Using Public Key Cryptography Key management and public key infrastructures.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Cryptography and Network Security Chapter 14
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Principles of Information Security, 2nd edition1 Cryptography.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Chapter 31 Network Security
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
DIGITAL SIGNATURE.
Computer and Network Security - Message Digests, Kerberos, PKI –
Cryptography and Network Security Chapter 14
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Digital Signatures and Digital Certificates Monil Adhikari.
Key Management Network Systems Security Mort Anvari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key management issues in PGP
Pooja programmer,cse department
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Introduction to Cryptography
Presentation transcript:

Using Public Key Cryptography Key management and public key infrastructures

Key management and public keys Two aspects of key management relate to the use of public key cryptography. –Public key provides mechanisms for delivery and management of secret keys for symmetric cryptographic algorithms, such as DES, AES, or RC4. –Public key cryptography requires mechanisms for public key distribution, to guarantee authenticity of keys.

Distribution of public keys Public keys must be distributed in some trustworthy fashion. –Otherwise, Mallory may provide Bob with a fake public key for Alice, resulting in: Failure to communicate with Alice Improper release of confidential information to Mallory Mallory being able to authenticate messages as if originated from Alice.

Distributing public keys Several mechanisms are available, such as: –public announcement –publicly available directory –active, online public key authority –public key certificates –general public key infrastructure

Public announcement Publicly announce your public key, by appending it to your website, or attaching it as a signature to s, etc. Advantages: –Simple, cheap and convenient Disadvantages: –Hidden costs of off-band authentication; or lack of any authentication mechanism altogether.

Public directory An authoritative entity maintains a directory of (name, public key) entries. Periodically, the directory is updated if new keys are added or revoked. The directory could be a highly available electronic database---but then authentication of the data retrieved must be provided. –Since individual records can be changed/revoked, it is necessary in this case to have proof-of- current-membership

Online, active public authority AB T Sign T (PK B ||Request 1 ||Time 1 ) PK B Request 1 ||Time 1 Note: Request 1 includes ID B Request 2 ||Time 2 Note: Request 2 includes ID A Sign T (PK A ||Request 2 ||Time 2 ) PK A Enc PK B (ID A ||N 1 ) Enc PK A (N 1 ||N 2 ) Enc PK B (N 2 )

Off-line public authorities An online, active trusted party creates a host of difficult engineering issues: –High availability and high security are hard to combine successfully –Scalability: The trusted party can become a performance bottleneck –Denial-of-Service: The trusted party introduces a single point-of-failure in the security framework

Public key certificates Certificates are an off-line alternative mechanism to the online trusted party. When a user registers a new public key with the authority, it receives a digital signature on a document that includes both a unique identifier for the user as well as the public key. –Certificate: Binds the pair

Certificate system Certificate Authority A B PK A, proof of identity Cert A = Sign CA (ID A ||PK A ||Exp.time) PK B, proof of identity Cert B = Sign CA (ID B ||PK B ||Exp.time) Cert A Cert B Cert A Cert B

Public Key Infrastructures In order for a certificate-based system to be functional (i.e., users accept each other certificates), there needs to be agreement on common certification authorities, certificate and signature formats, and the public keys of the certificate authorities need to be distributed securely. A framework that addresses all these issues is called a Public Key Infrastructure (PKI).

Examples of PKIs Anarchic –Based on peer trust and out-of-band verification mechanisms (e.g. PGP) Monopolistic Oligarchic –Internet e-business Name-constrained – Software package management

Olygarchic PKI Internet/E-business –E-business transactions are supported by the X.509 certificate format standard. –Public keys of trusted authorities are embedded in applications; commercial relationships between the dominant players ensure key distribution

Your web browser’s keys