Key Management and Distribution



Similar documents
Chapter 14. Key management and Distribution. Symmetric Key Distribution Using Symmetric Encryption

Key Management and Distribution

Introduction to Network Security Key Management and Distribution

Cryptography and Network Security Chapter 14

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Key Management and Distribution

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Message authentication and. digital signatures

Overview. SSL Cryptography Overview CHAPTER 1

Network Security Protocols

Authentication Applications

CS 392/681 - Computer Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Authentication Application

7 Key Management and PKIs

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Cryptography and Key Management Basics

SSL A discussion of the Secure Socket Layer

Internet Security. Contents. ITS335: IT Security. Internet Security. Secure . Summary

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Module 7 Security CS655! 7-1!

IT Networks & Security CERT Luncheon Series: Cryptography

Chapter 5: Network Layer Security

Internet Privacy Options

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

SSL/TLS: The Ugly Truth

IP Security. Ola Flygt Växjö University, Sweden

How To Understand And Understand The Security Of A Key Infrastructure

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security vulnerabilities in the Internet and possible solutions

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

TELE 301 Network Management. Lecture 18: Network Security

Client Server Registration Protocol

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Authentication Applications

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

How To Make A Trustless Certificate Authority Secure

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Mobin Javed. October 5, 2011

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

IPsec Details 1 / 43. IPsec Details

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

IPv6 First Hop Security Protecting Your IPv6 Access Network

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Security Digital Certificate Manager

Public Key Infrastructure for a Higher Education Environment

Bit Chat: A Peer-to-Peer Instant Messenger

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Security Digital Certificate Manager

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

User authentication in SIP

Key Management (Distribution and Certification) (1)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cleaning Encrypted Traffic

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

CS 4803 Computer and Network Security

5. Security in the IPN

EXAM questions for the course TTM Information Security May Part 1

Chapter 10. Network Security

Asymmetric cryptosystems fundamental problem: authentication of public keys

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Naming vs. Locating Entities

Computer and Network Security. Outline

SANE: A Protection Architecture For Enterprise Networks

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

1 Public Key Cryptography and Information Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Public Key Infrastructure (PKI)

Network Authentication X Secure the Edge of the Network - Technical White Paper

Message Authentication Codes

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

IBM i Version 7.3. Security Digital Certificate Manager IBM

WIRELESS LAN SECURITY FUNDAMENTALS

Simple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)

Cryptography and network security CNET4523

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Generic Aspects and Special Issues for High Speed Networks. Carsten Benecke, DFN-FWL, University of Hamburg

PKI: Public Key Infrastructure

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Transcription:

and Distribution CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 January 2011 CSS322Y10S2L12, Steve/Courses/CSS322/Lectures/key.tex, r1640

Contents and Management using Encryption using Encryption Distribution of Certificates

and Management key cryptography: fast implementations, good for encrypting large amounts of data; requires shared secret key (public) key cryptography: inefficient for large data, good for authentication; no need to share a secret How to share symmetric keys? How to distribute public keys?

Contents and Management using Encryption using Encryption Distribution of Certificates

using Encryption Objective: two entities share same secret key Principle: change keys frequently How to exchange a secret key? 1. A physically delivers key to B 2. Third party, C, can physically deliver key to A and B 3. If A and B already have a key, can securely transmit new key to each other, encrypted with old key 4. If A and B have secure connection with third party C, C can securely send keys to A and B Option 1 and 2: manual delivery; feasible if number of entites is small (link encryption) Option 3: requires initial distribution of key; discovery of initial key releases all subsequent keys Option 4: requires initial distribution of key with C; practical for large-scale systems (end-to-end encryption)

Link Encryption vs End-to-End Encryption Link Encryption Encrypt data over individual links in network Each link end-point shares a secret key Decrypt/Encrypt at each device in path Requires all links/devices to support encryption End-to-End Encryption Encrypt data at network end-points (e.g. hosts or applications) Each pair of hosts/applications share a secret key Does not rely on intermediate network devices

How Many Keys Need To Be Exchanged? A B SW1 SW3 R2 SW5 F G C R1 SW4 R3 H D E SW2 R4 SW6 I J Link-level encryption? End-to-end encryption between hosts? End-to-end encryption between applications?

Using a Centre Centre (KDC) is trusted third party Hierarchy of keys used: Data sent between end-systems encrypted with temporary session key Session keys obtained from KDC over network; encrypted with master key Master keys can be distributed using manual delivery

Use of a Key Hierarchy

Scenario

KDC Scenario Notation End-systems: A and B, identified by ID A and ID B Master keys: K a, K b Session key (between A and B): K s Nonce values: N 1, N 2 E.g. timestamp, counter, random value Must be different for each request Must be difficult for attacker to guess

Practical Considerations Hierarchical Key Control Use multiple KDCs in a hierarchy E.g. KDC for each LAN (or building); central KDC to exchange keys between hosts in different LANs Reduces effort in key distribution; limits damage if local KDC is compromised Session Key Lifetime Shorter lifetime is more secure; but increases overhead of exchanges Connection-oriented protocols (e.g. TCP): new session key for each connection Connection-less protocols (e.g. UDP/IP): change after fixed period or certain number of packets sent

Decentralised Alternative that doesn t rely on KDC Each end-system must manually exchange n 1 master keys (K m ) with others

Contents and Management using Encryption using Encryption Distribution of Certificates

using Encryption encryption generally too slow for encrypting large amount of data Common application of asymmetric encryption is exchanging secret keys Three examples: 1. Simple Secret 2. Secret with Confidentiality and Authentication 3. Hybrid Scheme: Public- of KDC Master Keys

Simple Secret Simple: no keys prior to or after communication Provides confidentiality for session key Subject to man-in-the-middle attack Only useful if attacker cannot modify/insert messages

Man-in-the-Middle Attack

Secret with Confidentiality and Authentication Provides both confidentiality and authentication in exchange of secret key

Hybrid Scheme: Public- of KDC Master Keys Use public-key distribution of secret keys when exchaning master keys between end-systems and KDC Efficient method of delivering master keys (rather than manual delivery) Useful for large networks, widely distributed set of users with single KDC

Contents and Management using Encryption using Encryption Distribution of Certificates

Distribution of By design, public keys are made public Issue: how to ensure public key of A actually belongs to A (and not someone pretending to be A) Four approaches for distributing public keys 1. Public announcement 2. Publicly available directory 3. Public-key authority 4. Public-key certificates

Public Announcements Make public key available in open forum: newspaper, email signature, website, conference,... Problem: anyone can announce a key pretending to be another user

Publicly Available Directory All users publish keys in central directory Users must provide identification when publishing key Users can access directory electronically Weakness: directory must be secure

Public-Key Authority Specific instance of using publicly available directory Assume each user has already security published public-key at authority; each user knows authorities public key

Public-Key Authority First 5 messages are for key exchange; last 2 are authentication of users Although 7 messages, public keys obtained from authority can be cached Problem: authority can be bottleneck Alternative: public-key certificates

Public-Key Certificates Assume public keys sent to CA can be authenticated by CA; each user has certificate of CA

Public Key Certificates A certificate is the ID and public-key of a user signed by CA C A = E(PR auth, [T ID A PU a ]) Timestamp T validates currency of certificate (expiration date) Common format for certificates is standard (by ITU) S/MIME (secure email) IP security (network layer security) SSL/TLS (transport layer security) SET (e-commerce)

Contents and Management using Encryption using Encryption Distribution of Certificates

Certificates Each user has a certificate, although it is created by the Certificate Authority (CA) Certificates are stored in a public directory Certificate format includes: Version of certificate Signature algorithm CA s name and unique identifier Period of validity User s name and unique identifier User s public key information Signature

Public-Key Certificate Use

Formats

Certificate Revocation List Certificates may be revoked before expiry CA signs a CRL, which is stored in public directory

Multiple Certificate Authorities Multiple CA s can be arranged in hierarchy Notation: Y << X >> certificate of X issued by CA Y