/18/2019 Ref: Pfleeger96, Ch.4.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Fall 2006CS 395: Computer Security1 Key Management.
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad.
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Example security systems n Kerberos n Secure shell.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
@Yuan Xue 285: Network Security CS 285 Network Security Digital Signature Yuan Xue Fall 2012.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Non-PKI Methods for Public Key Distribution
Digital Signatures.
Unit 3 Section 6.4: Internet Security
Symmetric and Asymmetric Encryption
Protocol Analysis.
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
e-Health Platform End 2 End encryption
A Wireless LAN Security Protocol
CS480 Cryptography and Information Security
Visit for more Learning Resources
Public Key Encryption and the RSA Algorithm
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
Basic Network Encryption
Introduction to security goals and usage of cryptographic algorithms
CS691 M2009 Semester Project PHILIP HUYNH
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
CS691 M2009 Semester Project PHILIP HUYNH
9.2 SECURE CHANNELS Medisetty Swathy.
CS Introduction to Operating Systems
Digital Certificates and X.509
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
Key Management Network Systems Security
Appendix 5: Cryptography p
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Key Management and Distribution
Kerberos Part of project Athena (MIT).
Key Establishment Protocols ~
Install AD Certificate Services
Transport Layer Security (TLS)
CDK: Chapter 7 TvS: Chapter 9
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Cryptographic Protocols
Basic Network Encryption
Public – Private Key Cryptography
Asymmetric Cryptographic Algorithms
Electronic Payment Security Technologies
Purpose: how do computers keep our information secret?
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Integrated Security System
Secure Diffie-Hellman Algorithm
Introduction to Cryptography
A Model For Network Security
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996. 4/18/2019 Ref: Pfleeger96, Ch.4

Symmetric Key Exchange Without Server Assume that two users have a copy of a symmetric encryption key K. For a small number of messages, K may be used for encryption. A new key may be generated (Knew) and K can be used to encrypt Knew, which can be sent to the receiver. 4/18/2019 Ref: Pfleeger96, Ch.4

A Problem with Symmetric Key Exchange Without Server Each pair of users need to share a key that is unique. If there are n pairs, then n(n+1)/2 keys are needed. 4/18/2019 Ref: Pfleeger96, Ch.4

Symmetric Key Exchange with Server Two users request a key from a central key distribution service. The number of keys required is reduced, but the flexibility is also reduced. The key distribution service could also become a bottleneck. 4/18/2019 Ref: Pfleeger96, Ch.4

Asymmetric Key Distribution Without Server Asymmetric (public) encryption reduces the need for individual keys. The vulnerability of the central distribution service is also reduced. Although the messages could be directly encrypted using the public keys, the algorithms tend to be less efficient than symmetric ones. 4/18/2019 Ref: Pfleeger96, Ch.4

Asymmetric Key Distribution Without Server (p.2) Public key authentication could be used to deliver a secret key for efficient symmetric encryption. A generates a secret symmetric key for communications with B--Ks A then encrypts Ks with A’s secret key. A then uses B’s public key to send the encrypted key to A. A then authenticates Ks by decrypting it with A’s public key. 4/18/2019 Ref: Pfleeger96, Ch.4

Asymmetric Key Distribution Without Server (p.3) To verify the key, each side can also send a test message. A random number could be generated, encrypted and sent. The other side could decrypted the number, add one, and then encrypt it and send it back. Finally a distribution center could provide the public keys, in the first place. 4/18/2019 Ref: Pfleeger96, Ch.4

Asymmetric Key Exchange with Server A requests B’s public key from the key distribution center. The distribution center uses its secret key (for authentication) to encrypt B’s public key and identifier and sends it to A. A decrypts the key using the distribution center’s public key and the result is authenticated. 4/18/2019 Ref: Pfleeger96, Ch.4

Asymmetric Key Exchange with Server (p.2) Now A sends can send his identity and a reference encrypted with B’s public key. B communicates with the key distribution center to receive A’s public key. B then encrypts his A’s reference and her own reference for authentication. A then sends a message and B’s reference. 4/18/2019 Ref: Pfleeger96, Ch.4