Based on Bruce Schneier Chapter 8: Key Management Dulal C Kar.

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Advertisements

Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Digital Signatures and Hash Functions. Digital Signatures.
Information Assurance Management Key Management Week 13-1.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 5 Cryptography Protecting principals communication in systems.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Computer Networking Lecture 21: Security and Cryptography Thanks to various folks from , semester’s past and others.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Lecture 24 Cryptography CPE 401 / 601 Computer Network Systems slides are modified from Jim Kurose and Keith Ross and Dave Hollinger.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Public Key Model 8. Cryptography part 2.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
IT 221: Introduction to Information Security Principles Lecture 6:Digital Signatures and Authentication Protocols For Educational Purposes Only Revised:
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 4: Intermediate Protocols
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Chapter 2: Protocol Building Blocks
Cryptography, Authentication and Digital Signatures
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Midterm Review Cryptography & Network Security
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Protocols Chapter 2 Protocol: A series of steps, involving two or more parties, designed to accomplish a task. All parties involved must know the protocol.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
COEN 351 E-Commerce Security
Intro to Cryptography Lesson Introduction
CS 6401 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Software Security Seminar - 1 Chapter 2. Protocol Building Blocks 발표자 : 최두호 Applied Cryptography.
Chapter 3 - Public-Key Cryptography & Authentication
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Based on Bruce Schneier Chapter 8: Key Management Dulal C Kar

Introduction Hardest part of cryptography Keeping keys secret is hard Cryptanalysts often attack key management protocols and algorithms

Generating Keys Security rests on keys Key generation algorithm can be under attack Reduced key spaces –DES has a 56-bit key –Fixing some of the bits reduces key space –Example: Key for Norton Discreet for MS- DOS actually reduces to a 40-bit key, times easier to break

Generating Keys (cont’d) Poor Key Choices –Same as poor password choices –Subject to dictionary attack –Dictionary attack is much more effective when used against a key of files and not a single key

Generating Keys (cont’d) Random Keys –Best keys but how to generate them –Use reliable random source such as noise from audio or radioactive decay or cryptographically secure pseudo random-bit generator –Discard weak keys. DES has only 16 weak keys. –Generating keys for public-key cryptography is harder due to math

Generating Keys (cont’d) Pass Phrases –Use easy to remember phrase –Then use a one-way hash function to obtain a pseudo-random-bit string from the phrase –Information theory About 1.3 bits of info per character in standard English For 64-bit key, a pass phrase of about 49 characters should be sufficient

Generating Keys (cont’d) ANSI X9.17 Key generation –“Not east to remember” keys –Suitable for sessions –Uses triple-DES to generate keys –Algorithm Let E K (X) be triple-DES encryption of X with key K. K: special key reserved for key generation V 0 : secret 64-bit seed T: timestamp To generate random key R i, calculate R i = E K (E K (T i ) xor V i ) To generate V i+1, calculate V i+1 = E K (E K (T i ) xor R i ) To turn R i into DES key, simply adjust every eight bit for parity.

Generating Keys (cont’d) DoD Key generation –Recommends using DES in OFB (output feedback) mode –Generate a DES key from system interrupt vectors, system status registers, and system counters –Generate an initialization vector from the system clock, system ID, and date and time –For plaintext, use an externally generated 64-bit quantity (or type eight characters) –Use the output as your key

Transferring Keys Public key cryptography solves the problem Some systems use alternate channels known to be secure Two types of keys by X9.17 standard –Data keys (distributed more often) –Key encryption keys (manually distributed, tamper proof smart card) Key distribution –Split key using secret splitting scheme –Send each share over a different channel

Transferring Keys (cont’d) Key distribution in large networks –Total number key exchanges for n-users is n(n-1)/2 –Better to create a central key server (or servers)

Verifying Keys When Bob receives a key, how does he know it came from Alice and not from some-one pretending to be Alice? Alice can use a digital signature protocol to sign the key Bob has to trust public-key database to verify Alice’s signature KDC can sign Alice’s public key Bob has to trust KDC’s public key he has In this sense, some people argue that public-key cryptography is useless

Verifying Keys (cont’d) Error detection during key transmission –Send key as well as a known constant 2 to 4 bytes encrypted by the key –At the receiving do the same to verify Key-error detection during decryption –For ASCII plaintext, decrypt and see whether you can read –For random plaintext Attach a verification block header, a known header encrypted by the key Decrypt at the receiver to verify