Sie sind auf Seite 1von 19

DATA ENCRYPTION

Chapter 10
Key Management;
Other Public-Key
Cryptosystems

Distribution of Public Keys


Several techniques have been proposed
for the distribution of public keys.
Public announcement
Publicly available directory
Public-key authority
Public-key certificates

Anokhi

Public Announcement
Any participant can send his or her
public key to any other participant or
broadcast the key to the community at
large (Figure 10.1).
Many users have adopted the practice
of appending their public key to
messages that they send to public
forums, such as USENET newsgroups
and Internet mailing lists.
Although anyone can forge such a
public announcement.
Anokhi

Publicly Available Directory


Maintaining a publicly available dynamic
directory of public keys.
Maintenance and distribution of the
public directory would have to be the
responsibility of some trusted entity or
organization (Figure 10.2).
The authority maintains a directory with a
{name, public key} entry for each
participant.
Each participant registers a public key with
the directory authority. Registration would
have to be in person or by some form of
Anokhi

Publicly Available Directory


A participant may replace the existing key
with a new one at any time, either because
of the desire to replace a public key that
has already been used for a large amount
of data, or because the corresponding
private key has been compromised in some
way.
Participants could also access the directory
electronically. For this purpose, secure,
authenticated communication from the
authority to the participant is mandatory.

Problems??
Obtain
Anokhi private key of authority
5

Public Announcement

Publicly Available Directory

Anokhi

Public-Key Authority
A central authority maintains a dynamic
directory
of
public
keys
of
all
participants.
In addition, each participant reliably
knows a public key for the authority,
with only the authority knowing the
corresponding private key.
Figure 10.3
Step 1-5 are not performed every time.
Concept of caching can be used
Anokhi

Anokhi

Public-Key Certificates
Use certificates that can be used by
participants to exchange keys without
contacting a public-key authority, in a
way that is as reliable as if the keys
were obtained directly from a public-key
authority.
A certificate consists of a public key plus
an identifier of the key owner, with the
whole block signed by a trusted third
party.
Typically, the third party is a certificate
authority,
such as a government
agency or
Anokhi
9

Public-Key Certificates
Any participant can read a certificate to
determine the name and public key of
the certificate's owner.
Any participant can verify that the
certificate
originated
from
the
certificate
authority
and
is
not
counterfeit.
Only the certificate authority can create
and update certificates.
Any participant can verify the currency
of the certificate.
Anokhi

10

Anokhi

11

Distribution of Secret Keys Using


Public-Key Cryptography
Simple Secret Key Distribution

Problems??
Man in the middle attack
Anokhi

12

Man in the middle attack


A form of active wire-tapping attack in
which the attacker intercepts and
selectively modifies communicated data
in order to masquerade as one or more
of
the
entities
involved
in
a
communication.
Attacker
E
can
compromise
the
communication in the following fashion
without being detected:
A generates a public/private key pair {PUa,
PRa} and transmits a message intended for
BAnokhi
consisting of PUa and an
identifier of A,
13

Man in the middle attack


E intercepts the message, creates its own
public/private key pair {PUe, PRe} and
transmits PUe||IDA to B.
B generates a secret key, Ks, and transmits
E(PUe, Ks).
E intercepts the message, and learns Ks by
computing D(PRe, E(PUe, Ks))
E transmits E(PUa, Ks) to A.

Anokhi

14

Secret Key Distribution with


Confidentiality and Authentication

Scheme
ensures
both
confidentiality
and
authentication in the exchange of a secret key.
Anokhi

15

A Hybrid Scheme
Key distribution center (KDC) that
shares a secret master key with each
user and distributes secret session keys
encrypted with the master key.
A public key scheme is used to
distribute the KDCs master keys.

Anokhi

16

10.2. Diffie-Hellman Key Exchange

Anokhi

17

10.2. Diffie-Hellman Key Exchange

Each side keeps the X value private &


makes the Y value publicly available to the
other side
Result is two sides have exchanged secret
value
Because
Xa and Xb are 18private attacker
Anokhi

Key Exchange Protocols

Problems??
Man in the middle attack
Anokhi

19

Das könnte Ihnen auch gefallen