SlideShare a Scribd company logo
CRYPTOGRAPHY
Key Management
Key Management
• The distribution of public keys
– Public announcement
– Public available directory
– Public-key authority
– Public-key certificates
• The use of public-key encryption to distribute secret keys
Public Announcement of Public
Keys
• Users distribute public keys to recipients or broadcast to community at large
– E.g., such as RSA, any participant can send his or her public key to
another participant
Major weakness is forgery
1. Anyone can create a key claiming to be someone else and
broadcast it
2. Until forgery is discovered can masquerade as claimed user
Public Key Directory
• Can obtain greater security by registering keys with a
public directory
• Directory must be trusted with properties:
– Contains {name, public-key} entries
– Participants register securely with directory
– Participants can replace key at any time
– Directory is periodically published
– Directory can be accessed electronically
• The scheme is Cleary more secure. The danger is, if an
adversary succeeds in obtaining or computing the
private key of the directory authority-it can
impersonate public keys of all the participants-Still
vulnerable to tampering or forgery
Public Key Directory
Public Key Authority
• Improve security by tightening control over distribution of public
keys from the directory
• Has properties of directory
• Requires users to know public key for the directory
• Users interact with directory to obtain any desired public key
securely
– Require real-time access to directory when keys are needed
• Users A and B mutually authenticate and assure freshness
• Drawbacks
– Public key authority could be a performance bottleneck
– The directory is vulnerable to tampering
Public Key Authority
Public-Key Distribution Scenario
Public Key Certificates
• Goal is to provide a mechanism as secure and reliable as the public key
authority without requiring direct contact-use of public key certificate
• Public key certificate
– Binds identity to public key
– Usually with other info such as period of validity, rights of use etc.
– With all contents signed by a TTP or Certificate Authority (CA)
• Public key certificate requirements
– Anyone can read a certificate and determine the name and public key of
the owner
– Anyone can verify that the certificate originated from the public key
certification authority
– Only the public key certification authority can issue or update certificates
– Anyone can verify the currency of the certificate
Public Key Certificates
Exchange of Public-Key Certificates
Distribution of Secret Keys using
PKC
• Because of its huge computational cost, Public-Key
cryptosystem usage tends to be restricted
– Secret key distribution
Simple Secret Key Distribution
(Merkle’s)
• Alice generates a public/private key pair and sends her public key to Bob
• Bob generates a secret key and sends it to Alice encrypted in her public
key
• Simple but vulnerable to man-in-the-middle attack
– End-to-end authentication is required
Simple Use of Public-Key Encryption to Establish a Session Key
Secret Key Distribution (Needham-
Schroeder’s)
• Provides a protection against both active and passive attacks
• Assume Alice and Bob have exchanged public keys (by any scheme described
earlier)
• Steps
1. Alice encrypts and sends an identifier of Alice and a nonce to Bob
2. Bob encrypts and sends Alice’s nonce and his own nonce
3. Alice encrypts and sends Bob’s nonce back to Bob
4. Alice selects, signs, encrypts and sends a secret key to Bob
• Ensure both confidentiality and authentication in the exchange of a secret
key
Secret Key Distribution (Needham-
Schroeder’s)
Public-Key Distribution of Secret Keys (Needham-Schroeder’s Algorithm)
Diffie-Hellman Key Exchange
• Relies on difficulty of computing discrete logarithms
K = (YB)XA mod q
= (XB mod q)XA mod q
= (XB)XA mod q
= XBXA mod q
= (XA)XB mod q
= (XA mod q)XB mod q
= (YA)XB mod q
Diffie-Hellman Key Exchange
EXAMPLE:
q = 97, primitive root of q, in this case,  = 5
A and B selects secret keys XA = 36 and XB = 58
Each computes public key; YA = 536 = 50 mod 97, YB = 558 = 44 mod 97
After exchanging public keys, each compute the common secret key:
K = (YB)XA mod 97 = 4436 = 75 mod 97
K = (YA)XB mod 97 = 5058 = 75 mod 97
Man-in-the-Middle Attack
Alice Bob
Darth
YA YD1
K1 = (YD1)XB mod q
K2 = (YD2)XA mod q
K2 = (YA)XD2 mod q
YB
K1 = (YB)XD1 mod q
YD2
• To counter such an attack, end-to-end authentication (the use of digital
signatures or public-key certificates) is required

More Related Content

PPTX
Key Management, key management three tools ,
PPT
Key management.ppt
PPTX
Module 5-Key management in security in computing
PPT
CHAPTER 14 CRYPTOGR AND NETWORK SECURITY
PPT
Information and data security key management and distribution
PDF
Unit 2_Key distribution_Deffi-Hellman.pdf
PPT
Chapter 7 security
Key Management, key management three tools ,
Key management.ppt
Module 5-Key management in security in computing
CHAPTER 14 CRYPTOGR AND NETWORK SECURITY
Information and data security key management and distribution
Unit 2_Key distribution_Deffi-Hellman.pdf
Chapter 7 security

Similar to Lec 10 - Key Management.ppt (20)

PPTX
information security(Public key encryption its characteristics and weakness, ...
PDF
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
PPT
Is unit-4-part-1
PDF
18CS2005 Cryptography and Network Security
PPTX
UNIT-IV.pptx
PDF
Computer security module 3
PPT
ch10_key_management.ppt
PPTX
Principles of public key cryptography and its Uses
PPTX
Cyptography and network security unit 3-1
PPTX
CNS 3RD UNIT PPT.pptx
PPTX
Key management
PPTX
Public Key Distribution
PPTX
3 public key cryptography
PPT
Unit - 3.ppt
PDF
Data security for any organization by using public key infrastructure compone...
PDF
Data security for any organization by using public key infrastructure compone...
PPT
KEY MGMT.ppt
PPTX
008 Key Distribution with examples and some
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
PPTX
Introduction to Cryptography CYB 303.pptx
information security(Public key encryption its characteristics and weakness, ...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Is unit-4-part-1
18CS2005 Cryptography and Network Security
UNIT-IV.pptx
Computer security module 3
ch10_key_management.ppt
Principles of public key cryptography and its Uses
Cyptography and network security unit 3-1
CNS 3RD UNIT PPT.pptx
Key management
Public Key Distribution
3 public key cryptography
Unit - 3.ppt
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
KEY MGMT.ppt
008 Key Distribution with examples and some
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Introduction to Cryptography CYB 303.pptx
Ad

Recently uploaded (20)

PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Well-logging-methods_new................
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Digital Logic Computer Design lecture notes
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
introduction to datamining and warehousing
PPTX
Geodesy 1.pptx...............................................
PPTX
CH1 Production IntroductoryConcepts.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Sustainable Sites - Green Building Construction
CYBER-CRIMES AND SECURITY A guide to understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
bas. eng. economics group 4 presentation 1.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Well-logging-methods_new................
Embodied AI: Ushering in the Next Era of Intelligent Systems
Internet of Things (IOT) - A guide to understanding
OOP with Java - Java Introduction (Basics)
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Digital Logic Computer Design lecture notes
Foundation to blockchain - A guide to Blockchain Tech
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
introduction to datamining and warehousing
Geodesy 1.pptx...............................................
CH1 Production IntroductoryConcepts.pptx
Mechanical Engineering MATERIALS Selection
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Sustainable Sites - Green Building Construction
Ad

Lec 10 - Key Management.ppt

  • 2. Key Management • The distribution of public keys – Public announcement – Public available directory – Public-key authority – Public-key certificates • The use of public-key encryption to distribute secret keys
  • 3. Public Announcement of Public Keys • Users distribute public keys to recipients or broadcast to community at large – E.g., such as RSA, any participant can send his or her public key to another participant Major weakness is forgery 1. Anyone can create a key claiming to be someone else and broadcast it 2. Until forgery is discovered can masquerade as claimed user
  • 4. Public Key Directory • Can obtain greater security by registering keys with a public directory • Directory must be trusted with properties: – Contains {name, public-key} entries – Participants register securely with directory – Participants can replace key at any time – Directory is periodically published – Directory can be accessed electronically • The scheme is Cleary more secure. The danger is, if an adversary succeeds in obtaining or computing the private key of the directory authority-it can impersonate public keys of all the participants-Still vulnerable to tampering or forgery
  • 6. Public Key Authority • Improve security by tightening control over distribution of public keys from the directory • Has properties of directory • Requires users to know public key for the directory • Users interact with directory to obtain any desired public key securely – Require real-time access to directory when keys are needed • Users A and B mutually authenticate and assure freshness • Drawbacks – Public key authority could be a performance bottleneck – The directory is vulnerable to tampering
  • 7. Public Key Authority Public-Key Distribution Scenario
  • 8. Public Key Certificates • Goal is to provide a mechanism as secure and reliable as the public key authority without requiring direct contact-use of public key certificate • Public key certificate – Binds identity to public key – Usually with other info such as period of validity, rights of use etc. – With all contents signed by a TTP or Certificate Authority (CA) • Public key certificate requirements – Anyone can read a certificate and determine the name and public key of the owner – Anyone can verify that the certificate originated from the public key certification authority – Only the public key certification authority can issue or update certificates – Anyone can verify the currency of the certificate
  • 9. Public Key Certificates Exchange of Public-Key Certificates
  • 10. Distribution of Secret Keys using PKC • Because of its huge computational cost, Public-Key cryptosystem usage tends to be restricted – Secret key distribution
  • 11. Simple Secret Key Distribution (Merkle’s) • Alice generates a public/private key pair and sends her public key to Bob • Bob generates a secret key and sends it to Alice encrypted in her public key • Simple but vulnerable to man-in-the-middle attack – End-to-end authentication is required Simple Use of Public-Key Encryption to Establish a Session Key
  • 12. Secret Key Distribution (Needham- Schroeder’s) • Provides a protection against both active and passive attacks • Assume Alice and Bob have exchanged public keys (by any scheme described earlier) • Steps 1. Alice encrypts and sends an identifier of Alice and a nonce to Bob 2. Bob encrypts and sends Alice’s nonce and his own nonce 3. Alice encrypts and sends Bob’s nonce back to Bob 4. Alice selects, signs, encrypts and sends a secret key to Bob • Ensure both confidentiality and authentication in the exchange of a secret key
  • 13. Secret Key Distribution (Needham- Schroeder’s) Public-Key Distribution of Secret Keys (Needham-Schroeder’s Algorithm)
  • 14. Diffie-Hellman Key Exchange • Relies on difficulty of computing discrete logarithms K = (YB)XA mod q = (XB mod q)XA mod q = (XB)XA mod q = XBXA mod q = (XA)XB mod q = (XA mod q)XB mod q = (YA)XB mod q
  • 15. Diffie-Hellman Key Exchange EXAMPLE: q = 97, primitive root of q, in this case,  = 5 A and B selects secret keys XA = 36 and XB = 58 Each computes public key; YA = 536 = 50 mod 97, YB = 558 = 44 mod 97 After exchanging public keys, each compute the common secret key: K = (YB)XA mod 97 = 4436 = 75 mod 97 K = (YA)XB mod 97 = 5058 = 75 mod 97
  • 16. Man-in-the-Middle Attack Alice Bob Darth YA YD1 K1 = (YD1)XB mod q K2 = (YD2)XA mod q K2 = (YA)XD2 mod q YB K1 = (YB)XD1 mod q YD2 • To counter such an attack, end-to-end authentication (the use of digital signatures or public-key certificates) is required