SlideShare una empresa de Scribd logo
1 de 39
Bishop: Chapter 10 Key Management
Topics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Session, Interchange Keys ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits ,[object Object],[object Object],[object Object],[object Object]
Key Exchange Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classical Key Exchange ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Simple Protocol 1. Alice Cathy { request for session key to Bob }  k A 2. Alice Cathy {  k s  }  k A  ||  {  k s  }  k B 3. Alice Bob {  k s  }  k B ,[object Object],[object Object]
Problems ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Needham-Schroeder 1. Alice Cathy Alice || Bob ||  r 1 2. Alice Cathy { Alice || Bob ||  r 1  ||  k s  ||  { Alice ||  k s  }  k B  }  k A 3. Alice Bob { Alice ||  k s  }  k B 4. Alice Bob {  r 2  }  k s 5. Alice Bob {  r 2  – 1 }  k s
Argument: Alice talking to Bob ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Argument: Bob talking to Alice ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Denning-Sacco Modification ,[object Object],[object Object],[object Object],a. Eve Bob { Alice ||  k s  }  k B b. Alice (intercepted by Eve) Bob {  r 2  }  k s c. Eve Bob {  r 2  – 1 }  k s
Problem & Solution ,[object Object],[object Object],[object Object],[object Object]
Needham-Schroeder with Denning-Sacco Modification 1. Alice Cathy Alice || Bob ||  r 1 2. Alice Cathy { Alice || Bob ||  r 1  ||  k s  ||  { Alice ||  T  ||  k s  }  k B  }  k A 3. Alice Bob { Alice ||  T  ||  k s  }  k B 4. Alice Bob {  r 2  }  k s 5. Alice Bob {  r 2  – 1 }  k s ,[object Object]
Needham-Schroeder with Denning-Sacco Modification ,[object Object],[object Object],[object Object],[object Object]
Otway-Rees Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Protocol 1. Alice Bob n  || Alice || Bob || {  r 1  ||  n  || Alice || Bob }  k A 2. Cathy Bob n  || Alice || Bob || {  r 1  ||  n  || Alice || Bob }  k A  || {  r 2  ||  n  || Alice || Bob }  k B 3. Cathy Bob n  || {  r 1  ||  k s  }  k A  || {  r 2  ||  k s  }  k B 4. Alice Bob n  || {  r 1  ||  k s  }  k A
Argument: Alice talking to Bob ,[object Object],[object Object],[object Object],[object Object]
Argument: Bob talking to Alice ,[object Object],[object Object],[object Object],[object Object]
Replay Attack against the Otway-Rees Protocol ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kerberos ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Idea ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ticket ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authenticator ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Protocol 1. user Cathy user  ||  TGS Cathy 2. user {  k u , TGS  }  k u  ||  T u , TGS 3. user TGS service  ||  A u , TGS  ||  T u , TGS 4. user TGS user  || {  k u , s  }  k u , TGS  ||  T u , s 5. user service A u , s  ||  T u , s 6. user service {  t  + 1 }  k u , s
Exercises ,[object Object],[object Object],[object Object],[object Object]
Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Exchange using Public Key ,[object Object],[object Object],[object Object],[object Object],[object Object],Alice Bob {  k s  }  e B
Problem and Solution ,[object Object],[object Object],[object Object],[object Object],Alice Bob { {  k s  }  d A  }  e B
Notes ,[object Object],[object Object],[object Object],[object Object],[object Object]
Man-in-the-Middle Attack  (in key exchange using public keys) Alice Cathy send Bob’s public key Eve Cathy send Bob’s public key Eve Cathy e B Alice e E Eve Alice Bob {  k s  }  e E Eve Bob {  k s  }  e B Eve intercepts request Eve intercepts message
Key Generation ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is “Random”? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is “Pseudorandom”? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Best Pseudorandom Numbers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Next ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Destacado

Destacado (6)

Key Storage
Key StorageKey Storage
Key Storage
 
Identity
IdentityIdentity
Identity
 
Key Certificates
Key CertificatesKey Certificates
Key Certificates
 
4.Xss
4.Xss4.Xss
4.Xss
 
Java Md Ds
Java Md DsJava Md Ds
Java Md Ds
 
Java Asymmetric
Java AsymmetricJava Asymmetric
Java Asymmetric
 

Similar a Key Exchange

Authentication (Distributed computing)
Authentication (Distributed computing)Authentication (Distributed computing)
Authentication (Distributed computing)
Sri Prasanna
 
Key Digital Signatures
Key Digital SignaturesKey Digital Signatures
Key Digital Signatures
phanleson
 
Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
Sri Prasanna
 

Similar a Key Exchange (12)

Authentication (Distributed computing)
Authentication (Distributed computing)Authentication (Distributed computing)
Authentication (Distributed computing)
 
Key Digital Signatures
Key Digital SignaturesKey Digital Signatures
Key Digital Signatures
 
1_Protocols.pptx
1_Protocols.pptx1_Protocols.pptx
1_Protocols.pptx
 
Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
 
network security
network security network security
network security
 
Da24658663
Da24658663Da24658663
Da24658663
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
 
Network Security.ppt
Network Security.pptNetwork Security.ppt
Network Security.ppt
 
Security protocols
Security protocolsSecurity protocols
Security protocols
 
Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Chapter 7 security
Chapter 7 securityChapter 7 security
Chapter 7 security
 
Assume that Alice and Bob are using the following authentication proto.docx
Assume that Alice and Bob are using the following authentication proto.docxAssume that Alice and Bob are using the following authentication proto.docx
Assume that Alice and Bob are using the following authentication proto.docx
 

Más de phanleson

Lecture 1 - Getting to know XML
Lecture 1 - Getting to know XMLLecture 1 - Getting to know XML
Lecture 1 - Getting to know XML
phanleson
 

Más de phanleson (20)

Learning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with SparkLearning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with Spark
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Mobile Security - Wireless hacking
Mobile Security - Wireless hackingMobile Security - Wireless hacking
Mobile Security - Wireless hacking
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
E-Commerce Security - Application attacks - Server Attacks
E-Commerce Security - Application attacks - Server AttacksE-Commerce Security - Application attacks - Server Attacks
E-Commerce Security - Application attacks - Server Attacks
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 04: HBase table designHBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 04: HBase table design
 
HBase In Action - Chapter 10 - Operations
HBase In Action - Chapter 10 - OperationsHBase In Action - Chapter 10 - Operations
HBase In Action - Chapter 10 - Operations
 
Hbase in action - Chapter 09: Deploying HBase
Hbase in action - Chapter 09: Deploying HBaseHbase in action - Chapter 09: Deploying HBase
Hbase in action - Chapter 09: Deploying HBase
 
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch11 - Machine Learning with MLlibLearning spark ch11 - Machine Learning with MLlib
Learning spark ch11 - Machine Learning with MLlib
 
Learning spark ch10 - Spark Streaming
Learning spark ch10 - Spark StreamingLearning spark ch10 - Spark Streaming
Learning spark ch10 - Spark Streaming
 
Learning spark ch09 - Spark SQL
Learning spark ch09 - Spark SQLLearning spark ch09 - Spark SQL
Learning spark ch09 - Spark SQL
 
Learning spark ch07 - Running on a Cluster
Learning spark ch07 - Running on a ClusterLearning spark ch07 - Running on a Cluster
Learning spark ch07 - Running on a Cluster
 
Learning spark ch06 - Advanced Spark Programming
Learning spark ch06 - Advanced Spark ProgrammingLearning spark ch06 - Advanced Spark Programming
Learning spark ch06 - Advanced Spark Programming
 
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch05 - Loading and Saving Your DataLearning spark ch05 - Loading and Saving Your Data
Learning spark ch05 - Loading and Saving Your Data
 
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value PairsLearning spark ch04 - Working with Key/Value Pairs
Learning spark ch04 - Working with Key/Value Pairs
 
Learning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with SparkLearning spark ch01 - Introduction to Data Analysis with Spark
Learning spark ch01 - Introduction to Data Analysis with Spark
 
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about LibertagiaHướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
 
Lecture 1 - Getting to know XML
Lecture 1 - Getting to know XMLLecture 1 - Getting to know XML
Lecture 1 - Getting to know XML
 
Lecture 4 - Adding XTHML for the Web
Lecture  4 - Adding XTHML for the WebLecture  4 - Adding XTHML for the Web
Lecture 4 - Adding XTHML for the Web
 

Último

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Último (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

Key Exchange

  • 1. Bishop: Chapter 10 Key Management
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Needham-Schroeder 1. Alice Cathy Alice || Bob || r 1 2. Alice Cathy { Alice || Bob || r 1 || k s || { Alice || k s } k B } k A 3. Alice Bob { Alice || k s } k B 4. Alice Bob { r 2 } k s 5. Alice Bob { r 2 – 1 } k s
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. The Protocol 1. Alice Bob n || Alice || Bob || { r 1 || n || Alice || Bob } k A 2. Cathy Bob n || Alice || Bob || { r 1 || n || Alice || Bob } k A || { r 2 || n || Alice || Bob } k B 3. Cathy Bob n || { r 1 || k s } k A || { r 2 || k s } k B 4. Alice Bob n || { r 1 || k s } k A
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.  
  • 27. Protocol 1. user Cathy user || TGS Cathy 2. user { k u , TGS } k u || T u , TGS 3. user TGS service || A u , TGS || T u , TGS 4. user TGS user || { k u , s } k u , TGS || T u , s 5. user service A u , s || T u , s 6. user service { t + 1 } k u , s
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Man-in-the-Middle Attack (in key exchange using public keys) Alice Cathy send Bob’s public key Eve Cathy send Bob’s public key Eve Cathy e B Alice e E Eve Alice Bob { k s } e E Eve Bob { k s } e B Eve intercepts request Eve intercepts message
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.