SlideShare a Scribd company logo
 Authorization via symmetric crypto
 Key exchange
o Using asymmetric crypto
o Using symmetric crypto with KDC
 KDC shares a key with every participant
 Authenticates participants, generates session (shared)
keys for them to talk to each other
 Gives the requester a “ticket” – session key,
requester’s ID and possibly expiration time, encrypted
by the key that the server shares with KDC
 Ticket and session key enrypted by the key that the
requester shares with KDC
 Needham-Schroeder, Kerberos
Third-party authentication service
oDistributes session keys for authentication,
confidentiality, and integrity
KDC
1. C, S, NC
2. KC(NC, KCS, S, KS (KCS, C ))
C S
3.KS (KCS, C )
4.KCS (NS )
5.KCS (NS-1)
Problem: replay attack
in step 3
Fix: use timestamps
 Introduce Ticket Granting Server (TGS)
o Issues timed keys to resources
 Users log on to authentication server (AS)
 AS+TGS = KDC
 Uses timestamps with a lifetime instead of
nonces
o Fixes freshness problem from Needham-
Schroeder
Third-party authentication service
oDistributes session keys for authentication,
confidentiality, and integrity
TGS
4. KC,TGS(KC,S), TCS
3. TGT, S, KC,TGS(C, t)
AS
1.C 2. KC(KC,TGS), TGT
C S
5. TCS, KC,S(C,t)
KC=hash(pass(C))
TGT=KTGS(C,Tvalid,KC,TGS)
TCS=KS(C,Tvalid,KC,S)
6. KC,S(t+1)
 Public key is public but …
o How does either side know who and what the key
is for?
 Does this solve key distribution problem?
o No – while confidentiality is not required,
integrity is
 Still need trusted third party
o Digital certificates – certificate authority (CA) signs
identity+public key tuple with its private key
o Problem is finding a CA that both client and server
trust
 Everyone has Trent’s public key
 Trent signs both Alice’s and Bob’s public
keys – he generates public-key certificate
 When they receive keys, verify the signature
 Mallory cannot impersonate Alice or Bob
because her key is signed as Mallory’s
 Certificate usually contains more than the
public key
oName, network address, organization
 Trent is known as Certificate Authority (CA)
Authentication steps
oVerifier provides nonce, or a timestamp is used
instead.
oPrincipal selects session key and sends it to verifier
with nonce, encrypted with principal’s private key
and verifier’s public key, sends principal’s
certificate too
oVerifier validates certificate
oVerifier checks signature on nonce
 PGP (Pretty Good Privacy)
o“Web of Trust”
o Source: Wikipedia
 “As time goes on, you will accumulate keys from
other people that you may want to designate as
trusted introducers. Everyone else will each choose
their own trusted introducers. And everyone will
gradually accumulate and distribute with their key a
collection of certifying signatures from other
people, with the expectation that anyone receiving
it will trust at least one or two of the signatures.
This will cause the emergence of a decentralized
fault-tolerant web of confidence for all public
keys.“
 X.509 standard
o Hierarchical model
o A handful of trusted CAs can issue certificates
to others
 SSH
o User keys exchanged out of band
o Weak assurance of server keys
 Is this the same host you spoke with last
time?
 Revocation lists (CRL’s)
o Long lists
o Hard to propagate
 Lifetime / Expiration
o Short life allows assurance of validity at time
of issue but increases cost of key distribution
 Real-time validation
o Online Certificate Status Protocol (OCSP)
o Single source of the compromised key list
o Clients check suspicious keys and hash
replies
 Group key vs. Individual key
o Proves that one belongs to the group vs. proving
an individual identity
o E.g., used for multicast messages
 Revoking access
o Change keys, redistribute
 Joining and leaving groups
o Does one see old messages on join or is the key
changed – backward secrecy
o How to revoke access – forward secrecy
 Robustness
o Coping with network partitioning
 Efficiency
o Cost of use, verification, exchange
 Centralized
o Single entity issues keys
o Optimization to reduce traffic for large groups
o May utilize application specific knowledge
 Decentralized
o Employs sub managers
 Distributed
o Members do key generation
o May involve group contributions

More Related Content

What's hot

Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
Frank Kelly
 
Kerberos
KerberosKerberos
Kerberos
Gichelle Amon
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4koolkampus
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)
Ismail Rachdaoui
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLSkeithrozario
 
Ssl
SslSsl
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windowsniteshitimpulse
 
Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
Suraj Singh
 
Kerberos
KerberosKerberos
Kerberos
Rahul Pundir
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
Arpit Agarwal
 

What's hot (15)

Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
Kerberos
KerberosKerberos
Kerberos
 
Lecture17
Lecture17Lecture17
Lecture17
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 
Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
 
Ssl
SslSsl
Ssl
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
 
Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
 
Kerberos
KerberosKerberos
Kerberos
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 

Viewers also liked

Database introduction
Database introductionDatabase introduction
Database introduction
David Hoen
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
David Hoen
 
Text classification methods
Text classification methodsText classification methods
Text classification methods
David Hoen
 
Basic dns-mod
Basic dns-modBasic dns-mod
Basic dns-mod
David Hoen
 
Plantilla creación proyecto_etwinning
Plantilla creación proyecto_etwinningPlantilla creación proyecto_etwinning
Plantilla creación proyecto_etwinning
Maria Vidal Nieto
 
Sql database object
Sql database objectSql database object
Sql database object
David Hoen
 
Nlp naive bayes
Nlp naive bayesNlp naive bayes
Nlp naive bayes
David Hoen
 
Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.
Karla Palacino
 
Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.
Karla Palacino
 
Decision tree
Decision treeDecision tree
Decision tree
David Hoen
 
Hashfunction
HashfunctionHashfunction
Hashfunction
David Hoen
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
David Hoen
 
Experiencia de uso educativo de Twitter
Experiencia de uso educativo de TwitterExperiencia de uso educativo de Twitter
Experiencia de uso educativo de Twitter
Amaia Segurola Colinas
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
David Hoen
 
Maze runner
Maze runnerMaze runner
Maze runner
Kassidy Caruso
 
Fomento de vocaciones STEM
Fomento de vocaciones STEMFomento de vocaciones STEM
Fomento de vocaciones STEM
Amaia Segurola Colinas
 
21 nursing problems by faye abdellah
21 nursing problems by faye abdellah21 nursing problems by faye abdellah
21 nursing problems by faye abdellah
Martha L. Garcia BSN, RN
 

Viewers also liked (18)

Database introduction
Database introductionDatabase introduction
Database introduction
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Text classification methods
Text classification methodsText classification methods
Text classification methods
 
Basic dns-mod
Basic dns-modBasic dns-mod
Basic dns-mod
 
Plantilla creación proyecto_etwinning
Plantilla creación proyecto_etwinningPlantilla creación proyecto_etwinning
Plantilla creación proyecto_etwinning
 
Sql database object
Sql database objectSql database object
Sql database object
 
Nlp naive bayes
Nlp naive bayesNlp naive bayes
Nlp naive bayes
 
Resume(1)
Resume(1)Resume(1)
Resume(1)
 
Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.
 
Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.Sociología de la profesión contable en Colombia.
Sociología de la profesión contable en Colombia.
 
Decision tree
Decision treeDecision tree
Decision tree
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 
Experiencia de uso educativo de Twitter
Experiencia de uso educativo de TwitterExperiencia de uso educativo de Twitter
Experiencia de uso educativo de Twitter
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
 
Maze runner
Maze runnerMaze runner
Maze runner
 
Fomento de vocaciones STEM
Fomento de vocaciones STEMFomento de vocaciones STEM
Fomento de vocaciones STEM
 
21 nursing problems by faye abdellah
21 nursing problems by faye abdellah21 nursing problems by faye abdellah
21 nursing problems by faye abdellah
 

Similar to Key exchange in crypto

Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
SmeetaJavalagi
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
MehediHasanShaon1
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
Information Security Awareness Group
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured Communications
Nitin Ramesh
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
Deepak John
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docxDescribe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
earleanp
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
Shumon Huque
 
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
David Ochel
 
Https
HttpsHttps
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
Olle E Johansson
 
Network security cs8
Network security  cs8Network security  cs8
Network security cs8
Infinity Tech Solutions
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
ch17.ppt
ch17.pptch17.ppt
ch17.ppt
SomuPatil8
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
SSL
SSLSSL
ok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.pptok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.ppt
SmeetaJavalagi
 
The last picks
The last picksThe last picks
The last picks
Nafiur Rahman Tuhin
 

Similar to Key exchange in crypto (20)

Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured Communications
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docxDescribe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
 
Https
HttpsHttps
Https
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Network security cs8
Network security  cs8Network security  cs8
Network security cs8
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
ch17.ppt
ch17.pptch17.ppt
ch17.ppt
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
SSL
SSLSSL
SSL
 
ok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.pptok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.ppt
 
The last picks
The last picksThe last picks
The last picks
 

More from David Hoen

Computer security
Computer securityComputer security
Computer security
David Hoen
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
David Hoen
 
Building a-database
Building a-databaseBuilding a-database
Building a-database
David Hoen
 
Database constraints
Database constraintsDatabase constraints
Database constraints
David Hoen
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
David Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
David Hoen
 
Prolog resume
Prolog resumeProlog resume
Prolog resume
David Hoen
 
Access data connection
Access data connectionAccess data connection
Access data connection
David Hoen
 
Database concepts
Database conceptsDatabase concepts
Database concepts
David Hoen
 
Datamining with nb
Datamining with nbDatamining with nb
Datamining with nb
David Hoen
 
Text categorization as a graph
Text categorization as a graph Text categorization as a graph
Text categorization as a graph
David Hoen
 
Text classification
Text classificationText classification
Text classification
David Hoen
 
Information retrieval
Information retrievalInformation retrieval
Information retrieval
David Hoen
 
Xml stylus studio
Xml stylus studioXml stylus studio
Xml stylus studio
David Hoen
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
David Hoen
 
Cryptography
CryptographyCryptography
Cryptography
David Hoen
 
Overview prolog
Overview prologOverview prolog
Overview prolog
David Hoen
 
Naïve bayes
Naïve bayesNaïve bayes
Naïve bayes
David Hoen
 

More from David Hoen (19)

Computer security
Computer securityComputer security
Computer security
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
 
Building a-database
Building a-databaseBuilding a-database
Building a-database
 
Database constraints
Database constraintsDatabase constraints
Database constraints
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Prolog resume
Prolog resumeProlog resume
Prolog resume
 
Access data connection
Access data connectionAccess data connection
Access data connection
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Datamining with nb
Datamining with nbDatamining with nb
Datamining with nb
 
Text categorization as a graph
Text categorization as a graph Text categorization as a graph
Text categorization as a graph
 
Xml schema
Xml schemaXml schema
Xml schema
 
Text classification
Text classificationText classification
Text classification
 
Information retrieval
Information retrievalInformation retrieval
Information retrieval
 
Xml stylus studio
Xml stylus studioXml stylus studio
Xml stylus studio
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview prolog
Overview prologOverview prolog
Overview prolog
 
Naïve bayes
Naïve bayesNaïve bayes
Naïve bayes
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Key exchange in crypto

  • 1.  Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant  Authenticates participants, generates session (shared) keys for them to talk to each other  Gives the requester a “ticket” – session key, requester’s ID and possibly expiration time, encrypted by the key that the server shares with KDC  Ticket and session key enrypted by the key that the requester shares with KDC  Needham-Schroeder, Kerberos
  • 2. Third-party authentication service oDistributes session keys for authentication, confidentiality, and integrity KDC 1. C, S, NC 2. KC(NC, KCS, S, KS (KCS, C )) C S 3.KS (KCS, C ) 4.KCS (NS ) 5.KCS (NS-1) Problem: replay attack in step 3 Fix: use timestamps
  • 3.  Introduce Ticket Granting Server (TGS) o Issues timed keys to resources  Users log on to authentication server (AS)  AS+TGS = KDC  Uses timestamps with a lifetime instead of nonces o Fixes freshness problem from Needham- Schroeder
  • 4. Third-party authentication service oDistributes session keys for authentication, confidentiality, and integrity TGS 4. KC,TGS(KC,S), TCS 3. TGT, S, KC,TGS(C, t) AS 1.C 2. KC(KC,TGS), TGT C S 5. TCS, KC,S(C,t) KC=hash(pass(C)) TGT=KTGS(C,Tvalid,KC,TGS) TCS=KS(C,Tvalid,KC,S) 6. KC,S(t+1)
  • 5.  Public key is public but … o How does either side know who and what the key is for?  Does this solve key distribution problem? o No – while confidentiality is not required, integrity is  Still need trusted third party o Digital certificates – certificate authority (CA) signs identity+public key tuple with its private key o Problem is finding a CA that both client and server trust
  • 6.  Everyone has Trent’s public key  Trent signs both Alice’s and Bob’s public keys – he generates public-key certificate  When they receive keys, verify the signature  Mallory cannot impersonate Alice or Bob because her key is signed as Mallory’s  Certificate usually contains more than the public key oName, network address, organization  Trent is known as Certificate Authority (CA)
  • 7. Authentication steps oVerifier provides nonce, or a timestamp is used instead. oPrincipal selects session key and sends it to verifier with nonce, encrypted with principal’s private key and verifier’s public key, sends principal’s certificate too oVerifier validates certificate oVerifier checks signature on nonce
  • 8.  PGP (Pretty Good Privacy) o“Web of Trust” o Source: Wikipedia  “As time goes on, you will accumulate keys from other people that you may want to designate as trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually accumulate and distribute with their key a collection of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause the emergence of a decentralized fault-tolerant web of confidence for all public keys.“
  • 9.  X.509 standard o Hierarchical model o A handful of trusted CAs can issue certificates to others
  • 10.  SSH o User keys exchanged out of band o Weak assurance of server keys  Is this the same host you spoke with last time?
  • 11.  Revocation lists (CRL’s) o Long lists o Hard to propagate  Lifetime / Expiration o Short life allows assurance of validity at time of issue but increases cost of key distribution  Real-time validation o Online Certificate Status Protocol (OCSP) o Single source of the compromised key list o Clients check suspicious keys and hash replies
  • 12.  Group key vs. Individual key o Proves that one belongs to the group vs. proving an individual identity o E.g., used for multicast messages
  • 13.  Revoking access o Change keys, redistribute  Joining and leaving groups o Does one see old messages on join or is the key changed – backward secrecy o How to revoke access – forward secrecy  Robustness o Coping with network partitioning  Efficiency o Cost of use, verification, exchange
  • 14.  Centralized o Single entity issues keys o Optimization to reduce traffic for large groups o May utilize application specific knowledge  Decentralized o Employs sub managers  Distributed o Members do key generation o May involve group contributions