Chapter 4 Protocols and Practices in Using Encryption
Chapter 4 Protocols and Practices in Using Encryption
1
Introduction
What is a protocol?
Protocol is an orderly sequence of steps two or
more parties take to accomplish some task.
Everyone using a protocol must agree to the
protocol before using it.
People use protocols to regulate behavior for
mutual benefit.
2
Introduction
Good protocol has the following characteristics:
(1) Established in advance: the protocol is
completely designed before it is used.
(2) Mutually subscribed: All parties to the protocol
agree to follow its steps, in order.
(3) Unambiguous: No party can fail to follow a
step properly because the party has
misunderstood the step.
(4) Complete: For every situation that can occur
there is a prescribe action to be taken.
3
Types of Protocols
4
Types of Protocols
Arbitrated Protocols
Arbitrator is a disinterested 3rd party trusted to
complete a transaction between two distrusting
parties.
Example: Buying and selling cars – banker or
lawyer is the arbitrator.
In computer protocol, an arbitrator is a
trustworthy 3rd party who ensures fairness. It
might be a person, a program or a machine.
5
Arbitrated Protocols
6
Types of Protocols
Arbitrated computer protocols have several
disadvantages:
The two sides may not be able to find a neutral 3rd party
that both sides trust. Suspicious users are rightfully
suspicious of an unknown arbiter in a network.
Maintaining the availability of an arbiter represents a cost
to the users or the network, that cost may be high.
7
Types of Protocols
Arbitrated computer protocols have several
disadvantages:
Arbitration causes a time delay in communication
because a third party must receive, act on and then
forward every transaction.
If the arbitration service is heavily used, it may
become a bottleneck in the network as many users
try to access a single arbiter.
Secrecy becomes vulnerable, because the arbiter
has access to much sensitive information.
9
Types of Protocols
Adjudicated Protocols
Adjudicated protocols involve the services of a
3rd party only in a case of a dispute.
Therefore, they are usually less costly in terms
of machine time or access to a trusted 3 rd party
software judge than arbitrated protocols.
However, adjudicated protocols detect a failure
to cooperate only after the failure has occurred.
10
Adjudicated Protocol
11
Types of Protocol
Self-Enforcing Protocols
A self-enforcing protocol is one that guarantees
fairness.
If either party tries to cheat, that fact becomes
evident to the other party.
No outsider is needed to ensure fairness.
Obviously, self-enforcing protocols are
preferable to the other types.
However, there is not a self-enforcing protocol
for every situation.
12
Self-Enforcing Protocol
13
Protocol to Solve Problems
Cryptographic algorithms rely on the property
that it is easy to encrypt and decrypt messages
with the appropriate keys but very hard to find
keys.
Therefore key management is really important!!!
14
Protocol to Solve Problems
15
Protocol to Solve Problems
Symmetric key exchange without server
17
Assume that both transmissions were sent under the
same encryption key.
Tipah would noticed that the first two blocks encrypted
were the same. So she know that the first two blocks are
her name and her account no. The only different is the
third block (the amount of money).
18
By inserting data onto the transmission line, Tipah can
now replace any person and account number with his
own name and account number, leaving the amount
alone.
Tipah does not need to know who should be getting the
money or how much is being obtained; Tipah simply
changes name and account no to his own and watches
the balance in his account grow.
In ease, the interceptor does not necessarily have to
break the encryption.
19
Protocol to Solve Problems
Symmetric key exchange with server
Distribution Centre
20
Protocol to Solve Problems
Symmetric key exchange with server
21
Protocols to Solve Problems
Asymmetric key exchange without server
Issues
22
Protocols to Solve Problems
Asymmetric key exchange without server
23
Protocol to Solve Problems
Asymmetric key exchange with server
Distribution Centre
2. Here is Renee
5. Here is Pablo’s Public Key
Public Key
Pablo
3. I’m Pablo,
Lets talk
Renee
6. Renee here
what’s up?
7. How are you
24
Protocol to Solve Problems
Distribution Center (DC)
How do DC deals with keys? – publish its own public
key widely – anybody wish to register, deliver the
key and personal identity under the DC key
Can have more than one center:
– as backup, overload, if it doesn’t have the key, request from
other DC
– performance, size, reliability
– must be available any time
So, what gives us confidence that the keys
registered are authentic?? That is, they belong to the
people whose identification are associated.
25
Protocol to Solve Problems
Certificate
Develop ways for two people to establish trust without
having both parties to be present.
Trust coordinated => Certificate Authority
27