Elements of Applied Cryptography. Key Distribution. Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack



Similar documents
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Cryptography and Network Security

CS 392/681 - Computer Security

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

CSCE 465 Computer & Network Security

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

CIS 5371 Cryptography. 8. Encryption --

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Public Key (asymmetric) Cryptography

Q: Why security protocols?

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

SFWR ENG 4C03 - Computer Networks & Computer Security

Computer and Network Security. Outline

Chapter 16: Authentication in Distributed System

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Module 7 Security CS655! 7-1!

Notes on Network Security Prof. Hemant K. Soni

Authentication Applications

Client Server Registration Protocol

Kerberos. Guilin Wang. School of Computer Science, University of Birmingham

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

Key Management (Distribution and Certification) (1)

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

TELE 301 Network Management. Lecture 18: Network Security

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Efficient nonce-based authentication scheme for Session Initiation Protocol

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Cryptography and Network Security Chapter 10

CS Computer Security Third topic: Crypto Support Sys

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Secure Remote Password (SRP) Authentication

Authentication Applications

Network Security Protocols

Computer Security: Principles and Practice

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Chapter 7: Network security

Security Sensor Network. Biswajit panja

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Public Key Infrastructure. Certificates Standard X509v3

Authentication Protocols

Capture Resilient ElGamal Signature Protocols

Principles of Network Security

Cryptography and Network Security

Cryptography and Network Security Chapter 14

Application Layer (1)

Secure File Transfer Using USB

Cryptography and Network Security Digital Signature

Chapter 3. Network Domain Security

Overview of Public-Key Cryptography

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

7 Key Management and PKIs

Cryprography and Network Security, PART II: Key Exchange Protocols

Chapter 10. Network Security

Bit Chat: A Peer-to-Peer Instant Messenger

Lecture 6 - Cryptography

A Simulation Game for Teaching Secure Data Communications Protocols

4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

How To Use Kerberos

Scenario. Roadmap. ! The simplified architecture! The complete architecture Pre-authentication Delegation. Realms

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Network Security. HIT Shimrit Tzur-David

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

CS549: Cryptography and Network Security

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Public Key Cryptography Overview

Key Management and Distribution

Practice Questions. CS161 Computer Security, Fall 2008

SECURITY IN NETWORKS

CS 758: Cryptography / Network Security

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

CS 494/594 Computer and Network Security

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Security in Near Field Communication (NFC)

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

The Mathematics of the RSA Public-Key Cryptosystem

Elements of Applied Cryptography Public key encryption

Transcription:

Elements of Applied Cryptography Key Distribution Trusted third party: KDC, KTC Diffie-Helmann protocol The man-in-the-middle attack

Point-to-point key establishment Alice Bob Each pair of users must share an a priori, long-term secret key Each user has (n 1) keys Eve Dave Carol The overall number of keys is n n 2 1 2 n 2 or O( n 2 ) Network Security 2

Point-to-point key establishment PROS Security. If a subject is compromised only its communications are compromised; communications between two other subjects are not compromised CONS Poor scalability. The number of keys is quadratic in the number of subjects New member s joining and a member s leaving affect all current members Network Security 3

Session/ephemeral key W A K W B Parties know each other e.g., a client A has an account on server B A and B a priori share a long term key W A and B wants to establish a session key K Session key is used for a communication session Session key is used for bulk encryption Long term key is used for key establishment Network Security 4

Session/ephemeral key one-pass M1 A B : E t, B, K with challenge-response M1 A B : n M 2 A B : E n, B, K B W W A B t A is a timestamp (a fresh quantity) requires synchronized clocks n B is a nonce (a fresh quantity) both parties contribute to the session key M1 A B : n M 2 A B : E K, n, n, B M3 A B E K, n, n, A B W A B A W B A B n A and n B are nonces K A and K B are keying materiale K = f(k A, K B ) Network Security 5

Key distribution with Trusted Third Party T allows pair of users to establish a session key T Each user shares a long-term, a priori key with T K AT A K BT B The overall number of long-term keys is O(n) T is a trusted third-party Maintain a database <U, K TU > Guarantee integrity and secrecy of the database Correctly play the key distribution protocol Network Security 6

Key Distribution Center A and B share distinct secret keys, K AT and K BT, with KDC KDC generates the session key K and distributes it to A and B KDC is trusted to correctly generate the key Network Security 7

The Otway-Rees protocol (1987) Key distribution with KDC T M, n A, n B : nonces M2: M, A, B, E n, M, A, B, K AT E n, M, A, B K BT A B M3: M, E n, K, K A AB AT E n, K K B AB BT M1: M, A, B, E n, M, A, B K AT A A B M3: M, E n, K K A AB AT Network Security 8

Trusted Third Party Kerberos (Unix, Active directory) K AT : shared key between Trent and Alice K AT K BT K BT : shared key between Trent and Bob Objective: Alice and Bob establish a secret shared session key K AB K AB? Network Security 9

Trusted Third Party: il protocollo M1 A T: A, B M2 T A: E((T, L, K AB, B), K AT ), E(T, L, K AB, A), K BT ) K AT K BT M3 A B: E((A, T), K AB ), E(T, L, K AB, A), K BT ) M3 B A: E(T+1, K AB ) K AB? T: timestamp (nonce) L: lifetime di K AB Network Security 10

Decentralized key management A and B share distinct secret keys, K AT and K BT, with KTC One of the parties generates the session key K; KTC transmits that key to the other peer The party is trusted to correctly generate the key KTC is trusted to correctly relay the key Network Security 11

The Wide-mouthed frog protocol Key distribution with KTC T M1: A, E T, B, K K A AB AT M2: B, E T, A, K K S AB BT A B Synchronized clocks Bob trusts Alice to be competent in generating keys Network Security 12

Key distribution with trusted third party Pros It is easy to add and remove entities from the network Each entity needs to store only one long-term secret key Cons All communication require initial interaction with the TTP TTP must be always online (availability) TTP is a performance bootleneck (efficiency) The TTP must be trusted TTP must store n long-terms keys TTP has the ability to read and forge all messages If the TTP is compromised, all communications are insecure Network Security 13

Public key distribution system A public key distribution systems allows two users to securely exchange a key over an insecure channel Whitfield Diffie and Martin Hellman, New directions in cryptography, IEEE Transactions on Information Theory, Vol. 22, no. 6, pages 644-654, November 1976. Whitfield Diffie, The first ten years of public key cryptography, Proceedings of IEEE, Vol. 76, no. 5, May 1988. Network Security 14

The discrete logarithm problem Let p be prime Let 1 g < p be a generator, i.e., 1 n < p, t s.t. g t mod p = n DISCRETE EXPONENTIATION Given g and x, computing y = g x mod p is computationally easy DISCRETE LOGARITHM x log y mod p Given g, 1 y p 1, it is computationally difficult to determine x (0 x p 2) s.t. y = g x mod p g Network Security 15

Diffie-Hellman protocol: scenario a K AB? b Let p be a large prime Let 1 g < p Let p e g publicly known Alice chooses a random number a Bob chooses a random number b M1 A M2 B B: A, Y A = g a mod p A: B, Y B = g b mod p Alice computes K AB = (Y B ) a mod p = g ab mod p Bob computes K AB = (Y A ) b mod p = g ab mod p Network Security 16

Security of Diffie-Hellman An adversary can compute K AB from Y A and Y B by computing, for example, log g B K Y mod p AB A Y If logs mod p are easily computed then the system can be broken There is no proof of the converse, i.e., if logs mod p are difficult to compute then the system is secure We don't see any way to compute K AB from Y A and Y B without first obtaining either a or b Network Security 17

Security of Diffie-Hellman Let p be a prime, p < 2 n, then All quantities are representable as n-bit numbers Exponentiation takes at most 2 log 2 p = 2n multiplications mod p Taking logs mod p requires p ½ = 2 n/2 operations Example n = 512 Exponentiation requires at most 1024 multiplications Taking logs mod p requires 2 256 = 10 77 operations Network Security 18

Diffie-Hellman protocol: an example Let p = 11, g = 7 Alice chooses a = 3 and computes Y A = g a mod p = 7 3 mod 11 = 343 mod 11 = 2 Bob chooses b = 6 and computes Y B = g b mod p = 7 6 mod 11 = 117649 mod 11 = 4 A B: 2 B A: 4 Alice receives 4 and computes K AB = (Y B ) a mod p = 4 3 mod 11 = 9 Bob receives 2 and computes K AB = (Y A ) b mod p = 2 6 mod 11 = 9 a K AB? b Network Security 19

The man-in-the-middle attack Alice has no guarantee that she is actually talking with Bob and vice versa a c b Network Security 20

The man-in-the-middle a c b a A, g mod p c A, g mod p c B, g mod p b B, g mod p ac K g mod p AM ac K g mod p, e AM bc K g mod p BM bc K g mod p BM Network Security 21

The man-in-the-middle K AM K AM, K BM K BM Alice believes to communicate with Bob by means of K AM Bob believes to communicate with Alice by means of K BM The adversary can read messages between Alice and Bob inject messages between Alice and Bob (impersonate Alice and Bob) Network Security 22

Diffie-Hellman protocol Alice, Y Bob, Y B A Carol, Y C Public read-only file trusted to preserve the integrity of the pairs X, Y X a Gimme Bob's Y Here, it is! Y B b Network Security 23

Diffie-Hellman protocol The man-in-themiddle always lies in wait a Gimme Bob's Y Here, it is! Y C Alice, Y Bob, Y B A Carol, Y Here, it is! Y B C b Network Security 24

Key distribution with public encryption Pros No TTP is required The public file could reside with each entity Only n public keys need to be stored to allow secure communications between any pair of entities, assuming that the only attack is that by a passive adversary Cons Key management becomes difficult in the presence of an active adversary (man-in-the-middle) Network Security 25

Key distribution with public keys A TTP certifies the public key of each entity S T and V T are the signing and verification keys of the TTP Public file certificate Alice, Y, s S Alice Y A A T A Bob, Y, s S Bob Y B B T B Dave, Y, s S Dave Y D D T D c V Alice e, s T A A c E m e A Network Security 26

Key distribution with certificates Pros Prevent an active adversary from impersonation Entities need to trust the TTP only to bind identities to public keys properly Certicates can be stored locally so eliminating percommunication interaction with the public file Uhmmm not really! Disadvantages if the signing key of TTP is compromised, all communications become insecure All trust is placed with one entity Network Security 27

Network Security 28