CNS Chapter 4
CNS Chapter 4
A third party can select the key and physically deliver it to A and
B
2
If A and B have previously and recently used a key, one party
could transmit the new key to the other, using the old key to
3 encrypt the new key
1) 2)
A B: IDA A B: IDA
B A: R1 B A: E(PUa, R2)
A B: E(PRa, R1) A B: R2
a) A requests a session key for use between A and B from the KDC. A
A service An
A realm Principal
or user instance
name name
name name
Authentication forwarding
Interrealm authentication
:
Key distribution using
asymmetric encryption
One of the major roles of public-key encryption is to address the
problem of key distribution
Public-key certificate
Consists of a public key plus a user ID of the key owner, with the whole
block signed by a trusted third party
Typically, the third party is a certificate authority (CA) that is trusted by
the user community, such as a government agency or a financial institution
A user can present his or her public key to the authority in a secure
manner and obtain a certificate
The user can then publish the certificate
Anyone needing this users public key can obtain the certificate and verify
that it is valid by way of the attached trusted signature
X.509 Certificates
ITU-T recommendation X.509 is part of the X.500 series of
recommendations that define a directory service
The standard does not dictate the use of a specific algorithm but
recommends RSA
Obtaining a users
certificate
User certificates generated by a CA have the following
characteristics:
Any user with access to the public key of the CA can
verify the user public key that was certified
No party other than the certification authority can
modify the certificate without this being detected
X<<C>>
Z<<Y>>Y<<V>>V<<W>>W<<X>>X<<C>>
Revocation of
certificates
Each certificate includes a period of validity
Includes:
Authority key identifier
Subject key identifier
Key usage
Private-key usage period
Certificate policies
Policy mappings
Certificate subject
and issuer attributes
These extensions support alternative names, in
alternative formats, for a certificate subject or
certificate issuer and can convey additional
information about the certificate subject to increase a
certificate users confidence that the certificate subject
is a particular person or entity
Includes:
Subject alternative name
Issuer alternative name
Subject directory attributes
Certification path
constraints
These extensions allow constraint specifications to be
included in certificates issued for CAs by other CAs
Includes:
Basic constraints
Name constraints
Policy constraints
Summary
Symmetric key distribution X.509 certificates
using symmetric encryption Certificates
X.509 Version 3
Kerberos
Version 4
Version 5