Symmetric Mechanisms for Authentication in IDRP



Similar documents
Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How To Choose Security Class S0 For An Extended Ats Message Service

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SECURITY IN NETWORKS

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Network Security Technology Network Management

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Chapter 10. Network Security

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Module 1: e- Learning

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

IT Networks & Security CERT Luncheon Series: Cryptography

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

An Introduction to Cryptography as Applied to the Smart Grid

Introduction to Computer Security

Overview. SSL Cryptography Overview CHAPTER 1

Lukasz Pater CMMS Administrator and Developer

Guide to Data Field Encryption

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

CRYPTOGRAPHY IN NETWORK SECURITY

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE CHECKLIST FOR IMPLEMENTATION OF GROUND/GROUND ATN NETWORK INFRASTRUCTURE

Cryptography & Digital Signatures

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Recommendation for Cryptographic Key Generation

Computer System Management: Hosting Servers, Miscellaneous

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

The Mathematics of the RSA Public-Key Cryptosystem

Chapter 7: Network security

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Understanding digital certificates

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Table: Security Services (X.800)

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

1 Signatures vs. MACs

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Introduction to Security and PIX Firewall

CSE/EE 461 Lecture 23

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Application Layer (1)

Network Security. HIT Shimrit Tzur-David

CS 758: Cryptography / Network Security

Lecture 9 - Network Security TDTS (ht1)

Computer Security: Principles and Practice

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

How To Encrypt Data With Encryption

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PACIFIC ATN NETWORK SERVICE ACCESS POINT (NSAP) ADDRESSING PLAN

What is network security?

Message Authentication Codes

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Advanced Cryptography

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Savitribai Phule Pune University

This Working Paper provides an introduction to the web services security standards.

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Digital Signature For Text File

CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS- SIMULATION USING NS2

Public Key Cryptography: RSA and Lots of Number Theory

Information Security

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

VoteID 2011 Internet Voting System with Cast as Intended Verification

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Public Key Cryptography and RSA. Review: Number Theory Basics

Properties of Secure Network Communication

An Efficient data storage security algorithm using RSA Algorithm

The application of prime numbers to RSA encryption

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Chapter 6 Electronic Mail Security

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

TELECOMMUNICATION NETWORKS

Cryptography and Key Management Basics

7! Cryptographic Techniques! A Brief Introduction

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

An Introduction to Cryptography and Digital Signatures

Cryptography & Network Security

Chapter 23. Database Security. Security Issues. Database Security

Archived NIST Technical Series Publication

Elements of Security

Key Management Interoperability Protocol (KMIP)

Cryptographic Hash Functions Message Authentication Digital Signatures

Design of a Secure File transfer System Using Hybrid Encryption Techniques

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Public Key (asymmetric) Cryptography

Transcription:

WG1/SG2 WP WG2/WP 488 International Civil Aviation Organization Aeronautical Telecommunication Network Panel (ATNP) WG2 and WG1/SG2 Meetings Honolulu, Hawaii, USA January 1999 Symmetric Mechanisms for Authentication in IDRP Presented by Tom McParland Summary The draft SARPS materials require that digital signatures based on public-key cryptography be used as the authentication mechanism for IDRP authentication. Although, the use of digital signatures follows naturally from the adoption of the X.509 authentication framework, their use may not be optimal in all cases where authentication is to be performed. This paper outlines a hybrid approach which uses an asymmetric algorithm for key distribution and connection establishment and a symmetric authentication mechanism for routing information exchange.

1. Introduction The draft SARPS materials require that digital signatures based on public-key cryptography be used as the authentication mechanism for IDRP authentication. Although, the use of digital signatures follows naturally from the adoption of the X.509 authentication framework, their use may not be optimal in all cases where authentication is to be performed. This paper distinguishes key distribution from connection establishment messaging and routing information exchange messaging, thereby, identifying three environments for IDRP authentication. Within this context, asymmetric and symmetric mechanisms are examined in terms of their operating characteristics. It is proposed that while asymmetric authentication may be appropriate for key distribution, it may not be optimal for authentication of connection establishment messaging in select situations and it is generally not optimal for authentication of routing information exchange messaging. Rather, in these cases, given that non-repudiation is not necessarily required and given the general characteristics of asymmetric cryptography especially with respect to bandwidth limitations of the ATN, symmetric authentication techniques may be more appropriate. 2. Discussion 2.1 Current Requirement for Digital Signature ATNP WG1/WP14-08, which presents draft text for Sub-Volume VIII of Doc 9705, contains the following: 8.3.1.5.1.1 ATN Boundary Intermediate Systems (BISs) supporting ATN security services shall support the use of ATN security provisions for authentication, using digital signatures, of routing exchanges between air-ground and ground BISs and from airborne BISs to air-ground BISs, but not vice versa, as defined in Sub-Volume V. This requirement specifies the explicit use of digital signatures to provide IDRP authentication. 2.2 Digital signatures Annex B (clause B.3.d) in X.509, describes digital signature as follows: This mechanism involves the encipherment, by the originator s private key, of a compressed string of the relevant data to be transferred. The digital signature together with the plain data is sent to the recipient. Similar to the case of the data integrity mechanism, this message can be processed to prove integrity. The digital signature mechanism also proves the authenticity of the originator, and the unambiguous relationship between the originator and the data that was transferred.

The authentication framework supports the digital signature mechanism using an asymmetric scheme. The digital signature mechanism supports the data integrity service but also supports the non-repudiation service. 2.3 Non-repudiation service From a security service perspective, it is the non-repudiation aspect of (asymmetric) digital signature mechanisms which distinguishes them from symmetric origin authentication mechanisms. It is proposed that although non-repudiation is generally desirable for key distribution, it is not required for authentication of IDRP connections and routing exchanges. 2.4 Characteristics of Asymmetric Mechanisms The clear advantage of public-key cryptography is in the area of key distribution. In particular, on an ATN-wide basis, only private keys need be kept secret while public keys may be readily distributed provided they are authenticated. The disadvantage of publickey encryption methods (at least those in general use) is their computational overhead and relatively large key sizes. Within the ATN IDRP environment, the computational performance of public-key encryption is a particular concern for ground-ground routers. In ground-ground operation, it is expected that there will be a significant number of Update BISPDUs to advertise or withdraw routes to aircraft. Thus, the requirement to perform public-key transformations could adversely affect performance, expecially of backbone routers. This is probably less of a concern in air-ground operation since it must be performed at any rate for initial key distribution and the there will be a minimal number of BISPDUs exchanged after the connection is established. In addition, the current requirements only call for single-entity authentication. Signature size is of particular concern in both the air-ground and ground-ground environment. RSA may be considered as an example where signature size is a function of the key length (See Annex D of X.509) The RSA public and private keys are ordered pairs consisting of a public (e) or secret exponent (d) and an arithmetic modulus (n) as follows: Public Key = {e, n} Private Key = {d, n} RSA encryption uses the public key parameters to convert a plaintext message M to ciphertext C as follows: C = M e (mod n)

Conversely, RSA decryption uses the private key parameters to convert ciphertext to plaintext as follows: M = C d (mod n) The data block length, i.e., the length of C or M, will be determined by the modulus. Thus even a conservative length of n, such as 512 bits, could result in data expansion. This is a particular problem for IDRP Authentication Type 2 which has a fixed size of 128 bits for the validation pattern field. Similar problems exist, for example, with the NIST Digital Signature Standard (DSS). As specified, DSS uses the Secure Hash Algorithm (SHA) with a 160-bit message digest. Based on these considerations, it is proposed that WG1 s algorithm analysis place special emphasis on signature size. In the event that a suitable, non-expanding public key algorithm can not be identified, the remaining section of this paper proposes an alternative hybrid approach to IDRP authentication 3. IDRP authentication using symmetric techniques 3.1 General operation The general approach for air-ground operation is to transfer a symmetric session key during the IDRP Open exchange and (if required by local security policy) to apply a symmetric authentication algorithm to accomplish Type 2 Authentication for all subsequent BISPDUs. This approach requires a public key cryptosystem which is reversible and therefore would eliminate signature systems such as DSS which only provide a signature service do not provide for encryption of a session key The general operation is in an air-ground environment consists of the following steps: 1. During the ISH exchange, the Air-ground and Airborne Routers signal their support for strong authentication. 2. The Air-ground router retrieves the aircraft s public-key certificate from a supporting directory service. The Air-ground router authenticates the aircraft s certificate using the certificate authority s public key. 3. The Air-ground router generates a symmetric session key 1 and encrypts the session key using the aircraft s public key. 2 4. The Air-ground router sends an Open PDU with Code 2 in the Authentication Code 3 field and with the encrypted session key in the Authentication Data field. 4 5. The Airborne router sends an Open PDU with Code 2 in the Authentication Code field and its digital signature in the Authentication Data field.

6. Upon receipt of the Open PDU, the Air-ground router authenticates the aircraft s signature using the aircraft s public key. If authentication fails, the connection is terminated. 7. The Airborne and Air-Ground routers include an authenticator as the Validation Pattern field in the header of all subsequent BISPDUs. The authenticator is generated using the symmetric session key. Note 1: Procedures for dynamic session key generation must be developed. Note 2: As noted above not all public-key algorithms have the property of permutability. Note 3: Type 2 Authentication is not applied to the Open PDU itself. Note 4: In this scenario only single entity authentication of connection establishment is performed. If mutual authentication were performed, the Air-ground router s certificate and digital signature would be sent. For ground-ground operation, a symmetric key could be installed through system management with application of appropriate access controls. Type 2 authentication using a symmetric algorithm is then performed on all BISPDUs, 3.2 Candidate cryptographic systems The selection of cryptographic algorithm(s) is the subject of a separate ongoing ATNP WG1/SG2 activity. The IDRP standard (ISO 10747) provided a fixed length field of 128 bits to carry the authentication pattern thus placing a constraint on the cryptographic algorithm selected. 3. Recommendations 1) WG1 should attempt to identify a single asymmetric algorithm which is computationally and bandwidth efficient, with particular attention to the signature size. Requirements for the associated authentication procedure should also be identified. 2) If a suitable asymmetric mechanism can not be identified, then WG1 should make provision for use of an asymmetric algorithm for key distribution and connection establishment and of a symmetric authentication mechanism for routing information exchange. 3) If the item 2 alternative is selected, then WG1 should define requirements for session key generation

4) WG2 is invited to note the alternatives of asymmetric vs. symmetric authentication mechanisms for routing information exchanges and provide feedback to WG1/SG2 as deemed appropriate.