SlideShare a Scribd company logo
1 of 27
GROUP 6 PRESENTATION
JERRIT JAISON (3)
MUHAMMED SHAAN M (25)
NAVANEETH SUDEVAN (27)
NIHAL JAGADEESH (28)
Key Management and
Distribution in Symmetric
Encryption
INTRODUCTION
• Secure communication relies on effective
key management.
• Key distribution is crucial for maintaining
data confidentiality and integrity.
• Insecure key distribution can lead to
unauthorized access and compromise
sensitive information.
• The presentation explores methods and
strategies for secure key distribution.
SYMMETRIC
ENCRYPTION
BASICS
• Symmetric encryption utilizes a shared
secret key for both encryption and
decryption.
• The secure distribution of this key among
communicating parties is essential.
• Without secure key distribution, the
effectiveness of symmetric encryption is
compromised.
• Highlighting the need for robust
mechanisms to share and manage secret
keys securely.
CHALLENGES IN
KEY
DISTRIBUTION
• Challenges in securely distributing secret
keys include the risk of interception during
transmission.
• Unauthorized access to keys poses a
significant threat to the confidentiality of
communication.
• Emphasizing the importance of addressing
these challenges for a robust security
framework.
• Secure key distribution methods are crucial
for overcoming these challenges.
METHODS OF
KEY
DISTRIBUTION
• Physical delivery involves hand-delivering
keys, suitable for small-scale environments.
• Third-party involvement adds a layer of
trust, allowing a central entity to distribute
keys securely.
• The transmission of new keys using old ones
leverages pre-established secure
connections.
• Each method has its advantages and
limitations, influencing the choice based on
specific security requirements.
KEY
DISTRIBUTION
CENTER
• The use of a key distribution center is based on
the use of a hierarchy of keys. At a minimum,
two levels of keys are used.
• Communication between end systems is
encrypted using a temporary key, often referred
to as a Session key.
• Typically, the session key is used for the duration
of a logical connection and then discarded.
• Master key is shared by the key distribution
center and an end system or user and used to
encrypt the session key.
KEY DISTRIBUTION SCENARIO
DECENTRALIZED KEY CONTROL
● The use of a key distribution center imposes the requirement that the KDC be
trusted and be protected from subversion.
● This requirement can be avoided if key distribution is fully decentralized.
MAJOR ISSUES WITH KDC
● Single Point of Failure:
○ KDC vulnerability can impact the entire authentication system.
○ Address with high availability and redundancy measures.
● Denial of Service Attacks:
○ Susceptible to DoS attacks.
○ Implement network security measures for detection and mitigation.
● Clock Synchronization Issues:
○ Relies on synchronized clocks.
○ Time differences can lead to authentication failures.
● Key Management Concerns:
○ Crucial to secure and manage encryption keys.
○ Regularly update and rotate keys for enhanced security.
● Security Vulnerabilities:
○ Regular security audits to identify and patch vulnerabilities.
○ Keep the KDC implementation up-to-date.
MAJOR ISSUES WITH KDC
● Misconfigurations:
○ Incorrect configurations may cause authentication failures.
○ Regularly review and audit configurations for correctness.
● Interoperability Challenges:
○ Verify compatibility between different implementations.
○ Critical in heterogeneous environments.
● Password Policies:
○ Password strength is vital for authentication.
○ Enforce strong password policies to enhance security.
● Lack of Monitoring and Logging:
○ Inadequate monitoring hinders incident detection.
○ Implement comprehensive logging and monitoring solutions.
● Compatibility with Modern Authentication:
○ Address challenges with multi-factor authentication.
○ Consider updates for compatibility with modern identity systems.
DECENTRALIZED KEY CONTROL
● The use of a key distribution center imposes the requirement that the KDC be
trusted and be protected from subversion.
● This requirement can be avoided if key distribution is fully decentralized.
Key Management and
Distribution in Asymmetric
Encryption
SIMPLE SECRET KEY DISTRIBUTION
➢ A generates a public/private key pair {PUa, PRa} and transmits a
message to B consisting of PUa and an identifier of A, IDA
➢ B generates a secret key, Ks, and transmits it to A, encrypted with A's
public key.
➢ A computes D(PRa, E(PUa, Ks)) to recover the secret key. Because only A
can decrypt the message, only A and B will know the identity of Ks.
➢ A discards PUa and PRa and B discards PUa.
SECRET KEY DISTRIBUTION WITH
CONFIDENTIALITY AND AUTHENTICATION
SECRET KEY DISTRIBUTION WITH
CONFIDENTIALITY AND AUTHENTICATION
• A uses B's public key to encrypt a message to B containing an identifier of A
(IDA) and a nonce (N1), which is used to identify this transaction uniquely
• B sends a message to A encrypted with PUa and containing A's nonce (N1) as
well as a new nonce generated by B (N2) Because only B could have decrypted
message (1), the presence of N1 in message (2) assures A that the correspondent
is B
• A returns N2 encrypted using B's public key, to assure B that its correspondent
is A.
• A selects a secret key Ks and sends M = E(PUb, E(PRa, Ks)) to B.
Encryption of this message with B's public key ensures that only B can read it;
encryption with A's private key ensures that only A could have sent it.
• B computes D(PUa, D(PRb, M)) to recover the secret key.
DISTRIBUTION OF PUBLIC KEYS
Several techniques have been proposed for the distribution of
public keys, which can mostly be grouped into the categories
shown.
• Public announcement
• Publicly available directory
• Public-key authority
• Public-key certificates
PUBLIC ANNOUNCEMENT OF PUBLIC KEYS
PUBLIC ANNOUNCEMENT OF PUBLIC KEYS
The point of public-key encryption is that the public key is public,
hence any participant can send his or her public key to any other
participant, or broadcast the key to the community at large. eg.
append PGP keys to email messages or post to newsgroups or
email list
PUBLICLY AVAILABLE DIRECTORY
PUBLICLY AVAILABLE DIRECTORY
• The authority maintains a directory with a {name, public key}
entry for each participant.
• Each participant registers a public key with the directory
authority.
• A participant may replace the existing key with a new one at any
time because the corresponding private key has been
compromised in some way.
• Participants could also access the directory electronically. For
this, secure, authenticated communication from the authority to
the participant is mandatory.
PUBLIC KEY AUTHORITY
PUBLIC KEY AUTHORITY
• Stronger security for public-key distribution can be achieved by
providing tighter control over the distribution of public keys from
the directory.
• It requires users to know the public key for the directory, and
that they interact with directory in real-time to obtain any desired
public key securely.
• Totally seven messages are required.
PUBLIC KEY CERTIFICATES
PUBLIC KEY CERTIFICATES
• A user must appeal to the authority for a public key for every
other user that it wishes to contact and it is vulnerable to
tampering too.
• Public key certificates can be used to exchange keys without
contacting a public-key authority.
• A certificate binds an identity to public key, with all contents
signed by a trusted PublicKey or Certificate Authority (CA).
• This can be verified by anyone who knows the public-key
authorities public-key.
CONCLUSION
• The effective management and secure distribution of
cryptographic keys play a pivotal role in the success of
symmetric encryption, serving as the linchpin for
maintaining the confidentiality and integrity of
sensitive data
• From key generation to secure distribution, storage,
and lifecycle management, organizations must
implement robust practices
• Utilizing Key Management Systems and adopting
comprehensive key management strategies are crucial
steps in fortifying data security and ensuring secure
communication in our interconnected digital
landscape.
THANK YOU

More Related Content

Similar to Module 5-Key management in security in computing

Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
Public_Key_Distribution.pptx
Public_Key_Distribution.pptxPublic_Key_Distribution.pptx
Public_Key_Distribution.pptxArunkumarv86
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.pptIshaKanwal4
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemMerlin Florrence
 
Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile PREMKUMAR
 
Untitled presentation (5).pptx
Untitled presentation (5).pptxUntitled presentation (5).pptx
Untitled presentation (5).pptxArchanaPandiyan
 
Untitled presentation (5).pptx
Untitled presentation (5).pptxUntitled presentation (5).pptx
Untitled presentation (5).pptxArchanaPandiyan
 

Similar to Module 5-Key management in security in computing (20)

Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Ch14
Ch14Ch14
Ch14
 
Public_Key_Distribution.pptx
Public_Key_Distribution.pptxPublic_Key_Distribution.pptx
Public_Key_Distribution.pptx
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
 
man in the middle
man in the middleman in the middle
man in the middle
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.ppt
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
 
Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Untitled presentation (5).pptx
Untitled presentation (5).pptxUntitled presentation (5).pptx
Untitled presentation (5).pptx
 
Untitled presentation (5).pptx
Untitled presentation (5).pptxUntitled presentation (5).pptx
Untitled presentation (5).pptx
 
Key management
Key managementKey management
Key management
 
H0362052056
H0362052056H0362052056
H0362052056
 
Public Key Distribution
Public Key DistributionPublic Key Distribution
Public Key Distribution
 
ch13.ppt
ch13.pptch13.ppt
ch13.ppt
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptxVishal Singh
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 

Recently uploaded (20)

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 

Module 5-Key management in security in computing

  • 1. GROUP 6 PRESENTATION JERRIT JAISON (3) MUHAMMED SHAAN M (25) NAVANEETH SUDEVAN (27) NIHAL JAGADEESH (28)
  • 2. Key Management and Distribution in Symmetric Encryption
  • 3. INTRODUCTION • Secure communication relies on effective key management. • Key distribution is crucial for maintaining data confidentiality and integrity. • Insecure key distribution can lead to unauthorized access and compromise sensitive information. • The presentation explores methods and strategies for secure key distribution.
  • 4. SYMMETRIC ENCRYPTION BASICS • Symmetric encryption utilizes a shared secret key for both encryption and decryption. • The secure distribution of this key among communicating parties is essential. • Without secure key distribution, the effectiveness of symmetric encryption is compromised. • Highlighting the need for robust mechanisms to share and manage secret keys securely.
  • 5. CHALLENGES IN KEY DISTRIBUTION • Challenges in securely distributing secret keys include the risk of interception during transmission. • Unauthorized access to keys poses a significant threat to the confidentiality of communication. • Emphasizing the importance of addressing these challenges for a robust security framework. • Secure key distribution methods are crucial for overcoming these challenges.
  • 6. METHODS OF KEY DISTRIBUTION • Physical delivery involves hand-delivering keys, suitable for small-scale environments. • Third-party involvement adds a layer of trust, allowing a central entity to distribute keys securely. • The transmission of new keys using old ones leverages pre-established secure connections. • Each method has its advantages and limitations, influencing the choice based on specific security requirements.
  • 7. KEY DISTRIBUTION CENTER • The use of a key distribution center is based on the use of a hierarchy of keys. At a minimum, two levels of keys are used. • Communication between end systems is encrypted using a temporary key, often referred to as a Session key. • Typically, the session key is used for the duration of a logical connection and then discarded. • Master key is shared by the key distribution center and an end system or user and used to encrypt the session key.
  • 9. DECENTRALIZED KEY CONTROL ● The use of a key distribution center imposes the requirement that the KDC be trusted and be protected from subversion. ● This requirement can be avoided if key distribution is fully decentralized.
  • 10. MAJOR ISSUES WITH KDC ● Single Point of Failure: ○ KDC vulnerability can impact the entire authentication system. ○ Address with high availability and redundancy measures. ● Denial of Service Attacks: ○ Susceptible to DoS attacks. ○ Implement network security measures for detection and mitigation. ● Clock Synchronization Issues: ○ Relies on synchronized clocks. ○ Time differences can lead to authentication failures. ● Key Management Concerns: ○ Crucial to secure and manage encryption keys. ○ Regularly update and rotate keys for enhanced security. ● Security Vulnerabilities: ○ Regular security audits to identify and patch vulnerabilities. ○ Keep the KDC implementation up-to-date.
  • 11. MAJOR ISSUES WITH KDC ● Misconfigurations: ○ Incorrect configurations may cause authentication failures. ○ Regularly review and audit configurations for correctness. ● Interoperability Challenges: ○ Verify compatibility between different implementations. ○ Critical in heterogeneous environments. ● Password Policies: ○ Password strength is vital for authentication. ○ Enforce strong password policies to enhance security. ● Lack of Monitoring and Logging: ○ Inadequate monitoring hinders incident detection. ○ Implement comprehensive logging and monitoring solutions. ● Compatibility with Modern Authentication: ○ Address challenges with multi-factor authentication. ○ Consider updates for compatibility with modern identity systems.
  • 12. DECENTRALIZED KEY CONTROL ● The use of a key distribution center imposes the requirement that the KDC be trusted and be protected from subversion. ● This requirement can be avoided if key distribution is fully decentralized.
  • 13. Key Management and Distribution in Asymmetric Encryption
  • 14. SIMPLE SECRET KEY DISTRIBUTION ➢ A generates a public/private key pair {PUa, PRa} and transmits a message to B consisting of PUa and an identifier of A, IDA ➢ B generates a secret key, Ks, and transmits it to A, encrypted with A's public key. ➢ A computes D(PRa, E(PUa, Ks)) to recover the secret key. Because only A can decrypt the message, only A and B will know the identity of Ks. ➢ A discards PUa and PRa and B discards PUa.
  • 15. SECRET KEY DISTRIBUTION WITH CONFIDENTIALITY AND AUTHENTICATION
  • 16. SECRET KEY DISTRIBUTION WITH CONFIDENTIALITY AND AUTHENTICATION • A uses B's public key to encrypt a message to B containing an identifier of A (IDA) and a nonce (N1), which is used to identify this transaction uniquely • B sends a message to A encrypted with PUa and containing A's nonce (N1) as well as a new nonce generated by B (N2) Because only B could have decrypted message (1), the presence of N1 in message (2) assures A that the correspondent is B • A returns N2 encrypted using B's public key, to assure B that its correspondent is A. • A selects a secret key Ks and sends M = E(PUb, E(PRa, Ks)) to B. Encryption of this message with B's public key ensures that only B can read it; encryption with A's private key ensures that only A could have sent it. • B computes D(PUa, D(PRb, M)) to recover the secret key.
  • 17. DISTRIBUTION OF PUBLIC KEYS Several techniques have been proposed for the distribution of public keys, which can mostly be grouped into the categories shown. • Public announcement • Publicly available directory • Public-key authority • Public-key certificates
  • 18. PUBLIC ANNOUNCEMENT OF PUBLIC KEYS
  • 19. PUBLIC ANNOUNCEMENT OF PUBLIC KEYS The point of public-key encryption is that the public key is public, hence any participant can send his or her public key to any other participant, or broadcast the key to the community at large. eg. append PGP keys to email messages or post to newsgroups or email list
  • 21. PUBLICLY AVAILABLE DIRECTORY • The authority maintains a directory with a {name, public key} entry for each participant. • Each participant registers a public key with the directory authority. • A participant may replace the existing key with a new one at any time because the corresponding private key has been compromised in some way. • Participants could also access the directory electronically. For this, secure, authenticated communication from the authority to the participant is mandatory.
  • 23. PUBLIC KEY AUTHORITY • Stronger security for public-key distribution can be achieved by providing tighter control over the distribution of public keys from the directory. • It requires users to know the public key for the directory, and that they interact with directory in real-time to obtain any desired public key securely. • Totally seven messages are required.
  • 25. PUBLIC KEY CERTIFICATES • A user must appeal to the authority for a public key for every other user that it wishes to contact and it is vulnerable to tampering too. • Public key certificates can be used to exchange keys without contacting a public-key authority. • A certificate binds an identity to public key, with all contents signed by a trusted PublicKey or Certificate Authority (CA). • This can be verified by anyone who knows the public-key authorities public-key.
  • 26. CONCLUSION • The effective management and secure distribution of cryptographic keys play a pivotal role in the success of symmetric encryption, serving as the linchpin for maintaining the confidentiality and integrity of sensitive data • From key generation to secure distribution, storage, and lifecycle management, organizations must implement robust practices • Utilizing Key Management Systems and adopting comprehensive key management strategies are crucial steps in fortifying data security and ensuring secure communication in our interconnected digital landscape.