Public Key Management Brent Waters. Page 2 Last Time  Saw multiple one-way function candidates for sigs. OWP (AES) Discrete Log Trapdoor Permutation.

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Key Distribution CS 470 Introduction to Applied Cryptography
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Computer Science Public Key Management Lecture 5.
Applied Cryptography Spring 2015 Digital signatures.
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
Bob can sign a message using a digital signature generation algorithm
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Networks Management and Security Lecture 3.
Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Key management issues in PGP
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
CS480 Cryptography and Information Security
Chapter 15 Key Management
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Digital Certificates and X.509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 15 Key Management
Presentation transcript:

Public Key Management Brent Waters

Page 2 Last Time  Saw multiple one-way function candidates for sigs. OWP (AES) Discrete Log Trapdoor Permutation (RSA)  Went over RSA-based signatures in detail

Page 3 DSA (Digital Signature Algorithm)  Discrete log based signature scheme Similar to El Gamal Signatures  1991 NIST proposed Became first govt. adopted signature scheme  Short signatures bit components  Slow signing and verification Exponentiation  Awkward description Security reduces to funny assumption

Page 4 Why DSA standard? RSA  Patent (until 2000)  Longer sigs ~200 bytes  Encryption (Export Controls) DSA  Patent Free  Short Signatures ~40bytes  No encryption

Page 5 Public Key Management  How does Alice obtain Bob’s public key  Answer: Certificate Authority signs other keys master-key CA I am Public Key Certificate Encrypted Message

Page 6 Certificates  X.509 Standard cert= name, org, address | public key |expiration |... + signature of certificate by C.A. Extensions (Version 3) Sign certs only... Bob obtains certificate offline

Page 7 How do we validate Certificate Auth?  Alice must have public key of certificate authority  Publish in N.Y. Times Everyone see, adversary cannot forge all Make sure Jayson Blair not on staff Not realistic  Ships with Browser or Operating System Done in practice

Page 8 Trust in CA  C.A. is trusted  If compromised can forge a cert for Bob Attack might be detected  CA key should be strongly guarded BBN SafeKeeper: tempest attacks

Page 9 Public Key Generation Algorithm  1) Alice generates pub/priv. key pair sends pub to CA  2) CA verifies Alice knows private key Challenge/response Self-signed certificate  3) CA generates cert and sends to Alice  CA doesn’t know Alice’s key

Page 10 Trust models (Symmetric vs Public) KDC A1 SymmetricPublic Key A2A3A4 CA A1A2 Pub/cert

Page 11 Trust models (Symmetric vs Public) Symmetric  Online KDC  Knows my key  If compromised past+future gone (forward security helps—guesses?) Public  Offline  Knows only public key Harder to do attack  Only future messages exposed

Page 12 Cross Domain Certification CA1CA2 AA Many domains, can’t load them all How does Bob verify if doesn’t even have CA key?

Page 13 Hierarchical solution root Stanford cs Amazon Cert chain: Check cert all way to root Hierarchies are pretty flat in practice

Page 14 Web of Trust No authority: I trust A who trusts B.... Which model do you like better? ABC

Page 15 Certificate Revocation  Revoke Bob’s certificate Private key is stolen Leaves company, doesn’t own ID I. Expiration Date in Cert (1 year) II. CRL Periodically send lists to everyone Long lists, hard to manage III. OSCP (Online Certificate status protocol) Online authority to answer queries Signing key at risk if distribute authorities

Page 16 Certificate Revocation Secure VA VA1 VA2 A Is B revoked Proof of Y/N Order revoked certs and build hash tree Secure VA signs root Either show path of revoked or prove by neighbors

Page 17 A bit disappointing... , but now have an on-line party again

Page 18 Price of Security  How much for 1 year certificate?  $349  40 bit security on some browsers  $995 (Pro Version)

Page 19 Certificates in Practice

Page 20 Certificates in Practice

Page 21 Certificates in Practice

Page 22 How many “root” certs on your browser? I Counted 105