L1 - Key Management and Distribution
L1 - Key Management and Distribution
1
key distribution
– key distribution technique:
• a term that refers to the means of delivering a
key to two parties who wish to exchange data
without allowing others to see the key.
2
Symmetric Key Distribution
using Symmetric Encryption
For two parties A and B, key distribution can be achieved in a
number of ways, as follows:
– Each registered user will get a master key (in some secure fashion such
as physical handling) to communicate securely with the KDC.
– Thus the number of keys for N users will be N Keys. Moreover, each user
will maintain only one key . Each user will get a session key from the KDC
to communicate with one registered user to be used for one time only.
4
key Distribution Scenario
5
key Distribution Scenario cont.
– IDA is the identity of the source.
– IDB is the identity of the destination.
– Nonce = may be a timestamp, a counter, or a
random number; it should be different with each
request and is used to prevent masquerade.
– Ka is the master key between the source and
KDC.
– Kb is the master key between the destination and
KDC.
– N2 is a nonce between B and A.
6
Hierarchical Key Control
– The key distribution is not limited to one KDC.
8
Session Key Lifetime Cont.
– For connection-oriented protocols the choices
are:
• Using the same session key for the length of time that
the connection is open.
• using a new session key for each new session.
• If the connection has a very long lifetime, then it better
to change the session key periodically.
– For connectionless protocols the choices are:
• Use a new session key for each exchange.
• Use a session key for a certain fixed period.
• Use a session key for a certain number of
transactions
9
Symmetric Key Distribution Using
Asymmetric Encryption
– Simple Secret Key Distribution
• 1. A generates a public/private key pair {PUa, PRa} and transmits a
message to B consisting of PUa and an identifier of A, IDA.
11
12
Distribution of Public Keys
– Public Keys distribution techniques can be
grouped into the following schemes:
• Public announcement
• Publicly available directory
• Public-key authority
• Public-key certificates
13
Distribution of Public-Keys cont.
Public announcement
– In this scheme of distribution the public key
is simply sent to public forums and Internet
mailing lists.
14
Distribution of Public-Keys cont.
Publicly available directory
– More security would be achieved by maintaining a
publicly available dynamic directory of public keys.
16
Distribution of Public-Keys cont.
Publicly-key Authority
– The public-key authority maintains a dynamic directory of public
keys of all participants.
– Each participant reliably knows a public key for the authority, with
only the authority knowing the corresponding private key.
17
Distribution of Public-Keys cont.
18
Distribution of Public-Keys cont.
Public-key certificates
19
Distribution of Public-Keys cont.
Public-key certificates requirements:
1. Any participant can read a certificate to
determine the name and public key of the
certificate’s owner.
2. Any participant can verify that the certificate
originated from the certificate authority and is not
counterfeit.
3. Only the certificate authority can create and
update certificates.
4. Any participant can verify the time validity of the
certificate.
20
X.509 Certificates
– X.509 standard has become universally
accepted for formatting public-key certificates.
21
X.509 Certificates Use
22
Certificate Format
The most important fields are:
1. Period of validity that
contains the first and the
last dates the certificate is
valid.
2. User’s Public Key
Information.
3. Signature which is
signed by the CA private
key and be used to verify
the integrity and the
authentication of the
certificate.
23