Leksion 10 Key Menagement

18
8/12/2019 Leksion 10 Key Menagement http://slidepdf.com/reader/full/leksion-10-key-menagement 1/18 1 Key Management MsC, Ing. Ezmerina Kotobelli [email protected]

Transcript of Leksion 10 Key Menagement

Page 1: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 1/18

1

Key Management

MsC, Ing. Ezmerina Kotobelli

[email protected]

Page 2: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 2/18

2

Overview

 Distributions of Public Keys

Public Key Authority

 Public Key Certificates  Public-Key Distribution of Secret Keys

Page 3: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 3/18

3

Key Management Public-key encryption helps address key distribution

 problems

Have two aspects of this:

o distribution of public keys

o use of public-key encryption to distribute secretkeys

Page 4: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 4/18

Page 5: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 5/18

5

Public Announcement

Users distribute public keys to recipients or broadcast tocommunity at large

o eg. append PGP keys to email messages or post to news

groups or email list

Major weakness is forgery

o anyone can create a key claiming to be someone else

and broadcast it

o until forgery is discovered can masquerade as claimeduser 

Page 6: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 6/18

6

Uncontrolled KeyDistribution

Page 7: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 7/18

7

Publicly AvailableDirectory

Can obtain greater security by registering keys with a

 public directory Directory must be trusted with properties:

o contains {name,public-key} entries

o participants register securely with directory

o participants can replace key at any timeo directory is periodically published

o directory can be accessed electronically

Still vulnerable to tampering or forgery

Page 8: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 8/18

8

Public Key Publication

Page 9: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 9/18

9

Public-Key Authority

Improve security by tightening control over distribution

of keys from directory

Has properties of directory

And requires users to know public key for the directory Then users interact with directory to obtain any desired

 public key securely

o does require real time access to directory when real-

keys are needed

Page 10: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 10/18

10

Public-Key Authority

Page 11: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 11/18

Page 12: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 12/18

12

Public-Key Certificates

Page 13: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 13/18

13

Public-Key Distributionof Secret Keys

Use previous methods to obtain public-key

Can use for secrecy or authentication

But public-key algorithms are slow

So usually want to use private-key encryption to

 protect message contents

Hence need a session key Have several alternatives for negotiating a suitable

session

Page 14: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 14/18

14

Simple Use of Public KeyEncryption to Establish a

Session Key

Page 15: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 15/18

15

Simple Secret KeyDistribution

Proposed by Merkle in 1979

o A generates a new temporary public key pair o A sends B the public key and their identity

o B generates a session key K sends it to A

encrypted using the supplied public key

o A decrypts the session key and both use Problem is that an opponent can intercept and

impersonate both halves of protocol

Page 16: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 16/18

16

Public-Key Distribution ofSecret Keys with Confidentiality

and Authentication

  If have securely exchanged public-keys:

Page 17: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 17/18

17

Hybrid Scheme

KDC uses a public key scheme to distribute a secret

master key

KDC uses the secret master key to distribute session

secret keys Performance: Distribution of session keys by public

key encryption could degrade overall system. With a

hybrid scheme public key is used only occasionally

to update the master keyWhen a single KDC serves a widely distributes set of 

users

Used in IBM mainframes

Page 18: Leksion 10 Key Menagement

8/12/2019 Leksion 10 Key Menagement

http://slidepdf.com/reader/full/leksion-10-key-menagement 18/18

18

Summary

 Distributions of Public Keys

Public Key Authority

 Public Key Certificates

 Public-Key Distribution of Secret Keys

 Hybrid Schemes