10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

NETWORK SECURITY.
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 Digital Signatures Authentication.
Cryptography and Network Security Chapter 14
Public Key Infrastructure (PKI)
Chapter 11: Cryptography
Cryptography and Network Security
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Chapter3 Public-Key Cryptography and Message Authentication.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Network and Communications Network Security Department of Computer Science Virginia Commonwealth University.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI Wade Trappe.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Digital Signatures and Authentication Protocols Chapter 13.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT DIFFIE-HELLMAN KEY.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Data Security and Encryption (CSE348) 1. Lecture # 21 2.
Cryptography and Network Security Chapter 14
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Private key
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Key Management and Distribution Anand Seetharam CST 312.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Distribution
Key Management Other Public-Key Cryptosystems
Computer and Network Security
CS480 Cryptography and Information Security
Chapter 10: Key Management (Again) and other Public Key Systems
Key Management Network Systems Security
Key Management and Distribution
Presentation transcript:

10. Key Management

Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography

Key Management Public-key distribution  Public announcement  Public available directory  Public-key authority  Public-key certificates

Public Announcement Public announcement of public keys  Any participant can send his/her public key to any participants or broadcast to the community.

Weakness  Anyone can forge a public announcement  Some user could pretend to be user A and send a public key to another participant or broadcast such a public key. C Public Announcement

Public Available Directory Publicly available directory 1. A trusted authority maintains a directory with a {name, public key} entry for each participants. 2. Each participant registers a public key with the directory authority.

3. A participant may replace the existing key with a new some at any time. 4. Periodically, the authority publishes the entire directory or updates to the directory. Public Available Directory

5. Participants could also access the directory electrically. For this purpose, secure, authenticated communication from the authority to the participant is mandatory. Public Available Directory

 This scheme is more secure, but still has vulnerabilities.  If an opponent get the private key of the directory authority, the opponent could counterfeit public keys in the directory. Public Available Directory

Public-key Authority  Stronger security for public-key distribution can be achieved by providing tighter control over the distribution of public keys from the directory.

1. A sends a timestamped message to the public-key authority containing a request for the current public key of B. Public-key Authority

2. The authority responds with a message that is encrypted using the authority’s private key, KR auth. Public-key Authority

3. A stores B’s public key and also use it to encrypt a message to B containing an identifier of A(ID A ) and a nonce(N 1 ). Public-key Authority

4,5 B retrieves A’s public key from the authority in the same manner as A retrieved B’s public key. Public-key Authority

6. B sends a message to A encrypted with KU a and containing A’s nonce(N 1 ) as well as a new nonce generated by B(N 2 ). Public-key Authority

7. A returns N 2, encrypted using B’s public key, to assure B that is correspondent is A. Public-key Authority

Drawbacks  A total of seven messages are required.  However, the initial four messages need be used only infrequently because both A and B can save the other’s public key for future use.  Public-key authority could be a bottleneck in the system, because a user must access the authority for the public key for every other user that it wishes to contact.  As before, the directory is vulnerable to tampering. Public-key Authority

Public-key Certificates Public-key certificates  Certificates are used to exchange keys without contacting a public-key authority.  A certificate consists of a public key, an identifier of the key owner, and more information with the signature of the whole block signed by a trusted third party.

Public-key Certificates Certificate generation  Each user sends his/her public key to a certificate authority (CA) in a secure manner.  The CA generates a certificate for the user using his/her private key.

Public-key Certificates Public-key exchange  A and B sends their certificates to each other.  Each verify the certificate using the CA’s public key.

Secret-Key Distribution Secret-key distribution via public-key cryptography  Simple secret key distribution  Secret key distribution with confidentiality and authentication  A hybrid scheme

Simple Secret Key Distribution  If A wishes to communicate with B, 1. A generates a public/private key pair {KU a, KR a } and transmits a message to B consisting of KU a and an identifier of A, ID A. 2. B generates a secret key, K s, and transmits it to A, encrypted with A’s public key. 3. A computes D KRa [E KUa [K s ]] to recover the secret key. 4. A discards KU a and KR a and B discards KU a.

 A and B can now securely communicate using conventional encryption and the session key K s.  However, this protocol is vulnerable to an active attack.  Man-in-the-middle attack  An opponent E can compromise the communication without being detected. Simple Secret Key Distribution

Man-in-the-middle attack 1. A generates a public/private key pair {KU a, KR a } and transmits a message intended for B consisting of KU a and ID A. 2. E intercepts the message, creates its own public/private key pair {KU e, KR e } and transmits KU e ||ID A to B. AEB (1) KU a ||ID A (2) KU e ||ID A (3) E KUe [K s ](4) E KUa [K s ] Simple Secret Key Distribution

Man-in-the-middle attack 4. B generates a secret key K s, and transmits E KUe [K s ]. 5. E intercepts the message and learns K s by computing D KRe [E KUe [K s ]]. 6. E transmits E KUa [K s ] to A. Simple Secret Key Distribution AEB (1) KU a ||ID A (2) KU e ||ID A (3) E KUe [K s ](4) E KUa [K s ]

Man-in-the-middle attack  Both A and B know K s and are unaware that E knows K s.  Knowing K s, E can decrypt all encrypted messages between A and B. Simple Secret Key Distribution

Secret Key distribution with Confidentiality and Authentication Secret Key Distribution with Confidentiality and Authentication  Assume that A and B have exchanged public key

1. A uses B’s public key to encrypt a message to B obtaining an identifier of A (ID A ) and a nonce (N 1 ), used to identify this transaction uniquely. 2. B sends a message to A encrypted with KU a and obtaining A’s nonce(N 1 ) as well as a now nonce generated by B(N 2 ). Secret Key distribution with Confidentiality and Authentication

3. A returns N 2, encrypted using B’s public key, to assure B that its correspondent is A. 4. A selects a secret key K s and sends M = E KUb [E KRa [K s ]] to B. Encryption of this message with B’s public key ensures that only B can read it; Encryption with A’s private key ensures that only A could have sent it. 5. B computes D KUa [D KRb [M]] to recover the secret key. Secret Key distribution with Confidentiality and Authentication

 This approach provides protection against both active and passive attacks.  Note that the first 3 step of this scheme are the same as that last 3 steps of Public-key authority scheme.  This scheme ensures both confidentiality and authentication in the exchange of a secret key. Secret Key distribution with Confidentiality and Authentication

Hybrid Scheme A Hybrid Scheme  The use of a key distribution center (KDC) that shares a secret master key with each user and distributes secret session keys encrypted with the master key.  A public key scheme is used to distribute the master keys.

 Performance  Distribution of session key by public-key encryption could degrade overall system performance.  With a 3-level hierarchy, public-key encryption is used only occasionally to update the master key between a user and the KDC.  Backward Compatibility  The hybrid scheme is easily overlaid on an existing KDC scheme, with minimal disruption or software changes. Hybrid Scheme