Rennes, 23/10/2014 Cristina Onete Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Rennes, 23/10/2014 Cristina Onete Commitment Schemes and Identification/Authentication.
Pairwise Key Agreement in Broadcasting Networks Ik Rae Jeong.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Rennes, 23/10/2014 Cristina Onete Commitment Schemes and Identification/Authentication.
Rennes, 27/11/2014 Cristina Onete Subject Review, Questions, and Exam Practice.
Rennes, 23/10/2014 Cristina Onete Putting it all together: using multiple primitives together.
Public Key Algorithms …….. RAIT M. Chatterjee.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Authentication System
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Diffie-Hellman Key Exchange
Computer Science Public Key Management Lecture 5.
Public Key Model 8. Cryptography part 2.
Strong Password Protocols
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Rachana Y. Patil 1 1.
Rennes, 15/10/2014 Cristina Onete Message authenticity: Digital Signatures.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Lecture 7b: The Diffie-Hellman Secret Sharing Scheme Wayne Patterson SYCS 653 Fall 2009.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Lecture 11: Strong Passwords
Rennes, 23/10/2014 Cristina Onete Graded Exercises & Authentication.
Key Agreement Guilin Wang School of Computer Science 12 Nov
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
COEN 351 E-Commerce Security
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Key Management Network Systems Security Mort Anvari.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Message Security, User Authentication, and Key Management
Diffie-Hellman Secure Key Exchange 1976.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Key Management Network Systems Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Rennes, 23/10/2014 Cristina Onete Key-Exchange Protocols. Diffie-Hellman, Active Attacks, and TLS/SSL

 Assume we share a Key Alice Bob  Symmetric encryption : Confidentiality of exchanged messages Cristina Onete || 17/11/2014 || 2 Shared Long-term security as long as key is “safe”

 Assume we share a Key Alice Bob  Symmetric authentication – MACs : Authenticity of exchanged messages Cristina Onete || 17/11/2014 || 3 Shared Nobody else can sign while the key is safe But: slightly weaker demand on key-secrecy than for encryption schemes

 Assume we share a Key Prover Verifier  Authentication and Identification Legitimacy of a prover with respect to a verifier Shared Nobody can impersonate prover while the key is safe challenge response Cristina Onete || 17/11/2014 || 4

 How do we get the keys? TTP Alice Bob Generate Cristina Onete || 17/11/2014 || 5

 Key-Exchange: Diffie Hellman Alice Bob Part of Key  Can we send the key part in clear? Cristina Onete || 17/11/2014 || 6

 Secure Key-Exchange Alice Bob  Security goal: If Alice and Bob share a session, their key is indistingui- shable from a random key  All the messages exchanged in that sessions are private and securely authenticated Cristina Onete || 17/11/2014 || 7

 Active attacks on DH Alice Bob Cruella  Exercise 1: Show how Cruella can intercept and inject messages between Alice and Bob Cristina Onete || 17/11/2014 || 8

 Active attacks on DH Alice Bob Cruella  Exercise 2: Show how you prevent this by using a signa- ture scheme Cristina Onete || 17/11/2014 || 9

 Client-Server scenario Bob = Amazon.fr Client  Say server’s transmissions are authenticated during Key- Exchange, but the client’s are not  Say the key exchange is secure  Exercise 3: What does this say about the security against a MiM adversary Cruella? Cristina Onete || 17/11/2014 || 10

 TLS-RSA Bob = Amazon.fr Client  Exercise 4: Explain how the Client and server can agree on a key by using RSA-encryption. What are the security guarantees in this case? Cristina Onete || 17/11/2014 || 11

 TLS-DH Bob = Amazon.fr Client  Exercise 5: How about now? Cristina Onete || 17/11/2014 || 12

CIDRE Thanks!