Get Random Proposal John Leiseboer 11 October 2012.

Slides:



Advertisements
Similar presentations
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Advertisements

Web security: SSL and TLS
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Adobe’s Real Time Messaging Protocol
Patterns of Interaction 2: Publish-Subscribe CS 5010 Program Design Paradigms "Bootcamp" Lesson 11.6 © Mitchell Wand, This work is licensed under.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Secure Socket Layer.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Modifying Managed Objects Alan Frindell 3/29/2011.
CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)
KMIP Vendor Extension Management KMIP supports ‘extensions’ but provides no mechanism for coordination of values between clients and servers or between.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Stream Ciphers.
COMP106 Assignment 2 – A new interface design Proposal 6.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
IEEE Wireless Local Area Networks (WLAN’s).
WSN Simulation Template for OMNeT++
ACE – Design Considerations Corinna Schmitt IETF ACE WG meeting July 23,
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Gursharan Singh Tatla Transport Layer 16-May
Chapter 17 TACACS+.
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
Secure Sockets Layer 1 / 99  SSL is perhaps the widest used security protocol on the Internet today.  Together with DC enables secure communication.
Csci5233 Computer Security1 GS: Chapter 6 Using Java Cryptography for Authentication.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
© 2010 IBM Corporation 23 September 2015 KMIP Server-to-server: use-cases and status Marko Vukolic Robert Haas
Multi-part Messages in KMIP John Leiseboer, QuintessenceLabs.
Web Security : Secure Socket Layer Secure Electronic Transaction.
(Business) Process Centric Exchanges
IETF 60 – San Diegodraft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Real-Time Streaming Protocol draft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Aravind.
WEP Protocol Weaknesses and Vulnerabilities
Hash and MAC Functions CS427 – Computer Security
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Recent Software Issues L3 Review of SM Software, 28 Oct Recent Software Issues Occasional runs had large numbers of single-event files. INIT message.
The Vesta Parallel File System Peter F. Corbett Dror G. Feithlson.
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
BAI513 - PROTOCOLS DHCP BAIST – Network Management.
Vigenere Cipher For example, choose a word “GOLD” for a key. And, add “GOLDGOLDGOLD….” to your plaintext Plaintext: t o o m u c h h y p e Key : GOLDGOLDGOLD.
Cody Brookshear Andy Borman
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
Multi-part Messages in KMIP John Leiseboer, QuintessenceLabs.
Separate Admin and Client Roles  Separation of Client and Admin roles If an app has authenticated as a client, Locate will return owned Managed (Crypto)
©2009 HP Confidential1 Proposal to OASIS KMIP TC Stan Feather and Indra Fitzgerald Hewlett-Packard Co. 26 October, 2010 Encoding Options for Key Wrap of.
Insert Your Name Insert Your Title Insert Date Client Registration Examples Alan Frindell Denis Pochuev 4/27/2011.
ISA 95 Working Group (Business) Process Centric Exchanges Dennis Brandl A Modest Proposal July 22, 2015.
ECC Design Team: Initial Report Brian Minard, Tolga Acar, Tim Polk November 8, 2006.
BAI513 - PROTOCOLS DHCP BAIST – Network Management.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
KMIP Compliance Redefining Server and Client requirements to claim compliance Presented by: Bob Lockhart.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Company LOGO Sage CRM – Marketing Sage CRM 7.3 provides a new integration with MailChimp for marketing campaigns. In this.
Programs and Models Almost all computer programs model some artifact – Artifact: product of civilization, either concrete or abstract, simple or complex.
IEEE SISWG (P1619.3)‏ Messaging & Transport. AGENDA Transport Protocols & Channel Protection Messaging Layer Capability Exchange & Authentication Groups.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Emdeon Office Batch Management Services This document provides detailed information on Batch Import Services and other Batch features.
Module 11: File Structure
Callbacks and Interacting Objects
KMIP Server-to-server: use-cases and status
SSL (Secure Socket Layer)
Measurement reporting in TGh
Presentation transcript:

Get Random Proposal John Leiseboer 11 October 2012

Desirable Features Minimal changes to KMIP Supports single “chunk”, and streaming random Can share same random amongst several clients Server can push random to clients Same model of operation as other proposed crypto operations (encrypt, sign, MAC, etc.)

Object or Operation? Cryptographic Operations Objects… – Objects that perform cryptographic operations Random, Encipher, Decipher, Sign, SignVerify, MAC, MACVerify, Hash – Consistent with OO programming Data fields: KMIP attributes Methods: KMIP operations

Random Object Object Type – Random Attributes – UID, Name, RNGAlgorithm, EntropyQuality, Offset, Length, others TBD Operations – Create, Locate, Get, Destroy, Notify, Put

Usage Client requests server to Create a Random Object – UID returned – Name attributes can be assigned to Random Object – Placeholder ID works for batch operations Client locates Random Object by Name Client gets Random Object bytes specifying Offset and Length – Get operation can be called more than once to read a stream of random bytes from the Random Object Client destroys Random Object Multiple clients can get (share) the same random stream

Test Case Outline Create (Random) – In: objectType=Random, attributes={Name={NameValue=’RNDStream1’,NameType=X}, RNGAlgorithm=X, EntropyQuality=X} – Out: objectType=Random, UID Locate (Random) – In: attributes={objectType=Random, Name={NameValue=’RNDStream1’,NameType=X}} – Out: UID Get (Random) – In: UID, attributes={Offset=X, Length=X} – Out: objectType=Random, UID, Random Destroy (Random) – In: UID

Simple, Single Chunk Operation For simple, single chunk operations – Client can send a batched request Create Get Destroy

Streaming Operation For streaming operation – The client can issue individual requests Create Get... Destroy

Sharing a Stream Clients (out of band) communicate information that identifies the shared stream – UID – Name, or other attributes that work with Locate Each client sends its own Get requests Only one client should Create and Destroy – Others can only Get

Discussion – KMIP Object Model What is "the model" for KMIP objects? Recent mutability discussion is relevant This proposal clearly models objects as mutable Also introduces the notion of Objects performing operations Standard does specify an Object model – Several different, incompatible interpretations are possible – One interpretation is that all objects are static and immutable – Another interpretation is that objects can be mutable and can perform operations Like OO programming models of objects

Discussion – Simple to Share Simple means to share Random/Key streams Each random stream can be identified by a UID, or a name – Very easy for cooperating clients to access the same stream The UID, or Name can be shared out of band by clients No new object type, or new attribute needed to enable sharing of Random/Key material

Discussion – Easy to Stream Streaming operations easily supported The alternative proposal is limited to single chunk operation – Does not support streaming operations (init, update, update,..., final), as supported in almost all crypto products and libraries Streaming mode of operation works very naturally with this proposal – Create functions as "init"; Get functions as "update"; and Destroy can function as "final"

Discussion – Easy Single Chunk Single chunk, one-off operation supported using batch Falls out very naturally from the current KMIP standard If only a single chunk crypto operation is to be performed, it can be done as a sequence of Create/Get/Destroy in a single batched set of requests

Discussion – Push to Client Notify and Put – Possibly some more thought needed, but… – Notify and Put should work with very little change with this model Notify Example – As new Random is generated, Notify messages can be sent by the server to registered clients to indicate that the Random Object's attribute(s) have changed – A simple Get by the client in response to a Notify will return the next Offset/Length chunk of random Put Example – As new random is produced, the server can send a Put message to registered clients – The Put object would retain the UID of the Random Object – Consider a new attribute called "update" rather than either of the current attributes (“new” and “replace”)

Summary Easily allows sharing of random/key streams (and sharing of cipher streams) using UID or Name Supports the mutability side of the Template debate – Can stop the debate with a compelling reason for selecting one side over the other Supports encipher, decipher, sign, etc. stream operations Works with Notify (no change) and Put (with addition of Update attribute) Is compatible with almost all OO paradigms – And matches usage models of currently deployed cryptographic products Requires little change to the existing KMIP specification – Where changes (mostly additions) are made, they fit in very naturally with the current standard – Reuses existing features of the standard wherever possible; e.g. Templates, Create, Get, Locate, Destroy, Notify and Put operations, batched operations using Placeholder ID, etc.