ET4280 ACN-04 Key Distribution and User Authentication
ET4280 ACN-04 Key Distribution and User Authentication
HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY Smart Applications & Network System Laboratory
Add : Room 618, Ta Quang Buu Library
No.1 Dai Co Viet Road, Hanoi, Vietnam
TRAN QUANG VINH Mobile : (+84) 912 636 939
Email : [email protected]
Ph.D., Assoc. Prof., Senior Lecturer [email protected]
School of Electrical and Electronic Engineering Website : https://sanslab.vn
OUTLINE
Symmetric key distribution using symmetric encryption
• Kerberos
• Version 4
• Version 5
Key distribution using asymmetric encryption
• Public-key certificates
• Public-key distribution of secret keys
X.509 certificates
• Certificates
• X.509 Version 3
Public-key infrastructure
• PKIX management functions
• PKIX management protocols
Federated identity management
• Identity management
• Identity federation
@ 2022 TRAN-QUANG VINH ◦ HUST 2
Symmetric Key Distribution using symmetric encryption
For symmetric encryption to work, the two parties to an exchange
must share the same key, and that key must be protected from
access by others
Frequent key changes are usually desirable to limit the amount of
data compromised if an attacker learns the key
Key distribution technique
The means of delivering a key to two parties that wish to exchange
data, without allowing others to see the key
• A third party can select the key and physically deliver it to A and B
2
• If A and B have previously and recently used a key, one party could transmit
the new key to the other, using the old key to encrypt the new key
3
(2)
(3)
(4)
(5)
(6)
A service An
A realm Principal
or user instance
name name
name name