Key Management
Key Management
Key Management
Key Exchange
Public key systems are much slower than
Key distribution
Key agreement
announcement
Publicly available directory
Public-key authority
Public-key certificates
Possible Attacks
Observe all messages over the channel
So
all
Save messages for reuse later
Public Announcement
users distribute public keys to recipients
Public-Key Authority
improve security by tightening control over
Public-Key Authority
Cont.
More advanced distribution
A
10
Cont.
In above scheme, the authority is
bottleneck
New approach: certificate
The certificate is
CA=EKRauth[T,IDA, KUA], where the EKRauth is the private key
used by the authority.
11
Public-Key Certificates
12
Public-Key Certificates
certificates allow key exchange without real-time access to
public-key authority
a certificate binds identity to public key
usually with other info such as period of validity, rights of use etc
13
X.509
The structure of a X.509 v3 digital certificate is as follows:
Certificate
Version
Serial Number
Algorithm ID
Issuer
Validity
Not Before
Not After
Subject
Subject Public Key Info
14
Sample Certificate
Certificate:
Data: Version: 1 (0x0)
Serial Number: 7829 (0x1e95)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services
Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com
Validity
15
16
17
18
Cont.
Attacking
A
19
Schemes
Security
20
21
Computationally secure
Scheme
K=c au av mod p
Cryptography and Network Security
22
Scheme
K=c au av mod p
23
Diffie-Hellman Problem
Diffie-Hellman problem definition
Given bu=gau
24