SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
2/24/2012




LOGO




       Key Exchange Protocols




               IT Faculty – DaLat University
                     February - 2012




                   Encryption
 For a plaintext M, a crypto algorithm A
 and a cryptographic key K , the ciphertext
 M‟ is calculated as follows:
    M‟ = A(K,M) = {M}K




             Perfect Encryption
i) Without the key K (in the case of a
   symmetric cryptosystem), or the matching
   private key of K (in the case of an
   asymmetric cryptosystem), the ciphertext
   {M}K does not provide any cryptanalytic
   means for finding the plaintext message
   M.




                                                      1
2/24/2012




               Perfect Encryption
ii) The ciphertext {M}K and maybe together
   with some known information about the
   plaintext message M do not provide any
   cryptanalytic means for finding the key K
   (in the case of a symmetric cryptosystem),
   or the matching private key of K (in the
   case of an asymmetric cryptosystem).




       The Dolev-Yao Threat Model
 In that model
   Malice (can ):
     • can obtain any message passing through the
       network
     • is a legitimate user of the network, and thus in
       particular can initiate a conversation with any other
       user
     • will have the opportunity to become a receiver to
       any principal
     • can send messages to any principal by
       impersonating any other principal




       The Dolev-Yao Threat Model
 Malice (cannot ):
  • cannot guess a random number which is chosen from a
    sufficiently large space
  • without the correct secret (or private) key, cannot retrieve
    plaintext from given ciphertext, and cannot create valid
    ciphertext from given plaintext, wrt. the perfect encryption
    algorithm
  • cannot find the private component, i.e., the private key,
    matching a given public key
  • while he may have control of a large public part of our
    computing and communication environment, in general,
    he is not in control of many private areas of the
    computing environment, such as accessing the memory
    of a principal's offline computing device




                                                                          2
2/24/2012




      The Dolev-Yao Threat Model
Suppose that two principals Alice and Bob wish
 to communicate with each other in a secure
 manner
ƒSuppose also that Alice and Bob have never
 met before, so they do not already share a
 secret key between them and do not already
 know for sure the other party's public key
ƒThen how can they communicate securely over
 completely insecure networks?




      The Dolev-Yao Threat Model




      The Dolev-Yao Threat Model




                                                         3
2/24/2012




      The Dolev-Yao Threat Model
1. Alice generates K at random, creates
   {K}KAT, and sends to Trent: Alice, Bob,
   {K}KAT
2. Trent finds keys KAT, KBT, decrypts
   {K}KAT to reveal K, creates {K}KBT and
   sends to Bob: Alice, Bob, {K}KBT
3. Bob decrypts {K}KBT to reveal K, forms
   and sends to Alice: {Hello Alice, I'm
   Bob!}K
.




      The Dolev-Yao Threat Model
Problem: K created by Alice is not strong
 enough  Bob is unhappy about this
ƒNew protocol: “Session key from Trent”




                                                    4
2/24/2012




                 An attack




      The Dolev-Yao Threat Model
This attack will only succeed if Malice is a
 legitimate user known to Trent  a realistic
 assumption – an insider attacker is often
 more of a threat than outsiders
 A fix: 1. Alice sends to Trent: Alice, {Bob}KAT;




                                                            5
2/24/2012




      The Dolev-Yao Threat Model
 Another attack
1. Alice sends to Trent: Alice, {Bob}KAT;
1. Malice("Alice") sends to Trent: Alice,
   {Malice}KAT




      The Dolev-Yao Threat Model
Instead, Malice can alter the message
 from Trent to Alice (message line 2 in
 Protocol "Session Key From Trent) into the
 following:
 Malice("Trent") sends to Alice: {K'}KAT




      The Dolev-Yao Threat Model
Malice can alter some protocol messages
 without detection.
This suggests that the protocol needs a
 security service which can guard against
 tampering of messages.
 This brings us to the following security
 service “Protocol with message
 authentication”




                                                     6
2/24/2012




 Protocol with Message Authentication
Malice has always been able to alter some
 protocol messages without detection
 None of the protocols designed so far has
 provided any cryptographic protection
 against message alteration.

 Thus, one way to fix these protocols is to
 provide such protection




 Protocol with Message Authentication
The protection should enable legitimate
 principals who have the right cryptographic
 keys to detect any unauthorized alteration
 of any protected protocol messages.
 Such protection or security service is
 called message authentication (is also
 called data integrity)




 Protocol with Message Authentication
We observe that Malice‟s alteration of the
 protocol messages has caused the
 following two effects:
   a session key is shared between wrong
    principals
   a wrong session key get established
 message authentication protection should
 provide a cryptographic binding between
 the session key to be established and its
 intended users.




                                                      7
2/24/2012




 Protocol with Message Authentication
 This lead to a new protocol: “Message
 Authentication”, where the identities of
 Alice and Bob are included in the
 encrypted message parts sent by Trent.




       Perfect encryption for message
            authentication service
 Perfect Encryption with Notation {M}K (for
 message authentication service)
  iii) Without the key K, even with the knowledge
     of the plaintext M, it should be impossible for
     someone to alter {M}K without being detected
     by the recipient during the time of decryption




                                                              8
2/24/2012




Attack on Protocol "Message Authentication"

Problem: message replay attack.
ƒMalice intercepts Alice's request, then:
   1. Alice sends to Malice(“Trent”)
   2. Malice(“Trent”) sends to Alice: {Bob,K'}KAT
    ,{Alice,K'} KBT
ƒTwo ciphertext blocks containing K' are a
 replay of old messages which Malice has
 recorded from a previous run of the
 protocol (between Alice and Bob)




Attack on Protocol "Message Authentication"

This attack will cause Alice & Bob to reuse
 the old session key K„
ƒSince K' is old, it may be possible for
 Malice to have discovered its value




     Protocol “challenge-response"
 Using this method Alice will generate a
 new random number NA at the start of the
 protocol and send this to Trent with the
 request for a new session key
The random number NA created by Alice
 for enabling the challenge-response
 mechanism is called a nonce which stands
 for a number used once




                                                            9
2/24/2012




     Protocol “challenge-response"
 An attack on the Needham-Schroeder
 symmetric key authentication protocol:
   Bob thinks he is sharing a new session key
    with Alice while actually the key is an old one
    and may be known to Malice




                                                            10
2/24/2012




                  Solution




A Protocol Using Public-key Cryptosystems

 Called the Needham-Schroeder Public-
 key Authentication Protocol
 Alice public key is KA, Alice private key is
 K-1A




                                                       11
2/24/2012




A Protocol Using Public-key Cryptosystems

An attack on public key authentication
 protocol
   Found after 17 years
   Result: Bob thinks he is sharing secrets NA,
    NB with Alice while actually sharing them with
    Malice
   Method: Malice makes use of Alice as she is
    trying to establish a connection with him




A Protocol Using Public-key Cryptosystems

 Malice may ask for a session key and
 Bob may believe that this request is from
 Alice
ƒThen, an example if Bob is a bank,
 Malice(“Alice”) sends to Bob the following
 command:
   { NA, NB, Transfer 5000$ from my account to
    Malice's“}KB




                                                           12
2/24/2012




A Protocol Using Public-key Cryptosystems

It is fairly easy to change the protocol so
 as to prevent the attack. If we include the
 responder's identity in message 6 of the
 protocol
   2-6. Bob sends to Malice("Alice"): {Bob, NA,
    NB}KA




A Protocol Using Public-key Cryptosystems

 This is what we are using nowadays




                                                         13

Más contenido relacionado

La actualidad más candente

Ao318992
Ao318992Ao318992
Ao318992IJMER
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network securitysmumbahelp
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network securitysmumbahelp
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...hemanthbbc
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 

La actualidad más candente (16)

Ao318992
Ao318992Ao318992
Ao318992
 
Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]Chapter8 nov 29_05[one.]
Chapter8 nov 29_05[one.]
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
114 120
114 120114 120
114 120
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
 
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...Ieeepro techno solutions   2014 ieee java project -key-aggregate cryptosystem...
Ieeepro techno solutions 2014 ieee java project -key-aggregate cryptosystem...
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 

Similar a Part04 key exchange protocols

aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Network Security
Network SecurityNetwork Security
Network Securityhj43us
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 
Chapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docxChapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docxrusselldayna
 
Us 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychainUs 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychainAlex Radocea
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and securityresearch30
 
Cgi whpr 35_pki_e
Cgi whpr 35_pki_eCgi whpr 35_pki_e
Cgi whpr 35_pki_emadunix
 
08 MK-PPT Advanced Topic 2.ppt
08 MK-PPT Advanced Topic 2.ppt08 MK-PPT Advanced Topic 2.ppt
08 MK-PPT Advanced Topic 2.pptajajkhan16
 
08 MK-PPT Advanced network security Topic 2.ppt
08 MK-PPT Advanced network security Topic 2.ppt08 MK-PPT Advanced network security Topic 2.ppt
08 MK-PPT Advanced network security Topic 2.pptLavkushGupta12
 

Similar a Part04 key exchange protocols (20)

aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
13
1313
13
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
 
Network Security
Network SecurityNetwork Security
Network Security
 
Crypt
CryptCrypt
Crypt
 
Ch7 2ed
Ch7 2edCh7 2ed
Ch7 2ed
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Chapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docxChapter 8SecurityComputer Networking A Top Down Approach .docx
Chapter 8SecurityComputer Networking A Top Down Approach .docx
 
b
bb
b
 
Us 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychainUs 17-radocea-intercepting-i cloud-keychain
Us 17-radocea-intercepting-i cloud-keychain
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Crypt
CryptCrypt
Crypt
 
Public private key
Public private keyPublic private key
Public private key
 
Cgi whpr 35_pki_e
Cgi whpr 35_pki_eCgi whpr 35_pki_e
Cgi whpr 35_pki_e
 
Internet security
Internet securityInternet security
Internet security
 
Security
SecuritySecurity
Security
 
08 MK-PPT Advanced Topic 2.ppt
08 MK-PPT Advanced Topic 2.ppt08 MK-PPT Advanced Topic 2.ppt
08 MK-PPT Advanced Topic 2.ppt
 
08 MK-PPT Advanced network security Topic 2.ppt
08 MK-PPT Advanced network security Topic 2.ppt08 MK-PPT Advanced network security Topic 2.ppt
08 MK-PPT Advanced network security Topic 2.ppt
 

Más de Lê Liêu

Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication securityLê Liêu
 
Part04 basic cryptography
Part04 basic cryptographyPart04 basic cryptography
Part04 basic cryptographyLê Liêu
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authenticationLê Liêu
 
Part01 general security concepts
Part01 general security conceptsPart01 general security concepts
Part01 general security conceptsLê Liêu
 
Part06 infrastructure security
Part06 infrastructure securityPart06 infrastructure security
Part06 infrastructure securityLê Liêu
 

Más de Lê Liêu (16)

1556 a 09
1556 a 091556 a 09
1556 a 09
 
1556 a 08
1556 a 081556 a 08
1556 a 08
 
1556 a 07
1556 a 071556 a 07
1556 a 07
 
1556 a 06
1556 a 061556 a 06
1556 a 06
 
1556 a 05
1556 a 051556 a 05
1556 a 05
 
1556 a 04
1556 a 041556 a 04
1556 a 04
 
1556 a 03
1556 a 031556 a 03
1556 a 03
 
1556 a 02
1556 a 021556 a 02
1556 a 02
 
1556 a 01
1556 a 011556 a 01
1556 a 01
 
1556 a 00
1556 a 001556 a 00
1556 a 00
 
1556 a 10
1556 a 101556 a 10
1556 a 10
 
Part05 communication security
Part05 communication securityPart05 communication security
Part05 communication security
 
Part04 basic cryptography
Part04 basic cryptographyPart04 basic cryptography
Part04 basic cryptography
 
Part02 access control authentication
Part02 access control   authenticationPart02 access control   authentication
Part02 access control authentication
 
Part01 general security concepts
Part01 general security conceptsPart01 general security concepts
Part01 general security concepts
 
Part06 infrastructure security
Part06 infrastructure securityPart06 infrastructure security
Part06 infrastructure security
 

Último

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Part04 key exchange protocols

  • 1. 2/24/2012 LOGO Key Exchange Protocols IT Faculty – DaLat University February - 2012 Encryption  For a plaintext M, a crypto algorithm A and a cryptographic key K , the ciphertext M‟ is calculated as follows:  M‟ = A(K,M) = {M}K Perfect Encryption i) Without the key K (in the case of a symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem), the ciphertext {M}K does not provide any cryptanalytic means for finding the plaintext message M. 1
  • 2. 2/24/2012 Perfect Encryption ii) The ciphertext {M}K and maybe together with some known information about the plaintext message M do not provide any cryptanalytic means for finding the key K (in the case of a symmetric cryptosystem), or the matching private key of K (in the case of an asymmetric cryptosystem). The Dolev-Yao Threat Model  In that model  Malice (can ): • can obtain any message passing through the network • is a legitimate user of the network, and thus in particular can initiate a conversation with any other user • will have the opportunity to become a receiver to any principal • can send messages to any principal by impersonating any other principal The Dolev-Yao Threat Model  Malice (cannot ): • cannot guess a random number which is chosen from a sufficiently large space • without the correct secret (or private) key, cannot retrieve plaintext from given ciphertext, and cannot create valid ciphertext from given plaintext, wrt. the perfect encryption algorithm • cannot find the private component, i.e., the private key, matching a given public key • while he may have control of a large public part of our computing and communication environment, in general, he is not in control of many private areas of the computing environment, such as accessing the memory of a principal's offline computing device 2
  • 3. 2/24/2012 The Dolev-Yao Threat Model Suppose that two principals Alice and Bob wish to communicate with each other in a secure manner ƒSuppose also that Alice and Bob have never met before, so they do not already share a secret key between them and do not already know for sure the other party's public key ƒThen how can they communicate securely over completely insecure networks? The Dolev-Yao Threat Model The Dolev-Yao Threat Model 3
  • 4. 2/24/2012 The Dolev-Yao Threat Model 1. Alice generates K at random, creates {K}KAT, and sends to Trent: Alice, Bob, {K}KAT 2. Trent finds keys KAT, KBT, decrypts {K}KAT to reveal K, creates {K}KBT and sends to Bob: Alice, Bob, {K}KBT 3. Bob decrypts {K}KBT to reveal K, forms and sends to Alice: {Hello Alice, I'm Bob!}K . The Dolev-Yao Threat Model Problem: K created by Alice is not strong enough  Bob is unhappy about this ƒNew protocol: “Session key from Trent” 4
  • 5. 2/24/2012 An attack The Dolev-Yao Threat Model This attack will only succeed if Malice is a legitimate user known to Trent  a realistic assumption – an insider attacker is often more of a threat than outsiders  A fix: 1. Alice sends to Trent: Alice, {Bob}KAT; 5
  • 6. 2/24/2012 The Dolev-Yao Threat Model  Another attack 1. Alice sends to Trent: Alice, {Bob}KAT; 1. Malice("Alice") sends to Trent: Alice, {Malice}KAT The Dolev-Yao Threat Model Instead, Malice can alter the message from Trent to Alice (message line 2 in Protocol "Session Key From Trent) into the following:  Malice("Trent") sends to Alice: {K'}KAT The Dolev-Yao Threat Model Malice can alter some protocol messages without detection. This suggests that the protocol needs a security service which can guard against tampering of messages.  This brings us to the following security service “Protocol with message authentication” 6
  • 7. 2/24/2012 Protocol with Message Authentication Malice has always been able to alter some protocol messages without detection  None of the protocols designed so far has provided any cryptographic protection against message alteration.  Thus, one way to fix these protocols is to provide such protection Protocol with Message Authentication The protection should enable legitimate principals who have the right cryptographic keys to detect any unauthorized alteration of any protected protocol messages.  Such protection or security service is called message authentication (is also called data integrity) Protocol with Message Authentication We observe that Malice‟s alteration of the protocol messages has caused the following two effects:  a session key is shared between wrong principals  a wrong session key get established  message authentication protection should provide a cryptographic binding between the session key to be established and its intended users. 7
  • 8. 2/24/2012 Protocol with Message Authentication  This lead to a new protocol: “Message Authentication”, where the identities of Alice and Bob are included in the encrypted message parts sent by Trent. Perfect encryption for message authentication service  Perfect Encryption with Notation {M}K (for message authentication service) iii) Without the key K, even with the knowledge of the plaintext M, it should be impossible for someone to alter {M}K without being detected by the recipient during the time of decryption 8
  • 9. 2/24/2012 Attack on Protocol "Message Authentication" Problem: message replay attack. ƒMalice intercepts Alice's request, then:  1. Alice sends to Malice(“Trent”)  2. Malice(“Trent”) sends to Alice: {Bob,K'}KAT ,{Alice,K'} KBT ƒTwo ciphertext blocks containing K' are a replay of old messages which Malice has recorded from a previous run of the protocol (between Alice and Bob) Attack on Protocol "Message Authentication" This attack will cause Alice & Bob to reuse the old session key K„ ƒSince K' is old, it may be possible for Malice to have discovered its value Protocol “challenge-response"  Using this method Alice will generate a new random number NA at the start of the protocol and send this to Trent with the request for a new session key The random number NA created by Alice for enabling the challenge-response mechanism is called a nonce which stands for a number used once 9
  • 10. 2/24/2012 Protocol “challenge-response"  An attack on the Needham-Schroeder symmetric key authentication protocol:  Bob thinks he is sharing a new session key with Alice while actually the key is an old one and may be known to Malice 10
  • 11. 2/24/2012 Solution A Protocol Using Public-key Cryptosystems  Called the Needham-Schroeder Public- key Authentication Protocol  Alice public key is KA, Alice private key is K-1A 11
  • 12. 2/24/2012 A Protocol Using Public-key Cryptosystems An attack on public key authentication protocol  Found after 17 years  Result: Bob thinks he is sharing secrets NA, NB with Alice while actually sharing them with Malice  Method: Malice makes use of Alice as she is trying to establish a connection with him A Protocol Using Public-key Cryptosystems  Malice may ask for a session key and Bob may believe that this request is from Alice ƒThen, an example if Bob is a bank, Malice(“Alice”) sends to Bob the following command:  { NA, NB, Transfer 5000$ from my account to Malice's“}KB 12
  • 13. 2/24/2012 A Protocol Using Public-key Cryptosystems It is fairly easy to change the protocol so as to prevent the attack. If we include the responder's identity in message 6 of the protocol  2-6. Bob sends to Malice("Alice"): {Bob, NA, NB}KA A Protocol Using Public-key Cryptosystems  This is what we are using nowadays 13