The devil is in the details

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Cryptography and Network Security Chapter 17
Chapter 8 Web Security.
Computer Science Public Key Management Lecture 5.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 21 Distributed System Security Copyright © 2008.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
The Secure Sockets Layer (SSL) Protocol
Key management issues in PGP
Chapter 5 Network Security Protocols in Practice Part I
IPSecurity.
Electronic mail security
Cryptography: an overview
Cryptography and Network Security
Cryptography and Network Security
CSE 4905 IPsec II.
Secure Sockets Layer (SSL)
e-Health Platform End 2 End encryption
CS480 Cryptography and Information Security
Authentication Applications
S/MIME T ANANDHAN.
CSE 4095 Transport Layer Security TLS, Part II
Cryptography and Network Security
Message Security, User Authentication, and Key Management
Cryptography and Network Security
ELECTRONIC MAIL SECURITY
SSL (Secure Socket Layer)
Resource Certificate Profile
ELECTRONIC MAIL SECURITY
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Protocol ap1.0: Alice says “I am Alice”
Chapter 4 Cryptography / Encryption
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Cryptography and Network Security
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

The devil is in the details Migration strategies for cryptographic algorithms (Migration to quantum-safe algorithms) Erik Andersen Andersen's L-Service Member of the Danish TC57 committee & WG15 Member of ITU-T Study Group 17, Question 11 era@x500.eu

Interworking issue When moving to new cryptographic algorithms not everybody will move at the same time (no big bang) Will potentially create interworking problems Solution: During a migration period duplicate the cryptographic algorithm(s)

The strategy At the start of the migration period, two cryptographic algorithms of a particular type are allowed to be included in specific way The native algorithm used before start of migration period together with associated information An alternative, assumingly stronger algorithm together with associated information An advanced entity will include both algorithms A back level entity will include only the native algorithm

The strategy (Cont.) The alternative algorithm and associated information shall be specified in such a way that a back level recipient can ignored it A back level recipient will ignore the alternative algorithm, but validate according to the native one An advanced recipient will validate according to the alternative algorithm At the end of the migration period, the alternative algorithm becomes the new native algorithm

Two different cases X.509 data types with extension mechanism: Public-key certificates Attribute certificates Certificate Revocation Lists (CRLs) Authorization and Validation Lists (AVLs) Communications protocols

Extension characteristics A supported extension shall be processed An unsupported non-critical extension shall be ignored These characteristics are utilized for migration purposes

Public-key certificate Version Serial Number Issuer signature algorithm Extension 1 Issuer Extension 2 Validity Subject Alternative Signature algorithm Subject’s public key info Issuer Unique Id Alternative subject’s public key info Subject Unique Id Alternative Signature Extensions Signature algorithm Signature Extension n

Protocol migration considerations When cryptographic algorithms may be negotiated before its use When cryptographic algorithms cannot be negotiated before its use Special considerations for new protocols Special considerations existing protocols Special considerations whether ASN.1 extension marks are supported or not Special considerations for digital signatures

Use or non-use of handshake A formal handshake exchange before the data transfer phase allows: Cryptographic algorithms not used during the handshake can be negotiated. Cryptographic algorithms used during the handshake require special measures for migration. Non-use of handshake requires special measures for all used cryptographic algorithms

Negotiation mechanism during handshake A sending entity provides a sequence of cryptographic algorithm alternatives in a handshake request The recipient shall take the first top one it supports to be included in the handshake accept During the migration period: The sender puts the alternative cryptographic algorithm at the top and the native cryptographic algorithm as number two If the recipient supports the alternative algorithm, that is returned in the accept. Otherwise, it takes the second alternative. Should be clearly specified in the English text

Where negotiation not possible Protocols without handshake Cryptographic algorithms used during the handshake

Adding alternative algorithm to existing association request when extension marks are used Before: HandshakeReq ::= SEQUENCE { - - - crypt AlgorithmIdentifier{{SupportedSymmetricKeyAlgorithms}}, ... } After: HandshakeReq ::= SEQUENCE { - - - crypt AlgorithmIdentifier{{SupportedSymmetricKeyAlgorithms}}, ..., altCrypt AlgorithmIdentifier{{SupportedSymmetricKeyAlgorithms}} }

Adding alternative algorithm to existing association request when extension marks are not used The parameter field of an algorithm specifications may be any data type. This allows for defining multiple algorithms within a single algorithm specification multipleSignaturesAlgo ALGORITHM ::= { PARMS MultipleSignaturesAlgo IDENTIFIED BY id-algo-multipleEncryptionAlgo } MultipleSignaturesAlgo ::= SEQUENCE SIZE (1..MAX) OF algo SEQUENCE { algorithm ALGORITHM.&id({SupportedSignatureAlgorithms}), parameter ALGORITHM.&Type({SupportedSignatureAlgorithms}{@algorithm}) OPTIONAL, ... } Pro: No change to the specification Con: Change to implementations The necessary specification, including object identifiers, are defined in Rec. ITU-T X.510 | IEC 9594-11

Signature on Application Protocol Data Unit (APDU) Protected by signature Signature algorithm ToBeSigned Signature algorithm Signature SIGNED{ToBeSigned} ::= SEQUENCE { toBeSigned ToBeSigned, algorithmIdentifier AlgorithmIdentifier{{SupportedAlgorithms}}, signature BIT STRING, ... }

Alt. Signature on APDU for new protocols Protected by signature Signature algorithm Ignore if algorithm not supported Alt. signature algorithm ToBeSigned Signature algorithm Extension mark Signature Extended SIGNED data type Alt. signature algorithm Optional - to be ignored if algorithm not supported Alt. Signature SIGNED{ToBeSigned} ::= SEQUENCE { toBeSigned ToBeSigned, algorithmIdentifier AlgorithmIdentifier{{SupportedAlgorithms}}, signature BIT STRING, ..., altAlgorithmIdentifier AlgorithmIdentifier{{SupportedAlgorithms}} OPTIONAL, altSignature BIT STRING OPTIONAL }

Alt. Signature on Application Protocol Data Unit (APDU) - 2 Request: --- sigAlg AlgorithmIdentifier {{SupportedSignatureAlgorithms}}, altSigAlg [0] AlgorithmIdentifier {{SupportedSignatureAlgorithms}} OPTIONAL, Response: --- sigSel CHOICE { sigAlg AlgorithmIdentifier {{SupportedSignatureAlgorithms}}, altSigAlg [0] AlgorithmIdentifier {{SupportedSignatureAlgorithms}} }, The responder is able to indicate that it has migrated, which might be used in subsequent communications

Alt. Signature on APDU for an existing protocols with extension marks supported Protected by signature Signature algorithm ToBeSigned Protected by signature Alt. signature algorithm Signature algorithm Extension marks Signature Extended SIGNED data type Alt. signature algorithm Optional - to be ignored Alt. Signature SIGNED{ToBeSigned} ::= SEQUENCE { toBeSigned ToBeSigned, algorithmIdentifier AlgorithmIdentifier{{SupportedAlgorithms}}, signature BIT STRING, ..., altAlgorithmIdentifier AlgorithmIdentifier{{SupportedAlgorithms}} OPTIONAL, altSignature BIT STRING OPTIONAL }

Protection during data transfer phase For performance reasons, data transfer APDUs are typically not protected by digital signatures, but by so-called Message Authentication Code (MAC). A MAC is also called an Integrity Check Value (ICV). This term is used here

An ICV data type corresponding to SIGNED data type ICV{ToBeProtected} ::= SEQUENCE { toBeProtected ToBeProtected, nonce OCTET STRING OPTIONAL, algorithmIdentifier AlgorithmIdentifier{{SupportedIcvAlgorithms}}, icv OCTET STRING, altAlgorithmIdentifier AlgorithmIdentifier{{SupportedIcvAlgorithms}} OPTIONAL, altIcv OCTET STRING OPTIONAL, ... } Only necessary if ICV algorithm not negotiated during handshake Defined in Rec. ITU-T X.510 | ISO/IEC 9594-11

Outstanding issue Two entities need to share symmetric keys For encryption For generation and validation of ICVs Such keys need to be established in some way How to migrate current methods are presently not clear!

Methods for establishing symmetric keys between two entities Key distribution - not scalable Key transport (key encryption) - RSA dependent Key agreement, e.g., Diffie-Hellman Results in a shared secret One or more symmetric key generated from shared secret using some algorithm, e.g., HMAC-based Extract-and- Expand Key Derivation Function (HKDF) (RFC 5869) Currently used by IEC 62351-4 and X.510

Methods for establishing symmetric keys between two entities What are the future symmetric key establishment algorithms? Some kind of "Diffie-Hellman" techniques Key encapsulation methods, e.g., QC-MDPC (Quasi Cyclic - Moderate Density Parity Check) Difficult to make a migration strategy without knowing where to go

Key encapsulation method (KEM) Key encapsulation different from key encryption (using RSA) Bob generates a public/private key pair Alice feeds Bob's public key into the KEM algorithm to create and encapsulate an AES key BOB uses his private key to decapsulate the AES key QC-MDPC (Quasi Cyclic - Moderate Density Parity Check) is (hopefully) a quantum-safe KEM A hybrid technique increases the security

Documentation Specification of extensions with procedures, e.g., for public-key certificates, is in Rec. ITU-T X.509 | ISO/IEC 9594-8 to be finally approved later this year for publication early 2020 Migration techniques for communications protocols provided as normative ASN.1 specifications and as an informative annex within Rec. ITU-T X.510 | ISO/IEC 9594-11. Final approval expected spring 2020 and publication later 2020. The protocol specified by Rec. ITU-T X.510 | ISO/IEC 9594-11 includes the migration methods (taking its own medicine)

End