Download presentation
Presentation is loading. Please wait.
Published byGeorge Stevenson Modified over 8 years ago
1
S/MIME IBE Submissions Terence Spies Voltage Security
2
Submission Documents Draft-ietf-smime-ibearch-00 –Overview of how the IBE protocols work Draft-ietf-smime-ibcs-00 –Complete description of IBE cryptomath Draft-ietf-smime-bfibecms-00 –How to encode in CMS Draft-ietf-smime-ibepkg-00 –How to fetch a private key Draft-ietf-smime-ibepps-00 –How to fetch a public parameter set
3
Ibearch SenderRecipient Key ServerPublic Param Server CMS Message ibecms ibepps ibepkg Get encryption parameters Ibeibcs - describes mathematical primitives Get decryption key
4
Ibcs Describes 4 basic operations –Generate master secret and parameters –Encrypt to an identity –Derive a decryption key from an identity –Decrypt with decryption key Two mathematical options –Boneh-Franklin older system –Boneh-Boyen preferred for future development
5
Bfibecms Describes encoding the IBE encrypted message key into OtherRecipientInfo field This field contains –Recipient identity –Server location –Key fetch method –Encrypted key data All data needed to request the decryption key and decrypt
6
Ibepkg Describes XML key request format Server can reply with any auth request –Basic and digest auth are described Server can also reply with a URL –This specifies an external authentication server –Client should receive a token and rerequest key with token in the request
7
Ibepps Public parameters describing how to encrypt Contains –IBE parameter data –URI of the associated key server –Identity schema supported by the server Email schema is defined in ibecms
8
Known defects Need real security considerations section Need to fix some ASN.1 bugs ASCII is munged for ‘ in the docs
9
Questions Is this the right document structure? –Combine PP+PKG+Arch –Leaves CMS, Math, Protocols Are the XML request structures correct? IPR Statement
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.