SlideShare a Scribd company logo
1 of 31
B.Tech Admission in India 
By: 
admission.edhole.com
TECS Week 2005 
Key Management Protocols 
and Compositionality 
John Mitchell 
Stanford 
admission.edhole.com
Key Management Options 
 Out of band 
• Can set up some keys this way (Kerberos) 
 Public-key infrastructure (PKI) 
• Leverage small # of public signing keys 
 Protocols for session keys 
• Generate short-lived session key 
• Avoid extended use of important secret 
• Don’t use same key for encryption and signing 
• Forward secrecy 
admission.edhole.com 
Cryptography reduces many problems to key management
Internet Standardization Process 
 All standards published as RFC (Request for 
Comment) 
• Available: http://www.ietf.org 
• Not all RFCs are Internet Standards ! 
 Typical path to standardization 
• Internet Drafts 
• RFC 
• Proposed Standard 
• Draft Standard (requires 2 working implementation) 
• Internet Standard (declared by IAB) 
 David Clark, MIT, 1992: We reject: kings, 
presidents, and voting. We believe in: rough 
consensus admission.edho laen.cdo rmunning code.”
Key Distribution: Kerberos Idea 
Client 
KeyCenter 
Server 
Shared symmetric key Kc 
Shared 
symmetric 
key Ks 
{Kcs, {Kcs}Ks}Kc 
{Kcs}Ks { msg }Kcs 
admission.edhole.com 
Key Center generates session key Kcs and 
distributes using shared long-term keys
Kerberos Protocol 
C TGS 
Ticket 1 
{C, Kt}Ktgs 
Ticket 1 
{C, Kt}Ktgs 
Ticket 2 
{C}Kt S 
Ticket 2 
Client 
KDC 
Service 
TGS 
{Kt}Kc 
{Ks}Kt 
{C}Ks 
Ktgs 
Kc 
Kv 
{C, Ks}Kv 
{C, Ks}Kv 
admission.edhole.com
Public-Key Infrastructure 
Known public signature verification key Ka 
Certificate 
Authority 
Sign(Ka, Ks), Sign(Ks, msg) 
Certificate 
Sign(Ka, Ks) 
Ks 
Client Server 
Server certificate can be verified 
by any client that has CA key Ka 
Certificate authority admission.edhole.com is “off line”
Key Exchange 
 Parties may have initial information 
 Generate and agree on session key 
• Authentication – know ID of other party 
• Secrecy – key not known to any others 
• Avoid replay attack 
• Forward secrecy 
• Avoid denial of service 
• Identity protection – disclosure to others 
• Other properties you can think of??? 
admission.edhole.com
Diffie-Hellman Key Exchange 
 Assume finite group G = áS, ·ñ 
• Generator g so every xÎS is x = gn 
• Example: integers modulo prime p 
 Protocol 
ga mod p 
A B 
gb mod p 
Alice, Bob share gab mod p admission.edhole.com not known to anyone else
Diffie-Hellman Key Exchange 
ga mod p 
A B 
gb mod p 
Authentication? 
Secrecy? 
Replay attack 
Forward secrecy? 
Denial of service? 
Identity protection? 
admission.edhole.com
IKE subprotocol from IPSEC 
m1 
A, (ga mod p) 
, signB(m1,m2) 
A B 
m2 
B, (gb mod p) 
signA(m1,m2) 
Result: A and B share secret gab mod p 
admission.edhole.com 
Signatures provide authentication, as long as signature 
verification keys are known
IPSec: Network Layer Security 
 Authentication Header (AH) 
• Access control and authenticate data origins 
• replay protection 
• No confidentiality 
 Encapsulated Secure Payload (ESP) 
• Encryption and/or authentication 
 Internet Key management (IKE) 
• Determine and distribute secret keys 
• Oakley + ISAKMP 
• Algorithm independent 
 Security policy database (SPD) 
• discarded, or bypass 
admission.edhole.com
IKE: Many modes 
 Main mode 
• Authentication by pre-shared keys 
• Auth with digital signatures 
• Auth with public-key encryption 
• Auth with revised public-key encryption 
 Quick mode 
• Compress number of messages 
• Also four authentication options 
admission.edhole.com
Aug 2001 Position Statement 
 In the several years since the standardization of 
the IPSEC protocols (ESP, AH, and ISAKMP/IKE), 
… several security problems…, most notably IKE. 
 Formal and semi-formal analyses by Meadows, 
Schneier et al, and Simpson, have shown … security 
problems in IKE stem directly from its complexity. 
 It seems … only a matter of time before serious 
*implementation* problems become apparent, again 
due to the complex nature of the protocol, and the 
complex implementation that must surely follow. 
 The Security Area Directors have asked the 
IPSEC working group to come up with a 
admisrseipolna.ceedmheonlet. cfoomr IKE.
How to study complex protocol 
admission.edhole.com
General Problem in Security 
 Divide-and-conquer is fundamental 
• Decompose system requirements into parts 
• Develop independent software modules 
• Combine modules to produce required system 
 Common belief: 
• Security properties do not compose 
Difficult system development problem 
admission.edhole.com
Example protocol 
Protocol P1 
A ® B : {message}KB 
A ® B : KA-1 
This satisfies basic requirements 
• Message is transmitted under encryption 
• Revealing secret key KA-1 does not reveal 
admission.edhole.com 
message
Similar protocol 
Protocol P2 
B ® A : {message’}KA 
B ® A : KB-1 
Transmits msg securely from B to A 
• Message is transmitted under encryption 
• Revealing secret key KB-1 does not reveal 
admission.edhole.com 
message
Composition P1; P2 
Sequential composition of two protocols 
A ® B : {message}KB 
A ® B : KA-1 
B ® A : {message’}KA 
B ® B : KB-1 
admission.edhole.com 
Definitely not secure 
• Eavesdropper learns both keys, decrypts
Protocol Derivation Framework 
Protocols are constructed from: 
• components 
by applying a series of: 
• composition, refinement and transformation 
operations. 
Incrementally achieve design goals 
• Properties accumulate as a derivation proceeds 
Examples in papers: 
• STS, ISO-9798-3, JFKi, JFKr, IKE, … 
Acknowledgement: Dusko admission.edhole.com Pavlovic [Kestrel]
STS family 
STS0 
m=gx, n=gy 
k=gxy 
STS0H 
STSa STSaH 
STS STSH 
STSPH 
JFK1 
distribute 
certificates 
cookie 
open 
responder 
JFK0 
symmetric 
hash 
JFK 
protect 
identities 
RFK 
STSP 
JFK (Just Fast Keying) 
and RFK (our name) 
were proposed 
successors to IKE 
admission.edhole.com
Example 
Construct protocol with properties: 
• Shared secret 
• Authenticated 
• Identity Protection 
• DoS Protection 
Design requirements for IKE, JFK, 
IKEv2 (IPSec key exchange protocol) 
admission.edhole.com
Component 1 
Diffie-Hellman 
A ® B: ga 
B ® A: gb 
• Shared secret (with someone) 
– A deduces: 
Knows(Y, gab) É (Y = A) ۷ Knows(Y,b) 
• Authenticated 
• Identity Protection 
• DoS Protection 
admission.edhole.com
Component 2 
Challenge Response: 
A ® B: m, A 
B ® A: n, sigB {m, n, A} 
A ® B: sigA {m, n, B} 
• Shared secret (with someone) 
• Authenticated 
– A deduces: Received (B, msg1) Λ Sent (B, msg2) 
• Identity Protection 
• DoS Protection 
admission.edhole.com
Composition 
 ISO 9798-3 protocol: 
A ® B: ga, A 
B ® A: gb, sigB {ga, gb, A} 
A ® B: sigA {ga, gb, B} 
• Shared secret: gab 
• Authenticated 
• Identity Protection 
• DoS Protection 
m := ga 
n := gb 
admission.edhole.com
Refinement 
 Encrypt signatures: 
A ® B: ga, A 
B ® A: gb, EK {sigB {ga, gb, A}} 
A ® B: EK {sigA {ga, gb, B}} 
• Shared secret: gab 
• Authenticated 
• Identity Protection 
• DoS Protection 
admission.edhole.com
Transformation 
 Use cookie: JFK core protocol 
A ® B: ga, A 
B ® A: gb, hashKB {gb, ga} 
A ® B: ga, gb, hashKB {gb, ga} 
EK {sigA {ga, gb, B}} 
B ® A: gb, EK {sigB {ga, gb, A}} 
• Shared secret: gab 
• Authenticated 
• Identity Protection 
• DoS Protection 
admission.edhole.com 
(Here B must store b in step 2, but we’ll fix this later…)
Cookie transformation 
 Typical protocol 
• Client sends request to server 
• Server sets up connection, responds 
• Client may complete session or not (DOS) 
 Cookie version 
• Client sends request to server 
• Server sends hashed data back 
– Send message #2 later after client confirms 
• Client confirms by returning hashed data 
• Need extra step to send postponed message 
admission.edhole.com
Cookie in JFK 
 Protocol susceptible to DOS 
eh1 
A ® B: ga, A 
B ® A: gb, EK {sigB {ga, gb, A}} 
A ® B: EK {sigA {ga, gb, B}} 
eh2 
 Use cookie: JFK core protocol 
A ® B: ga, A 
B ® A: gb, hashKB {gb, ga} 
A ® B: ga, gb, hashKB {gb, ga}, eh2 
B ® A: gb, eh1 
admission.edhole.com
Efficiency: Reuse D-H key 
 Costly to compute ga, gb, gab 
 Solution 
• Keep medium-term ga, gb (change ~10 min) 
• Replace ga by pair ga, nonce 
 JFKi, JFKr protocols (except cert or grpinfo, …) 
A ® B: Na, ga, A 
B ® A: Nb, gb, hashKB {Nb, Na, gb, ga} 
A ® B: Na, Nb, ga, gb, hashKB {Nb, Na, gb, ga}, 
EK {sigA {Na, Nb, ga, gb, B}} 
admission.edhole.com 
B ® A: gb, EK {sigNote: B does not needB t{oN sato, rNe abn,y g sa,h ogrbt,- tAer}m} data in step 2
Conclusion 
 Many protocol properties 
• Authentication Secrecy 
• Prevent replay Forward secrecy 
• Denial of service Identity protection 
 Systematic understanding is possible 
• But be careful; easy to make mistakes 
• State of the art 
– need to analyze complete protocol 
– research will produce admission.edhole.com compositional methods

More Related Content

Viewers also liked

Acrylic displays from Mid West Displays
Acrylic displays from Mid West DisplaysAcrylic displays from Mid West Displays
Acrylic displays from Mid West DisplaysSumeshnarmath
 
Hexagonal combs design 1 powerpoint ppt templates.
Hexagonal combs design 1 powerpoint ppt templates.Hexagonal combs design 1 powerpoint ppt templates.
Hexagonal combs design 1 powerpoint ppt templates.SlideTeam.net
 
Projetos memorias lions
Projetos memorias lionsProjetos memorias lions
Projetos memorias lionsMichelle Melo
 
052412 Vietnamese
052412   Vietnamese052412   Vietnamese
052412 VietnameseVogelDenise
 
Michael Durante Western Reserve research analysis- camel example
Michael Durante Western Reserve  research analysis- camel exampleMichael Durante Western Reserve  research analysis- camel example
Michael Durante Western Reserve research analysis- camel exampleMichael Durante
 
My Travel & Cash - Presentation Portugal Portuguese Dec-2012
My Travel & Cash - Presentation Portugal Portuguese Dec-2012My Travel & Cash - Presentation Portugal Portuguese Dec-2012
My Travel & Cash - Presentation Portugal Portuguese Dec-2012rickkiyo
 
Guideline earth hour 2012 vietnamese
Guideline earth hour 2012   vietnameseGuideline earth hour 2012   vietnamese
Guideline earth hour 2012 vietnamesePham Hanh
 
rm_lacave_urdiales
rm_lacave_urdialesrm_lacave_urdiales
rm_lacave_urdialeselacave
 
Presentazione Iniziale
Presentazione InizialePresentazione Iniziale
Presentazione Inizialemuffin5
 
Comunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugal
Comunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugalComunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugal
Comunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugalArmin Caldas
 
00 udpt introduction - th2010
00 udpt   introduction - th201000 udpt   introduction - th2010
00 udpt introduction - th2010Nguyen Son
 
Sps philly 2012 disectting custom share-point sites
Sps philly 2012   disectting custom share-point sitesSps philly 2012   disectting custom share-point sites
Sps philly 2012 disectting custom share-point sitesThomas Daly
 
Sitra Eva Heiskanen 2012-6-7
Sitra Eva Heiskanen 2012-6-7Sitra Eva Heiskanen 2012-6-7
Sitra Eva Heiskanen 2012-6-7Sitra Energia
 
Nghich li cuoc doi
Nghich li cuoc doi Nghich li cuoc doi
Nghich li cuoc doi Dung Tran
 

Viewers also liked (16)

Cce bill of rights
Cce bill of rightsCce bill of rights
Cce bill of rights
 
Acrylic displays from Mid West Displays
Acrylic displays from Mid West DisplaysAcrylic displays from Mid West Displays
Acrylic displays from Mid West Displays
 
Hexagonal combs design 1 powerpoint ppt templates.
Hexagonal combs design 1 powerpoint ppt templates.Hexagonal combs design 1 powerpoint ppt templates.
Hexagonal combs design 1 powerpoint ppt templates.
 
Projetos memorias lions
Projetos memorias lionsProjetos memorias lions
Projetos memorias lions
 
052412 Vietnamese
052412   Vietnamese052412   Vietnamese
052412 Vietnamese
 
Michael Durante Western Reserve research analysis- camel example
Michael Durante Western Reserve  research analysis- camel exampleMichael Durante Western Reserve  research analysis- camel example
Michael Durante Western Reserve research analysis- camel example
 
My Travel & Cash - Presentation Portugal Portuguese Dec-2012
My Travel & Cash - Presentation Portugal Portuguese Dec-2012My Travel & Cash - Presentation Portugal Portuguese Dec-2012
My Travel & Cash - Presentation Portugal Portuguese Dec-2012
 
Guideline earth hour 2012 vietnamese
Guideline earth hour 2012   vietnameseGuideline earth hour 2012   vietnamese
Guideline earth hour 2012 vietnamese
 
rm_lacave_urdiales
rm_lacave_urdialesrm_lacave_urdiales
rm_lacave_urdiales
 
Presentazione Iniziale
Presentazione InizialePresentazione Iniziale
Presentazione Iniziale
 
Comunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugal
Comunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugalComunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugal
Comunicado do-fmi-e-mais-uma-tranche-da-ajuda-financeira-a-portugal
 
00 udpt introduction - th2010
00 udpt   introduction - th201000 udpt   introduction - th2010
00 udpt introduction - th2010
 
Adeunis rf solar and ar fx3
Adeunis rf   solar and ar fx3Adeunis rf   solar and ar fx3
Adeunis rf solar and ar fx3
 
Sps philly 2012 disectting custom share-point sites
Sps philly 2012   disectting custom share-point sitesSps philly 2012   disectting custom share-point sites
Sps philly 2012 disectting custom share-point sites
 
Sitra Eva Heiskanen 2012-6-7
Sitra Eva Heiskanen 2012-6-7Sitra Eva Heiskanen 2012-6-7
Sitra Eva Heiskanen 2012-6-7
 
Nghich li cuoc doi
Nghich li cuoc doi Nghich li cuoc doi
Nghich li cuoc doi
 

Similar to B.tech admission in india

B.tech admission in india
B.tech admission in indiaB.tech admission in india
B.tech admission in indiaEdhole.com
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...IJCSIS Research Publications
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MEDZatulNadia
 
Chapter 9 security
Chapter 9 securityChapter 9 security
Chapter 9 securityNaiyan Noor
 
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)lpgauth
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image4HG20EC020MouneshGow
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in indiaEdhole.com
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in indiaEdhole.com
 
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSCody Thomas
 
Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?Greg Castle
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Staying Afloat with Buoy: A High-Performance HTTP Client
Staying Afloat with Buoy: A High-Performance HTTP ClientStaying Afloat with Buoy: A High-Performance HTTP Client
Staying Afloat with Buoy: A High-Performance HTTP Clientlpgauth
 
Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022HostedbyConfluent
 
White box crytography in an insecure enviroment
White box crytography in an insecure enviromentWhite box crytography in an insecure enviroment
White box crytography in an insecure enviromentIqra khalil
 
How to Make OpenStack Heat Better based on Our One Year Production Journey
How to Make OpenStack Heat Better based on Our One Year Production JourneyHow to Make OpenStack Heat Better based on Our One Year Production Journey
How to Make OpenStack Heat Better based on Our One Year Production JourneyKaz Shinohara
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8sDevOps Indonesia
 

Similar to B.tech admission in india (20)

B.tech admission in india
B.tech admission in indiaB.tech admission in india
B.tech admission in india
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
 
Securing Text Messages Application Using MED
Securing Text Messages Application Using MEDSecuring Text Messages Application Using MED
Securing Text Messages Application Using MED
 
Chapter 9 security
Chapter 9 securityChapter 9 security
Chapter 9 security
 
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
Staying Afloat with Buoy: A High-Performance HTTP Client (0.1.1)
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in india
 
Btech admission in india
Btech admission in indiaBtech admission in india
Btech admission in india
 
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
 
Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?Walls Within Walls: What if your attacker knows parkour?
Walls Within Walls: What if your attacker knows parkour?
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Staying Afloat with Buoy: A High-Performance HTTP Client
Staying Afloat with Buoy: A High-Performance HTTP ClientStaying Afloat with Buoy: A High-Performance HTTP Client
Staying Afloat with Buoy: A High-Performance HTTP Client
 
Bletchley
BletchleyBletchley
Bletchley
 
Chain of Responsibility Pattern
Chain of Responsibility PatternChain of Responsibility Pattern
Chain of Responsibility Pattern
 
Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022Advancing Apache Nifi Framework Security With David Handermann | Current 2022
Advancing Apache Nifi Framework Security With David Handermann | Current 2022
 
White box crytography in an insecure enviroment
White box crytography in an insecure enviromentWhite box crytography in an insecure enviroment
White box crytography in an insecure enviroment
 
How to Make OpenStack Heat Better based on Our One Year Production Journey
How to Make OpenStack Heat Better based on Our One Year Production JourneyHow to Make OpenStack Heat Better based on Our One Year Production Journey
How to Make OpenStack Heat Better based on Our One Year Production Journey
 
Securing an NGINX deployment for K8s
Securing an NGINX deployment for K8sSecuring an NGINX deployment for K8s
Securing an NGINX deployment for K8s
 

More from Edhole.com

Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarkaEdhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarkaEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in suratEdhole.com
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in indiaEdhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhiEdhole.com
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarkaEdhole.com
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarkaEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in suratEdhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in indiaEdhole.com
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhiEdhole.com
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbaiEdhole.com
 
Website development company surat
Website development company suratWebsite development company surat
Website development company suratEdhole.com
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in suratEdhole.com
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in indiaEdhole.com
 

More from Edhole.com (20)

Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website dsigning company in india
Website dsigning company in indiaWebsite dsigning company in india
Website dsigning company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Ca in patna
Ca in patnaCa in patna
Ca in patna
 
Chartered accountant in dwarka
Chartered accountant in dwarkaChartered accountant in dwarka
Chartered accountant in dwarka
 
Ca firm in dwarka
Ca firm in dwarkaCa firm in dwarka
Ca firm in dwarka
 
Ca in dwarka
Ca in dwarkaCa in dwarka
Ca in dwarka
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website designing company in surat
Website designing company in suratWebsite designing company in surat
Website designing company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 
Website designing company in delhi
Website designing company in delhiWebsite designing company in delhi
Website designing company in delhi
 
Website designing company in mumbai
Website designing company in mumbaiWebsite designing company in mumbai
Website designing company in mumbai
 
Website development company surat
Website development company suratWebsite development company surat
Website development company surat
 
Website desinging company in surat
Website desinging company in suratWebsite desinging company in surat
Website desinging company in surat
 
Website designing company in india
Website designing company in indiaWebsite designing company in india
Website designing company in india
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

B.tech admission in india

  • 1. B.Tech Admission in India By: admission.edhole.com
  • 2. TECS Week 2005 Key Management Protocols and Compositionality John Mitchell Stanford admission.edhole.com
  • 3. Key Management Options Out of band • Can set up some keys this way (Kerberos) Public-key infrastructure (PKI) • Leverage small # of public signing keys Protocols for session keys • Generate short-lived session key • Avoid extended use of important secret • Don’t use same key for encryption and signing • Forward secrecy admission.edhole.com Cryptography reduces many problems to key management
  • 4. Internet Standardization Process All standards published as RFC (Request for Comment) • Available: http://www.ietf.org • Not all RFCs are Internet Standards ! Typical path to standardization • Internet Drafts • RFC • Proposed Standard • Draft Standard (requires 2 working implementation) • Internet Standard (declared by IAB) David Clark, MIT, 1992: We reject: kings, presidents, and voting. We believe in: rough consensus admission.edho laen.cdo rmunning code.”
  • 5. Key Distribution: Kerberos Idea Client KeyCenter Server Shared symmetric key Kc Shared symmetric key Ks {Kcs, {Kcs}Ks}Kc {Kcs}Ks { msg }Kcs admission.edhole.com Key Center generates session key Kcs and distributes using shared long-term keys
  • 6. Kerberos Protocol C TGS Ticket 1 {C, Kt}Ktgs Ticket 1 {C, Kt}Ktgs Ticket 2 {C}Kt S Ticket 2 Client KDC Service TGS {Kt}Kc {Ks}Kt {C}Ks Ktgs Kc Kv {C, Ks}Kv {C, Ks}Kv admission.edhole.com
  • 7. Public-Key Infrastructure Known public signature verification key Ka Certificate Authority Sign(Ka, Ks), Sign(Ks, msg) Certificate Sign(Ka, Ks) Ks Client Server Server certificate can be verified by any client that has CA key Ka Certificate authority admission.edhole.com is “off line”
  • 8. Key Exchange Parties may have initial information Generate and agree on session key • Authentication – know ID of other party • Secrecy – key not known to any others • Avoid replay attack • Forward secrecy • Avoid denial of service • Identity protection – disclosure to others • Other properties you can think of??? admission.edhole.com
  • 9. Diffie-Hellman Key Exchange Assume finite group G = áS, ·ñ • Generator g so every xÎS is x = gn • Example: integers modulo prime p Protocol ga mod p A B gb mod p Alice, Bob share gab mod p admission.edhole.com not known to anyone else
  • 10. Diffie-Hellman Key Exchange ga mod p A B gb mod p Authentication? Secrecy? Replay attack Forward secrecy? Denial of service? Identity protection? admission.edhole.com
  • 11. IKE subprotocol from IPSEC m1 A, (ga mod p) , signB(m1,m2) A B m2 B, (gb mod p) signA(m1,m2) Result: A and B share secret gab mod p admission.edhole.com Signatures provide authentication, as long as signature verification keys are known
  • 12. IPSec: Network Layer Security Authentication Header (AH) • Access control and authenticate data origins • replay protection • No confidentiality Encapsulated Secure Payload (ESP) • Encryption and/or authentication Internet Key management (IKE) • Determine and distribute secret keys • Oakley + ISAKMP • Algorithm independent Security policy database (SPD) • discarded, or bypass admission.edhole.com
  • 13. IKE: Many modes Main mode • Authentication by pre-shared keys • Auth with digital signatures • Auth with public-key encryption • Auth with revised public-key encryption Quick mode • Compress number of messages • Also four authentication options admission.edhole.com
  • 14. Aug 2001 Position Statement In the several years since the standardization of the IPSEC protocols (ESP, AH, and ISAKMP/IKE), … several security problems…, most notably IKE. Formal and semi-formal analyses by Meadows, Schneier et al, and Simpson, have shown … security problems in IKE stem directly from its complexity. It seems … only a matter of time before serious *implementation* problems become apparent, again due to the complex nature of the protocol, and the complex implementation that must surely follow. The Security Area Directors have asked the IPSEC working group to come up with a admisrseipolna.ceedmheonlet. cfoomr IKE.
  • 15. How to study complex protocol admission.edhole.com
  • 16. General Problem in Security Divide-and-conquer is fundamental • Decompose system requirements into parts • Develop independent software modules • Combine modules to produce required system Common belief: • Security properties do not compose Difficult system development problem admission.edhole.com
  • 17. Example protocol Protocol P1 A ® B : {message}KB A ® B : KA-1 This satisfies basic requirements • Message is transmitted under encryption • Revealing secret key KA-1 does not reveal admission.edhole.com message
  • 18. Similar protocol Protocol P2 B ® A : {message’}KA B ® A : KB-1 Transmits msg securely from B to A • Message is transmitted under encryption • Revealing secret key KB-1 does not reveal admission.edhole.com message
  • 19. Composition P1; P2 Sequential composition of two protocols A ® B : {message}KB A ® B : KA-1 B ® A : {message’}KA B ® B : KB-1 admission.edhole.com Definitely not secure • Eavesdropper learns both keys, decrypts
  • 20. Protocol Derivation Framework Protocols are constructed from: • components by applying a series of: • composition, refinement and transformation operations. Incrementally achieve design goals • Properties accumulate as a derivation proceeds Examples in papers: • STS, ISO-9798-3, JFKi, JFKr, IKE, … Acknowledgement: Dusko admission.edhole.com Pavlovic [Kestrel]
  • 21. STS family STS0 m=gx, n=gy k=gxy STS0H STSa STSaH STS STSH STSPH JFK1 distribute certificates cookie open responder JFK0 symmetric hash JFK protect identities RFK STSP JFK (Just Fast Keying) and RFK (our name) were proposed successors to IKE admission.edhole.com
  • 22. Example Construct protocol with properties: • Shared secret • Authenticated • Identity Protection • DoS Protection Design requirements for IKE, JFK, IKEv2 (IPSec key exchange protocol) admission.edhole.com
  • 23. Component 1 Diffie-Hellman A ® B: ga B ® A: gb • Shared secret (with someone) – A deduces: Knows(Y, gab) É (Y = A) ۷ Knows(Y,b) • Authenticated • Identity Protection • DoS Protection admission.edhole.com
  • 24. Component 2 Challenge Response: A ® B: m, A B ® A: n, sigB {m, n, A} A ® B: sigA {m, n, B} • Shared secret (with someone) • Authenticated – A deduces: Received (B, msg1) Λ Sent (B, msg2) • Identity Protection • DoS Protection admission.edhole.com
  • 25. Composition ISO 9798-3 protocol: A ® B: ga, A B ® A: gb, sigB {ga, gb, A} A ® B: sigA {ga, gb, B} • Shared secret: gab • Authenticated • Identity Protection • DoS Protection m := ga n := gb admission.edhole.com
  • 26. Refinement Encrypt signatures: A ® B: ga, A B ® A: gb, EK {sigB {ga, gb, A}} A ® B: EK {sigA {ga, gb, B}} • Shared secret: gab • Authenticated • Identity Protection • DoS Protection admission.edhole.com
  • 27. Transformation Use cookie: JFK core protocol A ® B: ga, A B ® A: gb, hashKB {gb, ga} A ® B: ga, gb, hashKB {gb, ga} EK {sigA {ga, gb, B}} B ® A: gb, EK {sigB {ga, gb, A}} • Shared secret: gab • Authenticated • Identity Protection • DoS Protection admission.edhole.com (Here B must store b in step 2, but we’ll fix this later…)
  • 28. Cookie transformation Typical protocol • Client sends request to server • Server sets up connection, responds • Client may complete session or not (DOS) Cookie version • Client sends request to server • Server sends hashed data back – Send message #2 later after client confirms • Client confirms by returning hashed data • Need extra step to send postponed message admission.edhole.com
  • 29. Cookie in JFK Protocol susceptible to DOS eh1 A ® B: ga, A B ® A: gb, EK {sigB {ga, gb, A}} A ® B: EK {sigA {ga, gb, B}} eh2 Use cookie: JFK core protocol A ® B: ga, A B ® A: gb, hashKB {gb, ga} A ® B: ga, gb, hashKB {gb, ga}, eh2 B ® A: gb, eh1 admission.edhole.com
  • 30. Efficiency: Reuse D-H key Costly to compute ga, gb, gab Solution • Keep medium-term ga, gb (change ~10 min) • Replace ga by pair ga, nonce JFKi, JFKr protocols (except cert or grpinfo, …) A ® B: Na, ga, A B ® A: Nb, gb, hashKB {Nb, Na, gb, ga} A ® B: Na, Nb, ga, gb, hashKB {Nb, Na, gb, ga}, EK {sigA {Na, Nb, ga, gb, B}} admission.edhole.com B ® A: gb, EK {sigNote: B does not needB t{oN sato, rNe abn,y g sa,h ogrbt,- tAer}m} data in step 2
  • 31. Conclusion Many protocol properties • Authentication Secrecy • Prevent replay Forward secrecy • Denial of service Identity protection Systematic understanding is possible • But be careful; easy to make mistakes • State of the art – need to analyze complete protocol – research will produce admission.edhole.com compositional methods

Editor's Notes

  1. I’m going to talk about work we’ve been doing on designing a compositional logic for protocol correctness. This is joint work with John Mitchell and Dusko Pavlovic
  2. Properties accumulate as a derivation proceeds.
  3. Obtained by substituting Diffie-Hellman exponentials for the fresh terms m and n in the challenge-response protocol.
  4. B’s identity is protected against passive adversaries.
  5. A cookie mechanism is a standard way of preventing blind denial-of-service attacks. B returns a keyed hash of the Diffie-Hellman exponential that he receives in the first message from A. Only after A returns the cookie in the third message does B create state and perform expensive public key operations.
  6. B’s identity is protected against passive adversaries.