You are on page 1of 6

Control NMaster Encrypled

Master Session ector session ke


Control
ector

Hashing

here
pust
eeryption
Function Function

Encople Session KE
esson Key

As a tirst step, the control vector Is passea thirough a hash lunction inat produces a

value whose length is equal to the encryption key length. In essence, a hash function maps
values from a larger range into a smaller range with a reasonably uniform spread. Thus, for
example, if umbers in the range I to 100 are hashed into numbers in the range I to 10,

upproximately 10% of the source values should map into each of the target values. The hash
value is then XORed with the master key to produce an output that

iswhere
used as sthehkev
e input
masteer for
keyencrvntine thesession
and 1s the session Key.
kev. hus
The sessJOn key 1s recovered in

plaintext by the reverse operation:


DX[KmBH]. E((Km DH], Ks)

Secret Key Distribution with Confidentiality and Authentication:


(EPCh I 0all

-2) EPU, IN, I N ) -

Initiator Responder

3 ) ELPUa, Na)

-ELPU EPR, K,)*


A Uses B's publie key to encrypt a message to B contarning an tdentifier of A (11)) and a

nonce (Ni), which is used to identify this transaction uniquely


B sends a message to A encrypted with PU, and containingAS nonce (Ni) as wel as a

new nonce generated by B (N;) Because only B could have decrypted message (1), the

presence of N in message (2) assures A that the correspondent is B

A returns Na encrypted using B's public key, to assure B that its correspondent is A.

A selects a secret key K, and sends M = EPU. EPR,. K.) to B. Encryption of this

message with B's public key ensures that only B can read it; encryption with A's private

key ensures that only A could have sent it.

B computes D(PU., D(PR», M)) to recover the secret key.


Fubiic announcement

Publicly available directory

Public-key authority
Public-key certificates
Public Announcement of Public Keys

he point punc-key enciyption s that the punic key pubic, hence


any
send his or her public key to uny other participunt, bruaudcast the key to
purticipunt can or
the
cumnunity at large. eg append PGP keys to emul messuges ur post to newa gruups or
i l list s major weakness is lorgery, anyone could pretend to be user A and send a public
key to another participant or broadcast such a public key. Until the forgery is discovered

ihey can masquerade as the claimed user


ublicly Available Directory

Can obain greater security by registering keyw with a publice directory

directory must be trusted with properties:

e autoity mantanms a dirciory with a mane, publac key) eniry tor cach

participant.
Each participant registers a public key with the directory authority
A participant may replace the existing key with a new one at any time because the
coresponding pervate key lhas been compromised in some way.

e a n s c o a asO ccess t e aurccoy cietronicay a r s p u r p e , secure

Public-Key
oommunication fmm.the.authoritv.to the.narticinant is mandatory
Authoritv:

Stronger security for public-key distribution can be achieved by providing tighter control
over the dastriDuiOn ol puniic keys trom tne directory

requires users to know the public key for the directory, and that they interact with

directory in real-time to obtain any desired public key securely.


Totally seven messages
are required.

li
Elliptic curve cryptography:
ECC addition is analog of modular multiplication in RSA
ECC repeated addition is analog of modular exponentiation
Need "hard" problem equivalent to discrete log
where Q,toP compute
=kP, o Is"easy belong to a prime curve
Q given k, P
o But "hard" to find k given Q, P
o Known as the discrete logarithm problem of clliptic curve
Version Signature algortn
Certilicate
algorithm3
identifier
Parameters

Signature
Serml Number Issuer Name
-.gorithm
algorithm
identifier
**
paramefers
This Update Date
Issuer Name

Period of hefore Next Update Date


validity not fter
Revoked user certificate serial #
Subject Name
Subject's gprithns. certificate revocation date

ubic key3 --PEEE --

info
Issuer Unque

Tdentifier
Subject Unique
Identifier Revoked user certilicate seral
- -- ---

Extensions certificate revocation date


aprithms Signature. --
signature parameters P
encrypted1 erypted

a) A.S09 Certificate (b) Certificate Revocation List

CACAS> = CA (V, SN, AI, CA, UCA, A, UA, Ap, TA)

UccV>>
VcU

Yee

WcC>
Xe<W>>
Ycc
XeeD> (ZHz«o

<A>» ZccB
Hobs

publickey ey

CA
infoemsation

de nf unsige
ertificate

C A p a key ith CAsplbc ky

Figure 14.14 Public-Key Certificate Use

LInfrastructure
Certifcate/CRI. refrieval
Kepstr ,

Certileton,
Registration
Certifenteauthority
publication revocatiotn reqqiest
CertiflcateCRI.
plkcation

CRI. suer certiflication


publlcatlon
ertnee
PKI

entities
lectronic Mail Security
Pretty Good Privacy
scheme
Cssion key u s c d in
symmetric encryplion
private key of userA, u s e d in public-key encryption scheme
PR
scheme
PUa public key of user A, u s e d in public-key encryption

EP= public-key encryption


DP public-key decrypton
EC = symmetric encryption

DC= symmetric decryption


hash function
eatonatio
compreNsion using algorithm tornat

RO conversion to raldix
oa A>

i i

ge .PaPCpplogphic Functions
LA-KDC: IDal
2. KDC=-A: EIG, |A,1M|EI6,[6,10A1|) 2 8-AUe 9M|EA,AM4
KDC-A EK,I0NIKIT|EIK,JD,&
B-A EIM,N A-B EIKD,IK, EIK,NJ)
5A-B EK,1A) 1. AB: E(K|IDAl| K,|| T%)||N
2. B A : N'|E(K,. N'a)
| Clock T| <
Al1 + Al2 3. A-B:
E(K, N')
One-Way Authentication

LA-ADC: D,ID
KDC-& EM,K D,MEM,[A|10|0
A-B EK,JA|D)JEK,M)
Key
distribution
center
KDC fir aesion key

C
O

***********
HOST HOST
Network

Figre 144 Automatic Key Diaribution for ConnectionOriented PYotocol

connection request,it generates the session key and delivers it to the two

appropriate SSMs,using a unique permanent key for each SSM.


4. The requesting SSM can now release the connection request packet, and a

connection is set up between the two end systems.


5. All user data exchanged between the two end systems are encrypted by their

respective SSMs using the onetime session kev.

You might also like