BRC-Key Management and Distribution
BRC-Key Management and Distribution
• Key distribution is the function that delivers a key to two parties who
wish to exchange secure encrypted data. Some sort of mechanism or
protocol is needed to provide for the secure distribution of keys.
• Key distribution often involves the use of master keys, which are
infrequently used and are long lasting, and session keys, which are
generated and distributed for temporary use between two parties.
• Public-key encryption schemes are secure only if the authenticity of the
public key is assured. A public-key certificate scheme provides the
necessary security.
• X.509 defines the format for public-key certificates. This format is widely
used in a variety of applications.
• A public-key infrastructure (PKI) is defined as the set of hardware,
software, people, policies, and procedures needed to create, manage,
store, distribute, and revoke digital certificates based on asymmetric
cryptography.
• Typically, PKI implementations make use of X.509 certificates.
• The topics of cryptographic key management and cryptographic key
distribution are complex, involving cryptographic, protocol, and
management considerations.
• The purpose of this chapter is to give the reader a feel for the issues
involved and a broad survey of the various aspects of key management
1. Symmetric Key Distribution using Symmetric
Encryption
• The strength of any cryptographic system rests with the key
distribution technique, a term that refers to the means of
delivering a key to two parties who wish to exchange data
without allowing others to see the key.
• For two parties A and B, key distribution can be achieved in
a number of ways, as follows:
– A can select a key and physically deliver it to B.
– A third party can select the key and physically deliver it to A and B.
– If A and B have previously and recently used a key, one party can
transmit the new key to the other, encrypted using the old key.
– If A and B each has an encrypted connection to a third party C, C can
deliver a key on the encrypted links to A and B.
• A Key Distribution Scenario
• Automatic Key Distribution for Connection-Oriented
Protocol
Decentralized Key Distribution
• The use of a key distribution center imposes the requirement
that the KDC be trusted and be protected from subversion.
• This requirement can be avoided if key distribution is fully
decentralized.
• Although full decentralization is not practical for larger
networks using symmetric encryption only, it may be useful
within a local context.
• Thus, there may need to be as many as n(n-1)/2 master keys
for a configuration with n end systems.
Symmetric Key Distribution using Asymmetric
Encryption
• Because of the inefficiency of public key cryptosystems, they
are almost never used for the direct encryption of sizable
block of data, but are limited to relatively small blocks.
• One of the most important uses of a public-key cryptosystem
is to encrypt secret keys for distribution.
• In the same fashion, B can obtain A’s public key with the
reverse chain:
• This scheme need not be limited to a chain of two
certificates. An arbitrarily long path of CAs can be followed
to produce a chain. A chain with elements would be
expressed as
X.509 Hierarchy: A Hypothetical Example