SlideShare a Scribd company logo
Key Management/Distribution
Administrivia
 Snafu on books
 Probably best to buy it elsewhere
 Paper assignment and first homework
 Next week (9/24)
Cryptography in Use
 Provides foundation for security services
 But can it bootstrap itself?
 Must establish shared key
 Straightforward plan
 One side generates key
 Transmits key to other side
 But how?
Two Problems
 Peer-to-peer key sharing
 Prob 1: Known peer, insecure channel
 Prob 2: Secure channel, unknown peer
Security Through Obscurity?
 Caesar ciphers
 Very simple permutation
 Only 25 different cases
 Relies strictly on no one knowing the
method
Passwords
 Reduces permutation space to key
space
 Caesar cipher: one-letter “key”
 10-letter key for MSC reduces 26!
(~4x1020) to 26C10 (~2x1013)
 8-byte key for DES reduces 264!
(~1010200
) to 256 (~1017)
The Enigma Machine
 Broken first by Polish, then by English
 Not as easily as widely regarded
 Weaknesses in key distribution
 Day keys plus scramblers
 “Session keys” encrypted in duplicate
 Enigma did not use OFB/CFB
Peer-to-Peer Distribution
 Technically easy
 But it doesn’t scale
 Hundreds of servers…
 Times thousands of users…
 Yields ~ million keys
 Centralized key server
 Needham-Schroeder
Basic Idea
 User sends request to KDC: {s}
 KDC generates a random key: Kc,s
 Encrypted twice: {Kc,s}Kc, {Kc,s}Ks
 Typically called ticket and credentials, resp
 Ticket forwarded with application request
 No keys ever traverse net in the clear
Problem #1
 How does user know session key is
encrypted for the server? And vice
versa?
 Attacker intercepts initial request, and
substitutes own name for server
 Can now read all of user’s messages
intended for server
Solution #1
 Add names to ticket, credentials
 Request looks like {c, s}
 {Kc,s, s}Kc and {Kc,s, c}Ks, resp
 Both sides can verify intended target for
key sharing
 This is basic Needham-Schroeder
Problem #2
 How can user and server know that
session key is fresh?
 Attacker intercepts and records old KDC
reply, then inserts this in response to
future requests
 Can now read all traffic between user and
server
Solution #2
 Add nonces to ticket, credentials
 Request looks like {c, s, n}
 {Kc,s, s, n}Kc and {Kc,s, c, n}Ks
 Client can now check that reply made in
response to current request
Problem #3
 User now trusts credentials
 But can server trust user?
 How can server tell this isn’t a replay?
 Legitimate user makes electronic
payment to attacker; attacker replays
message to get paid multiple times
 Requires no knowledge of session key
Solution #3
 Add challenge-response
 Server generates second random nonce
 Sends to client, encrypted in session key
 Client must decrypt, decrement, encrypt
 Effective, but adds second round of
messages
Problem #4
 What happens if attacker does get
session key?
 Answer: Can reuse old session key to
answer challenge-response, generate new
requests, etc
Solution #4
 Replace (or supplement) nonce in
request/reply with timestamp [Denning,
Sacco]
 {Kc,s, s, n, t}Kc and {Kc,s, c, n, t}Ks, resp
 Also send {t}Kc,s as authenticator
 Prevents replay without employing second
round of messages as in challenge-response
Problem #5
 Each client request yields new known-
plaintext pairs
 Attacker can sit on the network, harvest
client request and KDC replies
Solution #5
 Introduce Ticket Granting Server (TGS)
 Daily ticket plus session keys
 (How is this different from Enigma?!)
 TGS+AS = KDC
 This is modified Needham-Schroeder
 Basis for Kerberos
Problem #6
 Active attacker can obtain arbitrary
numbers of known-plaintext pairs
 Can then mount dictionary attack at leisure
 Exacerbated by bad password selection
Solution #6
 Preauthentication
 Establish weak authentication for user
before KDC replies
 Examples
 Password-encrypted timestamp
 Hardware authentication
 Single-use key
Public Key Distribution
 Public key can be public!
 How does either side know who and what
the key is for? Private agreement? (Not
scalable.)
 Must delegate trust
 Why?
 How?
Certification Infrastructures
 Public keys represented by certificates
 Certificates signed by other certificates
 User delegates trust to trusted certificates
 Certificate chains transfer trust up several
links
Examples
 PGP
 “Web of Trust”
 Can model as connected digraph of signers
 X.500
 Hierarchical model: tree (or DAG?)
 (But X.509 certificates use ASN.1!

More Related Content

PPT
authentication u5.ppt
PPT
Authentication (Distributed computing)
PDF
An Introduction to Kerberos
PPT
PDF
BAIT1103 Chapter 3
PPTX
1165839977.pptx
PPTX
PPT
CT UNIT 5 Session 3.ppt User authentication and kerberos protocol
authentication u5.ppt
Authentication (Distributed computing)
An Introduction to Kerberos
BAIT1103 Chapter 3
1165839977.pptx
CT UNIT 5 Session 3.ppt User authentication and kerberos protocol

Similar to KeyManagement and distribution in informa.ppt (20)

PPT
User authentication crytography in cse engineering
PPT
ok_mary_pki1234public_key_encryption.ppt
PPT
Kerberos (1)
PPT
Cryptography
PPTX
1. Kerberos is an auth protocol llllllllllllllllllllll
PPT
Introduction to distributed security concepts and public key infrastructure m...
PPT
ok_mary_pki.ppt an introduction to Distributed Concept
PPT
Kerberos
PPTX
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...
PPTX
cyber security attacks cyber security attacks
PPT
Authentication: keys, MAC
PPTX
PPT
NSC_Unit-III_final.ppt
PPT
Network Security.ppt
PPTX
Kerberos
PPTX
Kerberos
PDF
IRJET- Secure Kerberos System in Distributed Environment
PPTX
Module-3Key Management and Distribution.pptx
User authentication crytography in cse engineering
ok_mary_pki1234public_key_encryption.ppt
Kerberos (1)
Cryptography
1. Kerberos is an auth protocol llllllllllllllllllllll
Introduction to distributed security concepts and public key infrastructure m...
ok_mary_pki.ppt an introduction to Distributed Concept
Kerberos
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...
cyber security attacks cyber security attacks
Authentication: keys, MAC
NSC_Unit-III_final.ppt
Network Security.ppt
Kerberos
Kerberos
IRJET- Secure Kerberos System in Distributed Environment
Module-3Key Management and Distribution.pptx
Ad

More from ubaidullah75790 (20)

PPTX
Chapter20 transaction processing system .pptx
PPTX
Chapter22 database security in dbms.pptx
PPTX
Chapter27 distributed database syst.pptx
PPTX
File Organization in database management.pptx
PPTX
transaction processing databse management.pptx
PPT
physical database design distributed .ppt
PPT
module03-ipaddr ipv6 addressing in net.ppt
PPT
PDBD- Part2 physical database design.ppt
PPT
Physical_Design system development life.PPT
PPT
S3 application and network attacks in.ppt
PPT
Chapter 5 cyber security in computer.ppt
PPTX
1606802425-dba-w7 database management.pptx
PPT
ENCh18 database management system ss.ppt
PPT
Chapter07 database system in computer.ppt
PPT
Chapter05 database sytem in computer . ppt
PPT
Chapter04 database system in computer.ppt
PPT
Chapter03 database system in computer.ppt
PPT
Chapter02 database system in computer.ppt
PPT
Chapter01 database system in computer.ppt
PPT
MYCH8 database management system in .ppt
Chapter20 transaction processing system .pptx
Chapter22 database security in dbms.pptx
Chapter27 distributed database syst.pptx
File Organization in database management.pptx
transaction processing databse management.pptx
physical database design distributed .ppt
module03-ipaddr ipv6 addressing in net.ppt
PDBD- Part2 physical database design.ppt
Physical_Design system development life.PPT
S3 application and network attacks in.ppt
Chapter 5 cyber security in computer.ppt
1606802425-dba-w7 database management.pptx
ENCh18 database management system ss.ppt
Chapter07 database system in computer.ppt
Chapter05 database sytem in computer . ppt
Chapter04 database system in computer.ppt
Chapter03 database system in computer.ppt
Chapter02 database system in computer.ppt
Chapter01 database system in computer.ppt
MYCH8 database management system in .ppt
Ad

Recently uploaded (20)

PPT
Ethics in Information System - Management Information System
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
simpleintnettestmetiaerl for the simple testint
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Exploring The Internet Of Things(IOT).ppt
PPT
12 Things That Make People Trust a Website Instantly
PPTX
t_and_OpenAI_Combined_two_pressentations
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Ethics in Information System - Management Information System
Layers_of_the_Earth_Grade7.pptx class by
Power Point - Lesson 3_2.pptx grad school presentation
newyork.pptxirantrafgshenepalchinachinane
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
simpleintnettestmetiaerl for the simple testint
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
artificialintelligenceai1-copy-210604123353.pptx
250152213-Excitation-SystemWERRT (1).ppt
Exploring The Internet Of Things(IOT).ppt
12 Things That Make People Trust a Website Instantly
t_and_OpenAI_Combined_two_pressentations
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Alethe Consulting Corporate Profile and Solution Aproach
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)

KeyManagement and distribution in informa.ppt

  • 2. Administrivia  Snafu on books  Probably best to buy it elsewhere  Paper assignment and first homework  Next week (9/24)
  • 3. Cryptography in Use  Provides foundation for security services  But can it bootstrap itself?  Must establish shared key  Straightforward plan  One side generates key  Transmits key to other side  But how?
  • 4. Two Problems  Peer-to-peer key sharing  Prob 1: Known peer, insecure channel  Prob 2: Secure channel, unknown peer
  • 5. Security Through Obscurity?  Caesar ciphers  Very simple permutation  Only 25 different cases  Relies strictly on no one knowing the method
  • 6. Passwords  Reduces permutation space to key space  Caesar cipher: one-letter “key”  10-letter key for MSC reduces 26! (~4x1020) to 26C10 (~2x1013)  8-byte key for DES reduces 264! (~1010200 ) to 256 (~1017)
  • 7. The Enigma Machine  Broken first by Polish, then by English  Not as easily as widely regarded  Weaknesses in key distribution  Day keys plus scramblers  “Session keys” encrypted in duplicate  Enigma did not use OFB/CFB
  • 8. Peer-to-Peer Distribution  Technically easy  But it doesn’t scale  Hundreds of servers…  Times thousands of users…  Yields ~ million keys  Centralized key server  Needham-Schroeder
  • 9. Basic Idea  User sends request to KDC: {s}  KDC generates a random key: Kc,s  Encrypted twice: {Kc,s}Kc, {Kc,s}Ks  Typically called ticket and credentials, resp  Ticket forwarded with application request  No keys ever traverse net in the clear
  • 10. Problem #1  How does user know session key is encrypted for the server? And vice versa?  Attacker intercepts initial request, and substitutes own name for server  Can now read all of user’s messages intended for server
  • 11. Solution #1  Add names to ticket, credentials  Request looks like {c, s}  {Kc,s, s}Kc and {Kc,s, c}Ks, resp  Both sides can verify intended target for key sharing  This is basic Needham-Schroeder
  • 12. Problem #2  How can user and server know that session key is fresh?  Attacker intercepts and records old KDC reply, then inserts this in response to future requests  Can now read all traffic between user and server
  • 13. Solution #2  Add nonces to ticket, credentials  Request looks like {c, s, n}  {Kc,s, s, n}Kc and {Kc,s, c, n}Ks  Client can now check that reply made in response to current request
  • 14. Problem #3  User now trusts credentials  But can server trust user?  How can server tell this isn’t a replay?  Legitimate user makes electronic payment to attacker; attacker replays message to get paid multiple times  Requires no knowledge of session key
  • 15. Solution #3  Add challenge-response  Server generates second random nonce  Sends to client, encrypted in session key  Client must decrypt, decrement, encrypt  Effective, but adds second round of messages
  • 16. Problem #4  What happens if attacker does get session key?  Answer: Can reuse old session key to answer challenge-response, generate new requests, etc
  • 17. Solution #4  Replace (or supplement) nonce in request/reply with timestamp [Denning, Sacco]  {Kc,s, s, n, t}Kc and {Kc,s, c, n, t}Ks, resp  Also send {t}Kc,s as authenticator  Prevents replay without employing second round of messages as in challenge-response
  • 18. Problem #5  Each client request yields new known- plaintext pairs  Attacker can sit on the network, harvest client request and KDC replies
  • 19. Solution #5  Introduce Ticket Granting Server (TGS)  Daily ticket plus session keys  (How is this different from Enigma?!)  TGS+AS = KDC  This is modified Needham-Schroeder  Basis for Kerberos
  • 20. Problem #6  Active attacker can obtain arbitrary numbers of known-plaintext pairs  Can then mount dictionary attack at leisure  Exacerbated by bad password selection
  • 21. Solution #6  Preauthentication  Establish weak authentication for user before KDC replies  Examples  Password-encrypted timestamp  Hardware authentication  Single-use key
  • 22. Public Key Distribution  Public key can be public!  How does either side know who and what the key is for? Private agreement? (Not scalable.)  Must delegate trust  Why?  How?
  • 23. Certification Infrastructures  Public keys represented by certificates  Certificates signed by other certificates  User delegates trust to trusted certificates  Certificate chains transfer trust up several links
  • 24. Examples  PGP  “Web of Trust”  Can model as connected digraph of signers  X.500  Hierarchical model: tree (or DAG?)  (But X.509 certificates use ASN.1!