Key Distribution/Management and Authentication Mert ÖZARAR Bilkent University

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

CMSC 414 Computer (and Network) Security Lecture 22 Jonathan Katz.
Chapter 10 Real world security protocols
Chapter 14 – Authentication Applications
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Computer Science&Technology School of Shandong University Instructor: Hou Mengbo houmb AT sdu.edu.cn Office: Information Security Research Group.
Cryptography and Network Security
Key Distribution/Management and Authentication two closely related subjects why?
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Services in Information Systems
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
1 Chapter 13 – Digital Signatures & Authentication Protocols Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Cryptography and Network Security (CS435) Part Eleven (Digital Signatures and Authentication Protocols)
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Key Distribution CS 470 Introduction to Applied Cryptography
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Chapter 31 Network Security
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Chapter 21 Distributed System Security Copyright © 2008.
Network Security Lecture 23 Presented by: Dr. Munam Ali Shah.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Digital Signatures and Authentication Protocols Chapter 13.
Cryptography and Network Security Chapter 13 Fourth Edition by William Stallings.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Digital Signatures, Message Digest and Authentication Week-9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cryptography and Network Security Chapter 14
Key Management Network Systems Security Mort Anvari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Dr. Nermin Hamza.  Attacks:  Traffic Analysis : traffic analysis occurs when an eavesdroppers observes message traffic on network. Not understand the.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication Protocols
Key Distribution/Management and Authentication
Presentation transcript:

Key Distribution/Management and Authentication Mert ÖZARAR Bilkent University

Key Distribution symmetric encryption schemes require both parties to share a common secret key –issue is how to securely distribute this key without revealing it to an adversary many attacks are based on poor key management and distribution –rather than breaking the codes This is, actually, the most difficult problem in developing secure systems

Key Distribution various key distribution alternatives for parties A and B : 1.A can select key and physically deliver to B –does not scale for a large and distributed group –how many keys do we need for N users? 2.third party can select & physically deliver key to A & B –similar comment as 1 –sometimes finding a “trusted” third party is another problem 3.if A & B have communicated previously, they can use previous key to encrypt a new key –good option but initially several keys to be distributed 4.if A & B have secure communications with a third party C, C can relay key between A & B

Session Key / Master Key The idea of having a key-encryption-key (master key) to generate random and temporary session keys can be implemented in several ways –Basic D-H is such an example public/private keys are master keys, exchanged key is a session key –Kerberos is another example –SSL uses three layers D-H for master key, master key for the session key

Session Key / Master Key Session key lifetime is a trade-off –if small securer since attacker can obtain less ciphertext to analyze But this creates more delay –If large less secure, but less delay

Key Distribution Facts Conservation of trust principle –a secure communication cannot be based on nothing; either there should be an initial direct contact or an indirect protocol to transfer trust Either physical delivery or a trusted third party –physical delivery is the only option to avoid a third party most basic system is PIN entry –otherwise regardless of symmetric or asymmetric encryption, you need a trusted third party

A Key Distribution Example Symmetric crypto based Each user shares a symmetric master key with the KDC (Key Distribution Center) –e.g. K a, K b, K c, … –possibly physically distributed Basic idea: –whenever a user A wants to communicate with B, it requests a session key (K s ) from KDC Protocol is in the next slide

A Key Distribution Example Assures that message 3 is not a replay

Key Management in PKC In other words –distribution of public keys –use of PKC to distribute secret keys public/private key as a master key

Distribution of the Public Keys the most important barrier against the deployment of PKC in applications Basic question? –how can I make sure about the legitimacy of a public key? –how can I make sure that Bob’s public key really belongs to Bob, not to Charlie? Why this is so important? –Name spoofing attacks become possible remember the man-in-the-middle attacks in anonymous Diffie-Hellman

Distribution of the Public Keys Some methods –Public Announcement –Publicly available databases/directories –Centralized distribution –Certificates

Public Announcement Broadcast your public key to the public –via newsgroups, mailing lists, from personal website, etc. –major weakness is anyone can easily pretend as yourself so attacks are possible

Publicly available directories/databases There exists a directory/database for {name, public key} pairs  LDAP write controlled –a trusted administrator if administered thoroughly, good –but a proper administration is difficult need secure mechanisms for registration, update, delete.

Centralized Distribution - Public- Key Authority Similar to directory/database approach, but access to the directory is automated via a secure protocol –users interact with directory to obtain any desired public key securely –requires real-time access to directory when keys are needed –users should know public key for the directory the directory/database contains {name, public key} pairs –write permit is restricted

Centralized Distribution - Public- Key Authority PROTOCOL

Centralized Distribution - Public- Key Authority What about caching the public keys at the end users? –good for performance saves some messages –but what happens if a public key is deleted form the database/directory? fresh copies needed or another protocol for the validity check

Centralized Distribution - Public- Key Authority Disadvantages –authority is an active entity and may create a performance bottleneck –database should be kept secure to prevent unauthorized modification

Public-Key Certificates certificates allow key exchange without real- time access to public-key authority a certificate binds identity to public key –usually with other info such as period of validity, issuer’s info, etc all contents signed by a trusted Certification Authority (CA) can be verified by anyone who knows the CA public-key CA must make sure about the identity of the certificate owner

Public-Key Certificates Certificates are widely used in practice –previous slides only show the idea need lots of polishing for practical use –is a single CA sufficient? –what happens if the CA’s public key is not known? how to distribute CA public keys? –what happens if a certificate is revoked? –How the users exchange their certificates in practical applications?

What can you do with securely distributed public keys? Digital signatures –have already talked about them confidentiality –theoretically possible but slow –instead session keys can be distributed those session keys are used for symmetric encryption

Distribution of Secret Keys using PKC Several methods exist Diffie-Hellman is one way we will see some alternatives

Simple Secret Key Distribution proposed by Merkle in 1979 –A generates a new temporary PKC key pair –A sends B its public key and identity –B generates a session key and sends it to A encrypted using the supplied public key –A decrypts the session key and both use it

Simple Secret Key Distribution problem is that an opponent can intercept and impersonate both parties of protocol –man-in-the-middle attack –result: A and B think that they exchanged K s securely but C also knows K s and use it to eavesdrop the communication passively C PUcPUc E (PU c, K s )E(PU a, K s )

Public-Key Distribution of Secret Keys assumption: public-keys are securely exchanged a priori First three steps are for authentication purposes Last step provides both the secrecy and authenticity of the session key

In practice Most systems offer a three-level approach –use of PKC to exchange master-key –use of master-key to exchange session keys most important advantage is at performance

A closer look to authentication making sure of peer entity’s identity –mutual or one-way –non-repudiation is not an aim here generally implemented as a protocol –basic idea: making sure that other party knows a common secret –also used for session key distribution two types –message authentication mostly one-way –peer entity authentication connection oriented approach

Two key issues Protection of any secret information Timeliness –to prevent replay attacks a valid message is copied and later resent –Why replays are bad? at minimum, disrupt proper operation by presenting messages that appear genuine but actually are not Think about a real world example!

Countermeasures - 1 Sequence numbers –not a practical method –parties should keep track of the sequence numbers –and should take care of message losses, duplications in a secure manner complicates the protocol

Countermeasures - 2 Timestamps –messages contain a timestamp –accept only fresh messages based on this timestamp –sometimes used, but there are some practical problems clocks must be synchronized in a secure manner tolerance to network delays

Countermeasures - 3 Challenge/response –Initiator sends a nonce (a challenge phrase or number used only one-time) and expects that nonce (or a transformation of it) in the response –easier to implement –but may require extra message transfer –and requires active parties not suitable for connectionless services

Authentication using Symmetric Encryption We start with well-known Needham- Schroeder protocol –actually have seen it as a key distribution protocol There exists a Key Distribution Center (KDC) –each party shares own master key with KDC –KDC generates session keys used for connections between parties –master keys are used to distribute these session keys

Needham-Schroeder Protocol original three-party key distribution protocol –for session between A and B mediated by a trusted KDC –KDC should be trusted since it knows the session key protocol overview 1. A→KDC: ID A || ID B || N 1 2. KDC→A: E (K a,[K s || ID B || N 1 || E (K b,[K s ||ID A ])]) 3. A→B: E (K b,[K s ||ID A ]) 4. B→A: E (K s,[N 2 ]) 5. A→B: E (K s,[f(N 2 )]) 4 and 5 prevent a kind of a replay attack –against replay of message 3 by an attacker

Needham-Schroeder (NS) Protocol but still vulnerable to a replay attack –if an old session key has been compromised, then message 3 can be resent to B by an attacker X impersonating A –after that X intercepts message 4 and sends a message 5 to B as if it is A –now X can impersonate A for the future communications with the session key –unlikely but a vulnerability modifications to address this problem –timestamps (Denning 81), B contacted at the beginning (Needham Schroeder 87) see for a repository of security protocolshttp://

NS Protocol with timestamps proposed by Dorothy Denning in 1981 A and B can understand replays by checking the timestamp in the message –even if attacker knows K s, he cannot generate message 3 with a fresh timestamp since he does not know K b 1. A→KDC: ID A || ID B 2. KDC→A: E (K a,[K s || ID B || T || E (K b,[K s ||ID A ||T])]) 3. A→B: E (K b,[K s ||ID A ||T]) 4. B→A: E (K s,[N 1 ]) 5. A→B: E (K s,[f(N 1 )])

Public-Key Approaches have seen some public-key approaches if confidentiality is major concern, can use: A→B: E (PU b, [K s ]) || E(K s, [M]) –digital envelopes if authentication needed, use a digital signature with a digital certificate: A→B: M || E (PR a, [H(M)]) || E (PR as, [T||ID A ||PU a ]) –message, signature, certificate We will detail security issues later

X.509 Authentication Protocols X.509 is a ITU-T standard part of the “directory services” –mostly for certificates, but also propose three generic authentication protocols –one-way authentication –two-way authentication –use both nonces and timestamps nonces are unique only within the lifetime of timestamp

X.509 one-way authentication Proves that the message generated by A and intended for B –also proves that message is not a replay –proves the identity of the sender, but not the recipient –optionally includes a session key t A : timestampr A : noncesgnData: Data signed

X.509 two-way Authentication both parties verify identity of each other reply message –generated by B –not a replay (guaranteed by t B and r B )