SlideShare a Scribd company logo
1 of 31
B.Tech Admission in India 
By: 
admission.edhole.com
TECS Week 2005 
Key Management Protocols 
and Compositionality 
John Mitchell 
Stanford 
admission.edhole.com
Key Management Options 
 Out of band 
• Can set up some keys this way (Kerberos) 
 Public-key infrastructure (PKI) 
• Leverage small # of public signing keys 
 Protocols for session keys 
• Generate short-lived session key 
• Avoid extended use of important secret 
• Don’t use same key for encryption and signing 
• Forward secrecy 
admission.edhole.com 
Cryptography reduces many problems to key management
Internet Standardization Process 
 All standards published as RFC (Request for 
Comment) 
• Available: http://www.ietf.org 
• Not all RFCs are Internet Standards ! 
 Typical path to standardization 
• Internet Drafts 
• RFC 
• Proposed Standard 
• Draft Standard (requires 2 working implementation) 
• Internet Standard (declared by IAB) 
 David Clark, MIT, 1992: We reject: kings, 
presidents, and voting. We believe in: rough 
consensus admission.edho laen.cdo rmunning code.”
Key Distribution: Kerberos Idea 
Client 
KeyCenter 
Server 
Shared symmetric key Kc 
Shared 
symmetric 
key Ks 
{Kcs, {Kcs}Ks}Kc 
{Kcs}Ks { msg }Kcs 
admission.edhole.com 
Key Center generates session key Kcs and 
distributes using shared long-term keys
Kerberos Protocol 
C TGS 
Ticket 1 
{C, Kt}Ktgs 
Ticket 1 
{C, Kt}Ktgs 
Ticket 2 
{C}Kt S 
Ticket 2 
Client 
KDC 
Service 
TGS 
{Kt}Kc 
{Ks}Kt 
{C}Ks 
Ktgs 
Kc 
Kv 
{C, Ks}Kv 
{C, Ks}Kv 
admission.edhole.com
Public-Key Infrastructure 
Known public signature verification key Ka 
Certificate 
Authority 
Sign(Ka, Ks), Sign(Ks, msg) 
Certificate 
Sign(Ka, Ks) 
Ks 
Client Server 
Server certificate can be verified 
by any client that has CA key Ka 
Certificate authority admission.edhole.com is “off line”
Key Exchange 
 Parties may have initial information 
 Generate and agree on session key 
• Authentication – know ID of other party 
• Secrecy – key not known to any others 
• Avoid replay attack 
• Forward secrecy 
• Avoid denial of service 
• Identity protection – disclosure to others 
• Other properties you can think of??? 
admission.edhole.com
Diffie-Hellman Key Exchange 
 Assume finite group G = áS, ·ñ 
• Generator g so every xÎS is x = gn 
• Example: integers modulo prime p 
 Protocol 
ga mod p 
A B 
gb mod p 
Alice, Bob share gab mod p admission.edhole.com not known to anyone else
Diffie-Hellman Key Exchange 
ga mod p 
A B 
gb mod p 
Authentication? 
Secrecy? 
Replay attack 
Forward secrecy? 
Denial of service? 
Identity protection? 
admission.edhole.com
IKE subprotocol from IPSEC 
m1 
A, (ga mod p) 
, signB(m1,m2) 
A B 
m2 
B, (gb mod p) 
signA(m1,m2) 
Result: A and B share secret gab mod p 
admission.edhole.com 
Signatures provide authentication, as long as signature 
verification keys are known
IPSec: Network Layer Security 
 Authentication Header (AH) 
• Access control and authenticate data origins 
• replay protection 
• No confidentiality 
 Encapsulated Secure Payload (ESP) 
• Encryption and/or authentication 
 Internet Key management (IKE) 
• Determine and distribute secret keys 
• Oakley + ISAKMP 
• Algorithm independent 
 Security policy database (SPD) 
• discarded, or bypass 
admission.edhole.com
IKE: Many modes 
 Main mode 
• Authentication by pre-shared keys 
• Auth with digital signatures 
• Auth with public-key encryption 
• Auth with revised public-key encryption 
 Quick mode 
• Compress number of messages 
• Also four authentication options 
admission.edhole.com
Aug 2001 Position Statement 
 In the several years since the standardization of 
the IPSEC protocols (ESP, AH, and ISAKMP/IKE), 
… several security problems…, most notably IKE. 
 Formal and semi-formal analyses by Meadows, 
Schneier et al, and Simpson, have shown … security 
problems in IKE stem directly from its complexity. 
 It seems … only a matter of time before serious 
*implementation* problems become apparent, again 
due to the complex nature of the protocol, and the 
complex implementation that must surely follow. 
 The Security Area Directors have asked the 
IPSEC working group to come up with a 
admisrseipolna.ceedmheonlet. cfoomr IKE.
How to study complex protocol 
admission.edhole.com
General Problem in Security 
 Divide-and-conquer is fundamental 
• Decompose system requirements into parts 
• Develop independent software modules 
• Combine modules to produce required system 
 Common belief: 
• Security properties do not compose 
Difficult system development problem 
admission.edhole.com
Example protocol 
Protocol P1 
A ® B : {message}KB 
A ® B : KA-1 
 This satisfies basic requirements 
• Message is transmitted under encryption 
• Revealing secret key KA-1 does not reveal 
admission.edhole.com 
message
Similar protocol 
Protocol P2 
B ® A : {message’}KA 
B ® A : KB-1 
 Transmits msg securely from B to A 
• Message is transmitted under encryption 
• Revealing secret key KB-1 does not reveal 
admission.edhole.com 
message
Composition P1; P2 
 Sequential composition of two protocols 
A ® B : {message}KB 
A ® B : KA-1 
B ® A : {message’}KA 
B ® B : KB-1 
admission.edhole.com 
 Definitely not secure 
• Eavesdropper learns both keys, decrypts
Protocol Derivation Framework 
 Protocols are constructed from: 
• components 
by applying a series of: 
• composition, refinement and transformation 
operations. 
 Incrementally achieve design goals 
• Properties accumulate as a derivation proceeds 
 Examples in papers: 
• STS, ISO-9798-3, JFKi, JFKr, IKE, … 
Acknowledgement: Dusko admission.edhole.com Pavlovic [Kestrel]
STS family 
STS0 
m=gx, n=gy 
k=gxy 
STS0H 
STSa STSaH 
STS STSH 
STSPH 
JFK1 
distribute 
certificates 
cookie 
open 
responder 
JFK0 
symmetric 
hash 
JFK 
protect 
identities 
RFK 
STSP 
JFK (Just Fast Keying) 
and RFK (our name) 
were proposed 
successors to IKE 
admission.edhole.com
Example 
 Construct protocol with properties: 
• Shared secret 
• Authenticated 
• Identity Protection 
• DoS Protection 
 Design requirements for IKE, JFK, 
IKEv2 (IPSec key exchange protocol) 
admission.edhole.com
Component 1 
 Diffie-Hellman 
A ® B: ga 
B ® A: gb 
• Shared secret (with someone) 
– A deduces: 
Knows(Y, gab) É (Y = A) ۷ Knows(Y,b) 
• Authenticated 
• Identity Protection 
• DoS Protection 
admission.edhole.com
Component 2 
 Challenge Response: 
A ® B: m, A 
B ® A: n, sigB {m, n, A} 
A ® B: sigA {m, n, B} 
• Shared secret (with someone) 
• Authenticated 
– A deduces: Received (B, msg1) Λ Sent (B, msg2) 
• Identity Protection 
• DoS Protection 
admission.edhole.com
Composition 
 ISO 9798-3 protocol: 
A ® B: ga, A 
B ® A: gb, sigB {ga, gb, A} 
A ® B: sigA {ga, gb, B} 
• Shared secret: gab 
• Authenticated 
• Identity Protection 
• DoS Protection 
m := ga 
n := gb 
admission.edhole.com
Refinement 
 Encrypt signatures: 
A ® B: ga, A 
B ® A: gb, EK {sigB {ga, gb, A}} 
A ® B: EK {sigA {ga, gb, B}} 
• Shared secret: gab 
• Authenticated 
• Identity Protection 
• DoS Protection 
admission.edhole.com
Transformation 
 Use cookie: JFK core protocol 
A ® B: ga, A 
B ® A: gb, hashKB {gb, ga} 
A ® B: ga, gb, hashKB {gb, ga} 
EK {sigA {ga, gb, B}} 
B ® A: gb, EK {sigB {ga, gb, A}} 
• Shared secret: gab 
• Authenticated 
• Identity Protection 
• DoS Protection 
admission.edhole.com 
(Here B must store b in step 2, but we’ll fix this later…)
Cookie transformation 
 Typical protocol 
• Client sends request to server 
• Server sets up connection, responds 
• Client may complete session or not (DOS) 
 Cookie version 
• Client sends request to server 
• Server sends hashed data back 
– Send message #2 later after client confirms 
• Client confirms by returning hashed data 
• Need extra step to send postponed message 
admission.edhole.com
Cookie in JFK 
 Protocol susceptible to DOS 
eh1 
A ® B: ga, A 
B ® A: gb, EK {sigB {ga, gb, A}} 
A ® B: EK {sigA {ga, gb, B}} 
eh2 
 Use cookie: JFK core protocol 
A ® B: ga, A 
B ® A: gb, hashKB {gb, ga} 
A ® B: ga, gb, hashKB {gb, ga}, eh2 
B ® A: gb, eh1 
admission.edhole.com
Efficiency: Reuse D-H key 
 Costly to compute ga, gb, gab 
 Solution 
• Keep medium-term ga, gb (change ~10 min) 
• Replace ga by pair ga, nonce 
 JFKi, JFKr protocols (except cert or grpinfo, …) 
A ® B: Na, ga, A 
B ® A: Nb, gb, hashKB {Nb, Na, gb, ga} 
A ® B: Na, Nb, ga, gb, hashKB {Nb, Na, gb, ga}, 
EK {sigA {Na, Nb, ga, gb, B}} 
admission.edhole.com 
B ® A: gb, EK {sigNote: B does not needB t{oN sato, rNe abn,y g sa,h ogrbt,- tAer}m} data in step 2
Conclusion 
 Many protocol properties 
• Authentication Secrecy 
• Prevent replay Forward secrecy 
• Denial of service Identity protection 
 Systematic understanding is possible 
• But be careful; easy to make mistakes 
• State of the art 
– need to analyze complete protocol 
– research will produce admission.edhole.com compositional methods

More Related Content

Similar to B.tech admission in india

CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...IJCSIS Research Publications
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MEDZatulNadia
 
Chapter 9 security
Chapter 9 securityChapter 9 security
Chapter 9 securityNaiyan Noor
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image4HG20EC020MouneshGow
 
Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?Greg Castle
 
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSCody Thomas
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)lpgauth
 
DEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone now
DEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone nowDEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone now
DEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone nowFelipe Prado
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFiText Group nv
 
2022-Db2-Securing_Your_data_in_motion.pdf
2022-Db2-Securing_Your_data_in_motion.pdf2022-Db2-Securing_Your_data_in_motion.pdf
2022-Db2-Securing_Your_data_in_motion.pdfRoland Schock
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in indiaEdhole.com
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in indiaEdhole.com
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8sDevOps Indonesia
 
White box crytography in an insecure enviroment
White box crytography in an insecure enviromentWhite box crytography in an insecure enviroment
White box crytography in an insecure enviromentIqra khalil
 
Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022HostedbyConfluent
 

Similar to B.tech admission in india (20)

CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
Chapter 9 security
Chapter 9 securityChapter 9 security
Chapter 9 security
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image
 
Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?
 
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Chain of Responsibility Pattern
Chain of Responsibility PatternChain of Responsibility Pattern
Chain of Responsibility Pattern
 
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
 
DEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone now
DEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone nowDEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone now
DEF CON 27 - CAMPBELL / MURRAY - gsm we can hear everyone now
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
2022-Db2-Securing_Your_data_in_motion.pdf
2022-Db2-Securing_Your_data_in_motion.pdf2022-Db2-Securing_Your_data_in_motion.pdf
2022-Db2-Securing_Your_data_in_motion.pdf
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in india
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in india
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8s
 
White box crytography in an insecure enviroment
White box crytography in an insecure enviromentWhite box crytography in an insecure enviroment
White box crytography in an insecure enviroment
 
Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022
 
Bletchley
BletchleyBletchley
Bletchley
 

More from Edhole.com

Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarkaEdhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarkaEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in suratEdhole.com
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in indiaEdhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhiEdhole.com
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarkaEdhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarkaEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in suratEdhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in indiaEdhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhiEdhole.com
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbaiEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in suratEdhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in indiaEdhole.com
 

More from Edhole.com (20)

Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbai
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

B.tech admission in india

  • 1. B.Tech Admission in India By: admission.edhole.com
  • 2. TECS Week 2005 Key Management Protocols and Compositionality John Mitchell Stanford admission.edhole.com
  • 3. Key Management Options Out of band • Can set up some keys this way (Kerberos) Public-key infrastructure (PKI) • Leverage small # of public signing keys Protocols for session keys • Generate short-lived session key • Avoid extended use of important secret • Don’t use same key for encryption and signing • Forward secrecy admission.edhole.com Cryptography reduces many problems to key management
  • 4. Internet Standardization Process All standards published as RFC (Request for Comment) • Available: http://www.ietf.org • Not all RFCs are Internet Standards ! Typical path to standardization • Internet Drafts • RFC • Proposed Standard • Draft Standard (requires 2 working implementation) • Internet Standard (declared by IAB) David Clark, MIT, 1992: We reject: kings, presidents, and voting. We believe in: rough consensus admission.edho laen.cdo rmunning code.”
  • 5. Key Distribution: Kerberos Idea Client KeyCenter Server Shared symmetric key Kc Shared symmetric key Ks {Kcs, {Kcs}Ks}Kc {Kcs}Ks { msg }Kcs admission.edhole.com Key Center generates session key Kcs and distributes using shared long-term keys
  • 6. Kerberos Protocol C TGS Ticket 1 {C, Kt}Ktgs Ticket 1 {C, Kt}Ktgs Ticket 2 {C}Kt S Ticket 2 Client KDC Service TGS {Kt}Kc {Ks}Kt {C}Ks Ktgs Kc Kv {C, Ks}Kv {C, Ks}Kv admission.edhole.com
  • 7. Public-Key Infrastructure Known public signature verification key Ka Certificate Authority Sign(Ka, Ks), Sign(Ks, msg) Certificate Sign(Ka, Ks) Ks Client Server Server certificate can be verified by any client that has CA key Ka Certificate authority admission.edhole.com is “off line”
  • 8. Key Exchange Parties may have initial information Generate and agree on session key • Authentication – know ID of other party • Secrecy – key not known to any others • Avoid replay attack • Forward secrecy • Avoid denial of service • Identity protection – disclosure to others • Other properties you can think of??? admission.edhole.com
  • 9. Diffie-Hellman Key Exchange Assume finite group G = áS, ·ñ • Generator g so every xÎS is x = gn • Example: integers modulo prime p Protocol ga mod p A B gb mod p Alice, Bob share gab mod p admission.edhole.com not known to anyone else
  • 10. Diffie-Hellman Key Exchange ga mod p A B gb mod p Authentication? Secrecy? Replay attack Forward secrecy? Denial of service? Identity protection? admission.edhole.com
  • 11. IKE subprotocol from IPSEC m1 A, (ga mod p) , signB(m1,m2) A B m2 B, (gb mod p) signA(m1,m2) Result: A and B share secret gab mod p admission.edhole.com Signatures provide authentication, as long as signature verification keys are known
  • 12. IPSec: Network Layer Security Authentication Header (AH) • Access control and authenticate data origins • replay protection • No confidentiality Encapsulated Secure Payload (ESP) • Encryption and/or authentication Internet Key management (IKE) • Determine and distribute secret keys • Oakley + ISAKMP • Algorithm independent Security policy database (SPD) • discarded, or bypass admission.edhole.com
  • 13. IKE: Many modes Main mode • Authentication by pre-shared keys • Auth with digital signatures • Auth with public-key encryption • Auth with revised public-key encryption Quick mode • Compress number of messages • Also four authentication options admission.edhole.com
  • 14. Aug 2001 Position Statement In the several years since the standardization of the IPSEC protocols (ESP, AH, and ISAKMP/IKE), … several security problems…, most notably IKE. Formal and semi-formal analyses by Meadows, Schneier et al, and Simpson, have shown … security problems in IKE stem directly from its complexity. It seems … only a matter of time before serious *implementation* problems become apparent, again due to the complex nature of the protocol, and the complex implementation that must surely follow. The Security Area Directors have asked the IPSEC working group to come up with a admisrseipolna.ceedmheonlet. cfoomr IKE.
  • 15. How to study complex protocol admission.edhole.com
  • 16. General Problem in Security Divide-and-conquer is fundamental • Decompose system requirements into parts • Develop independent software modules • Combine modules to produce required system Common belief: • Security properties do not compose Difficult system development problem admission.edhole.com
  • 17. Example protocol Protocol P1 A ® B : {message}KB A ® B : KA-1 This satisfies basic requirements • Message is transmitted under encryption • Revealing secret key KA-1 does not reveal admission.edhole.com message
  • 18. Similar protocol Protocol P2 B ® A : {message’}KA B ® A : KB-1 Transmits msg securely from B to A • Message is transmitted under encryption • Revealing secret key KB-1 does not reveal admission.edhole.com message
  • 19. Composition P1; P2 Sequential composition of two protocols A ® B : {message}KB A ® B : KA-1 B ® A : {message’}KA B ® B : KB-1 admission.edhole.com Definitely not secure • Eavesdropper learns both keys, decrypts
  • 20. Protocol Derivation Framework Protocols are constructed from: • components by applying a series of: • composition, refinement and transformation operations. Incrementally achieve design goals • Properties accumulate as a derivation proceeds Examples in papers: • STS, ISO-9798-3, JFKi, JFKr, IKE, … Acknowledgement: Dusko admission.edhole.com Pavlovic [Kestrel]
  • 21. STS family STS0 m=gx, n=gy k=gxy STS0H STSa STSaH STS STSH STSPH JFK1 distribute certificates cookie open responder JFK0 symmetric hash JFK protect identities RFK STSP JFK (Just Fast Keying) and RFK (our name) were proposed successors to IKE admission.edhole.com
  • 22. Example Construct protocol with properties: • Shared secret • Authenticated • Identity Protection • DoS Protection Design requirements for IKE, JFK, IKEv2 (IPSec key exchange protocol) admission.edhole.com
  • 23. Component 1 Diffie-Hellman A ® B: ga B ® A: gb • Shared secret (with someone) – A deduces: Knows(Y, gab) É (Y = A) ۷ Knows(Y,b) • Authenticated • Identity Protection • DoS Protection admission.edhole.com
  • 24. Component 2 Challenge Response: A ® B: m, A B ® A: n, sigB {m, n, A} A ® B: sigA {m, n, B} • Shared secret (with someone) • Authenticated – A deduces: Received (B, msg1) Λ Sent (B, msg2) • Identity Protection • DoS Protection admission.edhole.com
  • 25. Composition ISO 9798-3 protocol: A ® B: ga, A B ® A: gb, sigB {ga, gb, A} A ® B: sigA {ga, gb, B} • Shared secret: gab • Authenticated • Identity Protection • DoS Protection m := ga n := gb admission.edhole.com
  • 26. Refinement Encrypt signatures: A ® B: ga, A B ® A: gb, EK {sigB {ga, gb, A}} A ® B: EK {sigA {ga, gb, B}} • Shared secret: gab • Authenticated • Identity Protection • DoS Protection admission.edhole.com
  • 27. Transformation Use cookie: JFK core protocol A ® B: ga, A B ® A: gb, hashKB {gb, ga} A ® B: ga, gb, hashKB {gb, ga} EK {sigA {ga, gb, B}} B ® A: gb, EK {sigB {ga, gb, A}} • Shared secret: gab • Authenticated • Identity Protection • DoS Protection admission.edhole.com (Here B must store b in step 2, but we’ll fix this later…)
  • 28. Cookie transformation Typical protocol • Client sends request to server • Server sets up connection, responds • Client may complete session or not (DOS) Cookie version • Client sends request to server • Server sends hashed data back – Send message #2 later after client confirms • Client confirms by returning hashed data • Need extra step to send postponed message admission.edhole.com
  • 29. Cookie in JFK Protocol susceptible to DOS eh1 A ® B: ga, A B ® A: gb, EK {sigB {ga, gb, A}} A ® B: EK {sigA {ga, gb, B}} eh2 Use cookie: JFK core protocol A ® B: ga, A B ® A: gb, hashKB {gb, ga} A ® B: ga, gb, hashKB {gb, ga}, eh2 B ® A: gb, eh1 admission.edhole.com
  • 30. Efficiency: Reuse D-H key Costly to compute ga, gb, gab Solution • Keep medium-term ga, gb (change ~10 min) • Replace ga by pair ga, nonce JFKi, JFKr protocols (except cert or grpinfo, …) A ® B: Na, ga, A B ® A: Nb, gb, hashKB {Nb, Na, gb, ga} A ® B: Na, Nb, ga, gb, hashKB {Nb, Na, gb, ga}, EK {sigA {Na, Nb, ga, gb, B}} admission.edhole.com B ® A: gb, EK {sigNote: B does not needB t{oN sato, rNe abn,y g sa,h ogrbt,- tAer}m} data in step 2
  • 31. Conclusion Many protocol properties • Authentication Secrecy • Prevent replay Forward secrecy • Denial of service Identity protection Systematic understanding is possible • But be careful; easy to make mistakes • State of the art – need to analyze complete protocol – research will produce admission.edhole.com compositional methods

Editor's Notes

  1. I’m going to talk about work we’ve been doing on designing a compositional logic for protocol correctness. This is joint work with John Mitchell and Dusko Pavlovic
  2. Properties accumulate as a derivation proceeds.
  3. Obtained by substituting Diffie-Hellman exponentials for the fresh terms m and n in the challenge-response protocol.
  4. B’s identity is protected against passive adversaries.
  5. A cookie mechanism is a standard way of preventing blind denial-of-service attacks. B returns a keyed hash of the Diffie-Hellman exponential that he receives in the first message from A. Only after A returns the cookie in the third message does B create state and perform expensive public key operations.
  6. B’s identity is protected against passive adversaries.