Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

08

E3
N
C
U
AC

Cryptography and Network Security


Key Distribution 231

Dr. Abdellatif Elkouny


Cryptographic Algorithms

08
E3
N
C
U
AC
Key Distribution

08
• given parties A and B have various key
distribution alternatives:

E3
1. A can select key and physically deliver to B
2. third party can select & deliver key to A & B

N
3. if A & B have communicated previously can

C
use previous key to encrypt a new key
U
4. if A & B have secure communications with a
third party C, C can relay key between A & B
AC

Dr. Abdellatif Elkouny 233


Key Hierarchy

08
 session key
 temporary key

E3
 used for encryption of data between
users for one logical session then

N
discarded
 master key
C
U
 used to encrypt session keys
AC

 shared by user & key distribution


center

Dr. Abdellatif Elkouny 234


Key Distribution Scenario 235
1. A requests from the KDC a session key to

08
connect B (Identity of A and B, unique nonce
N1).

E3
2. The KDC responds with a message encrypted
using Ka ( one-time session key Ks, the original
request message of A to match response with

N
appropriate request, info for B)

C
3. A stores the session key and forwards to B;
E(Kb ,[Ks || IDA]).
U
Two additional steps are desirable:
AC

4. Using the new session key B sends a nonce


N2 to A.
5. A responds with f(N2), where f is a function
that performs some transformation on N2 (eg.
adding one).
These steps assure B that the original message
it received (step 3) was not a replay.
Note that steps 4 and 5, as well as 3,
perform an authentication function. Dr. Abdellatif Elkouny
Secret Key Distribution with
Confidentiality and Authentication 236

08
E3
N
C
U
AC

Dr. Abdellatif Elkouny


Man-in-the-Middle Attack 237
this very simple scheme is vulnerable to an active man-

08
in-the-middle attack

E3
N
C
U
AC
Public-Key Certificates 238

08
certificates allow key exchange without real-

E3
time access to public-key authority
a certificate binds identity to public key

N
 usually with other info such as period of validity,
rights of use etc
C
U
with all contents signed by a trusted Public-
AC

Key or Certificate Authority (CA)


can be verified by anyone who knows the
public-key authorities public-key
Dr. Abdellatif Elkouny
Public-Key Certificates 239

08
E3
N
C
U
AC

Dr. Abdellatif Elkouny


X.509 Authentication Service 240
part of CCITT X.500 directory service standards

08
distributed servers maintaining user info database

E3
defines framework for authentication services
directory may store public-key certificates

N
with public key of user signed by certification
authority C
U
also defines authentication protocols
AC

uses public-key crypto & digital signatures


algorithms not standardised, but RSA recommended
X.509 certificates are widely used
have 3 versions
Dr. Abdellatif Elkouny
241

08
X.509

E3
Certificate

N
Use
C
U
AC

Dr. Abdellatif Elkouny


X.509 Certificates 242

08
• issued by a Certification Authority (CA), containing:
• version V (1, 2, or 3)

E3
• serial number SN (unique within CA) identifying certificate
• signature algorithm identifier AI

N
• issuer X.500 name CA)
• period of validity TA (from - to dates)

C
subject X.500 name A (name of owner)
U
• subject public-key info Ap (algorithm, parameters, key)
• issuer unique identifier (v2+)
AC

• subject unique identifier (v2+)


• extension fields (v3)
• signature (of hash of all fields in certificate)
• notation CA<<A>> denotes certificate for A signed by CA

Dr. Abdellatif Elkouny


X.509 Certificates 243

08
E3
N
C
U
AC

Dr. Abdellatif Elkouny


Summary 244

08
• have considered:

E3
• symmetric key distribution using symmetric
encryption

N
• symmetric key distribution using public-key
encryption
C
• distribution of public keys
U
• announcement, directory, authrority, CA
AC

• X.509 authentication and certificates

Dr. Abdellatif Elkouny

You might also like