Download presentation
Presentation is loading. Please wait.
Published byJuliana Freeman Modified over 9 years ago
1
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols
2
Key management Nearly all Internet security protocols make use of cryptography for authentication, integrity, and/or confidentiality Cryptography requires key management Key Management tends to be expensive by any measure: Protocol complexity Infrastructure Processing power
3
Many ways to manage keys Internet security protocols support a vast number of environments and situations Many key management approaches: Pre-shared keys Public key cryptography Key distribution centers
4
Pre-shared keys Start with a manually installed secret value Must be installed in each peer Traffic rarely protected directly with the pre-shared key Exchange single-use values (nonces) Use key derivation function (KDF) to generate a fresh key for traffic protection A B
5
Public key cryptography (1) Avoids manual installation in peers Two ways public key cryptography can be used to establish a key for traffic protection: Key agreement – exchange public keys and compute a pairwise secret value Key transport – sender makes up the traffic key and encrypts it with the public key of the receiver; receiver decrypts with their own private key A B
6
Public key cryptography (2) Need to identify the party that holds the private key that corresponds to the received public key Two primary approaches: Leap of faith Certificates
7
Leap of faith No infrastructure Server gives client its public key Man-in-the-middle attack is possible May verify the public key out-of-band Client remembers the public key for server If public key changes, the man-in-the-middle is detected Or, did the server just changed its public key?
8
Certificates Certificates bind an identity to a public key A certificate contains: Subject’s Name Subject’s Public Key Validity Period Issuer’s Name Certificate Authority (CA) establishes and maintains an accurate binding between the public key and attributes contained in a certificate
9
Certification path Alice can verify Bob’s certificate by verifying a chain of certificates starting at one issued by a Certification Authority (CA) that she trusts
10
Key distribution center On-line trusted party to pass out keys KDC must have a relationship with all peers The initiator exchange with the KDC might be based on a pre-shared secret value (like a password) or based on public key cryptography A B KDC 2. 3. 1.
11
Enrollment Establishing the first key is the most expensive part of key management Basis for trust in the keys Pre-shared keys – manual installation Public key cryptography – public key certification Key distribution centers – manual installation, public key certification, or some for of registration
12
IETF protocol efforts (1) Many protocols that support more than one of the key management approaches: Pre-shared keys Public key cryptography Key distribution centers
13
IETF protocol efforts (2) IKEv1 and IKEv2 – Pre-shared keys and Public key cryptography TLS – Pre-shared keys and Public key cryptography Secure Shell – Public key cryptography Supports Leap of faith and Certificates EAP – Pre-shared keys, Public key cryptography, and Key distribution centers CMS – Pre-shared keys and Public key cryptography Kerberos – Key distribution centers With authentication to KDC based on Pre-shared keys or Public key cryptography
14
IETF enrollment efforts (1) KeyProv – provision shared symmetric key for one- time password device and other tokens Dynamic Symmetric Key Provisioning Protocol Single or multiple key requests Optional user authentication with out-of-band pass code Time out policy Key renewal, which may replace factory-loaded key End-to-End Protection of keying material Two key formats: Portable Symmetric Key Container (XML) Symmetric Key Package Content Type (ASN.1)
15
IETF enrollment efforts (2) Keys for TCP Authentication Option (TCP-AO) TCP-AO is initial use case, but the solution ought to work for other situations where a table of keys is needed Support unicast and multicast security protocols Manage tables of keys for the peers Table includes key identifiers, algorithm identifiers, protocol identifiers, usage period, and key derivation key (KDK) Traffic key derived from protocol information and the KDK in the table
16
IETF enrollment efforts (3) Clear need for standards that simplify the enrollment process for certificates, but the previous work on this topic was not fruitful
17
Algorithm agility Design principle to support more than one cryptographic algorithm in all IETF security protocols Negotiation increases complexity Allows transition when an algorithm gets old or broken Implementations support a set of algorithms Long cycle to specify standard, implement, test, and deploy support for new algorithm
18
Role for NIST Credibility: many mandatory to implement algorithms are from NIST specifications NIST is the source of important algorithms DES 3DES AES MD5 SHA-1 SHA-256 ?? Important note: Internet security community sees need for transition in these cases
19
Word of warning Where there is a security flaw, the Internet security community is willing to expend the effort to transition algorithms Without such a motivation, there is significant resistance to change for alignment with specifications from any source Implementation, test, and deployment cost Interoperability issues
20
Questions? For those viewing via webcast, please submit questions for this presentation to kmwquestions@nist.gov
21
Thank you Russ Housley Phone: +1 703 435 1775 Email: housley@vigilsec.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.