Doc.: IEEE 802.11-03/492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 1 March 2002 An Authentication layering model Robert Moskowitz Trusecure.

Slides:



Advertisements
Similar presentations
LinkSec Architecture Attempt 3
Advertisements

1 Needham-Schroeder Key Descriptor 11/12/2002 Needham-Schroeder Key Descriptor Robert G. Moskowitz ICSAlabs IEEE 802 Plenary Meeting Kauai, Nov 12, 2002.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Q & A for Discussion Date Submitted: Aug 17, 2010 Presented at IEEE a Teleconference.
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Key Management in Cryptography
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
EAP Mutual Cryptographic Binding draft-ietf-karp-ops-model-03 draft-ietf-karp-ops-model-03 S. Hartman M. Wasserman D. Zhang.
Doc.: IEEE /1066r2 Submission July 2011 Robert Moskowitz, VerizonSlide 1 Link Setup Flow Date: Authors: NameCompanyAddressPhone .
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Doc.: IEEE Submission March 2012 Jani Pellikka, Andrei Gurtov (University of Oulu)Slide 1 Project: IEEE P Working Group.
Lecture 11: Strong Passwords
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Doc.: IEEE HIP-over-TG9 Submission May 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Doc.: IEEE r0 Submission December, 2001 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
Privilege Management Chapter 22.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center
Channel Binding Support for EAP Methods Charles Clancy, Katrin Hoeper.
Doc.: hip-Turorial-KeyManagementProtocols November 2010 Slide 1 Key Management Protocols Opening Pandora's Box Value, Cost, and Future Proofing.
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Doc.: IEEE /230r0 Submission Robert Moskowitz, Trusecure/ICSALabsSlide 1 March 2002 Proxied Preauthorized Roaming Robert Moskowitz Trusecure Corporation.
Network Layer Security Network Systems Security Mort Anvari.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: Authors:
November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 1Submission Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /1212r0 Submission September 2011 IEEE Slide 1 The Purpose and Justification of WAPI Comparing Apples to Apples, not Apples to.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Web Applications Security Cryptography 1
Open issues with PANA Protocol
OAuth WG Conference Call, 11th Jan. 2013
Phil Hunt, Hannes Tschofenig
Encryption and Network Security
NAAS 2.0 Features and Enhancements
TruSecure Corporation
Security Properties Straw Polls
Link Setup Flow July 2011 Date: Authors: Name Company
A View on s Routing A Framework for a Discussion
A Function Orientated Mesh Security Model
27 Febraury 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Sub-committee Status Report.
Link Setup Flow July 2011 Date: Authors: Name Company
Security Mechanisms Network Security.
Robert Moskowitz, Verizon
TruSecure Corporation
Presentation transcript:

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 1 March 2002 An Authentication layering model Robert Moskowitz Trusecure Corporation ICSALabs

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 2 March 2002 Motivation Authentication has grown beyond a small component of security to a self-standing pillar of secure systems design –Monolithic authentication systems are being replaced by componentized systems Develop a layered model for Authentication –flows, channels, algorithms, and entities A clear taxonomy for Authentication This effort is limited to two-party Authentication

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 3 March 2002 The Authentication Model In most authentication systems these layers are not obvious –The channel is frequently not provided The advent of the channel (e.g. EAP) that makes this well defined model valuable Authentication Flow Authentication Channel [optional] Authentication Algorithm Identity & Key

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 4 March 2002 Authentication Flows Three groupings –Unidirectional, Bi-directional, Coupled unidirectional Unidirectional has two state machines –Initiator and Responder Bi-directional as a single state machine –For both the Initiator and Responder –Handles directional reversal and race conditions Coupled unidirectional –2 unidirectional that both must complete before the authentication is finished –Ignores race condition and direction reversal

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 5 March 2002 Unidirectional Versus Bi-directional Unidirectional advantageous –Clear cut Initiator Benefits from smaller Initiator state machine size Bi-directional advantageous –Single state machine –Either party may initiate –Handles race condition –Can ‘emulate’ unidirectional through role enforcement Coupled unidirectional NOT equivalent to bi- directional

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 6 March 2002 Establishing Identities Authentication’s raison d'être is establishing Identities Identities are established by a cryptographic binding Bindings can be based on Symmetric or Asymmetric cryptography

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 7 March 2002 Nature of Cryptographic Bindings Weak binding –Party has the key, but no proof of identity Strong binding –Identity is tied to key Examples of Bindings –Name to Symmetric Key –Two names to Symmetric Key –Name to Asymmetric Key

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 8 March 2002 Using bindings in an authentication algorithm Well-designed algorithm will maximize the trust for each party Examples of an authentication algorithm –Single Identity with key –Two Identities with a single key –Two Identities with keys in a nested algorithm –Two Identities with keys

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 9 March 2002 Authentication Channels An authentication algorithm muxing service Helps further the development and use of good authentication algorithms

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 10 March 2002 What is Mutual Authentication? where the parties authenticate to each other within a single authentication process An authentication process may be called ‘mutual’ and still the following issues are undefined: –Is one or both identities exchanged? –If only one identity is exchanged, is the other identity implied by knowledge of a symmetric key? –Is/are the identities exchange secure? –If two identities are securely exchanged, are they protected with one or two keys? –If two identities, is there one identity exchange, two intertwined exchanges, or two serial or parallel exchanges?

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 11 March 2002 What is Mutual Authentication? Limit the applicability of ‘Mutual Authentication’ to authentication algorithms and how they act on Identity bindings Authentication flows and channels are silent on mutuality –Mutuality is NOT established by a bi-directional or coupled unidirectional flow Appropriate to delineate the requirement of mutual authentication for a system, like in IEEE

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 12 March 2002 What is Mutual Authentication? There are two features that further typify an authentication –Are both identities explicitly included within the algorithm or is one implicit as in AKA. –Is one of the identities not bound to its key, but protected with the other party’s key.

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 13 March 2002 What is Mutual Authentication? the following terminology would be appropriate to describe a particular mutual authentication algorithm –Explicit, Secured Identity Authentication –Implicit, Secured Identity Authentication –Explicit, Unsecured Identity Authentication –Implicit, Unsecured Identity Authentication –Where Explicit means identity is included in the protocol and Secure means the identity is cryptographicly protected

doc.: IEEE /492r0-I Submission Robert Moskowitz, Trusecure/ICSALabsSlide 14 March 2002 Security Associations An SA is a set of policy and key(s) used to protect information The successful authentication creates a unique SA for the two parties Each new authentication creates a new, unique, SA The SA is used to group all the information related to the authentication so that everything can be properly protected within the party and deleted when no longer needed An SA can be bi-directional or unidirectional –One set of keying material in bi-drectional, separate keying material in unidirectional