Lecture10 - Week 10
Lecture10 - Week 10
Lecturer:
Houshyar Honar Pajooh
Room Number : AE-3-28 (University Building - East)
Email: [email protected]
Sunway University | NET3106 Network Security | Houshyar Honar Pajooh | Aug 2022
SENSITIVE
NET3106 – Network Security
WEEK (10)
Cryptographic Key Management and
Distribution
Sunway University | NET3106 Network Security | Houshyar Honar Pajooh | Aug 2022
SENSITIVE
Contents
• Key Distribution and Management
– Symmetric Key Distribution using Symmetric Encryption
– Symmetric Key Distribution using Asymmetric Encryption
– Distribution of Public Keys
• Digital Certificates
– X.509 Certificates
Key Management
• Challenges
– How to share a secret key?
– How to obtain someone else’s public key?
– When to change keys?
– Link Encryption
▪ Encrypt data over individual links in network
▪ Each link end-point shares a secret key
▪ Decrypt/Encrypt at each device in path
▪ Requires all links/devices to support encryption
– End-to-End Encryption
▪ Encrypt data at network end-points (e.g. hosts or applications)
▪ Each pair of hosts/applications share a secret key
▪ Does not rely on intermediate network devices
Symmetric Key Distribution
• Given parties A and B, key distribution can be achieved in a number of
ways:
– A can select a key and physically deliver it to B
– A third party can select the key and physically deliver it to A and B
– If A and B have previously and recently used a key, one party can
transmit the new key to the other, encrypted using the old key
– If A and B each has an encrypted connection to a third party C, C
can deliver a key on the encrypted links to A and B
Figure 15.1 Key Distribution Between
Two Communicating Entities
Figure 15.2 Symmetric Key Hierarchy
Figure 15.3 Simple Use of Public-Key
Encryption to Establish a Session Key
Figure 15.4 Another Man-in-the-Middle
Attack
Figure 15.5 Public-Key Distribution of
Secret Keys
Figure 15.6 Uncontrolled Public-Key
Distribution
Figure 15.7 Public-Key Publication
Figure 15.8 Public-Key Distribution
Scenario
Figure 15.9 Exchange of Public-Key
Certificates
X.509 Certificates
• Part of the X.500 series of recommendations that define a directory service
– The directory is, in effect, a server or distributed set of servers that
maintains a database of information about users
• X.509 defines a framework for the provision of authentication services by the
X.500 directory to its users
– Was initially issued in 1988 with the latest revision in 2016
– Based on the use of public-key cryptography and digital signatures
– Does not dictate the use of a specific algorithm but recommends RSA
– Does not dictate a specific hash algorithm
• Each certificate contains the public key of a user and is signed with the
private key of a trusted certification authority
• X.509 defines alternative authentication protocols based on the use of
public-key certificates
Figure 15.10 X.509 Public-Key
Certificate Use
Certificates
Created by a trusted Certification Authority (CA) and have the following
elements:
• Version
• Serial number
• Signature algorithm identifier
• Issuer name
• Period of validity
• Subject name
• Subject’s public-key information
• Issuer unique identifier
• Subject unique identifier
• Extensions
• Signature
Figure 15.11 X.509 Formats
Obtaining a Certificate
• User certificates generated by a CA have the following characteristics:
– Any user with access to the public key of the CA can verify the user
public key that was certified
– No party other than the certification authority can modify the certificate
without this being detected
• Because certificates are unforgeable, they can be placed in a directory
without the need for the directory to make special efforts to protect them
– In addition, a user can transmit his or her certificate directly to other
users
Sunway University | NET3106 Network Security | Houshyar Honar Pajooh | Aug 2022
SENSITIVE