Chapter8 Part2
Chapter8 Part2
“I am Alice”
Failure scenario??
in a network,
Bob can not “see”
Alice, so Trudy simply
“I am Alice” declares
herself to be Alice
Alice’s
IP address
“I am Alice”
Failure scenario??
Alice’s Alice’s
“I’m Alice”
IP addr password
Alice’s Alice’s
“I’m Alice”
IP addr password
playback attack: Trudy
Alice’s records Alice’s packet
OK
IP addr and later
plays it back to Bob
Alice’s Alice’s
“I’m Alice”
IP addr password
Alice’s encrypted
“I’m Alice”
IP addr password
Alice’s encrypted
“I’m Alice” record
IP addr password
and
Alice’s
OK playback
IP addr
still works!
Alice’s encrypted
“I’m Alice”
IP addr password
R
KA-B(R) Alice is live, and
only Alice knows
key to encrypt
nonce, so it must
Failures, drawbacks? be Alice!
Network Security 7-9
Authentication: ap5.0
ap4.0 requires shared symmetric key
can we authenticate using public key techniques?
ap5.0: use nonce, public key cryptography
“I am Alice”
Bob computes
R + -
- KA(KA (R)) = R
K A (R) and knows only Alice
“send me your public key”
could have the private
+ key, that encrypted R
KA such that
+ -
K (K (R)) = R
A A
Failures?
Network Security 7-10
ap5.0: security hole
Man (woman) in the middle attack: Trudy poses as
Alice (to Bob) and as Bob (to Alice)
I am Alice I am Alice
R -
K (R)
T
R - Send me your public key
K (R) +
A K
T
Send me your public key
+
K
A +
K (m)
Trudy gets T
- +
+ m = K (K (m))
K (m)
A sends T T Alice
m to
- + ennrypted with
m = K (K (m))
A A Alice’s public key
Network Security 7-11
ap5.0: security hole
Man (woman) in the middle attack: Trudy poses as
Alice (to Bob) and as Bob (to Alice)
Difficult to detect:
Bob receives everything that Alice sends, and vice
versa. (e.g., so Bob, Alice can meet one week later and
recall conversation)
problem is that Trudy receives all messages as well!
Causing:
No reliable authority to distribute public keys
We will discuss how to solve it in web security
Network Security 7-12
Digital Signatures
Non-repudiation:
Alice can take m, and signature K (m) to court and
B
prove that Bob signed m. -
equal
No confidentiality !
?
Network Security 7-19
Trusted Intermediaries
Symmetric key problem: Public key problem:
How do two entities When Alice obtains
establish shared secret Bob’s public key (from
key over network? web site, e-mail,
Solution: diskette), how does she
know it is Bob’s public
trusted key distribution
key, not Trudy’s?
center (KDC) acting as
intermediary between Solution:
entities trusted certification
authority (CA)
KA-KDC KP-KDC
KX-KDC
KP-KDC KB-KDC
KY-KDC
KZ-KDC
KA-KDC KB-KDC
KDC
KA-KDC(A,B) generates
R1
+
- +
K CA(KB ) digital Bob’s
KB signature public
+
(decrypt) K B key
CA
public +
K CA
key
B )
+ B Web Server B
Client A -
(K
A
KC
K+B(KAB, R)
KAB(R)
KAB(m)
K+B(KAB, R)
KAB(R)
KAB(m)
Initial setup:
Trust the first-time connection
Save the server’s public key