23
Practices in Security Practices in Security Bruhadeshwar Bezawada Bruhadeshwar Bezawada

Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Embed Size (px)

Citation preview

Page 1: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Practices in Security Practices in Security

Bruhadeshwar BezawadaBruhadeshwar Bezawada

Page 2: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Key ManagementKey Management

Set of techniques and procedures supporting Set of techniques and procedures supporting the establishment and maintenance of keying the establishment and maintenance of keying relationships between authorized partiesrelationships between authorized parties Initialization of system users within a domainInitialization of system users within a domain Generation, distribution, and installation of keying Generation, distribution, and installation of keying

materialmaterial Controlling the use of keying materialControlling the use of keying material Update, revocation and destruction of keying Update, revocation and destruction of keying

materialmaterial Storage, backup/recovery, and archival of keying Storage, backup/recovery, and archival of keying

materialmaterial

Page 3: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Types Key ManagementTypes Key Management

Automated Key ManagementAutomated Key Management More than N^2 KeysMore than N^2 Keys Stream cipherStream cipher Initialization vectors are usedInitialization vectors are used Large amount of data needs to be encrypted in short Large amount of data needs to be encrypted in short

amount of timeamount of time Long term session keys are used in multicast sessionsLong term session keys are used in multicast sessions Frequent change in session key is expectedFrequent change in session key is expected

Manual key managementManual key management Environment has limited bandwidth or high RTTEnvironment has limited bandwidth or high RTT Information has low valueInformation has low value Total volume of traffic is very lowTotal volume of traffic is very low Scale of each deployment is very limitedScale of each deployment is very limited

Page 4: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Cryptographic PrimitivesCryptographic Primitives

Hash FunctionsHash Functions Symmetric key algorithmsSymmetric key algorithms Asymmetric key algorithmsAsymmetric key algorithms

Page 5: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Cryptographic primitivesCryptographic primitives

Hash functions do not require keys, Hash functions do not require keys, provideprovide data authentication and integrity servicesdata authentication and integrity services compression of messages for digital compression of messages for digital

signature and verificationsignature and verification derivation of keys in key establishment derivation of keys in key establishment

algorithmsalgorithms generate deterministic random numbersgenerate deterministic random numbers

Page 6: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Cryptographic primitivesCryptographic primitives

Symmetric key algorithms require the Symmetric key algorithms require the same key across all operations, same key across all operations, provide provide data confidentialitydata confidentiality authentication and integrity in the form of authentication and integrity in the form of

MACsMACs key establishmentkey establishment generation of deterministic random generation of deterministic random

numbersnumbers

Page 7: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Cryptographic primitivesCryptographic primitives

Asymmetric key, public key algorithms, Asymmetric key, public key algorithms, enableenable digital signaturesdigital signatures establish cryptographic keying materialestablish cryptographic keying material generate random numbersgenerate random numbers

Exercise : Enumerate all hash functions, all Exercise : Enumerate all hash functions, all symmetric key ciphers and all public-key symmetric key ciphers and all public-key crypto systems available currently. crypto systems available currently. Differentiate between commercially available Differentiate between commercially available and non-commercial algorithmsand non-commercial algorithms

Page 8: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Types of keysTypes of keys

Private signature key (public-private Private signature key (public-private keys)keys)

Public signature verification keysPublic signature verification keys Symmetric authentication keySymmetric authentication key Private authentication keyPrivate authentication key Public authentication keysPublic authentication keys Symmetric data encryption keySymmetric data encryption key

Page 9: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

TypesTypes

Symmetric and asymmetric random Symmetric and asymmetric random number generation keysnumber generation keys

Symmetric master keySymmetric master key Private key transport keyPrivate key transport key Public key transport keyPublic key transport key Symmetric key agreement key (also, Symmetric key agreement key (also,

key wrapping key)key wrapping key)

Page 10: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

TypesTypes

Private ephemeral key agreement Private ephemeral key agreement keykey

Public ephemeral key agreement keyPublic ephemeral key agreement key Symmetric authorization keysSymmetric authorization keys Private authorization keyPrivate authorization key Public authorization keyPublic authorization key

Page 11: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

General Terms in Key General Terms in Key ManagementManagement

Key registrationKey registration Key revocationKey revocation Key transportKey transport Key updateKey update Key derivationKey derivation Key confirmationKey confirmation Key establishmentKey establishment Key agreementKey agreement

Page 12: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

TermsTerms

Registration authorityRegistration authority Security domainSecurity domain Self-signed certificateSelf-signed certificate

Page 13: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Valuable Information in Valuable Information in Addition to Cryptographic KeysAddition to Cryptographic Keys

Domain parametersDomain parameters Initialization vectors, shared secrets, Initialization vectors, shared secrets,

RNG seeds, nonces, random numbersRNG seeds, nonces, random numbers Intermediate resultsIntermediate results Key control informationKey control information PasswordsPasswords Audit informationAudit information

Page 14: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

CryptoperiodsCryptoperiods

Time span during which a specific key is Time span during which a specific key is authorized for use by legitimate entities, or authorized for use by legitimate entities, or the keys for a given system will remain in the keys for a given system will remain in effect. A good cryptoperiodeffect. A good cryptoperiod Limits amount of information protected by a Limits amount of information protected by a

given key from disclosuregiven key from disclosure Limits amount of exposure if a single key is Limits amount of exposure if a single key is

compromisedcompromised Limits use of particular algorithm to its estimated Limits use of particular algorithm to its estimated

effective lifetimeeffective lifetime limits time available to penetrate physical, limits time available to penetrate physical,

procedural, and logical access mechanisms that procedural, and logical access mechanisms that protect a keyprotect a key

Page 15: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Risk Factors to Consider for Risk Factors to Consider for CryptoperiodsCryptoperiods

Strength of cryptographic implementationsStrength of cryptographic implementations Operating environment, secure limited Operating environment, secure limited

access, open office or public terminalaccess, open office or public terminal Volume of information or transactionsVolume of information or transactions Security objectiveSecurity objective Re-keying methodRe-keying method Number of nodes sharing the key/copies of Number of nodes sharing the key/copies of

the keythe key Threat to informationThreat to information

Page 16: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Other Factors Affecting Other Factors Affecting CryptoperiodsCryptoperiods

Communication vs StorageCommunication vs Storage E.g., keys used for online transactions are E.g., keys used for online transactions are

likely to have smaller cryptoperiodslikely to have smaller cryptoperiods Keys used for storage will have higher, as cost Keys used for storage will have higher, as cost

of re-encryption is highof re-encryption is high Cost of Key Revocation and ReplacementCost of Key Revocation and Replacement

Changing keys can be an expensive processChanging keys can be an expensive process Encryption of large databasesEncryption of large databases Revocation of large number of keysRevocation of large number of keys Expensive security measures are justified for such Expensive security measures are justified for such

cases as the cryptoperiod can be made highcases as the cryptoperiod can be made high

Page 17: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Factors Affecting Public Factors Affecting Public KeysKeys

Private keys may have longer cryptoperiods Private keys may have longer cryptoperiods than public-keys when used for confidentialitythan public-keys when used for confidentiality

When used for challenge (dynamic) When used for challenge (dynamic) authentication both public and private keys authentication both public and private keys can have the same cryptoperiodcan have the same cryptoperiod

When used for digital signatures public keys When used for digital signatures public keys can have longer cryptoperiods than private can have longer cryptoperiods than private keys as they will be necessary to verify keys as they will be necessary to verify certificatescertificates

Page 18: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Cryptoperiods for Different Cryptoperiods for Different KeysKeys

Private signature key (public-private keys)Private signature key (public-private keys) 1-3years1-3years

Public signature verification keysPublic signature verification keys Symmetric authentication keySymmetric authentication key

2-3 years2-3 years Private authentication keyPrivate authentication key

1-2years1-2years Public authentication keysPublic authentication keys

1-2years1-2years Symmetric data encryption keySymmetric data encryption key

3years3years

Page 19: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Cryptoperiods for Different Cryptoperiods for Different KeysKeys

Symmetric and asymmetric random Symmetric and asymmetric random number generation keysnumber generation keys Depends on the RNG techniqueDepends on the RNG technique

Symmetric master keySymmetric master key 1 year1 year

Private and Public key transport keysPrivate and Public key transport keys Private 2years, public 1-2 yearsPrivate 2years, public 1-2 years

Symmetric key agreement key (also, key Symmetric key agreement key (also, key wrapping key)wrapping key) 1-2years1-2years

Page 20: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Cryptoperiods for Different Cryptoperiods for Different KeysKeys

Private and public ephemeral key Private and public ephemeral key agreement keyagreement key Time required to complete the key Time required to complete the key

agreement protocolagreement protocol Symmetric authorization keysSymmetric authorization keys

2years2years Private and Public authorization keysPrivate and Public authorization keys

2years2years

Page 21: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Other ParametersOther Parameters

Domain parameters stay for the cryptoperiodDomain parameters stay for the cryptoperiod IV is associated with the information and IV is associated with the information and

stays as long as the information is heldstays as long as the information is held Shared secrets are destroyed as soon as the Shared secrets are destroyed as soon as the

necessary key derivations are completenecessary key derivations are complete RNG seeds are destroyed immediatelyRNG seeds are destroyed immediately Intermediate results are destroyed Intermediate results are destroyed

immediatelyimmediately

Page 22: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Algorithms, Key Sizes and Algorithms, Key Sizes and StrengthsStrengths

Page 23: Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships

Factors to be Considered For Factors to be Considered For Design of New SystemDesign of New System

Sensitivity of information and system lifetimeSensitivity of information and system lifetime Algorithm selectionAlgorithm selection System design wrt performance and securitySystem design wrt performance and security Pre-implementation evaluationPre-implementation evaluation TestingTesting TrainingTraining System implementation and transitionSystem implementation and transition Post-implementation evaluationPost-implementation evaluation