 Key Management  Secure Group Management  Authorization Management  Latest Relevant Knowledge  Future Work  References 2.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Public Key Infrastructure (PKI)
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication & Kerberos
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
L-13 Security 1. Schedule up to Midterm 2/26 No class (work on project 1, hw3) Review 3/2 Monday 4:30 pm NSH 3002 HW 3 due Midterm 3/3 Tuesday in class.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Outline User authentication
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Secure Communication with an Insecure Internet Infrastructure.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Science Public Key Management Lecture 5.
Introduction to Public Key Cryptography
Secure Communication with an Insecure Internet Infrastructure Lecture Nov. 21 st 2006 Dan Wendlandt.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Using Cryptography for Network Security Common problems: –Authentication - A and B want to prove their identities to one another –Key-distribution - A.
Cryptography and Network Security (CS435) Part Eight (Key Management)
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Computer and Network Security Rabie A. Ramadan Lecture 6.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Computer and Network Security - Message Digests, Kerberos, PKI –
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Lecture 14 Public Key Cryptography and RSA. Summary principles of public-key cryptography principles of public-key cryptography RSA algorithm, implementation,
CST 312 Pablo Breuer.  First published public-key algorithm  A number of commercial products employ this key exchange technique  Purpose is to enable.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Communication & Networks
CS480 Cryptography and Information Security
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Presentation transcript:

 Key Management  Secure Group Management  Authorization Management  Latest Relevant Knowledge  Future Work  References 2

 Key management for symmetric encryption  Key Distribution Center (KDC)  Key management for asymmetric encryption  Distribution of public keys  Session key distribution  Diffie-Hellman Key Exchange 3

 Alice and Bob need shared symmetric key.  KDC is a server that shares different secret key with each registered user.  Alice and Bob know own symmetric keys K A-KDC and K B-KDC for communicating with KDC. 4

K B-KDC K X-KDC K Y-KDC K Z-KDC K P-KDC K B-KDC K A-KDC Alice Bob KDC 5

Alice knows R1 Bob knows to use R1 to communicate with Alice KDC generates R1 K B-KDC (A,R1) K A-KDC (A,B) K A-KDC (R1, K B-KDC (A,R1) ) 6

 Distribution of Public Keys  Public announcement  Publicly available directory  Public-key authority  Public-key certificates 7

 Users distribute public keys to all  Advantage: Simplicity  Disadvantage: Forgery  Anyone can forge such a announcement  Ex: user B pretends to be A, and publish a key for A  Then all messages sent to A, readable by B! 8

 Publicly available dynamic directory.  Maintained by trusted organization.  Weakness: If adversary obtains the private key of the directory. 9

 Encryption is used to exchanged keys.  Stores public keys like directory.  User needs to know the public key of the authority.  Weakness: Authority is the bottleneck just like the directory. 10

11

 Certificate = Public key + identifier + timestamp.  Certificate authority  Govt. agency or trusted financial institution.  User can publish the certificate. 12

13

 Naïve method  Weakness: Man-in-the-middle-attack 14

15

 Only sender and receiver take part.  No involvement of KDC.  Based on the complexity of computing discrete logarithms. 16

17

 When a process asks to join a group G, the integrity of the group must not be compromised.  Each group member has a secret key CK G.  Also the group has a private key- public key pair for communication with nongroup members. 18

 P  Entity that wants to join the group.  G  The group  Q  A member of the group  RP  Reply pad  K P,G  Secret key between P and G  N  Nonce 19

 Managing access rights is very important in distributed systems.  Nondistributed system  Account in the machine controls all access rights.  Distributed system  Single account in the central server.  The server is consulted each time the user accesses a certain resource or machine. 20

 A capability is an unforgeable data structure for a specific resource,  Specifies the access rights that the holder of the capability has with respect to that resource.  128 bit identifier. 21

 When server wants to give access rights to a certain object, it makes a owner capability (OC).  All right bits are on.  A random check field is chosen and stored in a table. Server PortC Object 22

 The client creates a bit mask (B) representing his access rights and send it to the server.  Server creates a new capability.  The new capability is called Restricted Capability (RC).  Extracts C from the table for the requested object.  Check field(RC) = f(B XOR C), where f is a one way function.  Right field(RC) = B  Sends the RC to client. 23

24

 When client wants access to the object, it sends the RC to the server.  Server checks:  The right bits are not “all 1s”, so it’s a restricted capability.  IF (check(RC) XOR check(table) == check(OC)) THEN permits the access ELSE blocks the request 25

 An entity can delegate some of its access rights to another process so that the later can do the job on behalf of him.  A proxy is created by the process who wants to delegate.  Proxy (not proxy server) is a token that gives the bearer of it some privileges that can only be used by the entity which made the proxy. 26

 Alice delegates some rights to Bob so that he can do some job in the server on behalf of her.  They share a secret key, K A,B.  R  List of rights  S(+)proxy  Security question made by Alice  S(-)proxy  Answer of the security question.  Alice tells the answer only to Bob.  Bob proves his honesty to Alice by answering the security question asked by the server 27

28

 Using biometric data for sharing symmetric key, e.g. fingerprint based Key Distribution Center [3].  Quantum Key Distribution (QKD) [4].  Role Based Access Control (RBAC) [5]. 29

 Quantum computing, e.g. quantum entanglement might play a big role in secure key management.  For secure group communication, biometric data, e.g. genetic information of each group member can be used. 30

[1] W. Stallings, Cryptography and Network Security – Principles and Practices,4 th Ed., Prentice-Hall Inc., Upper Saddle River, New Jersy, USA, [2] Andrew S. Tanenbaum and Maarten van Steen Distributed Systems: Principles and Paradigms (2nd Edition). Prentice-Hall, Inc., Upper Saddle River, NJ, USA. [3] Barman, S.; Chattopadhyay, S.; Samanta, D., "An approach to cryptographic key distribution through fingerprint based key distribution center," in Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on, vol., no., pp , Sept doi: /ICACCI [4] Xianzhu Cheng; Yongmei Sun; Yuefeng Ji, "A QoS-supported scheme for quantum key distribution," in Advanced Intelligence and Awareness Internet (AIAI 2011), 2011 International Conference on, vol., no., pp , Oct. 2011doi: /cp [5] Qi Li; Mingwei Xu; Xinwen Zhang, "Towards a Group-Based RBAC Model and Decentralized User-Role Administration," in Distributed Computing Systems Workshops, ICDCS '08. 28th International Conference on, vol., no., pp , June 2008 doi: /ICDCS.Workshops