15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Public Key Infrastructure (PKI)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
1 Authentication Applications Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Computer Science Public Key Management Lecture 5.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Netprog: Kerberos1 KERBEROS. Contents: Introduction History Components Authentication Process Strengths Weaknesses and Solutions Applications References.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
Authentication 3: On The Internet. 2 Readings URL attacks
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Computer and Network Security - Message Digests, Kerberos, PKI –
Using Public Key Cryptography Key management and public key infrastructures.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
KERBEROS SYSTEM Kumar Madugula.
Key Management and Distribution Anand Seetharam CST 312.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Key management issues in PGP
Computer Communication & Networks
Cryptography and Network Security
CS480 Cryptography and Information Security
Chapter 15 Key Management
Message Security, User Authentication, and Key Management
Digital Certificates and X.509
Chapter 15 Key Management
Presentation transcript:

15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management

SYMMETRIC-KEY DISTRIBUTION Symmetric-key cryptography is more efficient than asymmetric-key cryptography for enciphering large messages. Symmetric-key cryptography, however, needs a shared secret key between two parties. The distribution of keys is another problem Key-Distribution Center: KDC Session Keys Topics discussed in this section:

Symmetric Key Distribution Each pair of communicating entities needs a shared key For a n-party system, there are n(n-1)/2 distinct keys in the system and each party needs to maintain n-1 distinct keys. How to reduce the number of shared keys in the system How to securely distribute this key K1K1 K4K4 K2K2 K3K3 K5K5 K6K6 K7K7 K8K8 K9K9 K 10

Key-Distribution Center: KDC Figure 15.1 Key-distribution center (KDC)

15.5 Flat Multiple KDCs Continued Figure 15.2 Flat multiple KDCs

15.6 Hierarchical Multiple KDCs Continued Figure 15.3 Hierarchical multiple KDCs

15.7 A KDC creates a secret key for each member. This secret key can be used only between the member and the KDC, not between two members Session Keys A session symmetric key between two parties is used only once. Note

15.8 A Simple Protocol Using a KDC Continued Figure 15.4 First approach using KDC

15.9 Needham-Schroeder Protocol Continued Figure 15.5 Needham-Schroeder protocol

Continued Figure 15.6 Otway-Rees protocol Otway-Rees Protocol

KERBEROS A backbone network allows several LANs to be connected. In a backbone network, no station is directly connected to the backbone; the stations are part of a LAN, and the backbone connects the LANs Servers Operation Using Different Servers Kerberos Version Realms Topics discussed in this section: Kerberos is an authentication protocol, and at the same time a KDC, that has become very popular. Several systems, including Windows 2000, use Kerberos. Originally designed at MIT, it has gone through several versions.

Servers Figure 15.7 Kerberos servers

15.13 Authentication Server (AS) The authentication server (AS) is the KDC in the Kerberos protocol Continued Ticket-Granting Server (TGS) The ticket-granting server (TGS) issues a ticket for the real server (Bob). Real Server The real server (Bob) provides services for the user (Alice).

Operation Figure 15.8 Kerberos example

15.15 Note that if Alice needs to receive services from different servers, she need repeat only the last four steps Using Different Servers

15.16 The minor differences between version 4 and version 5 are briefly listed below: Kerberos Version 5 1)Version 5 has a longer ticket lifetime. 2)Version 5 allows tickets to be renewed. 3)Version 5 can accept any symmetric-key algorithm. 4)Version 5 uses a different protocol for describing data types. 5)Version 5 has more overhead than version 4.

15.17 Kerberos allows the global distribution of ASs and TGSs, with each system called a realm. A user may get a ticket for a local server or a remote server Realms

PUBLIC-KEY DISTRIBUTION In asymmetric-key cryptography, people do not need to know a symmetric shared key; everyone shields a private key and advertises a public key Public Announcement Trusted Center Controlled Trusted Center Certification Authority X Public-Key Infrastructures (PKI) Topics discussed in this section:

Public Announcement Figure Announcing a public key

Trusted Center Figure Trusted center

Controlled Trusted Center Figure Controlled trusted center

Certification Authority Figure Certification authority

X.509 Certificate Figure shows the format of a certificate.

15.24 Certificate Renewal Each certificate has a period of validity. If there is no problem with the certificate, the CA issues a new certificate before the old one expires Continued Certificate Revoke In some cases a certificate must be revoked before its expiration. Delta Revocation To make revocation more efficient, the delta certificate revocation list (delta CRL) has been introduced.

Continued Figure Certificate revocation format Signature algorithm ID Issuer name This update date Next update date Revoked Certificate. Revoked Certificate

Public-Key Infrastructures (PKI) Figure Some duties of a PKI

15.27 Trust Model Continued Figure PKI hierarchical model

Continued Show how User1, knowing only the public key of the CA (the root), can obtain a verified copy of User3’s public key. Example 15.3 Solution User3 sends a chain of certificates, CA > and CA1 >, to User1. a. User1 validates CA > using the public key of CA. b. User1 extracts the public key of CA1 from CA >. c. User1 validates CA1 > using the public key of CA1. d. User1 extracts the public key of User 3 from CA1 >.

Continued Some Web browsers, such as Netscape and Internet Explorer, include a set of certificates from independent roots without a single, high-level, authority to certify each root. One can find the list of these roots in the Internet Explorer at Tools/Internet Options/Contents/Certificate/Trusted roots (using pull-down menu). The user then can choose any of this root and view the certificate. Example 15.4

Continued Figure Mesh model

Continued Alice is under the authority Root1; Bob is under the authority Root4. Show how Alice can obtain Bob’s verified public key. Example 15.5 Solution Bob sends a chain of certificates from Root4 to Alice. Alice looks at the directory of Root1 to find Root1 > and Root4 > certificates. Using the process shown in Figure below, Alice can verify Bob’s public key. Alice Bob