Unit 8
Unit 8
Security
(3170720)
UNIT 8: KEY MANAGEMENT AND DISTRIBUTION, SYMMETRIC KEY
DISTRIBUTION USING SYMMETRIC AND ASYMMETRIC ENCRYPTIONS,
D I S T R I B U T I O N O F P U B L I C K E Y S , X . 5 0 9 C E R T I F I C AT E S , P U B L I C K E Y
INFRASTRUCTURE
R E F E R E N C E B O O K - C R Y P TO G R A P H Y A N D N E T W O R K S E C U R I T Y, P R I N C I P L E S
A N D P R A C T I C E S I X T H E D I T I O N , W I L L I A M S TA L L I N G S , P E A R S O N
CHAPTER -14
Road Map
Link-level encryption?
20
End-to-end encryption between hosts?
If n host then key required = n(n-1)/2 = 10(9)/2 = 45
End-to-end encryption between applications?
Each application has key . If 5 applications on every host , how many ? (end
to end )
5 * 45 =225 key (if Application A can communicate with only application A
on another host )
(50 *49 )/2 =1225 (if Application A can communicate with any application
on another host )
Key Distribution Centre
Key distribution for symmetric keys by a central server (KDC):
- fixed number of distributions (for given n)
Use of the control vector has two advantages over use of an 8-bit tag.
First, there is no restriction on length of the control vector, which enables arbitrarily
complex controls to be imposed on key use.
Second, the control vector is available in clear form at all stages of operation. Thus,
control of key use can be exercised in multiple locations.
Symmetric Key Distribution Using
Asymmetric Encryption
Symmetric Key Distribution Using Asymmetric
Encryption
Asymmetric encryption generally too slow for encrypting large
amount of data hence they are almost never used for the direct
encryption of sizable block of data, but are limited to relatively
small blocks.
Common application of asymmetric encryption is exchanging secret
keys
Three examples:
1. Simple Secret Key Distribution
2. Secret Key Distribution with Confidentiality and Authentication
3. Hybrid Scheme: Public-Key Distribution of KDC Master Keys
Simple Key Distribution
Simple Key Distribution
Simple: no keys prior to or after communication
Provides confidentiality for session key
Subject to man-in-the-middle attack
Only useful if attacker cannot modify/insert messages
Simple Key Distribution
Insecure against an adversary who can intercept messages and then either relay the
intercepted message or substitute another message.
Such an attack is known as a man-in-the-middle attack.
Simple Key Distribution
Secret Key Distribution with Confidentiality and
Authentication
Provides both confidentiality and authentication in exchange of
secret key It is assumed that A and B have exchanged public keys
Secret Key Distribution with Confidentiality and
Authentication
Hybrid Key Distribution
Retain Use Key Distribution Center (KDC)
Share secret master key with user
Distributes session key using master key
Use public-key distribution to distribute master key – efficient
method to deliver master key rather than manual delivery
The addition of a public-key layer provides a secure, efficient means
of distributing master keys.
This is an advantage in a configuration in which a single KDC serves
a widely distributed set of users.
Rationale
Performance
Backward compatibility - The hybrid scheme is easily overlaid on
an existing KDC scheme with minimal disruption or software
changes
Distribution of Public key
Distribution of Public Key
Optional Field
Alice Bob
(client) (client)
Alice obtains Cathy<<Dan>>
Alice validate Cathy<<Dan>>
Alice use Cathy<<Dan>> to validate Dan<<Bob>>
For a network with N nodes, how many master keys are present?
A : N(N-1)/2
B:N
C : N(N+1)/2
D : N/2
Communication between end systems is encrypted using a key, often known
as
A : temporary key
B : section key
C : line key
D : session key
The ________ method provides a one-time session key for two parties.
A) Diffie-Hellman
B) RSA
C) DES
D) AES
Which one of the following is not a public key distribution means?
a) Public-Key Certificates
b) Hashing Certificates
c) Publicly available directories
d) Public-Key authority
Suppose that A has obtained a certificate from certification authority X1 and B has
obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s
public key. In notation of X.509, this chain is represented in the correct order as –
a) X2 X1 X1 B
b) X1 X1 X2 A
c) X1 X2 X2 B
d) X1 X2 X2 A
Certificates generated by X that are the certificates of other CAs are Reverse
Certificates.
a) True
b) False
It is desirable to revoke a certificate before it expires because
a) the user is no longer certified by this CA
b) the CA’s certificate is assumed to be compromised
c) the user’s private key is assumed to be compromised
d) all of the mentioned
The period of validity consists of the date on which the certificate expires.
a) True
b) False
Certificate extensions fall into 3 categories. Which one of the following is not a
Certificate extensions category?
a) Subject and Issuer attributes
b) Key and Policy information
c) Certification path constraints
d) All of the above are Certificate extensions categories