• No results found

Key Management and Distribution

N/A
N/A
Protected

Academic year: 2021

Share "Key Management and Distribution"

Copied!
33
0
0

Loading.... (view fulltext now)

Full text

(1)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Key Management and Distribution

CSS322: Security and Cryptography

Sirindhorn International Institute of Technology Thammasat University

Prepared by Steven Gordon on 23 January 2011 CSS322Y10S2L12, Steve/Courses/CSS322/Lectures/key.tex, r1640

(2)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Contents

Key Distribution and Management

Symmetric Key Distribution using Symmetric Encryption

Symmetric Key Distribution using Asymmetric Encryption

Distribution of Public Keys

(3)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Key Distribution and Management

I Symmetric key cryptography: fast implementations, good for encrypting large amounts of data; requires shared secret key

I Asymmetric (public) key cryptography: inefficient for large data, good for authentication; no need to share a secret

I How to share symmetric keys?

(4)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Contents

Key Distribution and Management

Symmetric Key Distribution using Symmetric Encryption

Symmetric Key Distribution using Asymmetric Encryption

Distribution of Public Keys

(5)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Symmetric Key Distribution using Symmetric

Encryption

I Objective: two entities share same secret key

I Principle: change keys frequently

I How to exchange a secret key?

1. A physically delivers key to B

2. Third party, C, can physically deliver key to A and B

3. If A and B already have a key, can securely transmit new key to each other, encrypted with old key

4. If A and B have secure connection with third party C, C can securely send keys to A and B

I Option 1 and 2: manual delivery; feasible if number of entites is small (link encryption)

I Option 3: requires initial distribution of key; discovery of initial key releases all subsequent keys

I Option 4: requires initial distribution of key with C; practical for large-scale systems (end-to-end encryption)

(6)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Link Encryption vs End-to-End Encryption

Link Encryption

I Encrypt data over individual links in network

I Each link end-point shares a secret key

I Decrypt/Encrypt at each device in path

I Requires all links/devices to support encryption

End-to-End Encryption

I Encrypt data at network end-points (e.g. hosts or applications)

I Each pair of hosts/applications share a secret key

(7)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

How Many Keys Need To Be Exchanged?

SW1 SW2 R1 SW4 SW3 R2 R3 R4 D E C B A I SW6 J SW5 G F H I Link-level encryption?

I End-to-end encryption between hosts?

(8)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Using a Key Distribution Centre

I Key Distribution Centre (KDC) is trusted third party

I Hierarchy of keys used:

I Data sent between end-systems encrypted with temporarysession key

I Session keys obtained from KDC over network; encrypted withmaster key

(9)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

(10)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

(11)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

KDC Scenario Notation

I End-systems: A and B, identified by IDA and IDB

I Master keys: Ka, Kb

I Session key (between A and B): Ks

I Nonce values: N1, N2

I E.g. timestamp, counter, random value

I Must be different for each request I Must be difficult for attacker to guess

(12)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Practical Considerations

Hierarchical Key Control

I Use multiple KDCs in a hierarchy

I E.g. KDC for each LAN (or building); central KDC to exchange keys between hosts in different LANs

I Reduces effort in key distribution; limits damage if local KDC is compromised

Session Key Lifetime

I Shorter lifetime is more secure; but increases overhead of exchanges

I Connection-oriented protocols (e.g. TCP): new session key for each connection

I Connection-less protocols (e.g. UDP/IP): change after fixed period or certain number of packets sent

(13)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Decentralised Key Distribution

I Alternative that doesn’t rely on KDC

I Each end-system must manually exchange n − 1 master

(14)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Contents

Key Distribution and Management

Symmetric Key Distribution using Symmetric Encryption

Symmetric Key Distribution using Asymmetric Encryption

Distribution of Public Keys

(15)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Symmetric Key Distribution using Asymmetric

Encryption

I Asymmetric encryption generally too slow for encrypting large amount of data

I Common application of asymmetric encryption is

exchanging secret keys

I Three examples:

1. Simple Secret Key Distribution

2. Secret Key Distribution with Confidentiality and Authentication

3. Hybrid Scheme: Public-Key Distribution of KDC Master Keys

(16)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Simple Secret Key Distribution

I Simple: no keys prior to or after communication

I Provides confidentiality for session key

I Subject to man-in-the-middle attack

(17)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Man-in-the-Middle Attack

(18)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Secret Key Distribution with Confidentiality and

Authentication

I Provides both confidentiality and authentication in exchange of secret key

(19)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Hybrid Scheme: Public-Key Distribution of KDC

Master Keys

I Use public-key distribution of secret keys when

exchaning master keys between end-systems and KDC

I Efficient method of delivering master keys (rather than manual delivery)

I Useful for large networks, widely distributed set of users with single KDC

(20)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Contents

Key Distribution and Management

Symmetric Key Distribution using Symmetric Encryption

Symmetric Key Distribution using Asymmetric Encryption

Distribution of Public Keys

(21)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Distribution of Public Keys

I By design, public keys are made public

I Issue: how to ensure public key of A actually belongs to A (and not someone pretending to be A)

I Four approaches for distributing public keys

1. Public announcement

2. Publicly available directory

3. Public-key authority

(22)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Public Announcements

I Make public key available in open forum: newspaper, email signature, website, conference, . . .

I Problem: anyone can announce a key pretending to be

(23)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Publicly Available Directory

I All users publish keys in central directory

I Users must provide identification when publishing key

I Users can access directory electronically

(24)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Public-Key Authority

I Specific instance of using publicly available directory

I Assume each user has already security published public-key at authority; each user knows authorities public key

(25)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Public-Key Authority

I First 5 messages are for key exchange; last 2 are authentication of users

I Although 7 messages, public keys obtained from authority can be cached

I Problem: authority can be bottleneck

(26)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Public-Key Certificates

I Assume public keys sent to CA can be authenticated by CA; each user has certificate of CA

(27)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Public Key Certificates

I A certificate is the ID and public-key of a user signed by CA

CA= E(PRauth, [T ||IDA||PUa])

I Timestamp T validates currency of certificate (expiration date)

I Common format for certificates is X.509 standard (by ITU)

I S/MIME (secure email)

I IP security (network layer security)

I SSL/TLS (transport layer security)

(28)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Contents

Key Distribution and Management

Symmetric Key Distribution using Symmetric Encryption

Symmetric Key Distribution using Asymmetric Encryption

Distribution of Public Keys

(29)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

X.509 Certificates

I Each user has a certificate, although it is created by the Certificate Authority (CA)

I Certificates are stored in a public directory

I Certificate format includes:

I Version of X.509 certificate

I Signature algorithm

I CA’s name and unique identifier

I Period of validity

I User’s name and unique identifier

I User’s public key information

(30)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

(31)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

X.509 Formats

(32)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Certificate Revocation List

I Certificates may be revoked before expiry

(33)

CSS322 Key Management Key Distribution Symmetric with Symmetric Symmetric with Asymmetric Public Keys X.509

Multiple Certificate Authorities

I Multiple CA’s can be arranged in hierarchy

References

Related documents

To date, no one has taken a sustained looked at Justice Ginsburg's approach to decision-making in the area of criminal procedure, by which I mean the types

The aim of this study was to observe the direct impact of atorvastatin on advanced glycation end products- (AGEs) induced RAGE expression in healthy Sprague Dawley (SD) rats..

The data on sx agree with this picture since (a) whenever the various morphological forms of intermediate bristles are present the heavier inter- mediate bristles

The questionnaire will contain five sections: a demographic questionnaire, the Socialization Tactics in Sport Teams Questionnaire (Benson & Eys, 2017), the Youth Sport

The recovery was evaluated via acetabular index (AI) and Harris hip score. Postoperative X-ray films of 29 children showed concentric reduction of all hips. Total 25 children healed

Fernandes and Duarte [26,31] present an architecture that aims to provide efficient routing, proper resource isolation and a secure communication channel between routers and the

The heterogeneous temperature distribution and the presented deformation lead to high plastic strains in the trace as well as in the via.. This result is different compared to a

Häberli J, Henle P, Acklin YP et al (2016) Knee joint kinematics with dynamic augmentation of primary anterior cruciate ligament repair -a biomechanical study. Knee 25:271