Sunteți pe pagina 1din 25

Key Management and

Distribution

Major Issues Involved in Symmetric


Key Distribution
For symmetric encryption to work, the two parties of an
exchange must share the same key and that key must be
protected.
Frequent key changes may be desirable to limit the amount
of data compromised.
The strength of a cryptographic system rests with the
technique for solving the key distribution problem -delivering a key to the two parties of an exchange.
The scale of the problem depends on the number of
communication pairs.

YSL

Information Security Mutual Trust

Approaches to Symmetric Key


Distribution
Let A (Alice) and B (Bob) be the two parties.
A key can be selected by A and physically delivered to B.
A third party can select the key and physically deliver it to
A and B.
If A and B have previously and recently used a key, one
party can transmit the new key to the other, encrypted
using the old key.
If A and B each has an encrypted connection to a third
party C,
C can deliver a key on the encrypted links to A and B.
YSL

Information Security Mutual Trust

Symmetric Key Distribution Task

YSL

Information Security Mutual Trust

Symmetric Key Hierarchy

Typically a hierarchy structure of keys is adopted.


Session keys

Master keys

YSL

temporary key
used for encryption of data between users
for one logical session then discarded
used to encrypt session keys
shared by each user & the key distribution center
Information Security Mutual Trust

Symmetric Key Hierarchy

YSL

Information Security Mutual Trust

Symmetric Key Distribution Scenario

YSL

Information Security Mutual Trust

Symmetric Key Distribution Issues


Hierarchies of KDCs required for large
networks, but must trust each other
Session key lifetimes should be limited for
greater security
Use of automatic key distribution on behalf
of users, but must trust system
Use of decentralized key distribution
Controlling key usage
YSL

Information Security Mutual Trust

Symmetric Key Distribution Using


Public Keys

Public key cryptosystems are inefficient.


almost never used for direct data encryption
rather used to encrypt secret keys for distribution

YSL

Information Security Mutual Trust

Simple Secret Key Distribution


Merkle proposed this very simple scheme
allows secure communications
no keys before/after exist

YSL

Information Security Mutual Trust

10

Simple Secret Key Distribution


(contd)
Simple secret key distribution (contd)
advantages
simplicity
no keys stored before and after the communication
security against eavesdropping

disadvantages
lack of authentication mechanism between participants
vulnerability to an active attack as described in the next
slide
leak of the secret key upon such active attacks
YSL

Information Security Mutual Trust

11

Man-in-the-Middle Attacks

YSL

This very simple scheme is vulnerable to an


active man-in-the-middle attack.

Information Security Mutual Trust

12

Secret Key Distribution with


Confidentiality & Authentication

YSL

Information Security Mutual Trust

13

Secret Key Distribution with


Confidentiality & Authentication (contd)
Provision of protection against both active
and passive attacks
Assurance of both confidentiality and
authentication in the exchange of a secret
key
Availability of public keys a priori
Complexity
YSL

Information Security Mutual Trust

14

Public Key Distribution


The distribution of public keys

public announcement
publicly available directory
public-key authority
public-key certificates

The use of public-key encryption to distribute


secret keys
simple secret key distribution
secret key distribution with confidentiality and
authentication
YSL

Information Security Mutual Trust

15

Public Key Distribution (contd)


Public announcement

YSL

Information Security Mutual Trust

16

Public Key Distribution (contd)


Public announcement (contd)
advantages: convenience
disadvantages: forgery of such a public
announcement by anyone

YSL

Information Security Mutual Trust

17

Public Key Distribution (contd)


Publicly available directory

YSL

Information Security Mutual Trust

18

Public Key Distribution (contd)


Publicly available directory (contd)
elements of the scheme
{name, public key} entry for each participant in the
directory
in-person or secure registration
on-demand entry update
periodic publication of the directory
availability of secure electronic access from the
directory to participants

advantages: greater degree of security


YSL

Information Security Mutual Trust

19

Public Key Distribution (contd)


Publicly available directory (contd)
disadvantages
need of a trusted entity or organization
need of additional security mechanism from the directory
authority to participants
vulnerability of the private key of the directory authority
(global-scaled disaster if the private key of the directory
authority is compromised)
vulnerability of the directory records

YSL

Information Security Mutual Trust

20

Public Key Distribution (contd)


Public-key authority

YSL

Information Security Mutual Trust

21

Public Key Distribution (contd)


Public-key authority (contd)
stronger security for public-key distribution can be
achieved by providing tighter control over the
distribution of public keys from the directory
each participant can verify the identity of the authority
participants can verify identities of each other
disadvantages
bottleneck effect of the public-key authority
vulnerability of the directory records
YSL

Information Security Mutual Trust

22

Public Key Distribution (contd)


Public-key certificates

YSL

Information Security Mutual Trust

23

Public Key Distribution (contd)


Public-key certificates (contd)
to use certificates that can be used by participants to
exchange keys without contacting a public-key
authority
requirements on the scheme
any participant can read a certificate to determine the name
and public key of the certificates owner
any participant can verify that the certificate originated from
the certificate authority and is not counterfeit
only the certificate authority can create & update certificates
any participant can verify the currency of the certificate
YSL

Information Security Mutual Trust

24

Public Key Distribution (contd)


Public-key certificates (contd)
advantages
to use certificates that can be used by participants to
exchange keys without contacting a public-key authority
in a way that is as reliable as if the key were obtained
directly from a public-key authority
no on-line bottleneck effect

disadvantages: need of a certificate authority

YSL

Information Security Mutual Trust

25

S-ar putea să vă placă și