Unit 4 cryptography
Unit 4 cryptography
➢ PKI
➢ Kerberos
➢ E-mail Security
1
Objective of Unit -4
2
Key-distribution center (KDC) CO4
Note
A session symmetric key between two parties
is used only once.
11/21/2023 3
Key-distribution center (KDC) CO4
11/21/2023 4
Key-distribution center (KDC) CO4
11/21/2023 5
Key Distribution
➢ symmetric schemes require both parties to
share a common secret key
➢ issue is how to securely distribute this key
➢ whilst protecting it from others
➢ frequent key changes can be desirable
➢ often secure system failure due to a break
in the key distribution scheme
Key Distribution
➢ symmetric schemes require both parties to
share a common secret key
➢ issue is how to securely distribute this key
➢ whilst protecting it from others
➢ frequent key changes can be desirable
➢ often secure system failure due to a break
in the key distribution scheme
Key Hierarchy
Key Distribution Scenario
Key Distribution Issues
➢ hierarchies of KDC’s required for large
networks, but must trust each other
➢ session key lifetimes should be limited for
greater security
➢ use of automatic key distribution on behalf
of users, but must trust system
➢ use of decentralized key distribution
➢ controlling key usage
Simple Secret Key Distribution
➢ Merkle proposed this very simple scheme
⚫ allows secure communications
⚫ no keys before/after exist
Secret Key Distribution with
Confidentiality and
Authentication
Symmetric-key Distribution CO4
11/21/2023 14
Public-key Distribution CO4
11/21/2023 18
Public-key Distribution CO4
Public Announcement
11/21/2023 19
Public Announcement
Trusted Center
11/21/2023 22
Public-Key Authority
➢ improve security by tightening control over
distribution of keys from directory
➢ has properties of directory
➢ and requires users to know public key for
the directory
➢ then users interact with directory to obtain
any desired public key securely
⚫ does require real-time access to directory
when keys are needed
⚫ may be vulnerable to tampering
Public-Key Authority
Public-key Distribution CO4
11/21/2023 25
Public-Key Certificates
➢ certificates allow key exchange without
real-time access to public-key authority
➢ a certificate binds identity to public key
⚫ usually with other info such as period of
validity, rights of use etc
➢ with all contents signed by a trusted
Public-Key or Certificate Authority (CA)
➢ can be verified by anyone who knows the
public-key authorities public-key
Public-Key Certificates
Public-key Distribution CO4
Certification Authority
11/21/2023 28
Public-key Distribution CO4
X.509 Certificate
11/21/2023 29
The standard uses the following notation to define a certificate:
CA<<A>>= CA {V, SN, AI, CA, UCA, A, UA, Ap, TA}
where
Y << X >> = the certificate of user X issued by certification authority Y
Y{I} = the signing of I by Y. It consists of I with an encrypted
hash
code appended
V = version of the certificate
SN = serial number of the certificate
AI = identifier of the algorithm used to sign the certificate
CA = name of certificate authority
UCA = optional unique identifier of the CA
A = name of user A
UA = optional unique identifier of the user A
Ap = public key of user A
TA = period of validity of the certificate
Public-key Distribution CO4
X.509 Certificate
Certificate Renewal
Each certificate has a period of validity. If there is no
problem with the certificate, the CA issues a new
certificate before the old one expires.
Certificate Renewal
In some cases a certificate must be revoked before its
expiration.
Delta Revocation
To make revocation more efficient, the delta certificate
revocation list (delta CRL) has been introduced.
11/21/2023 31
15.31
X.509 Certificates
Public-key infrastructure
(PKI)
public-key infrastructure is :
11/21/2023 34
Public Key Infrastructure
Key Elements of PKIX model
1.) End Entity : term used to denote end users, devices or any other entity
that wants to get issue the public key certificate.
5.) Repository : any method used to store certificates and CRL so that
they can be retrieved by end entity
Public-key Distribution CO4
Trust Model
PKI hierarchical model
11/21/2023 37
Kerberos CO4
11/21/2023 38
Kerberos Requirements
• its first report identified requirements as:
– secure
– reliable
– transparent
– scalable
Kerberos v4 Overview
➢a basic third-party authentication scheme
➢have an Authentication Server (AS)
⚫users initially negotiate with AS to identify self
⚫AS provides a non-corruptible authentication
credential (ticket granting ticket TGT)
➢have a Ticket Granting server (TGS)
⚫users subsequently request access to other services
from TGS on basis of users TGT
➢using a complex protocol using DES
Kerberos Co4
Kerberos servers
11/21/2023 42
Kerberos CO4
Kerberos version 5
The minor differences between version 4 and version 5 are
briefly listed below:
11/21/2023 43
References
Thank You
11/21/2023 70