... Jesús Almansa and Marco Carbone 4th April 2002 { jfa,

Slides:



Advertisements
Similar presentations
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Advertisements

Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Computer Security Key Management. Introduction We distinguish between a session key and a interchange key ( long term key ). The session key is associated.
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
Computer Security Key Management
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
1 Key Management CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 1, 2004.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
Certificateless Authenticated Two-Party Key Agreement Protocols
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
Slide 1 Vitaly Shmatikov CS 378 Public-Key Authentication and Public-Key Infrastructure.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Computer Science Public Key Management Lecture 5.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
X.509 Certificate management in.Net By, Vishnu Kamisetty
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Linux Networking and Security Chapter 8 Making Data Secure.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Formal Analysis of Security Protocols Dr. Changyu Dong
PKI2001(TIFR,Mumbai) PGP Pretty Good Privacy Designed for secure transfer of s with off-line or out of band key distribution.
EE515/IS523 Think Like an Adversary Lecture 3 Crypto Yongdae Kim 한국과학기술원.
Security protocols  Authentication protocols (this lecture)  Electronic voting protocols  Fair exchange protocols  Digital cash protocols.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Nature of Science.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Trust calculus for PKI Roman Novotný, Milan Vereščák.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Chapter 4: Public Key Cryptography
Computer and Network Security - Message Digests, Kerberos, PKI –
Using Public Key Cryptography Key management and public key infrastructures.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Universally Composable Authentication and Key-exchange with Global PKI Ran Canetti (TAU and BU) Daniel Shahaf (TAU) Margarita Vald(TAU) PKC2016 Taipei,
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
Decentralized Access Control: Overview Deepak Garg Foundations of Security and Privacy Fall 2009.
Key management issues in PGP
Copyright © Cengage Learning. All rights reserved.
Sec. 2.3: Apply Deductive Reasoning
Public Key Infrastructure
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography Lecture 27.
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

... Jesús Almansa and Marco Carbone 4th April 2002 { jfa,

2 Two-Party Communication AliceBob Adversary (Passive) unsecured channel secure channel

3 Two-Party Communication Alice Bob Adversary (Active) unsecured channel secure channel

4 Public-Key Cryptography Alice Bob Adversary (Active) unsecured channel

5 Key Management A3A3 A1A1 A4A4 A2A2

6 A3A3 A1A1 A4A4 A2A2 TTP

7 Public-Key Certificate Vouches for the authenticity of the public key bound to the subject entity Usefulness: To prove identity (authenticity of an entity) To avoid denials Good: trust can be used transitively Bad:  all trust placed with one single entity  if TTP is compromised, comm. is insecure

8 Public-Key Infrastructure (PKI) CertificatesTrust Relations Evidences Conclusions associated (confidence) values

9 Pretty Good Privacy (PGP) A widely used software package (Zimmerman) Stalling’s notation: (entity, key) A B pk A signed by pk B

10 Pretty Good Privacy (PGP) certification path web of trust

11 Pretty Good Privacy (PGP) Confidence Values = {unknown, no trust, marginally trusted, fully trusted } pk A is valid if either or pk A

12 Pretty Good Privacy (PGP) Bob Alice Is Bob’s key valid for Alice? : Yes Bob Alice : No

13 Confidence Valuation in a PKI based on Uncertain Evidence (R. Kohlas – U. Maurer) Agenda:  Formalism Basics & Graphical Notation Principles  Modeling Public-Key Certification  Confidence Valuation in PGP  Conclusions

14 Formalism: Basic Definitions Piece of Evidence (Assumption) A statement we suppose is true. Hypothesis A statement not generally known to be true.

15 Formalism: Basic Definitions(2) Argument for h Collection of assumptions from which (along with the belief) h can be derived. Belief Composition of statements taken as a fact.

16 Formalism: Graphical Notation Hypothesis and Evidences: hE

17 Formalism: Graphical Notation(2) Σ Belief:

18 Formalism: Graphical Notation(3) Argument:

19 Formalism: Graphical Notation(4) Validity and Arguments: h Σ

20 Formalism: Basic Definitions(3) Confidence Value Degree of certainty for an assumption or hypothesis to be true. Confidence Assignment Entity’s initial belief w.r.t. each assumption.

21 Formalism: Basic Definitions(4) Reduces a priori information to a single confidence value for the hypothesis Confidence Valuation Function that takes a hypothesis h and a confidence assignment and returns a confidence value for h.

22 Formalism: Graphical Notation(5) Confidence Values:

23 Formalism: Graphical Notation(6) Confidence Assignment:

24 Formalism: Graphical Notation(7) Confidence Valuation: e ()=, hh

25 Confidence Valuation in a PKI based on Uncertain Evidence (R. Kohlas – U. Maurer) Agenda:  Formalism Basics & Graphical Notation Principles  Modeling Public-Key Certification  Confidence Valuation in PGP  Conclusions

26 Principles: P1   e ()=, h h then If

27 Principles: P1 (2)  e ()=, h h then If

28 Principles: P2 then e (), h If   e (), h

29 Principles: P3  f h1h1 h2h2 If

30 Principles: P3 (2) and = f ( ) then e (), h1h1 e ( ), h2h2 =

31 Principles: P4 h2h2 h1h1 If

32 Principles: P4 (2) then e (), h1h1 e (), h2h2 

33 Confidence Valuation in a PKI based on Uncertain Evidence (R. Kohlas – U. Maurer) Agenda:  Formalism Basics & Graphical Notation Principles  Modeling Public-Key Certification  Confidence Valuation in PGP  Conclusions

34 Modeling PK Certification In the particular case of PK Certification: Pairs of entities and keys can be seen like statements The confidence values must be assigned to entities To realize the abstract formalism in a concrete problem: identify pieces of evidence identify possible conclusions define confidence values

35 Modeling PK Certification Alice Bob Carol, K1 Carol, K2 Bob Carol, K1 Alice

36 Confidence Valuation in a PKI based on Uncertain Evidence (R. Kohlas – U. Maurer) Agenda:  Formalism Basics & Graphical Notation Principles  Modeling Public-Key Certification  Confidence Valuation in PGP  Conclusions

37 Confidence Valuation in PGP Statements: Cert K1,X,K2 Aut X,K Trust X,K

38 Confidence Valuation in PGP Cert K1,X,K Aut Y,K1 Trust Y,K1 Aut X,K

39 Confidence Valuation in PGP   e ()=, h h then If P1 holds

40 Confidence Valuation in PGP then e (), h If   e (), h P2 holds

41 Confidence Valuation in PGP  f h1h1 h2h2 If

42 Confidence Valuation in PGP and = f ( ) then e (), h1h1 e (), h2h2 =

43 Confidence Valuation in PGP Bob Alice Is Bob’s key valid for Alice? : Yes Bob Alice : No P3 does not hold!

44 Confidence Valuation in PGP h2h2 h1h1 If

45 Confidence Valuation in PGP then e (), h1h1 e (), h2h2  P4 holds

46 Confidence Valuation in a PKI based on Uncertain Evidence (R. Kohlas – U. Maurer) Agenda:  Formalism Basics & Graphical Notation Principles  Modeling Public-Key Certification  Confidence Valuation in PGP  Conclusions

47 Conclusions Summary Two parts: –Logic –Confidence Valuation Both efficient! What are and how to assign confidence values. In light of what was said, how adequate is it for trust management.