Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Authentication & Kerberos
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Chapter 5 Network Security Protocols in Practice Part I
Introduction to Cryptography
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Key Management in Cryptography
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
CSCI 6962: Server-side Design and Programming
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
TLS 1.2 and NIST SP A Tim Polk November 10, 2006.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Dynamic Symmetric Key Provisioning Protocol (DSKPP) Mingliang Pei Salah Machani IETF68 KeyProv WG Prague.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Chapter 21 Distributed System Security Copyright © 2008.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Computer and Network Security - Message Digests, Kerberos, PKI –
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Key Management in AAA Russ Housley Incoming Security Area Director.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
Web Applications Security Cryptography 1
IETF Provisioning of Symmetric Keys (keyprov) WG Update
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Computer Communication & Networks
Module 8: Securing Network Traffic by Using IPSec and Certificates
The Secure Sockets Layer (SSL) Protocol
Protocol ap1.0: Alice says “I am Alice”
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols

Key management Nearly all Internet security protocols make use of cryptography for authentication, integrity, and/or confidentiality Cryptography requires key management Key Management tends to be expensive by any measure: Protocol complexity Infrastructure Processing power

Many ways to manage keys Internet security protocols support a vast number of environments and situations Many key management approaches: Pre-shared keys Public key cryptography Key distribution centers

Pre-shared keys Start with a manually installed secret value Must be installed in each peer Traffic rarely protected directly with the pre-shared key Exchange single-use values (nonces) Use key derivation function (KDF) to generate a fresh key for traffic protection A B

Public key cryptography (1) Avoids manual installation in peers Two ways public key cryptography can be used to establish a key for traffic protection: Key agreement – exchange public keys and compute a pairwise secret value Key transport – sender makes up the traffic key and encrypts it with the public key of the receiver; receiver decrypts with their own private key A B

Public key cryptography (2) Need to identify the party that holds the private key that corresponds to the received public key Two primary approaches: Leap of faith Certificates

Leap of faith No infrastructure Server gives client its public key Man-in-the-middle attack is possible May verify the public key out-of-band Client remembers the public key for server If public key changes, the man-in-the-middle is detected Or, did the server just changed its public key?

Certificates Certificates bind an identity to a public key A certificate contains: Subject’s Name Subject’s Public Key Validity Period Issuer’s Name Certificate Authority (CA) establishes and maintains an accurate binding between the public key and attributes contained in a certificate

Certification path Alice can verify Bob’s certificate by verifying a chain of certificates starting at one issued by a Certification Authority (CA) that she trusts

Key distribution center On-line trusted party to pass out keys KDC must have a relationship with all peers The initiator exchange with the KDC might be based on a pre-shared secret value (like a password) or based on public key cryptography A B KDC

Enrollment Establishing the first key is the most expensive part of key management Basis for trust in the keys Pre-shared keys – manual installation Public key cryptography – public key certification Key distribution centers – manual installation, public key certification, or some for of registration

IETF protocol efforts (1) Many protocols that support more than one of the key management approaches: Pre-shared keys Public key cryptography Key distribution centers

IETF protocol efforts (2) IKEv1 and IKEv2 – Pre-shared keys and Public key cryptography TLS – Pre-shared keys and Public key cryptography Secure Shell – Public key cryptography Supports Leap of faith and Certificates EAP – Pre-shared keys, Public key cryptography, and Key distribution centers CMS – Pre-shared keys and Public key cryptography Kerberos – Key distribution centers With authentication to KDC based on Pre-shared keys or Public key cryptography

IETF enrollment efforts (1) KeyProv – provision shared symmetric key for one- time password device and other tokens Dynamic Symmetric Key Provisioning Protocol Single or multiple key requests Optional user authentication with out-of-band pass code Time out policy Key renewal, which may replace factory-loaded key End-to-End Protection of keying material Two key formats: Portable Symmetric Key Container (XML) Symmetric Key Package Content Type (ASN.1)

IETF enrollment efforts (2) Keys for TCP Authentication Option (TCP-AO) TCP-AO is initial use case, but the solution ought to work for other situations where a table of keys is needed Support unicast and multicast security protocols Manage tables of keys for the peers Table includes key identifiers, algorithm identifiers, protocol identifiers, usage period, and key derivation key (KDK) Traffic key derived from protocol information and the KDK in the table

IETF enrollment efforts (3) Clear need for standards that simplify the enrollment process for certificates, but the previous work on this topic was not fruitful

Algorithm agility Design principle to support more than one cryptographic algorithm in all IETF security protocols Negotiation increases complexity Allows transition when an algorithm gets old or broken Implementations support a set of algorithms Long cycle to specify standard, implement, test, and deploy support for new algorithm

Role for NIST Credibility: many mandatory to implement algorithms are from NIST specifications NIST is the source of important algorithms DES  3DES  AES MD5  SHA-1  SHA-256  ?? Important note: Internet security community sees need for transition in these cases

Word of warning Where there is a security flaw, the Internet security community is willing to expend the effort to transition algorithms Without such a motivation, there is significant resistance to change for alignment with specifications from any source Implementation, test, and deployment cost Interoperability issues

Questions? For those viewing via webcast, please submit questions for this presentation to

Thank you Russ Housley Phone: