SlideShare a Scribd company logo
1 of 11
By:
Anuj Tyagi
Anshul Jain
Rahul Kulkarni
ARCHITECHTURE
• Client – Server System
Server
Client A Client BMutual Authentication
Shared Key generation
USER REGISTRATION AND CLIENT-SERVER AUTHENTICATION
PROTOCOL
ASSUMPTIONS
• Server holds the public key of all the Clients along with its own public key and shard key is
generated to be used with respective clients.
• Server has a list of Registered Usernames and Passwords.
• Client is aware of server’s registration connection port and ip.
• Client sends the user name and challenge in its first contact with the server as an argument.
USER REGISTRATION AND CLIENT-SERVER AUTHENTICATION
PROTOCOL
1. Sending timestamps along with user name and
passwords.
2. Server replies with a ‘Hello’ along with a T2
encrypted with public key of the client.
3. Key Establishment and Authentication happens in
a Diffie Hellman Exchange.
4. Password Hashes and User list is forwarded from
the server to the client along with message
integrity and authentication.
(u_name, pwd) : T1
{ga, T2+1}S, {N1}S
{gs(+) (N1+1)}A
Hello, {T2}A
{R1}gas
{R1+1}gas, {R2}gas
{R2 – 1}gas
A S
g,p,a,kS s,g,p, KA
[Pwd, N] gas, [H(pwd)] gas
[H(u_list)] gas, [u_list] gas
Specifications
• Size of R1 = 8 bytes.
• Restrict the user name and password to 8 bytes in length.
• Asymmetric Encryption is used for solving challenges.
• SHA-256 is used for message integrity.
MUTUAL AUTHENTICATION AND KEY ESTABILSHMENT PROTOCOL
Assumptions
• Server holds the public key of all the Clients along with its own public key and shared key with each
of its clients.
• Usage of NONCE assuming each NONCE is difficult to replicate by any outsider.
• Authentication and Key Establishment occurs between active clients only.
• Diffie Hellman Keys are dropped once a session is complete between any two clients.
MUTUAL AUTHENTICATION AND KEY ESTABILSHMENT PROTOCOL
u_name, T1
{ga, T2+1}S, {N1}S
{gS(+) (N1+1)}A
Hello, {T2}A
{R1}gas
{R1+1}gas, {R2}gas
{R2 – 1}gas
A S
g,p,a,kS s,g,p, KA
Specifications
• Size of N1 = 8 bytes.
• Restrict the user name and password to 8 bytes in length.
• ‘a’ -> private key for Diffie Hellman Exchange.
• ‘g’ -> function to calculate shared key
• ‘p’ -> Large Prime Number used in Diffie Hellman Exchange.
• Asymmetric Encryption is used for solving challenges.
• SHA-256 is used for message integrity.
Safety and Integrity
• Reflection Attacks
• Man In the Middle Attack
• Replay Attack
Peer to Peer Communication
User A User B
KAB { T1, Message1}
KAB { T2, Message2}
KAB = gab mod p
T1 = Timestamp
Logout process
User A User B
Logout, KAB {UserA,
T1}
KAB { T2}
KAB = Symmetric Key
T1 = Timestamp

More Related Content

Similar to Secure messaging using PKI

Similar to Secure messaging using PKI (20)

fengmei.ppt
fengmei.pptfengmei.ppt
fengmei.ppt
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
fengmei.ppt
fengmei.pptfengmei.ppt
fengmei.ppt
 
SSL Demystified
SSL DemystifiedSSL Demystified
SSL Demystified
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
03-SSL (1).ppt
03-SSL (1).ppt03-SSL (1).ppt
03-SSL (1).ppt
 
03-SSL (2).ppt
03-SSL (2).ppt03-SSL (2).ppt
03-SSL (2).ppt
 
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
 
this is ppt this is ppt this is ppt this is ppt
this is ppt this is ppt this is ppt this is pptthis is ppt this is ppt this is ppt this is ppt
this is ppt this is ppt this is ppt this is ppt
 
The last picks
The last picksThe last picks
The last picks
 
ch13 ABCD.ppt
ch13 ABCD.pptch13 ABCD.ppt
ch13 ABCD.ppt
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
ssl
sslssl
ssl
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
SIP over TLS
SIP over TLSSIP over TLS
SIP over TLS
 
SSL
SSLSSL
SSL
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
 
8.SSL encryption.ppt
8.SSL encryption.ppt8.SSL encryption.ppt
8.SSL encryption.ppt
 

More from wolverinetyagi

Smart body Object sensor networking
Smart body  Object sensor networkingSmart body  Object sensor networking
Smart body Object sensor networkingwolverinetyagi
 
Real time heart attack mobile detection iot use case for sdn
Real time heart attack mobile detection iot use case for sdnReal time heart attack mobile detection iot use case for sdn
Real time heart attack mobile detection iot use case for sdnwolverinetyagi
 
Resilient integration of distributed high performance zones into the bel wue ...
Resilient integration of distributed high performance zones into the bel wue ...Resilient integration of distributed high performance zones into the bel wue ...
Resilient integration of distributed high performance zones into the bel wue ...wolverinetyagi
 
Data Center Interconnect
Data Center InterconnectData Center Interconnect
Data Center Interconnectwolverinetyagi
 
Access List in Networks
Access List in NetworksAccess List in Networks
Access List in Networkswolverinetyagi
 
SDN and Named Data Networking Security
SDN and Named Data Networking SecuritySDN and Named Data Networking Security
SDN and Named Data Networking Securitywolverinetyagi
 

More from wolverinetyagi (6)

Smart body Object sensor networking
Smart body  Object sensor networkingSmart body  Object sensor networking
Smart body Object sensor networking
 
Real time heart attack mobile detection iot use case for sdn
Real time heart attack mobile detection iot use case for sdnReal time heart attack mobile detection iot use case for sdn
Real time heart attack mobile detection iot use case for sdn
 
Resilient integration of distributed high performance zones into the bel wue ...
Resilient integration of distributed high performance zones into the bel wue ...Resilient integration of distributed high performance zones into the bel wue ...
Resilient integration of distributed high performance zones into the bel wue ...
 
Data Center Interconnect
Data Center InterconnectData Center Interconnect
Data Center Interconnect
 
Access List in Networks
Access List in NetworksAccess List in Networks
Access List in Networks
 
SDN and Named Data Networking Security
SDN and Named Data Networking SecuritySDN and Named Data Networking Security
SDN and Named Data Networking Security
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Secure messaging using PKI

  • 2. ARCHITECHTURE • Client – Server System Server Client A Client BMutual Authentication Shared Key generation
  • 3. USER REGISTRATION AND CLIENT-SERVER AUTHENTICATION PROTOCOL ASSUMPTIONS • Server holds the public key of all the Clients along with its own public key and shard key is generated to be used with respective clients. • Server has a list of Registered Usernames and Passwords. • Client is aware of server’s registration connection port and ip. • Client sends the user name and challenge in its first contact with the server as an argument.
  • 4. USER REGISTRATION AND CLIENT-SERVER AUTHENTICATION PROTOCOL 1. Sending timestamps along with user name and passwords. 2. Server replies with a ‘Hello’ along with a T2 encrypted with public key of the client. 3. Key Establishment and Authentication happens in a Diffie Hellman Exchange. 4. Password Hashes and User list is forwarded from the server to the client along with message integrity and authentication. (u_name, pwd) : T1 {ga, T2+1}S, {N1}S {gs(+) (N1+1)}A Hello, {T2}A {R1}gas {R1+1}gas, {R2}gas {R2 – 1}gas A S g,p,a,kS s,g,p, KA [Pwd, N] gas, [H(pwd)] gas [H(u_list)] gas, [u_list] gas
  • 5. Specifications • Size of R1 = 8 bytes. • Restrict the user name and password to 8 bytes in length. • Asymmetric Encryption is used for solving challenges. • SHA-256 is used for message integrity.
  • 6. MUTUAL AUTHENTICATION AND KEY ESTABILSHMENT PROTOCOL Assumptions • Server holds the public key of all the Clients along with its own public key and shared key with each of its clients. • Usage of NONCE assuming each NONCE is difficult to replicate by any outsider. • Authentication and Key Establishment occurs between active clients only. • Diffie Hellman Keys are dropped once a session is complete between any two clients.
  • 7. MUTUAL AUTHENTICATION AND KEY ESTABILSHMENT PROTOCOL u_name, T1 {ga, T2+1}S, {N1}S {gS(+) (N1+1)}A Hello, {T2}A {R1}gas {R1+1}gas, {R2}gas {R2 – 1}gas A S g,p,a,kS s,g,p, KA
  • 8. Specifications • Size of N1 = 8 bytes. • Restrict the user name and password to 8 bytes in length. • ‘a’ -> private key for Diffie Hellman Exchange. • ‘g’ -> function to calculate shared key • ‘p’ -> Large Prime Number used in Diffie Hellman Exchange. • Asymmetric Encryption is used for solving challenges. • SHA-256 is used for message integrity.
  • 9. Safety and Integrity • Reflection Attacks • Man In the Middle Attack • Replay Attack
  • 10. Peer to Peer Communication User A User B KAB { T1, Message1} KAB { T2, Message2} KAB = gab mod p T1 = Timestamp
  • 11. Logout process User A User B Logout, KAB {UserA, T1} KAB { T2} KAB = Symmetric Key T1 = Timestamp