Cryptography and Key Management Basics

Similar documents
Key & Data Storage on Mobile Devices

IT Networks & Security CERT Luncheon Series: Cryptography

EXAM questions for the course TTM Information Security May Part 1

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Table of Contents. Bibliografische Informationen digitalisiert durch

CRIPT - Cryptography and Network Security

An Introduction to Cryptography as Applied to the Smart Grid

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Archived NIST Technical Series Publication

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Computer Security: Principles and Practice

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Security Policy Revision Date: 23 April 2009

Using BroadSAFE TM Technology 07/18/05

CS 758: Cryptography / Network Security

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Key Management and Distribution

SSL A discussion of the Secure Socket Layer

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Recommendation for Cryptographic Key Generation

Overview. SSL Cryptography Overview CHAPTER 1

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Recommendation for Key Management Part 1: General (Revision 3)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

WIRELESS LAN SECURITY FUNDAMENTALS

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri sd&m

Cryptography & Network Security

Chapter 6 Electronic Mail Security

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Introduction to Security and PIX Firewall

Information Security

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

An Introduction to Digital Signature Schemes

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Chapter 8. Network Security

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

CRYPTOGRAPHY IN NETWORK SECURITY

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

SE 4472a / ECE 9064a: Information Security

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Secure Sockets Layer

CSE/EE 461 Lecture 23

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

Cryptography and Network Security

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

VoteID 2011 Internet Voting System with Cast as Intended Verification

Cryptography and network security CNET4523

SPINS: Security Protocols for Sensor Networks

GT 6.0 GSI C Security: Key Concepts

SBClient SSL. Ehab AbuShmais

Overview of Public-Key Cryptography

Cryptography and Network Security Digital Signature

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2. Cryptography 2.4 Digital Signatures

Pulse Secure, LLC. January 9, 2015

SSL Protect your users, start with yourself

Securing Data at Rest ViSolve IT Security Team

Savitribai Phule Pune University

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Cryptography and Network Security: Summary

7 Key Management and PKIs

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Secure Data Exchange Solution

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Advanced Authentication

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Cryptography and Network Security Chapter 15

How To Encrypt Data With Encryption

Managed Portable Security Devices

Deploying EFS: Part 1

Introduction to Cryptography

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

CRYPTOGRAPHY AS A SERVICE

7! Cryptographic Techniques! A Brief Introduction

IPsec Details 1 / 43. IPsec Details

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Security vulnerabilities in the Internet and possible solutions

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Network Security Protocols

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Transcription:

Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 1 / 24

Plan for Today 1 Talk 1: Cryptography and Key Management Basics (Erik Zenner) 2 Talk 2: Public Key Infrastructure (Christian D. Jensen) 3 Discussion Identify open questions If you have questions, don t hesitate to ask (anytime). Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 2 / 24

1 Cryptographic Basics Goals, Algorithms, and Keys Symmetric vs. Asymmetric Cryptography Important Examples 2 Key Management Key Setup Key Life-Cycle 3 Final Remarks Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 3 / 24

Outline Cryptographic Basics 1 Cryptographic Basics Goals, Algorithms, and Keys Symmetric vs. Asymmetric Cryptography Important Examples 2 Key Management Key Setup Key Life-Cycle 3 Final Remarks Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 4 / 24

Protection Goals Cryptographic Basics Goals, Algorithms, and Keys Cryptography is not only about encryption. There exist many potential protection goals: Confidentiality Data Authentication Integrity Authenticity Non-Repudiation Entity Authentication Key Establishment Anonymity... Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 5 / 24

Cryptographic Basics From Algorithm to Solution Goals, Algorithms, and Keys Cryptography is only about the lowest layers when building a security solution. Higher layers are typically handled by Security Engineers. Layer Algorithm / Primitive Scheme Protocol (math) Protocol (tech) Implementation Deployment Example AES, RSA AES-128-CTR, OAEP Diffie-Hellman, Kerberos SSL/TLS, IPSec OpenSSL (C/C++) Portalen Single Sign-on Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 6 / 24

Cryptographic Keys Cryptographic Basics Goals, Algorithms, and Keys Standard Assumption: The attacker knows everything about the security solution with the exception of the key. (Kerckhoffs Principle) Why? Protecting keys is easier than protecting whole implementations. Managing keys (generating, exchanging, storing, changing...) is easier than managing whole implementations. If only the key is secret, all other aspects of the security solution can be publicly scrutinised. Consequence: Protect the key by all means! Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 7 / 24

Cryptographic Basics Purpose of Cryptographic Keys Goals, Algorithms, and Keys The following is a categorisation of cryptographic keys according to what they are used for: Data key: Directly used for the cryptographical purpose, e.g. encryption or authentication. Key-encryption key: Used to encrypt other keys, e.g. in key exchange or key storage. Master key: Used to generate other keys, using a key derivation function (KDF). E.g.: Session Key := KDF(Master Key, Session Number). Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 8 / 24

Symmetric Keys Cryptographic Basics Symmetric vs. Asymmetric Cryptography Cryptographic operations typically involve a sender and a receiver (can be the same person). Symmetric Keys: Sender and receiver use the same key (traditional case). Properties: Short keys (80-256 bit) Fast algorithms Special case: Passwords. Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 9 / 24

Asymmetric Keys Cryptographic Basics Symmetric vs. Asymmetric Cryptography Asymmetric Keys: Sender and receiver use different keys: Public key: publicly available (e.g. for encryption) Private key: personal secret (e.g. for decryption) Properties: Long keys (e.g. RSA: 768-4095 bit) Slow algorithms Advantage: Makes key transport easy if implemented properly. Remark: Public keys are known to the attacker, i.e. no real keys. Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 10 / 24

Cryptographic Basics Example 1: Hybrid Encryption Symmetric vs. Asymmetric Cryptography Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 11 / 24

Cryptographic Basics Example 2: Digital Signature Symmetric vs. Asymmetric Cryptography Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 12 / 24

Cryptographic Basics Algorithm Classification Important Examples If we organise cryptographic algorithms and protocols by protection goals and symmetric vs. asymmetric keys, we obtain the following table: Symmetric Asymmetric Confidentiality Sym. Encryption Asym. Encryption Data Authentication MAC Digital Signatures Entity Authentication Challenge/Response, Challenge/Response, Passwords Zero Knowledge Key Establishment var. var. Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 13 / 24

Important Examples Cryptographic Basics Important Examples The following are examples for such algorithms and protocols: Symmetric Encryption: AEA (AES), DEA (DES), RC4 Asymmetric Encryption: RSA, ElGamal MAC: HMAC, CBC-MAC Digital Signatures: RSA, DSA (DSS), ECDSA Entity Authentication: Password, PIN, OTP, Biometrics, Kerberos, Needham-Schroeder Key Establishment: Diffie-Hellman, IKE, Kerberos, Needham-Schroeder, TTP, Public-Key Infrastructure (PKI) Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 14 / 24

Outline Key Management 1 Cryptographic Basics Goals, Algorithms, and Keys Symmetric vs. Asymmetric Cryptography Important Examples 2 Key Management Key Setup Key Life-Cycle 3 Final Remarks Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 15 / 24

Key Generation Key Management Key Setup Any secret key material has to be generated. Main options: Generated by one party, then sent to the other (key transport). Generated by all parties working together (key agreement). Generated by a trusted third party and sent to all parties. The form of the key material depends on its use (e.g., RSA keys are very different from AES-128 keys). See the relevant standard for details of format and generation. With the exception of passwords, key generation typically requires some kind of random input. Random number generation Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 16 / 24

Key Management Random Number Generation Key Setup Three types of random number generators (often confused): Statistical random number generator: Deterministic algorithm, not cryptographically secure (e.g., rand() from stdlib.h in C/C++). Never use this for cryptographic purposes! Cryptographic random number generator: Deterministic algorithm, cryptographically secure. Be very careful to seed correctly! Be careful to protect the inner state against attacker! Real random number generator: Uses measurements of physical processes to generate real randomness. Too expensive for most applications. Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 17 / 24

Key Exchange Key Management Key Setup In addition to being generated, the key also needs to be distributed to all legitimate parties. How to prevent others from seeing the key? How to authenticate the legitimate parties (sender and receiver)? How to distribute the key to the legitimate parties? How to verify that the legitimate parties received the key? If done remotely: Use cryptography (many different solutions). Sometimes easier: Personal key exchange. Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 18 / 24

Key Storage Key Management Key Life-Cycle Keys have to be stored somehow. Problems include: How to store keys such that only legitimate parties have access? Use more keys? Special case: Passwords (not stored in hardware) How to make backups such that lost keys can be recovered? Prioritise: Availability or security? Backups have to be secured, too! Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 19 / 24

Key Expiration Key Management Key Life-Cycle Keys can (in fact: should) expire sometime. Problems include: How to keep track of key expiration? Inform all users. Set up new key. What happens after expiration? Archive old key material? How? Delete old key material? How? Remember all copies! Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 20 / 24

Key Compromise Key Management Key Life-Cycle Worst case: Key has been compromised because 1 an attacker has potentially had access to the key, or 2 the corresponding cryptographic algorithm was broken. What do we have to do? Key must no longer be used in the future. Key Expiration (see above) All concerned parties have to be informed. Key Revocation (see talk 2) Old documents have to be protected. Re-Encryption? Re-Signing? Destruction of old documents? Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 21 / 24

Outline Final Remarks 1 Cryptographic Basics Goals, Algorithms, and Keys Symmetric vs. Asymmetric Cryptography Important Examples 2 Key Management Key Setup Key Life-Cycle 3 Final Remarks Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 22 / 24

How to Proceed Final Remarks No international standards on key management. Probably to come in the next years No one size fits all solutions. You have to know the usage scenario. Never build your own cryptographic solutions! Use off-the-shelf (or off-the-standard) products. If in doubt, ask cryptographers or IT security engineers. Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 23 / 24

Final Remarks References / Further Reading The following books and references could be useful: N. Ferguson, B. Schneier: Practical Cryptography. Wiley, 2003. A. Menezes, P.C. van Oorschot, S.A. Vanstone: Handbook of Applied Cryptography. (parts of chapters 10,12,13; available online) NIST SP 800-57: Recommendation for Key Management. (3 parts; available online) Erik Zenner (DTU-MAT) Cryptography and Key Management Basics DTU, Oct. 23, 2007 24 / 24