CSE 5636 - Network Security CYB 5290 - Secure Data Communica Ons and Networks Public Key Cryptography I
CSE 5636 - Network Security CYB 5290 - Secure Data Communica Ons and Networks Public Key Cryptography I
Public Key
Infrastructure
Key-transport
Scheme
A symmetric key-wrapping algorithm wraps
(i.e., encrypts and integrity-protects) keying
material using a symmetric key-wrapping key
The wrapping operation is specified as:
C = KWA.WRAP(KWK, K, A) ,
And the unwrapping operation is specified as:
K = KWA.UNWRAP(KWK, C, A) ,
Where KWK is the key-wrapping key, K
is the plaintext keying material, A is
additional input, and C is the ciphertext
CSE
5636
/
CYB
5290
Die-Hellman Protocol
Alice and Bob have never met and share no secrets but need a shared key
Public info: p and g
p is a large prime number, g is a generator of Zp*
Zp* = {1, 2, , p-1}; x Zp*, a such that x = ga mod p
g can be generated using the methods specified in RFC 2631 and NIST SP 186-3
ga
mod
p,
p,
g
and
l
gb
mod
p
Shared
key
k
a
mod
p)b
=
gab
mod
p
Compute
k
=
(
g
Example for DH
Man-in-the-middle aUack
Generator
g
G : 256 hex digits or 1024 bits
1EA4748FCCB6EA00C20E8B58DD31BFDB45761F4AAD1693145
1317A0FD68DB89FA7D3C9C78966FC65815228323F87AC2C5B
B796C504FB1EFE5BDA24C7950214B8F50A41E14608BDA4A62
272483D6D88C3A82DD88A78EEB046695882FA38DAEAF7BB07
DBFCD3D272A7B9CFD42536D53CE325A17AD83BFBF40FC325
CAD69F25EF36
Generator g: in decimals
21517827566643959654712506169933867278799151500861664
71302013269299239763240750528525518766444586454021369
51357836625109998539894817291915868585512905817214775
72011739753867405902376527168121378707507894136914243
30800114409872561249704632585164484785869308940580496
8619243420583551652929775203283262478085942
l: 1023
a
Example
a
and
g
mod
p
Private Key a: 1024 bits
10421657F1FAA5C6F4DC3C908E6CBC792B7DFE9D267
F2D5214ED1CC6C351C4228C003989AB8682C241A5CD
F466D975F27FAC6D2C6B458D66BD699D52F752A6FD4
3E26A5B648BDBEFDB1A4B3EC724CEE027AC37C6CB5
72F7677E006C64FD0E40EA52B972B91EAA557F7474F2
96CEA8AB86F26CA80B791CF66AD5C9CDE396CAD99
PublicKey ga mod p : 1024 bits
3BBBAF40F8989F0C5DD66F9F2817E309D5AE263C089
7BFA1EFB45746ED7D991C1F1054B83BB911CCEEAC4
8D24D66A5EE4F24F9858950E1AE3088C815DB67F66E
97005501856C62B9C6A92252C8668786ED66E416A615
AEC39517ECE57FA0C5D1D3156A44F5FD6E9D364236E
B67B802E3A98EDF6DFBAFC43B9102F8E5CF76E347
CSE
5636
/
CYB
5290
Die-Hellman
Security
Discrete Logarithm (DL) problem (DLP):
given gx mod p, it is mathematically hard to extract x
There is no known efficient algorithm for doing this
Computational Diffie-Hellman (CDH) problem:
given gxmod p and gymod p, it is mathematically hard to compute gxy mod p
Unless x or y are given
DECISIONAL DIFFIE-HELLMAN (DDH) problem:
Given gxmod p and gymod p, it is mathematically hard to
distinguish the difference between gxy mod p and gr mod p where r is
random
ProperAes
of
Die-Hellman
Assuming the DDH problem is hard, the Diffie-Hellman
protocol is a secure key establishment protocol against
passive attackers
Eavesdropper cannot tell the difference between the
established key and a random value
Use gab mod p as the key for symmetric cryptography
Symmetric Crypto is approximately 1000 times
faster than modular exponentiation
Diffie-Hellman protocol does not provide authentication
Alices identity cannot be associated with ga mod p
IPsec uses the encrypted tunnel established by gab
mod p for exchanging certificates or passwords
CSE
5636
/
CYB
5290
Use of DH
RFC 2409 and RFC 4306 for The Internet Key Exchange (IKE)
To negotiate and provide authenticated keying material for security associations
in a protected manner
NIST SP 800-57
Recommendation for Key Management Part 1: General
SP 800-56A
Recommendation for pair-wise key establishment schemes using discrete
logarithm cryptography
Finite Field Cryptography (FFC) is DH using MODP
SP 800-77
The Diffie-Hellman (DH) group used to establish the secret keying material for
IKE and IPsec should be consistent with current security requirements
DH group 2 (1024-bit MODP) should be used for Triple DES and for AES with a 128-bit
key
For greater security, DH group 5 (1536-bit MODP) or DH group 14 (2048-bit MODP)
may be used for AES with 192 and 256-bit key
QuesAons?
Marco
Carvalho
Associate
Professor
[email protected]
(321)
674-8767