SlideShare a Scribd company logo
1 of 45
UNIT-4 PART-1
Key Management and
Distribution
 topics of cryptographic key management /
key distribution are complex
 cryptographic, protocol, & management issues
 symmetric schemes require both parties to
share a common secret key
 public key schemes require parties to
acquire valid public keys
 have concerns with doing both
Road Map
 symmetric key distribution using symmetric
encryption
 symmetric key distribution using public-key
encryption
 distribution of public keys
• announcement, directory, authrority, CA
 X.509 authentication and certificates
 public key infrastructure (PKIX)
Key Distribution
 symmetric schemes require both parties to
share a common secret key
 issue is how to securely distribute this key
 whilst protecting it from others
 frequent key changes can be desirable
 often secure system failure due to a break
in the key distribution scheme
Key Distribution
 given parties A and B have various key
distribution alternatives:
1. A can select key and physically deliver to B
2. third party can select & deliver key to A & B
3. if A & B have communicated previously can
use previous key to encrypt a new key
4. if A & B have secure communications with a
third party C, C can relay key between A & B
Key Distribution Task
Key Hierarchy
 typically have a hierarchy of keys
 session key
 temporary key
 used for encryption of data between users
 for one logical session then discarded
 master key
 used to encrypt session keys
 shared by user & key distribution center
Key Hierarchy
Key Distribution Scenario
Key Distribution Issues
 hierarchies of KDC’s required for large
networks, but must trust each other
 session key lifetimes should be limited for
greater security
 use of automatic key distribution on behalf
of users, but must trust system
 use of decentralized key distribution
 controlling key usage
Road Map
 symmetric key distribution using symmetric
encryption
 symmetric key distribution using public-key
encryption
 distribution of public keys
• announcement, directory, authrority, CA
 X.509 authentication and certificates
 public key infrastructure (PKIX)
Symmetric Key Distribution
Using Public Keys
 public key cryptosystems are inefficient
 so almost never use for direct data encryption
 rather use to encrypt secret keys for distribution
Simple Secret Key Distribution
 Merkle proposed this very simple scheme
 allows secure communications
 no keys before/after exist
If A wishes to communicate with B, the following procedure is employed:
1.A generates a public/private key pair {PUa, PRa} and transmits a message to
B consisting of PUa and an identifier of A, IDA.
2.B generates a secret key, Ks, and transmits it to A, encrypted with A's public
key.
3.A computes D(PRa, E(PUa, Ks)) to recover the secret key. Because only A
can decrypt the message, only A and B will know the identity of Ks.
4.A discards PUa and PRa and B discards PUa.
A and B can now securely communicate using conventional encryption and
the session key Ks. At the completion of the exchange, both A and B discard
Ks.
Despite its simplicity, this is an attractive protocol. No keys exist before the
start of the communication and none exist after the completion of
communication.
Thus, the risk of compromise of the keys is minimal. At the same time, the
communication is secure from eavesdropping.
Man-in-the-Middle Attack
 this very simple scheme is vulnerable to
an active man-in-the-middle attack
The protocol depicted in above Figure is insecure against an
adversary who can intercept messages and then either relay the
intercepted message or substitute another message . Such an
attack is known as a man-in-the-middle attack.
In this case, if an adversary, E, has control of the intervening
communication channel, then E can compromise the
communication in the following fashion without being detected:
1.A generates a public/private key pair {PUa, PRa} and transmits
a message intended for B consisting of PUa and an identifier of A,
IDA.
2.E intercepts the message, creates its own public/private key pair
{PUe, PRe} and transmits PUe || IDA to B.
3.B generates a secret key, Ks, and transmits E(PUe, Ks).
4.E intercepts the message and learns Ks by computing D(PRe,
E(PUe, Ks)).
5.E transmits E(PUa, Ks) to A.
Secret Key Distribution with
Confidentiality and
Authentication
The above figure provides protection against both active and
passive attacks
Assuming A and B have exchanged public keys , then the
following steps occur:
1.A uses B's public key to encrypt a message to B containing an identifier of A
(IA) and a nonce (N1), which is used to identify this transaction uniquely.
2.B sends a message to A encrypted with PUa and containing A's nonce (N1)
as well as a new nonce generated by B (N2). Because only B could have
decrypted message (1), the presence of N1 in message (2) assures A that the
correspondent is B.
3.A returns N2, encrypted using B's public key, to assure B that its
correspondent is A.
4.A selects a secret key Ks and sends M = E(PUb, E(PRa, Ks)) to B. Encryption
with B's public key ensures that only B can read it; encryption with A's private
key ensures that only A could have sent it.
5.B computes D(PUa, D(PRb, M)) to recover the secret key.
The result is that this scheme ensures both confidentiality and authentication in
the exchange of a secret key.
Hybrid Key Distribution
 retain use of private-key KDC
 shares secret master key with each user
 distributes session key using master key
 public-key used to distribute master keys
 especially useful with widely distributed users
 rationale
 performance
 backward compatibility
Road Map
 symmetric key distribution using symmetric
encryption
 symmetric key distribution using public-key
encryption
 distribution of public keys
• announcement, directory, authority, CA
 X.509 authentication and certificates
 public key infrastructure (PKIX)
Distribution of Public Keys:
 Several techniques have been proposed
for the distribution of public keys, which
can mostly be grouped into the categories
shown.
 public announcement
 publicly available directory
 public-key authority
 public-key certificates
Public Announcement
 users distribute public keys to recipients or
broadcast to community at large
 eg. append PGP keys to email messages or
post to news groups or email list
 major weakness is forgery
 anyone can create a key claiming to be
someone else and broadcast it
 until forgery is discovered can masquerade as
claimed user
Publicly Available Directory
 can obtain greater security by registering
keys with a public directory
 directory must be trusted with properties:
 contains {name,public-key} entries
 participants register securely with directory
 participants can replace key at any time
 directory is periodically published
 directory can be accessed electronically
 still vulnerable to tampering or forgery
Public-Key Authority
 improve security by tightening control over
distribution of keys from directory
 has properties of directory
 and requires users to know public key for
the directory
 then users interact with directory to obtain
any desired public key securely
 does require real-time access to directory
when keys are needed
 may be vulnerable to tampering
Public-Key Authority
Road Map
 symmetric key distribution using symmetric
encryption
 symmetric key distribution using public-key
encryption
 distribution of public keys
• announcement, directory, authrority, CA
 X.509 authentication and certificates
 public key infrastructure (PKIX)
Public-Key Certificates
 certificates allow key exchange without
real-time access to public-key authority
 a certificate binds identity to public key
 usually with other info such as period of
validity, rights of use etc
 with all contents signed by a trusted
Public-Key or Certificate Authority (CA)
 can be verified by anyone who knows the
public-key authorities public-key
Public-Key Certificates
X.509 Authentication Service
 part of CCITT X.500 directory service standards
 distributed servers maintaining user info database
 defines framework for authentication services
 directory may store public-key certificates
 with public key of user signed by certification authority
 also defines authentication protocols
 uses public-key crypto & digital signatures
 algorithms not standardised, but RSA recommended
 X.509 certificates are widely used
 have 3 versions
X.509
Certificate
Use
X.509 Certificates
 issued by a Certification Authority (CA), containing:
 version V (1, 2, or 3)
 serial number SN (unique within CA) identifying certificate
 signature algorithm identifier AI
 issuer X.500 name CA)
 period of validity TA (from - to dates)
 subject X.500 name A (name of owner)
 subject public-key info Ap (algorithm, parameters, key)
 issuer unique identifier (v2+)
 subject unique identifier (v2+)
 extension fields (v3)
 signature (of hash of all fields in certificate)
 notation CA<<A>> denotes certificate for A signed by CA
X.509 Certificates
Obtaining a Certificate
 any user with access to CA can get any
certificate from it
 only the CA can modify a certificate
 because cannot be forged, certificates can
be placed in a public directory
CA Hierarchy
 if both users share a common CA then they are
assumed to know its public key
 otherwise CA's must form a hierarchy
 use certificates linking members of hierarchy to
validate other CA's
 each CA has certificates for clients (forward) and
parent (backward)
 each client trusts parents certificates
 enable verification of any certificate from one CA
by users of all other CAs in hierarchy
CA Hierarchy Use
Certificate Revocation
 certificates have a period of validity
 may need to revoke before expiry, eg:
1. user's private key is compromised
2. user is no longer certified by this CA
3. CA's certificate is compromised
 CA’s maintain list of revoked certificates
 the Certificate Revocation List (CRL)
 users should check certificates with CA’s CRL
X.509 Version 3
 has been recognised that additional
information is needed in a certificate
 email/URL, policy details, usage constraints
 rather than explicitly naming new fields
defined a general extension method
 extensions consist of:
 extension identifier
 criticality indicator
 extension value
Certificate Extensions
 key and policy information
 convey info about subject & issuer keys, plus
indicators of certificate policy
 certificate subject and issuer attributes
 support alternative names, in alternative
formats for certificate subject and/or issuer
 certificate path constraints
 allow constraints on use of certificates by
other CA’s
Road Map
 symmetric key distribution using symmetric
encryption
 symmetric key distribution using public-key
encryption
 distribution of public keys
• announcement, directory, authrority, CA
 X.509 authentication and certificates
 public key infrastructure (PKIX)
Public Key Infrastructure
public-key infrastructure (PKI) as the set of hardware, software,
people, policies, and procedures needed to create, manage,
store, distribute, and revoke digital certificates based on
asymmetric cryptography
Its principal is to enable secure, convenient, and efficient
acquisition of public keys. The IETF Public Key Infrastructure
X.509 (PKIX) working group has setup a formal (and generic)
model based on X.509 that is suitable for deploying a certificate-
based architecture on the Internet.
Above fig shows interrelationships among some key elements:
• End entity: A generic term used to denote end users, devices
(e.g., servers, routers), or any other entity that can be identified in
the subject field of a public key certificate. End entities can
consume and/or support PKI-related services.
Certification authority (CA): The issuer of certificates and
(usually) certificate revocation lists (CRLs). It may also support a
variety of administrative functions, although these are often
delegated to Registration Authorities.
Registration authority (RA): An optional component that can
assume a number of administrative functions from the CA.
The RA is often associated with the End Entity registration
process, but can assist in a number of other areas as well.
CRL issuer: An optional component that a CA can delegate to
publish CRLs.
Repository: A generic term used to denote any method for
storing certificates and CRLs so that they can be retrieved by End
Entities.
PKIX Management
 PKIX identifies a number of management functions that potentially
need to be supported by management protocols
 functions:
 registration
 initialization
 certification
 key pair recovery
 key pair update
 revocation request
 cross certification
 The PKIX working group has defines two alternative
management protocols between PKIX entities
 protocols: CMP, CMC
Registration: whereby a user first makes itself known to a CA, prior to issue
of a certificate(s) for that user. It usually involves some off-line or online
procedure for mutual authentication.
Initialization: to install key materials that have the appropriate relationship
with keys stored elsewhere in the infrastructure.
Certification: process where a CA issues a certificate for a user's public key,
and returns it to the user's client system and/or posts it in a repository.
Key pair recovery: a mechanism to recover the necessary decryption keys
when normal access to the keying material is no longer possible.
Key pair update: key pairs need to be updated and new certificates issued.
Revocation request: when authorized person advises need for certificate
revocation, e.g. private key compromise, affiliation change, name change.
Cross certification: when two CAs exchange information used in
establishing a cross-certificate, issued by one CA to another CA that contains a
CA signature key used for issuing certificates.
The PKIX working group has defines two alternative management protocols
between PKIX entities. RFC 2510 defines the certificate management protocols
(CMP), which is a flexible protocol able to accommodate a variety of technical,
operational, and business models.
 RFC 2797 defines certificate management messages over CMS (RFC 2630) called
CMC. This is built on earlier work to leverage existing code.
Summary Unit-4 Part-1
 have considered:
 symmetric key distribution using symmetric
encryption
 symmetric key distribution using public-key
encryption
 distribution of public keys
• announcement, directory, authrority, CA
 X.509 authentication and certificates
 public key infrastructure (PKIX)

More Related Content

What's hot

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication rajakhurram
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-Deepak John
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...TELKOMNIKA JOURNAL
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 

What's hot (20)

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Ch13
Ch13Ch13
Ch13
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Ch14
Ch14Ch14
Ch14
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Ch10
Ch10Ch10
Ch10
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Network security cs8
Network security  cs8Network security  cs8
Network security cs8
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 

Similar to Is unit-4-part-1

Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distributionMazin Alwaaly
 
Key management.ppt
Key management.pptKey management.ppt
Key management.pptSou Jana
 
Module 5-Key management in security in computing
Module 5-Key management in security in computingModule 5-Key management in security in computing
Module 5-Key management in security in computingAparnaSunil24
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,salutiontechnology
 
ch10_key_management.ppt
ch10_key_management.pptch10_key_management.ppt
ch10_key_management.pptPanimalarK
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver04
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols NetProtocol Xpert
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1AsrithaKorupolu
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to KerberosShumon Huque
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3limsh
 
key management in cryptography and network security
key management in cryptography and network securitykey management in cryptography and network security
key management in cryptography and network securitySri Latha
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.pptIshaKanwal4
 

Similar to Is unit-4-part-1 (20)

Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distribution
 
Key management.ppt
Key management.pptKey management.ppt
Key management.ppt
 
Module 5-Key management in security in computing
Module 5-Key management in security in computingModule 5-Key management in security in computing
Module 5-Key management in security in computing
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,
 
KEY MGMT.ppt
KEY MGMT.pptKEY MGMT.ppt
KEY MGMT.ppt
 
Ch15
Ch15Ch15
Ch15
 
ch10_key_management.ppt
ch10_key_management.pptch10_key_management.ppt
ch10_key_management.ppt
 
unit6.ppt
unit6.pptunit6.ppt
unit6.ppt
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
 
key management
 key management key management
key management
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Unit - 3.ppt
Unit - 3.pptUnit - 3.ppt
Unit - 3.ppt
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
BAIT1103 Chapter 3
BAIT1103 Chapter 3BAIT1103 Chapter 3
BAIT1103 Chapter 3
 
key management in cryptography and network security
key management in cryptography and network securitykey management in cryptography and network security
key management in cryptography and network security
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.ppt
 

Recently uploaded

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Is unit-4-part-1

  • 2. Key Management and Distribution  topics of cryptographic key management / key distribution are complex  cryptographic, protocol, & management issues  symmetric schemes require both parties to share a common secret key  public key schemes require parties to acquire valid public keys  have concerns with doing both
  • 3. Road Map  symmetric key distribution using symmetric encryption  symmetric key distribution using public-key encryption  distribution of public keys • announcement, directory, authrority, CA  X.509 authentication and certificates  public key infrastructure (PKIX)
  • 4. Key Distribution  symmetric schemes require both parties to share a common secret key  issue is how to securely distribute this key  whilst protecting it from others  frequent key changes can be desirable  often secure system failure due to a break in the key distribution scheme
  • 5. Key Distribution  given parties A and B have various key distribution alternatives: 1. A can select key and physically deliver to B 2. third party can select & deliver key to A & B 3. if A & B have communicated previously can use previous key to encrypt a new key 4. if A & B have secure communications with a third party C, C can relay key between A & B
  • 7. Key Hierarchy  typically have a hierarchy of keys  session key  temporary key  used for encryption of data between users  for one logical session then discarded  master key  used to encrypt session keys  shared by user & key distribution center
  • 10. Key Distribution Issues  hierarchies of KDC’s required for large networks, but must trust each other  session key lifetimes should be limited for greater security  use of automatic key distribution on behalf of users, but must trust system  use of decentralized key distribution  controlling key usage
  • 11. Road Map  symmetric key distribution using symmetric encryption  symmetric key distribution using public-key encryption  distribution of public keys • announcement, directory, authrority, CA  X.509 authentication and certificates  public key infrastructure (PKIX)
  • 12. Symmetric Key Distribution Using Public Keys  public key cryptosystems are inefficient  so almost never use for direct data encryption  rather use to encrypt secret keys for distribution
  • 13. Simple Secret Key Distribution  Merkle proposed this very simple scheme  allows secure communications  no keys before/after exist
  • 14. If A wishes to communicate with B, the following procedure is employed: 1.A generates a public/private key pair {PUa, PRa} and transmits a message to B consisting of PUa and an identifier of A, IDA. 2.B generates a secret key, Ks, and transmits it to A, encrypted with A's public key. 3.A computes D(PRa, E(PUa, Ks)) to recover the secret key. Because only A can decrypt the message, only A and B will know the identity of Ks. 4.A discards PUa and PRa and B discards PUa. A and B can now securely communicate using conventional encryption and the session key Ks. At the completion of the exchange, both A and B discard Ks. Despite its simplicity, this is an attractive protocol. No keys exist before the start of the communication and none exist after the completion of communication. Thus, the risk of compromise of the keys is minimal. At the same time, the communication is secure from eavesdropping.
  • 15. Man-in-the-Middle Attack  this very simple scheme is vulnerable to an active man-in-the-middle attack
  • 16. The protocol depicted in above Figure is insecure against an adversary who can intercept messages and then either relay the intercepted message or substitute another message . Such an attack is known as a man-in-the-middle attack. In this case, if an adversary, E, has control of the intervening communication channel, then E can compromise the communication in the following fashion without being detected: 1.A generates a public/private key pair {PUa, PRa} and transmits a message intended for B consisting of PUa and an identifier of A, IDA. 2.E intercepts the message, creates its own public/private key pair {PUe, PRe} and transmits PUe || IDA to B. 3.B generates a secret key, Ks, and transmits E(PUe, Ks). 4.E intercepts the message and learns Ks by computing D(PRe, E(PUe, Ks)). 5.E transmits E(PUa, Ks) to A.
  • 17. Secret Key Distribution with Confidentiality and Authentication
  • 18. The above figure provides protection against both active and passive attacks Assuming A and B have exchanged public keys , then the following steps occur: 1.A uses B's public key to encrypt a message to B containing an identifier of A (IA) and a nonce (N1), which is used to identify this transaction uniquely. 2.B sends a message to A encrypted with PUa and containing A's nonce (N1) as well as a new nonce generated by B (N2). Because only B could have decrypted message (1), the presence of N1 in message (2) assures A that the correspondent is B. 3.A returns N2, encrypted using B's public key, to assure B that its correspondent is A. 4.A selects a secret key Ks and sends M = E(PUb, E(PRa, Ks)) to B. Encryption with B's public key ensures that only B can read it; encryption with A's private key ensures that only A could have sent it. 5.B computes D(PUa, D(PRb, M)) to recover the secret key. The result is that this scheme ensures both confidentiality and authentication in the exchange of a secret key.
  • 19. Hybrid Key Distribution  retain use of private-key KDC  shares secret master key with each user  distributes session key using master key  public-key used to distribute master keys  especially useful with widely distributed users  rationale  performance  backward compatibility
  • 20. Road Map  symmetric key distribution using symmetric encryption  symmetric key distribution using public-key encryption  distribution of public keys • announcement, directory, authority, CA  X.509 authentication and certificates  public key infrastructure (PKIX)
  • 21. Distribution of Public Keys:  Several techniques have been proposed for the distribution of public keys, which can mostly be grouped into the categories shown.  public announcement  publicly available directory  public-key authority  public-key certificates
  • 22. Public Announcement  users distribute public keys to recipients or broadcast to community at large  eg. append PGP keys to email messages or post to news groups or email list  major weakness is forgery  anyone can create a key claiming to be someone else and broadcast it  until forgery is discovered can masquerade as claimed user
  • 23. Publicly Available Directory  can obtain greater security by registering keys with a public directory  directory must be trusted with properties:  contains {name,public-key} entries  participants register securely with directory  participants can replace key at any time  directory is periodically published  directory can be accessed electronically  still vulnerable to tampering or forgery
  • 24. Public-Key Authority  improve security by tightening control over distribution of keys from directory  has properties of directory  and requires users to know public key for the directory  then users interact with directory to obtain any desired public key securely  does require real-time access to directory when keys are needed  may be vulnerable to tampering
  • 26. Road Map  symmetric key distribution using symmetric encryption  symmetric key distribution using public-key encryption  distribution of public keys • announcement, directory, authrority, CA  X.509 authentication and certificates  public key infrastructure (PKIX)
  • 27. Public-Key Certificates  certificates allow key exchange without real-time access to public-key authority  a certificate binds identity to public key  usually with other info such as period of validity, rights of use etc  with all contents signed by a trusted Public-Key or Certificate Authority (CA)  can be verified by anyone who knows the public-key authorities public-key
  • 29. X.509 Authentication Service  part of CCITT X.500 directory service standards  distributed servers maintaining user info database  defines framework for authentication services  directory may store public-key certificates  with public key of user signed by certification authority  also defines authentication protocols  uses public-key crypto & digital signatures  algorithms not standardised, but RSA recommended  X.509 certificates are widely used  have 3 versions
  • 31. X.509 Certificates  issued by a Certification Authority (CA), containing:  version V (1, 2, or 3)  serial number SN (unique within CA) identifying certificate  signature algorithm identifier AI  issuer X.500 name CA)  period of validity TA (from - to dates)  subject X.500 name A (name of owner)  subject public-key info Ap (algorithm, parameters, key)  issuer unique identifier (v2+)  subject unique identifier (v2+)  extension fields (v3)  signature (of hash of all fields in certificate)  notation CA<<A>> denotes certificate for A signed by CA
  • 33. Obtaining a Certificate  any user with access to CA can get any certificate from it  only the CA can modify a certificate  because cannot be forged, certificates can be placed in a public directory
  • 34. CA Hierarchy  if both users share a common CA then they are assumed to know its public key  otherwise CA's must form a hierarchy  use certificates linking members of hierarchy to validate other CA's  each CA has certificates for clients (forward) and parent (backward)  each client trusts parents certificates  enable verification of any certificate from one CA by users of all other CAs in hierarchy
  • 36. Certificate Revocation  certificates have a period of validity  may need to revoke before expiry, eg: 1. user's private key is compromised 2. user is no longer certified by this CA 3. CA's certificate is compromised  CA’s maintain list of revoked certificates  the Certificate Revocation List (CRL)  users should check certificates with CA’s CRL
  • 37. X.509 Version 3  has been recognised that additional information is needed in a certificate  email/URL, policy details, usage constraints  rather than explicitly naming new fields defined a general extension method  extensions consist of:  extension identifier  criticality indicator  extension value
  • 38. Certificate Extensions  key and policy information  convey info about subject & issuer keys, plus indicators of certificate policy  certificate subject and issuer attributes  support alternative names, in alternative formats for certificate subject and/or issuer  certificate path constraints  allow constraints on use of certificates by other CA’s
  • 39. Road Map  symmetric key distribution using symmetric encryption  symmetric key distribution using public-key encryption  distribution of public keys • announcement, directory, authrority, CA  X.509 authentication and certificates  public key infrastructure (PKIX)
  • 41. public-key infrastructure (PKI) as the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography Its principal is to enable secure, convenient, and efficient acquisition of public keys. The IETF Public Key Infrastructure X.509 (PKIX) working group has setup a formal (and generic) model based on X.509 that is suitable for deploying a certificate- based architecture on the Internet. Above fig shows interrelationships among some key elements: • End entity: A generic term used to denote end users, devices (e.g., servers, routers), or any other entity that can be identified in the subject field of a public key certificate. End entities can consume and/or support PKI-related services. Certification authority (CA): The issuer of certificates and (usually) certificate revocation lists (CRLs). It may also support a variety of administrative functions, although these are often delegated to Registration Authorities.
  • 42. Registration authority (RA): An optional component that can assume a number of administrative functions from the CA. The RA is often associated with the End Entity registration process, but can assist in a number of other areas as well. CRL issuer: An optional component that a CA can delegate to publish CRLs. Repository: A generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by End Entities.
  • 43. PKIX Management  PKIX identifies a number of management functions that potentially need to be supported by management protocols  functions:  registration  initialization  certification  key pair recovery  key pair update  revocation request  cross certification  The PKIX working group has defines two alternative management protocols between PKIX entities  protocols: CMP, CMC
  • 44. Registration: whereby a user first makes itself known to a CA, prior to issue of a certificate(s) for that user. It usually involves some off-line or online procedure for mutual authentication. Initialization: to install key materials that have the appropriate relationship with keys stored elsewhere in the infrastructure. Certification: process where a CA issues a certificate for a user's public key, and returns it to the user's client system and/or posts it in a repository. Key pair recovery: a mechanism to recover the necessary decryption keys when normal access to the keying material is no longer possible. Key pair update: key pairs need to be updated and new certificates issued. Revocation request: when authorized person advises need for certificate revocation, e.g. private key compromise, affiliation change, name change. Cross certification: when two CAs exchange information used in establishing a cross-certificate, issued by one CA to another CA that contains a CA signature key used for issuing certificates. The PKIX working group has defines two alternative management protocols between PKIX entities. RFC 2510 defines the certificate management protocols (CMP), which is a flexible protocol able to accommodate a variety of technical, operational, and business models.  RFC 2797 defines certificate management messages over CMS (RFC 2630) called CMC. This is built on earlier work to leverage existing code.
  • 45. Summary Unit-4 Part-1  have considered:  symmetric key distribution using symmetric encryption  symmetric key distribution using public-key encryption  distribution of public keys • announcement, directory, authrority, CA  X.509 authentication and certificates  public key infrastructure (PKIX)