Presented by: Ayush MTech ECE 192220002 Key Distribution • For symmetric encryption to work, two parties A and B, key distribution can be achieved in a number of ways, as follows: 1. A can select a key and physically deliver it to B. 2. A third party can select the key and physically deliver it to A and B. 3. If A and B have previously and recently used a key, one party can transmit the new key to the other, encrypted using the old key. 4. If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and B Key Management • One of the major roles of public-key encryption has been to address the problem of key distribution. There are actually two distinct aspects to the use of public-key cryptography in this regard: • The distribution of public keys • The use of public-key encryption to distribute secret keys Distribution of Public Keys • Public announcement • Publicly available directory • Public-key authority • Public-key certificates Public Announcement of Public Keys
Figure 10.1. Uncontrolled Public-Key Distribution
Publicly Available Directory
Figure 10.2. Public-Key Publication
Public-Key Authority Public-Key Certificates
Figure 10.4. Exchange of Public-Key Certificates
WiMAX • Acronym for Worldwide Interoperability for Microwave Access. • Based on Wireless MAN technology. • A wireless technology optimized for the delivery of IP centric services over a wide area. • A scalable wireless platform for constructing alternative and complementary broadband networks. • A certification that denotes interoperability of equipment built to the IEEE 802.16 or compatible standard. The IEEE 802.16 Working Group develops standards that address two types of usage models − • A fixed usage model (IEEE 802.16-2004). • A portable usage model (IEEE 802.16e). WiMAX - Security Functions • WiMAX systems were designed at the outset with robust security in mind. The standard includes state-of-the-art methods for ensuring user data privacy and preventing unauthorized access with additional protocol optimization for mobility. • Security is handled by a privacy sublayer within the WiMAX MAC. The key aspects of WiMAX security are as follow − • Support for Privacy • Device/user Authentication • Flexible Key-management Protocol • Protection of Control Messages • Support for Fast Handover