SlideShare ist ein Scribd-Unternehmen logo
1 von 16
CRYPTOGRAPHY
Key Management
Key Management
• The distribution of public keys
– Public announcement
– Public available directory
– Public-key authority
– Public-key certificates
• The use of public-key encryption to distribute secret keys
Public Announcement of Public
Keys
• Users distribute public keys to recipients or broadcast to community at large
– E.g., such as RSA, any participant can send his or her public key to
another participant
Major weakness is forgery
1. Anyone can create a key claiming to be someone else and
broadcast it
2. Until forgery is discovered can masquerade as claimed user
Public Key Directory
• Can obtain greater security by registering keys with a
public directory
• Directory must be trusted with properties:
– Contains {name, public-key} entries
– Participants register securely with directory
– Participants can replace key at any time
– Directory is periodically published
– Directory can be accessed electronically
• The scheme is Cleary more secure. The danger is, if an
adversary succeeds in obtaining or computing the
private key of the directory authority-it can
impersonate public keys of all the participants-Still
vulnerable to tampering or forgery
Public Key Directory
Public Key Authority
• Improve security by tightening control over distribution of public
keys from the directory
• Has properties of directory
• Requires users to know public key for the directory
• Users interact with directory to obtain any desired public key
securely
– Require real-time access to directory when keys are needed
• Users A and B mutually authenticate and assure freshness
• Drawbacks
– Public key authority could be a performance bottleneck
– The directory is vulnerable to tampering
Public Key Authority
Public-Key Distribution Scenario
Public Key Certificates
• Goal is to provide a mechanism as secure and reliable as the public key
authority without requiring direct contact-use of public key certificate
• Public key certificate
– Binds identity to public key
– Usually with other info such as period of validity, rights of use etc.
– With all contents signed by a TTP or Certificate Authority (CA)
• Public key certificate requirements
– Anyone can read a certificate and determine the name and public key of
the owner
– Anyone can verify that the certificate originated from the public key
certification authority
– Only the public key certification authority can issue or update certificates
– Anyone can verify the currency of the certificate
Public Key Certificates
Exchange of Public-Key Certificates
Distribution of Secret Keys using
PKC
• Because of its huge computational cost, Public-Key
cryptosystem usage tends to be restricted
– Secret key distribution
Simple Secret Key Distribution
(Merkle’s)
• Alice generates a public/private key pair and sends her public key to Bob
• Bob generates a secret key and sends it to Alice encrypted in her public
key
• Simple but vulnerable to man-in-the-middle attack
– End-to-end authentication is required
Simple Use of Public-Key Encryption to Establish a Session Key
Secret Key Distribution (Needham-
Schroeder’s)
• Provides a protection against both active and passive attacks
• Assume Alice and Bob have exchanged public keys (by any scheme described
earlier)
• Steps
1. Alice encrypts and sends an identifier of Alice and a nonce to Bob
2. Bob encrypts and sends Alice’s nonce and his own nonce
3. Alice encrypts and sends Bob’s nonce back to Bob
4. Alice selects, signs, encrypts and sends a secret key to Bob
• Ensure both confidentiality and authentication in the exchange of a secret
key
Secret Key Distribution (Needham-
Schroeder’s)
Public-Key Distribution of Secret Keys (Needham-Schroeder’s Algorithm)
Diffie-Hellman Key Exchange
• Relies on difficulty of computing discrete logarithms
K = (YB)XA mod q
= (XB mod q)XA mod q
= (XB)XA mod q
= XBXA mod q
= (XA)XB mod q
= (XA mod q)XB mod q
= (YA)XB mod q
Diffie-Hellman Key Exchange
EXAMPLE:
q = 97, primitive root of q, in this case,  = 5
A and B selects secret keys XA = 36 and XB = 58
Each computes public key; YA = 536 = 50 mod 97, YB = 558 = 44 mod 97
After exchanging public keys, each compute the common secret key:
K = (YB)XA mod 97 = 4436 = 75 mod 97
K = (YA)XB mod 97 = 5058 = 75 mod 97
Man-in-the-Middle Attack
Alice Bob
Darth
YA YD1
K1 = (YD1)XB mod q
K2 = (YD2)XA mod q
K2 = (YA)XD2 mod q
YB
K1 = (YB)XD1 mod q
YD2
• To counter such an attack, end-to-end authentication (the use of digital
signatures or public-key certificates) is required

Weitere ähnliche Inhalte

Ähnlich wie Lec 10 - Key Management.ppt

ch10_key_management.ppt
ch10_key_management.pptch10_key_management.ppt
ch10_key_management.ppt
PanimalarK
 
Module 5-Key management in security in computing
Module 5-Key management in security in computingModule 5-Key management in security in computing
Module 5-Key management in security in computing
AparnaSunil24
 

Ähnlich wie Lec 10 - Key Management.ppt (20)

Network security
Network securityNetwork security
Network security
 
Key Management, key management three tools ,
Key Management, key management three tools ,Key Management, key management three tools ,
Key Management, key management three tools ,
 
Key management.ppt
Key management.pptKey management.ppt
Key management.ppt
 
Ch14
Ch14Ch14
Ch14
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
man in the middle
man in the middleman in the middle
man in the middle
 
KEY MGMT.ppt
KEY MGMT.pptKEY MGMT.ppt
KEY MGMT.ppt
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
ch10_key_management.ppt
ch10_key_management.pptch10_key_management.ppt
ch10_key_management.ppt
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Module 5-Key management in security in computing
Module 5-Key management in security in computingModule 5-Key management in security in computing
Module 5-Key management in security in computing
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
ch13.ppt
ch13.pptch13.ppt
ch13.ppt
 
ch13.ppt
ch13.pptch13.ppt
ch13.ppt
 
ch13 ABCD.ppt
ch13 ABCD.pptch13 ABCD.ppt
ch13 ABCD.ppt
 
Network Security.ppt
Network Security.pptNetwork Security.ppt
Network Security.ppt
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
grid authentication
grid authenticationgrid authentication
grid authentication
 

Kürzlich hochgeladen

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Kürzlich hochgeladen (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 

Lec 10 - Key Management.ppt

  • 2. Key Management • The distribution of public keys – Public announcement – Public available directory – Public-key authority – Public-key certificates • The use of public-key encryption to distribute secret keys
  • 3. Public Announcement of Public Keys • Users distribute public keys to recipients or broadcast to community at large – E.g., such as RSA, any participant can send his or her public key to another participant Major weakness is forgery 1. Anyone can create a key claiming to be someone else and broadcast it 2. Until forgery is discovered can masquerade as claimed user
  • 4. Public Key Directory • Can obtain greater security by registering keys with a public directory • Directory must be trusted with properties: – Contains {name, public-key} entries – Participants register securely with directory – Participants can replace key at any time – Directory is periodically published – Directory can be accessed electronically • The scheme is Cleary more secure. The danger is, if an adversary succeeds in obtaining or computing the private key of the directory authority-it can impersonate public keys of all the participants-Still vulnerable to tampering or forgery
  • 6. Public Key Authority • Improve security by tightening control over distribution of public keys from the directory • Has properties of directory • Requires users to know public key for the directory • Users interact with directory to obtain any desired public key securely – Require real-time access to directory when keys are needed • Users A and B mutually authenticate and assure freshness • Drawbacks – Public key authority could be a performance bottleneck – The directory is vulnerable to tampering
  • 7. Public Key Authority Public-Key Distribution Scenario
  • 8. Public Key Certificates • Goal is to provide a mechanism as secure and reliable as the public key authority without requiring direct contact-use of public key certificate • Public key certificate – Binds identity to public key – Usually with other info such as period of validity, rights of use etc. – With all contents signed by a TTP or Certificate Authority (CA) • Public key certificate requirements – Anyone can read a certificate and determine the name and public key of the owner – Anyone can verify that the certificate originated from the public key certification authority – Only the public key certification authority can issue or update certificates – Anyone can verify the currency of the certificate
  • 9. Public Key Certificates Exchange of Public-Key Certificates
  • 10. Distribution of Secret Keys using PKC • Because of its huge computational cost, Public-Key cryptosystem usage tends to be restricted – Secret key distribution
  • 11. Simple Secret Key Distribution (Merkle’s) • Alice generates a public/private key pair and sends her public key to Bob • Bob generates a secret key and sends it to Alice encrypted in her public key • Simple but vulnerable to man-in-the-middle attack – End-to-end authentication is required Simple Use of Public-Key Encryption to Establish a Session Key
  • 12. Secret Key Distribution (Needham- Schroeder’s) • Provides a protection against both active and passive attacks • Assume Alice and Bob have exchanged public keys (by any scheme described earlier) • Steps 1. Alice encrypts and sends an identifier of Alice and a nonce to Bob 2. Bob encrypts and sends Alice’s nonce and his own nonce 3. Alice encrypts and sends Bob’s nonce back to Bob 4. Alice selects, signs, encrypts and sends a secret key to Bob • Ensure both confidentiality and authentication in the exchange of a secret key
  • 13. Secret Key Distribution (Needham- Schroeder’s) Public-Key Distribution of Secret Keys (Needham-Schroeder’s Algorithm)
  • 14. Diffie-Hellman Key Exchange • Relies on difficulty of computing discrete logarithms K = (YB)XA mod q = (XB mod q)XA mod q = (XB)XA mod q = XBXA mod q = (XA)XB mod q = (XA mod q)XB mod q = (YA)XB mod q
  • 15. Diffie-Hellman Key Exchange EXAMPLE: q = 97, primitive root of q, in this case,  = 5 A and B selects secret keys XA = 36 and XB = 58 Each computes public key; YA = 536 = 50 mod 97, YB = 558 = 44 mod 97 After exchanging public keys, each compute the common secret key: K = (YB)XA mod 97 = 4436 = 75 mod 97 K = (YA)XB mod 97 = 5058 = 75 mod 97
  • 16. Man-in-the-Middle Attack Alice Bob Darth YA YD1 K1 = (YD1)XB mod q K2 = (YD2)XA mod q K2 = (YA)XD2 mod q YB K1 = (YB)XD1 mod q YD2 • To counter such an attack, end-to-end authentication (the use of digital signatures or public-key certificates) is required