SlideShare a Scribd company logo
 Authorization via symmetric crypto
 Key exchange
o Using asymmetric crypto
o Using symmetric crypto with KDC
 KDC shares a key with every participant
 Authenticates participants, generates session (shared)
keys for them to talk to each other
 Gives the requester a “ticket” – session key,
requester’s ID and possibly expiration time, encrypted
by the key that the server shares with KDC
 Ticket and session key enrypted by the key that the
requester shares with KDC
 Needham-Schroeder, Kerberos
Third-party authentication service
oDistributes session keys for authentication,
confidentiality, and integrity
KDC
1. C, S, NC
2. KC(NC, KCS, S, KS (KCS, C ))
C S
3.KS (KCS, C )
4.KCS (NS )
5.KCS (NS-1)
Problem: replay attack
in step 3
Fix: use timestamps
 Introduce Ticket Granting Server (TGS)
o Issues timed keys to resources
 Users log on to authentication server (AS)
 AS+TGS = KDC
 Uses timestamps with a lifetime instead of
nonces
o Fixes freshness problem from Needham-
Schroeder
Third-party authentication service
oDistributes session keys for authentication,
confidentiality, and integrity
TGS
4. KC,TGS(KC,S), TCS
3. TGT, S, KC,TGS(C, t)
AS
1.C 2. KC(KC,TGS), TGT
C S
5. TCS, KC,S(C,t)
KC=hash(pass(C))
TGT=KTGS(C,Tvalid,KC,TGS)
TCS=KS(C,Tvalid,KC,S)
6. KC,S(t+1)
 Public key is public but …
o How does either side know who and what the key
is for?
 Does this solve key distribution problem?
o No – while confidentiality is not required,
integrity is
 Still need trusted third party
o Digital certificates – certificate authority (CA) signs
identity+public key tuple with its private key
o Problem is finding a CA that both client and server
trust
 Everyone has Trent’s public key
 Trent signs both Alice’s and Bob’s public
keys – he generates public-key certificate
 When they receive keys, verify the signature
 Mallory cannot impersonate Alice or Bob
because her key is signed as Mallory’s
 Certificate usually contains more than the
public key
oName, network address, organization
 Trent is known as Certificate Authority (CA)
Authentication steps
oVerifier provides nonce, or a timestamp is used
instead.
oPrincipal selects session key and sends it to verifier
with nonce, encrypted with principal’s private key
and verifier’s public key, sends principal’s
certificate too
oVerifier validates certificate
oVerifier checks signature on nonce
 PGP (Pretty Good Privacy)
o“Web of Trust”
o Source: Wikipedia
 “As time goes on, you will accumulate keys from
other people that you may want to designate as
trusted introducers. Everyone else will each choose
their own trusted introducers. And everyone will
gradually accumulate and distribute with their key a
collection of certifying signatures from other
people, with the expectation that anyone receiving
it will trust at least one or two of the signatures.
This will cause the emergence of a decentralized
fault-tolerant web of confidence for all public
keys.“
 X.509 standard
o Hierarchical model
o A handful of trusted CAs can issue certificates
to others
 SSH
o User keys exchanged out of band
o Weak assurance of server keys
 Is this the same host you spoke with last
time?
 Revocation lists (CRL’s)
o Long lists
o Hard to propagate
 Lifetime / Expiration
o Short life allows assurance of validity at time
of issue but increases cost of key distribution
 Real-time validation
o Online Certificate Status Protocol (OCSP)
o Single source of the compromised key list
o Clients check suspicious keys and hash
replies
 Group key vs. Individual key
o Proves that one belongs to the group vs. proving
an individual identity
o E.g., used for multicast messages
 Revoking access
o Change keys, redistribute
 Joining and leaving groups
o Does one see old messages on join or is the key
changed – backward secrecy
o How to revoke access – forward secrecy
 Robustness
o Coping with network partitioning
 Efficiency
o Cost of use, verification, exchange
 Centralized
o Single entity issues keys
o Optimization to reduce traffic for large groups
o May utilize application specific knowledge
 Decentralized
o Employs sub managers
 Distributed
o Members do key generation
o May involve group contributions

More Related Content

PDF
[POSS 2019] TLS for Dummies
Worteks
 
PPTX
kerberos
sameer farooq
 
PDF
How ssl works
Saptarshi Basu
 
PPT
Ch15
raja yasodhar
 
PPT
Cryptography - Overview
Mohammed Adam
 
PPTX
SSL/TLS
Sirish Kumar
 
PPT
X 509 Certificates How And Why In Vb.Net
Puneet Arora
 
PPT
Lecture 9 key distribution and user authentication
rajakhurram
 
[POSS 2019] TLS for Dummies
Worteks
 
kerberos
sameer farooq
 
How ssl works
Saptarshi Basu
 
Cryptography - Overview
Mohammed Adam
 
SSL/TLS
Sirish Kumar
 
X 509 Certificates How And Why In Vb.Net
Puneet Arora
 
Lecture 9 key distribution and user authentication
rajakhurram
 

What's hot (15)

PPTX
Ssl in a nutshell
Frank Kelly
 
PPTX
Kerberos
Gichelle Amon
 
PPT
Lecture17
Châu Thanh Chương
 
PPT
Authentication Application in Network Security NS4
koolkampus
 
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
PDF
Building basic public key infrastucture (PKI)
Ismail Rachdaoui
 
PPT
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
PPTX
Introduction to SSL/TLS
keithrozario
 
PPTX
Transport Layer Security (TLS)
Arun Shukla
 
PPT
key distribution in network security
babak danyal
 
PPTX
Kerberos Authentication Process In Windows
niteshitimpulse
 
PPTX
Kerberos authentication
Suraj Singh
 
PPTX
Kerberos
Rahul Pundir
 
PDF
SSL/TLS Handshake
Arpit Agarwal
 
Ssl in a nutshell
Frank Kelly
 
Kerberos
Gichelle Amon
 
Authentication Application in Network Security NS4
koolkampus
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
Building basic public key infrastucture (PKI)
Ismail Rachdaoui
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
Introduction to SSL/TLS
keithrozario
 
Transport Layer Security (TLS)
Arun Shukla
 
key distribution in network security
babak danyal
 
Kerberos Authentication Process In Windows
niteshitimpulse
 
Kerberos authentication
Suraj Singh
 
Kerberos
Rahul Pundir
 
SSL/TLS Handshake
Arpit Agarwal
 
Ad

Viewers also liked (18)

PPT
Database introduction
David Hoen
 
PPT
Crypto theory to practice
David Hoen
 
PPT
Text classification methods
David Hoen
 
PPT
Basic dns-mod
David Hoen
 
DOCX
Plantilla creación proyecto_etwinning
Maria Vidal Nieto
 
PPT
Sql database object
David Hoen
 
PPTX
Nlp naive bayes
David Hoen
 
DOCX
Resume(1)
Jeff Castro
 
PDF
Sociología de la profesión contable en Colombia.
Karla Palacino
 
PDF
Sociología de la profesión contable en Colombia.
Karla Palacino
 
PPTX
Decision tree
David Hoen
 
PPTX
Hashfunction
David Hoen
 
PPT
Hash mac algorithms
David Hoen
 
PDF
Experiencia de uso educativo de Twitter
Amaia Segurola Colinas
 
PPT
Prolog programming
David Hoen
 
PPTX
Maze runner
Kassidy Caruso
 
PDF
Fomento de vocaciones STEM
Amaia Segurola Colinas
 
PPTX
21 nursing problems by faye abdellah
Martha L. Garcia BSN, RN
 
Database introduction
David Hoen
 
Crypto theory to practice
David Hoen
 
Text classification methods
David Hoen
 
Basic dns-mod
David Hoen
 
Plantilla creación proyecto_etwinning
Maria Vidal Nieto
 
Sql database object
David Hoen
 
Nlp naive bayes
David Hoen
 
Resume(1)
Jeff Castro
 
Sociología de la profesión contable en Colombia.
Karla Palacino
 
Sociología de la profesión contable en Colombia.
Karla Palacino
 
Decision tree
David Hoen
 
Hashfunction
David Hoen
 
Hash mac algorithms
David Hoen
 
Experiencia de uso educativo de Twitter
Amaia Segurola Colinas
 
Prolog programming
David Hoen
 
Maze runner
Kassidy Caruso
 
Fomento de vocaciones STEM
Amaia Segurola Colinas
 
21 nursing problems by faye abdellah
Martha L. Garcia BSN, RN
 
Ad

Similar to Key exchange in crypto (20)

PPTX
Module III CNS Kerberos and its example.pptx
NithyasriA2
 
PPT
Authentication services
Greater Noida Institute Of Technology
 
PPT
ch14.ppt
SomuPatil8
 
PDF
Computer security module 4
Deepak John
 
PPT
Crypto Analysis slides presentation slides
tahirsaleem54
 
PPTX
public key infrastructure
vimal kumar
 
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
PPT
Introduction to distributed security concepts and public key infrastructure m...
Information Security Awareness Group
 
PPT
Protocols for Public Key Management
Shafaan Khaliq Bhatti
 
PPT
ok_mary_pki1234public_key_encryption.ppt
SmeetaJavalagi
 
PPT
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
AhmedJaha
 
PPTX
1165839977.pptx
ssuser000e54
 
PPT
Unit 4.ppt
DHANABALSUBRAMANIAN
 
PPTX
Unit 4 (Part II) - Authentication Framework for PKC.pptx
RAMESHMRA21130030110
 
PPT
ch13 ABCD.ppt
georgejustymirobi1
 
PPTX
Public Key Infrastructures
Zefren Edior
 
PPT
Network security.ppt
ChSheraz3
 
PDF
Authentication and Authorization Models
CSCJournals
 
PPT
ok_mary_pki.ppt an introduction to Distributed Concept
HazemElabed2
 
Module III CNS Kerberos and its example.pptx
NithyasriA2
 
Authentication services
Greater Noida Institute Of Technology
 
ch14.ppt
SomuPatil8
 
Computer security module 4
Deepak John
 
Crypto Analysis slides presentation slides
tahirsaleem54
 
public key infrastructure
vimal kumar
 
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Introduction to distributed security concepts and public key infrastructure m...
Information Security Awareness Group
 
Protocols for Public Key Management
Shafaan Khaliq Bhatti
 
ok_mary_pki1234public_key_encryption.ppt
SmeetaJavalagi
 
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
AhmedJaha
 
1165839977.pptx
ssuser000e54
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
RAMESHMRA21130030110
 
ch13 ABCD.ppt
georgejustymirobi1
 
Public Key Infrastructures
Zefren Edior
 
Network security.ppt
ChSheraz3
 
Authentication and Authorization Models
CSCJournals
 
ok_mary_pki.ppt an introduction to Distributed Concept
HazemElabed2
 

More from David Hoen (19)

PPT
Computer security
David Hoen
 
PPT
Introduction to prolog
David Hoen
 
PPTX
Building a-database
David Hoen
 
PPT
Database constraints
David Hoen
 
PPT
Hash crypto
David Hoen
 
PPTX
Introduction to security_and_crypto
David Hoen
 
PPT
Prolog resume
David Hoen
 
PPT
Access data connection
David Hoen
 
PPT
Database concepts
David Hoen
 
PPTX
Datamining with nb
David Hoen
 
PDF
Text categorization as a graph
David Hoen
 
PPT
Xml schema
David Hoen
 
PPT
Text classification
David Hoen
 
PPT
Information retrieval
David Hoen
 
PPT
Xml stylus studio
David Hoen
 
PPTX
Crypto passport authentication
David Hoen
 
PPTX
Cryptography
David Hoen
 
PPTX
Overview prolog
David Hoen
 
PPTX
Naïve bayes
David Hoen
 
Computer security
David Hoen
 
Introduction to prolog
David Hoen
 
Building a-database
David Hoen
 
Database constraints
David Hoen
 
Hash crypto
David Hoen
 
Introduction to security_and_crypto
David Hoen
 
Prolog resume
David Hoen
 
Access data connection
David Hoen
 
Database concepts
David Hoen
 
Datamining with nb
David Hoen
 
Text categorization as a graph
David Hoen
 
Xml schema
David Hoen
 
Text classification
David Hoen
 
Information retrieval
David Hoen
 
Xml stylus studio
David Hoen
 
Crypto passport authentication
David Hoen
 
Cryptography
David Hoen
 
Overview prolog
David Hoen
 
Naïve bayes
David Hoen
 

Recently uploaded (20)

PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Doc9.....................................
SofiaCollazos
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 

Key exchange in crypto

  • 1.  Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant  Authenticates participants, generates session (shared) keys for them to talk to each other  Gives the requester a “ticket” – session key, requester’s ID and possibly expiration time, encrypted by the key that the server shares with KDC  Ticket and session key enrypted by the key that the requester shares with KDC  Needham-Schroeder, Kerberos
  • 2. Third-party authentication service oDistributes session keys for authentication, confidentiality, and integrity KDC 1. C, S, NC 2. KC(NC, KCS, S, KS (KCS, C )) C S 3.KS (KCS, C ) 4.KCS (NS ) 5.KCS (NS-1) Problem: replay attack in step 3 Fix: use timestamps
  • 3.  Introduce Ticket Granting Server (TGS) o Issues timed keys to resources  Users log on to authentication server (AS)  AS+TGS = KDC  Uses timestamps with a lifetime instead of nonces o Fixes freshness problem from Needham- Schroeder
  • 4. Third-party authentication service oDistributes session keys for authentication, confidentiality, and integrity TGS 4. KC,TGS(KC,S), TCS 3. TGT, S, KC,TGS(C, t) AS 1.C 2. KC(KC,TGS), TGT C S 5. TCS, KC,S(C,t) KC=hash(pass(C)) TGT=KTGS(C,Tvalid,KC,TGS) TCS=KS(C,Tvalid,KC,S) 6. KC,S(t+1)
  • 5.  Public key is public but … o How does either side know who and what the key is for?  Does this solve key distribution problem? o No – while confidentiality is not required, integrity is  Still need trusted third party o Digital certificates – certificate authority (CA) signs identity+public key tuple with its private key o Problem is finding a CA that both client and server trust
  • 6.  Everyone has Trent’s public key  Trent signs both Alice’s and Bob’s public keys – he generates public-key certificate  When they receive keys, verify the signature  Mallory cannot impersonate Alice or Bob because her key is signed as Mallory’s  Certificate usually contains more than the public key oName, network address, organization  Trent is known as Certificate Authority (CA)
  • 7. Authentication steps oVerifier provides nonce, or a timestamp is used instead. oPrincipal selects session key and sends it to verifier with nonce, encrypted with principal’s private key and verifier’s public key, sends principal’s certificate too oVerifier validates certificate oVerifier checks signature on nonce
  • 8.  PGP (Pretty Good Privacy) o“Web of Trust” o Source: Wikipedia  “As time goes on, you will accumulate keys from other people that you may want to designate as trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually accumulate and distribute with their key a collection of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause the emergence of a decentralized fault-tolerant web of confidence for all public keys.“
  • 9.  X.509 standard o Hierarchical model o A handful of trusted CAs can issue certificates to others
  • 10.  SSH o User keys exchanged out of band o Weak assurance of server keys  Is this the same host you spoke with last time?
  • 11.  Revocation lists (CRL’s) o Long lists o Hard to propagate  Lifetime / Expiration o Short life allows assurance of validity at time of issue but increases cost of key distribution  Real-time validation o Online Certificate Status Protocol (OCSP) o Single source of the compromised key list o Clients check suspicious keys and hash replies
  • 12.  Group key vs. Individual key o Proves that one belongs to the group vs. proving an individual identity o E.g., used for multicast messages
  • 13.  Revoking access o Change keys, redistribute  Joining and leaving groups o Does one see old messages on join or is the key changed – backward secrecy o How to revoke access – forward secrecy  Robustness o Coping with network partitioning  Efficiency o Cost of use, verification, exchange
  • 14.  Centralized o Single entity issues keys o Optimization to reduce traffic for large groups o May utilize application specific knowledge  Decentralized o Employs sub managers  Distributed o Members do key generation o May involve group contributions