Key Exchange, Man-in-the-Middle Attack

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Diffie-Hellman Key Exchange
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Public-Key Cryptography CS110 Fall Conventional Encryption.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CSE 331: Introduction to Networks and Security Fall 2001 Instructor: Carl A. Gunter Encrypted Knock Knock.
PUBLIC KEY CRYPTOGRAPHY ALGORITHM Concept and Example 1IT352 | Network Security |Najwa AlGhamdi.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Key Management Network Systems Security Mort Anvari.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Homework #1 J. H. Wang Oct. 9, 2012.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Key Management Other Public-Key Cryptosystems
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Attacks on Public Key Encryption Algorithms
CSCE 715: Network Systems Security
Message Authentication and Hash Functions
Encryption and Integrity
Key Management Session and Interchange Key Key Exchange
Key Exchange References: Applied Cryptography, Bruce Schneier
Cryptographic Hash Function
CMSC 414 Computer and Network Security Lecture 15
CS480 Cryptography and Information Security
Encryption
Presented by: Dr. Munam Ali Shah
Man in the Middle Attacks
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Network Security (contd.)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
9.2 SECURE CHANNELS Medisetty Swathy.
ElGamal Public-Key Systems over GF(p) & GF(2m)
Cryptography and Network Security
Chapter 10: Key Management (Again) and other Public Key Systems
Cryptography and Network Security
Protocol ap1.0: Alice says “I am Alice”
Key Management Network Systems Security
Key Management and Distribution
El Gamal and Diffie Hellman
Cryptography and Network Security Chapter 10
Diffie-Hellman key exchange/agreement algorithm
CSCE 715: Network Systems Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 3 - Public-Key Cryptography & Authentication
CSCE 715: Network Systems Security
Asymmetric Cryptographic Algorithms
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Diffie-Hellman Key Exchange
7/30/2019 Computer Security Ch10: Key management & Other Public Key Cryptosystems Howon Kim 2019.
One-way Hash Function Network Security.
Secure Diffie-Hellman Algorithm
Counter With Cipher Block Chaining-MAC
Symmetric Key Distribution
Digital Signature Standard (DSS)
Digital Signatures Network Security.
Confidentiality, Integrity, Nonrepudiation
Cipher-Based MAC Network Security.
A Model For Network Security
Diffie-Hellman Algorithm
Security Attacks Network Security.
Message Authentication
Security in Wide Area Networks
AIT 682: Network and Systems Security
Presentation transcript:

Key Exchange, Man-in-the-Middle Attack Network Security

Key Exchange, Man-in-the-Middle Attack Objectives of the Topic After completing this topic, a student will be able to describe Man-in-the-Middle Attack while performing key exchange.

Key Exchange, Man-in-the-Middle Attack Figures and material in this topic have been adapted from “Network Security Essentials : Applications and Standards”, 2014, by William Stallings.

Key Exchange, Man-in-the-Middle Attack Key Exchange Protocol: An Example Suppose that user A wishes to set up a connection with user B and use a secret key to encrypt messages on that connection.

Key Exchange, Man-in-the-Middle Attack User A can generate a one-time private key XA, calculate public value YA, and send that to user B. User B responds by generating a private value XB, calculating YB, and sending YB to user A.

Key Exchange, Man-in-the-Middle Attack Both users can now calculate the key. The necessary public values q and α would need to be known ahead of time.

Key Exchange, Man-in-the-Middle Attack

Key Exchange, Man-in-the-Middle Attack Key Exchange Protocol: Another Example Suppose that a group of users (e.g., all users on a LAN) each generate a long-lasting private value Xi (for user i) and calculate a public value Yi.

Key Exchange, Man-in-the-Middle Attack These public values, together with global public values for q and α, are stored in some central directory.

Key Exchange, Man-in-the-Middle Attack At any time, user j can access user i’s public value, calculate a secret key, and use that to send an encrypted message to user i.

Key Exchange, Man-in-the-Middle Attack If the central directory is trusted, then this form of communication provides both confidentiality and a degree of authentication.

Key Exchange, Man-in-the-Middle Attack However, the technique does not protect against replay attacks.

Key Exchange, Man-in-the-Middle Attack Suppose Alice and Bob wish to exchange keys, and Darth is the adversary. The man-in-the-middle attack proceeds as follows

Key Exchange, Man-in-the-Middle Attack 1. Darth prepares for the attack by generating two random private keys XD1 and XD2 and then computing the corresponding public keys YD1 and YD2.

Key Exchange, Man-in-the-Middle Attack 2. Alice transmits YA to Bob. 3. Darth intercepts YA and transmits YD1 to Bob. Darth also calculates K2 = (YA)XD2 mod q.

Key Exchange, Man-in-the-Middle Attack 4. Bob receives YD1 and calculates K1 = (YD1)XB mod q. 5. Bob transmits YB to Alice. 6. Darth intercepts YB and transmits YD2 to Alice. Darth calculates K1 = (YB)XD1 mod q.

Key Exchange, Man-in-the-Middle Attack 7. Alice receives YD2 and calculates K2 = (YD2)XA mod q.

Key Exchange, Man-in-the-Middle Attack At this point, Bob and Alice think that they share a secret key, but instead Bob and Darth share secret key K1 and Alice and Darth share secret key K2. All future communication bet. Bob and Alice works in following way.

Key Exchange, Man-in-the-Middle Attack 1. Alice sends an encrypted message M: E(K2, M). 2. Darth intercepts the encrypted message and decrypts it to recover M. 3. Darth sends Bob E(K1, M) or E(K1, M′), where M′ is any message.

Key Exchange, Man-in-the-Middle Attack In the first case, Darth simply wants to eavesdrop on the communication without altering it. In the second case, Darth wants to modify the message going to Bob.

Key Exchange, Man-in-the-Middle Attack

Key Exchange, Man-in-the-Middle Attack The key exchange protocol is vulnerable to such an attack because it does not authenticate the participants. End