Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Cryptography and Network Security Chapter 14
Public Key Infrastructure (PKI)
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Computer Science Public Key Management Lecture 5.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Week 4 - Wednesday.  What did we talk about last time?  RSA algorithm.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Authentication 3: On The Internet. 2 Readings URL attacks
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Network Security – Special Topic on Skype Security.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Infrastructure (PKI) Chien-Chung Shen
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Encryption CS110: Computer Science and the Internet.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Cryptography and Network Security Chapter 14
Using Public Key Cryptography Key management and public key infrastructures.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Digital Signatures and Digital Certificates Monil Adhikari.
Key Management Network Systems Security Mort Anvari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key management issues in PGP
Chapter 15 Key Management
Protocol ap1.0: Alice says “I am Alice”
Chapter 15 Key Management
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Protocols for public-key management

Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys (for classical cryptography) This has more to do with authentication of the users

Management of public keys One problem we went over too quickly: if Alice and Bob do not know each other, how do they get each other’s public key to communicate with each other? Solution 1: append your public key (e.g., for PGP) to the end of your –Attack: s can be forged –Eve sends an to Bob pretending she is Alice and handing him a public key, supposedly Alice’s; she will be able to communicate with Bob pretending she is Alice Solution 2: post it on your website –Attack: Eve breaks into the DNS server and sends Alice a fake webpage purportedly of Bob’s –Alice encrypts the message using that public key and Eve will beable to read it; Eve may even modify the message and forwards it to Bob using his public key

First solution: Public-key Authority Bottom-line idea here: get the public key of the other user from a trusted central authority This scenario assumes the existence of a public authority (whoever that may be) that maintains a dynamic directory of public keys of all users –The public authority has its own (private key, public key) that it is using to communicate to users Whenever Alice want to communicate with Bob she will go through the following protocol: –1.Alice sends a time stamped message to the central authority with a request for Bob’s public key (the time stamp is to mark the moment of the request) –2.The authority sends back a message encrypted with its private key (for authentication) – message contains Bob’s public key and the original message of Alice –this way Alice knows this is not a reply to an old request; –3.Alice starts the communication to Bob by sending him an encrypted message containing her name and a random number (to identify uniquely this transaction) –4.Bob gets Alice’s public key in the same way (step 1) –5.Bob gets Alice’s public key in the same way (step 2) –6.Bob replies to Alice by sending an encrypted message with Alice’s random number plus another random number (to identify uniquely the transaction) –7.Alice replies once more encrypting Bob’s random number Steps 6,7 are desirable so that Alice and Bob authenticate each other –indeed they are the only ones who could read each other’s random number

First solution: Public-key Authority

Drawbacks to the first solution For any communication between any two users, the central authority must be consulted by both users to get the newest public keys The central authority must be online 24 hours/day If the central authority goes offline, all secure communications halt This clearly leads to an undesirable bottleneck

Second solution: Certificate Authority Idea: have a trusted authority to certify one’s own public key –Whenever Alice want to start secure communication with Bob she sends him her public key certified by the central authority (encrypted with its private key) –Bob will know that it is indeed Alice because he will see her name in the certificate (he can decrypt it using the authority’s public certificate) –To get her own certificate she must visit the authority (with her passport) or otherwise use some type of e-security –after that she may place it on the web because it is unforgeable –The certificate can be used for a period of time after which it must be changed –think of it as a credit card with an expiration date –The central authority does not have to be online all the time –it may not be online at all The main job of the certification authority is to bind a public key to someone’s identity –Note however that the name of the user need not be in the certificate –Instead the certificate may only state that the user is over 18 years old or has some other kind of rights –this may be useful for anonymity When Alice has her private key compromised she is in the same position as losing her credit card: she must go to the authority and get a new certificate; same after expiration time of her certificate

Certificate Authority (CA)

A standard for certificates: X.509 To avoid having different types of certificates for different users standard X.509 has been issued for the format of certificates –widely used over the Internet At its core, X.509 is a way to describe certificates (see the table on the next slide) –for detailed information see the standard or RFC 2459 Example: if Bob works in the loan department of the Money Bank in the US, his X.500 (a series of recommendations) address could be/C=US/O=Money Bank/OU=Loan/CN=Bob, where C is for country, O for organization, OU for organizational unit, CN for common name

A standard for certificates: X.509

Public key infrastructures (PKI) One single CA issuing all the world’s certificates is clearly infeasible Several CAs all run by the same organization (which one?) using the same private key to issue certificates introduces the real problem of key leakage –this would ruin the whole world’s e-security Proposed solution (still to be standardized): Public Key Infrastructure (PKI) –Has multiple components, including users, CAs, certificates, directories –Give here just a simple form of PKI as a hierarchy of CAs –In our example we show only three levels, but in practice there could many more –On the top of the hierarchy is the top-level CA (the root) –The root certifies second-level CAs that we call RAs (Regional Authorities) –RAs certify the real CAs which issue X.509 certificates to individuals and institutions

Public key infrastructures