0% found this document useful (0 votes)
11 views55 pages

Unit 4 cryptography

The document covers key management and distribution, focusing on symmetric and public key distribution methods, including PKI and Kerberos. It details the roles of key distribution centers (KDC), public-key certificates, and the infrastructure necessary for secure key management. Additionally, it discusses authentication applications and the importance of secure key distribution in maintaining system integrity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views55 pages

Unit 4 cryptography

The document covers key management and distribution, focusing on symmetric and public key distribution methods, including PKI and Kerberos. It details the roles of key distribution centers (KDC), public-key certificates, and the infrastructure necessary for secure key management. Additionally, it discusses authentication applications and the importance of secure key distribution in maintaining system integrity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Content

➢ Key Management and Distribution

➢ Symmetric Key Distribution

➢ Public key Distribution

➢ PKI

➢ Kerberos

➢ E-mail Security

1
Objective of Unit -4

• Learn about Key Management and distribution: Symmetric


key distribution, Diffie-Hellman Key Exchange

• To understand Public key distribution, X.509 Certificates,


Public key Infrastructure.

• To study Authentication Applications: Kerberos, Electronic


mail security: pretty good privacy (PGP), S/MIME.

2
Key-distribution center (KDC) CO4

A KDC creates a secret key for each member. This secret


key can be used only between the member and the KDC,
not between two members.

Note
A session symmetric key between two parties
is used only once.

11/21/2023 3
Key-distribution center (KDC) CO4

Key-distribution center (KDC)

11/21/2023 4
Key-distribution center (KDC) CO4

Hierarchical Multiple KDCs

11/21/2023 5
Key Distribution
➢ symmetric schemes require both parties to
share a common secret key
➢ issue is how to securely distribute this key
➢ whilst protecting it from others
➢ frequent key changes can be desirable
➢ often secure system failure due to a break
in the key distribution scheme
Key Distribution
➢ symmetric schemes require both parties to
share a common secret key
➢ issue is how to securely distribute this key
➢ whilst protecting it from others
➢ frequent key changes can be desirable
➢ often secure system failure due to a break
in the key distribution scheme
Key Hierarchy
Key Distribution Scenario
Key Distribution Issues
➢ hierarchies of KDC’s required for large
networks, but must trust each other
➢ session key lifetimes should be limited for
greater security
➢ use of automatic key distribution on behalf
of users, but must trust system
➢ use of decentralized key distribution
➢ controlling key usage
Simple Secret Key Distribution
➢ Merkle proposed this very simple scheme
⚫ allows secure communications
⚫ no keys before/after exist
Secret Key Distribution with
Confidentiality and
Authentication
Symmetric-key Distribution CO4

Alice and Bob can create a session key between


themselves without using a KDC. This method of
session-key creation is referred to as the symmetric-
key agreement. We can create key using:-

1 Diffie-Hellman Key Agreement

11/21/2023 14
Public-key Distribution CO4

In asymmetric-key cryptography, people do not need to


know a symmetric shared key; everyone shields a private
key and advertises a public key.

11/21/2023 18
Public-key Distribution CO4

Public Announcement

11/21/2023 19
Public Announcement

➢ users distribute public keys to recipients or


broadcast to community at large
➢ major weakness is forgery
⚫ anyone can create a key claiming to be
someone else and broadcast it
⚫ until forgery is discovered can masquerade as
claimed user
Publicly Available Directory
➢ can obtain greater security by registering
keys with a public directory
➢ directory must be trusted with properties:
⚫ contains {name,public-key} entries
⚫ participants register securely with directory
⚫ participants can replace key at any time
⚫ directory is periodically published
⚫ directory can be accessed electronically
➢ still vulnerable to tampering or forgery
Public-key Distribution CO4

Trusted Center

11/21/2023 22
Public-Key Authority
➢ improve security by tightening control over
distribution of keys from directory
➢ has properties of directory
➢ and requires users to know public key for
the directory
➢ then users interact with directory to obtain
any desired public key securely
⚫ does require real-time access to directory
when keys are needed
⚫ may be vulnerable to tampering
Public-Key Authority
Public-key Distribution CO4

Controlled Trusted Center

11/21/2023 25
Public-Key Certificates
➢ certificates allow key exchange without
real-time access to public-key authority
➢ a certificate binds identity to public key
⚫ usually with other info such as period of
validity, rights of use etc
➢ with all contents signed by a trusted
Public-Key or Certificate Authority (CA)
➢ can be verified by anyone who knows the
public-key authorities public-key
Public-Key Certificates
Public-key Distribution CO4

Certification Authority

11/21/2023 28
Public-key Distribution CO4

X.509 Certificate

11/21/2023 29
The standard uses the following notation to define a certificate:
CA<<A>>= CA {V, SN, AI, CA, UCA, A, UA, Ap, TA}
where
Y << X >> = the certificate of user X issued by certification authority Y
Y{I} = the signing of I by Y. It consists of I with an encrypted
hash
code appended
V = version of the certificate
SN = serial number of the certificate
AI = identifier of the algorithm used to sign the certificate
CA = name of certificate authority
UCA = optional unique identifier of the CA
A = name of user A
UA = optional unique identifier of the user A
Ap = public key of user A
TA = period of validity of the certificate
Public-key Distribution CO4
X.509 Certificate
Certificate Renewal
Each certificate has a period of validity. If there is no
problem with the certificate, the CA issues a new
certificate before the old one expires.

Certificate Renewal
In some cases a certificate must be revoked before its
expiration.

Delta Revocation
To make revocation more efficient, the delta certificate
revocation list (delta CRL) has been introduced.

11/21/2023 31
15.31
X.509 Certificates
Public-key infrastructure
(PKI)
public-key infrastructure is :

the set of hardware, software, people, policies, and procedures needed to


create, manage, store, distribute, and revoke digital certificates based on
asymmetric encryption.

Objective for developing PKI:

To enable secure, convenient, and efficient acquisition of public keys.

Public-key infrastructure X.509 (PKIX) is a working group which has


been the driving force behind the setting up a formal and generic model
based on X.509 that is suitable for deploying a certificate- based
architecture on the internet
Public-key Distribution CO4
Public-Key Infrastructures (PKI)

Some duties of a PKI

11/21/2023 34
Public Key Infrastructure
Key Elements of PKIX model

1.) End Entity : term used to denote end users, devices or any other entity
that wants to get issue the public key certificate.

2.) Certification Authority (CA) : the issuer of certificates and certificate


revocation list (CRLs).

3.) Registration authority (RA) : it is an optional component that can


assume a number of administrative functions from the CA. It is often
associated with end entity registration process.

4.) CRL issuer : It is an optional component that a CA delegates to publish


CRLs.

5.) Repository : any method used to store certificates and CRL so that
they can be retrieved by end entity
Public-key Distribution CO4

Trust Model
PKI hierarchical model

11/21/2023 37
Kerberos CO4

Kerberos is an authentication protocol, and at the same


time a KDC, that has become very popular. Several
systems, including Windows 2000, use Kerberos.
Originally designed at MIT, it has gone through several
versions.

11/21/2023 38
Kerberos Requirements
• its first report identified requirements as:
– secure
– reliable
– transparent
– scalable
Kerberos v4 Overview
➢a basic third-party authentication scheme
➢have an Authentication Server (AS)
⚫users initially negotiate with AS to identify self
⚫AS provides a non-corruptible authentication
credential (ticket granting ticket TGT)
➢have a Ticket Granting server (TGS)
⚫users subsequently request access to other services
from TGS on basis of users TGT
➢using a complex protocol using DES
Kerberos Co4

Kerberos servers

11/21/2023 42
Kerberos CO4

Kerberos version 5
The minor differences between version 4 and version 5 are
briefly listed below:

1) Version 5 has a longer ticket lifetime.


2) Version 5 allows tickets to be renewed.
3) Version 5 can accept any symmetric-key algorithm.
4) Version 5 uses a different protocol for describing data
types.
5) Version 5 has more overhead than version 4.

11/21/2023 43
References

Thank You

11/21/2023 70

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy