Title: Introduction%20to%20Cryptographic%20Key%20Management
1Introduction to Cryptographic Key Management
2Outline
- Context
- Definitions
- Description
- Principles
- Illustrations and Demonstrations
- Recommendations
3Context -- Cryptography is
- use of secret codes to hide and authenticate data
- suited to open and hostile environments
- broadly applicable
- portable
- composable
- can emulate any media or environment control
- arbitrarily strong
- effective
- efficient
4Context
- cost of crypto is low
- falling with the cost of computing
- relative strength is rising
- strong as we need it to be
- stronger than other security mechanisms
- strong link in the security chain
- robust, resilient, not likely to break
- very unlikely to collapse
- advantage is to the cryptographer
5Modern Cryptography - the great inventions
- automatic encoding and decoding
- the large independent key variable
- complexity-based encryption (DES)
- asymmetric key
- automatic key management
6Symmetric Key Cryptography
Out-of -channel exchange
7Key Management
- generation
- recording
- transcription
- distribution
- installation
- storage
- change
- disposition
- and control
8Key Management
- generation
- recording
- transcription
- distribution
- installation
- storage
- change
- disposition
- and control
9Key Management
- is very important
- must be rigorous and disciplined
- principal point of attack
- not intuitive
- easy to screw up
10Modern Key Management
- fully automated, (i.e., no manual operations)
- permits frequent key change (e.g., file, session,
message, transaction, or other data object) - increases the effective key length or security
- balances the interests in the key of multiple
parties - application of RSA
- and smart cards
- may be integrated or stand-alone
11Applications of Key Management
- increase effective strength
- compensate for limitations of algorithm
- involve multiple people in sensitive duties
- personal security environments
12Principles of Key Management
- No key may ever appear in the clear
- All keys must be randomly generated by a crypto
engine - Keys must be chosen evenly from the entire key
space - Must not have any (visible) structure
- Key-encrypting keys are separate from data keys
- Everything encrypted under a key-encrypting key
must originate within a crypto engine - Key management must be automated
13Asymmetric Key Cryptography
- key has two parts
- what is encrypted with one part may only be
decrypted with the other - only one part need be kept secret
- requires a minimum of prearrangement
14Public Key Issues
- public key need not be kept secret
- must be the right key
- i.e., association between public key and legal
person - encapsulated in a certificate
- signed by someone who knows
15Digital Envelope
BobsPrivate Key
BobsPublic Key
Bob
16Digital Signature
JohnsPrivate Key
JohnsPublic Key
17Characteristic DES
RSA Relative
Speed Fast
Slow Functions Used
Transposition Multiplication
Substitution
Key - length
56 bits 400-800
bits Least Cost Attack
Exhaustion Factoring
Cost of Attack
Centuries Centuries
Time to Generate Micro-seconds
Tens of Seconds a Key
Key Type Symmetric
Asymmetric
18Hybrid Cryptography
JanesPublic Key
JanesPrivate Key
Jane
19Key Management Systems and Protocols
- PGP
- RSA Secure
- Kerberos KDC
- Secure Socket Layer (SSL)
- XML Key Management System
- X509 Certificates/PKIX
- BBN SafeKeyper
- ISAKMP and Oakley
20PGP
- software
- used to encrypt files or messages
- under a block cipher (IDEA)
- generates the block cipher key
- uses RSA to exchange the block cipher key
- uses the block cipher to hide the private key
- uses an endorsement system to exchange public
keys - uses a passphrase to generate the key-hiding key
- If the passphrase is forgotten, files cannot be
recovered
21ViaCrypt PGP, Business Edition
- uses two levels of key-hiding key
- the one used to protect the private key is itself
encrypted twice. - once under the users pass-phrase
- once under a system of keys
- such that a specified number of parties must act
in concert to recover the key.
22- add-in to file manager
- encrypts files or directories
- on command
- or by default
- automatically
- prompts user for passphrase when needed
- support multi-party emergency management over-ride
23(No Transcript)
24(No Transcript)
25(No Transcript)
26Kerberos Key DistributionCenter
- Kerberos KDC is a trusted server
- that shares a secret with every entity in a
domain. - When two processes, A and B, want to talk,
- Kerberos generates a key
- and encrypts it twice, once under the secret
shared with each, and publishes it. - Each process uses its own secret to decrypt the
key so that they can talk to each other.
27KDC
Simplified Kerberos Schematic
Im fred. I want a ticket for payroll
2
3
Client (fred)
1, 4, 8
Server(payroll)
6
28Secure Socket Layer (SSL)
- API and protocol for clients to talk to servers
29(No Transcript)
30(No Transcript)
31(No Transcript)
32BBN SafeKeyper
- book-size hardware box with unique identity
- generates a private key/public key pair
- private key cannot ever be removed from the box
- box has three physical keys
- beneficial use of the key requires the box and
the physical keys - box contains a public key belonging to BBN
- publishes its own identity and public key under
the BBN public key - so that BBN can recognize it and certify it.
33BBN SafeKeyper Backup
- SafeKeyper can publish multiple parts of the
private key - encrypted in such a way
- that with a specied number of the parts
- another SafeKeyper box can reconstruct the
private key.
34BBN SafeKeyper Applications
- Certificate management support for Internet
Privacy Enhanced Mail - Exchange of work orders, purchase orders,
letters of credit, bids, proposals, or other
official documents - Software license distribution and usage control
- Electronic funds transfer
- Network and host sign-on authorization
- Detection of tampering with, or forgery of,
computer-based applications - Any place high integrity key storage is indicated
35Encryption in the Internet
36(No Transcript)
37Encryption in the Internet
38(No Transcript)