KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT DIFFIE-HELLMAN KEY.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 Digital Signatures Authentication.
Public Key Infrastructure (PKI)
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Chapter3 Public-Key Cryptography and Message Authentication.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
ASYMMETRIC CIPHERS.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 3 Public-Key Cryptography and Key Management.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
1 Information Security Frank Yeong-Sung Lin Department of Information Management National Taiwan University EMBA 2009 – Information Systems and Applications.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI Wade Trappe.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security Rabie A. Ramadan Lecture 6.
1 Network Security Frank Yeong-Sung Lin Department of Information Management National Taiwan University.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography and Network Security Chapter 10
Cryptography and Network Security Key Management and Other Public Key Cryptosystems.
Scott CH Huang COM 5336 Lecture 7 Other Public-Key Cryptosystems Scott CH Huang COM 5336 Cryptography Lecture 7.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Cryptography and Network Security Chapter 14
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Key Management public-key encryption helps address key distribution problems have two aspects of this: – distribution of public keys – use of public-key.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Information Security Lab. Dept. of Computer Engineering 251/ 278 PART II Asymmetric Ciphers Key Management; Other CHAPTER 10 Key Management; Other Public.
Public-Key Cryptography and RSA
Presentation transcript:

KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS - Chapter 10 KEY MANAGEMENT DIFFIE-HELLMAN KEY EXCHANGE ELLIPTIC CURVE ARITHMETIC ELLIPTIC CURVE CRYPTOGRAPHY

KEY MANAGEMENT KEY MANAGEMENT Two Aspects: Distribution of, Public Keys Secret Keys using PKC encryption

DISTRIBUTION OF PUBLIC KEYS DISTRIBUTION OF PUBLIC KEYS PUBLIC ANNOUNCEMENT - easy to forge (e.g. append public key to ) PUBLICLY AVAILABLE DIRECTORY - [name,public-key], secure registration/access PUBLIC-KEY AUTHORITY - shared public/private key pair with each user PUBLIC-KEY CERTIFICATES - exchange authentic keys without contacting authority

UNCONTROLLED PUBLIC-KEY DISTRIBUTION

PUBLIC-KEY PUBLICATION

PUBLIC-KEY DISTRIBUTION SCENARIO

7 EXCHANGE OF PUBLIC-KEY CERTIFICATES

8  Any participant can read certificate to determine name and public key of cert. owner determine name and public key of cert. owner  Any participant can verify that cert. is not counterfeit. counterfeit.  Only the certificate authority can create and update certs. and update certs.  Any participant can verify currency of certificate. certificate.

9 EXCHANGE OF PUBLIC-KEY CERTIFICATES To read and verify: D KU auth [C A ] = D KU auth [E KR auth [T,ID A,K U a ]] = (T,ID A,K U a ) Timestamp counteracts: A’s private key learned by opponent A’s private key learned by opponent A updates private/public key pair A updates private/public key pair Opponent replays old cert. to B Opponent replays old cert. to B B encrypts using old public key B encrypts using old public key

10 PKC TO ESTABLISH SESSION KEY

11 PKC TO ESTABLISH SESSION KEY KU a and KR a discarded afterwards Advantage: No keys before or after protocol But, A  [KU a,ID a ] E  [KU e,ID e ] B B  E KU e [K s ] E  E KU a [K s ] A E learns K s A and B unaware

12 PUBLIC-KEY DISTRIBUTION OF SECRET KEYS

13 PUBLIC-KEY DISTRIBUTION OF SECRET KEYS N1 || N2 prevent eavesdropping Scheme ensures confidentiality and authentication

14 DIFFIE-HELLMAN KEY EXCHANGE

15 DIFFIE-HELLMAN KEY EXCHANGE

16 ELLIPTIC CURVES INSTEAD OF RSA ELLIPTIC CURVES INSTEAD OF RSA  Replace multiplication with ’addition’ (a x a x a ….x a) mod n (a x a x a ….x a) mod n replaced by replaced by (a + a + a … + a) mod {elliptic curve} (a + a + a … + a) mod {elliptic curve} Multiplicative order (size of ’circle’)Multiplicative order (size of ’circle’) replaced by replaced by #points on elliptic curve #points on elliptic curve Elliptic curve defined by cubic equation:Elliptic curve defined by cubic equation: y 2 + xy = x 3 + ax 2 + b y 2 + xy = x 3 + ax 2 + b

17 EXAMPLE OF ELLIPTIC CURVES

18 ELLIPTIC CURVE E 23 (1,1)

19 ECC KEY EXCHANGE

20 ELLIPTIC CURVE vs RSA TABLE 10.2