19
Key Management

Key Management. Authentication Using Public-Key Cryptography K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Embed Size (px)

Citation preview

Page 1: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Key Management

Page 2: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Authentication Using Public-Key Cryptography

KA+, KB

+: public keysA

lice

Bo

b

KB+(A, RA)1

2 KA+(RA, RB,KA,B)

3 KA,B(RB)

What if KB+ is faked?

Page 3: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Security Management

Problem: how do you get keys in the first place?

Key distribution: securely associate an entity with a key- Example: Public Key Infrastructure (PKI), a system that manages

public key distribution on a wide-scale

Key establishment: establish session keys- Use public key cryptography (we already know how to do it)

Page 4: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Components of a PKI

Page 5: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Digital Certificate

Signed data structure that binds an entity (E) with its corresponding public key (KE

+)- Signed by a recognized and trusted authority, i.e.,

Certification Authority (CA)

- Provide assurance that a particular public key belongs to a specific entity

How?- CA generates KCA

-(E, KE+)

- Everyone can verify signature using KCA+

Page 6: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Certification Authority (CA)

People, processes responsible for creation, delivery and management of digital certificates

Organized in a hierarchy (use delegation – see next)

CA-1 CA-2

Root CA

Page 7: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Registration Authority

People, processes and/or tools that are responsible for

- Authenticating the identity of new entities (users or computing devices)

- Requiring certificates from CA’s.

Page 8: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Certificate Repository

A database which is accessible to all users of a PKI, contains:

- Digital certificates,

- Certificate revocation information

- Policy information

Page 9: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Example

Alice generates her own key pair.

public keyAlice

private keyAlice

Bob generates his own key pair.

Both sent their public key to a CA and receive a digital certificate

public keyBob

private keyBob

Page 10: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Example

Alice gets Bob’s public key from the CA

private keyAlice

public key

Bob

private keyBob

public keyAlice

Bob gets Alice’s public key from the CA

Page 11: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Certificate Revocation

Process of publicly announcing that a certificate has been revoked and should no longer be used.

Approaches:- Use certificates that automatically time out

- Use certificate revocation list

Page 12: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Authorization Management

Page 13: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Authorization Management

Granting authorization rights

Related with access control which verifies access rights

Page 14: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Capabilities (1)

How to grant a capability?

How to verify a capability?

Page 15: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Capabilities (2)

Capability: - Unforgeable data structure for a specific resource R

- Specify access right the holder has with respect to R

An example:

48 bits 24 bits 8 bits 48 bits

Server port Object Rights Check

Page 16: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Capabilities (3)

Generation of a restricted capability from an owner capability

Owner

Page 17: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Delegation: Motivation Example

A user Alice has read-only access rights on a large file F

Alice wants to print F on printer P no earlier than 2am- Method A: Alice sends the entire file F to the printer P;

- Method B: Alice passes the file name to P and printer P copies the file F to its spooling directory when F is actually needed.

- For method B, Alice needs to delegate her read-only access rights on F to printer P

Page 18: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Delegation: Neuman Scheme

The general structure of a proxy as used for delegation:

Page 19: Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B

Delegation: Neuman Scheme

Using a proxy to delegate and prove ownership of access rights

In practice S+proxy, S-

proxy can be a public-private key pair and N can be a nonce