ECS726-Week05 Cryptographic Protocols Key Management-P
ECS726-Week05 Cryptographic Protocols Key Management-P
Pasquale Malacaria
EECS, QMUL
Table of contents
1. Cryptographic Protocols
Analysing a simple protocol
Authentication and Key Establishment (AKE) protocols
2. Key Management
1
Cryptographic Protocols
protocols?
2
What is a cryptographic protocol?
5
Cryptographic protocol standards
6
Analysing a simple protocol
identifier!
9
Example Protocol 1: Analysis
B Protocol 1 analysis
• Data origin authentication of Alice’s reply : MAC
• Freshness of Alice’s reply : nonce
• Assurance Alice’s reply corresponds to Bob’s request
:
1 rB , nonce Bob generated for this run.
2 reply contains the identifier Bob.
• Protocol Assumptions
1 Bob has access to a source of randomness.
2 Alice and Bob already share a symmetric key K.
3 Alice and Bob agree on the use of a strong MAC
algorithm.
Protocol 1 meets the security goals and hence is a
suitable protocol to use in our simple application. 10
Example Protocol 2
11
Example Protocol 2: Analysis
13
Example Protocol 3
14
Example Protocol 3: reflection attack
B
(reflection attack): to prevent it include identifiers of
recipients in protocol messages
15
Example Protocol 4
16
Protocol 4 analysis
17
Example Protocol 5
18
Protocol 5 analysis
19
Protocol 5 analysis
20
Example Protocol 6
21
Example Protocol 6
Is protocol 6 correct?
22
Example Protocol 7
B
a session identifier
what is Ta?
23
Example Protocol 7
Is protocol 7 correct?
24
Analysing a simple protocol: Summary
25
AKE
26
Diffie-Hellman
the first protocol
27
Diffie-Hellman
28
Diffie-Hellman
29
Diffie-Hellman key agreement protocol
31
Diffie-Hellman toy example: security
33
Diffie-Hellman: the man in the middle attack
34
Diffie-Hellman: man in the middle
35
Diffie-Hellman: man in the middle
36
Diffie-Hellman: mitigating man in the middle
37
Diffie-Hellman: station to station
38
using public key certificates
40
Key length
41
Key hierarchy
B Not all keys are created equal: e.g. some keys are
used to create other shorter terms keys, also a key
guarding a keychain is more valuable than any other
key in the chain... Typically:
• top of the hierarchy are the master keys
• then keys encrypting keys
• then data keys (e.g. generated each time you login at
the bank)
42
Key hierarchy
B Not all keys are created equal: e.g. some keys are
used to create other shorter terms keys, also a key
guarding a keychain is more valuable than any other
key in the chain... Typically:
• top of the hierarchy are the master keys
• then keys encrypting keys
• then data keys (e.g. generated each time you login at
the bank)
43
Keys: A key distribution scenario
44
Keys: A key distribution scenario
45
Key distribution using public key encryption
46
Public key certificates
Public key certificates
47
Public key certificate
49
chain of trust
51
self-signed certificates
52
certificates
53
Questions?
Next week: Example Applications of
Cryptography.
53