Unit 4
Unit 4
There are some important aspects of key management which are as follows −
Cryptographic keys are nothing but special pieces of data. Key management
refers to the secure administration of cryptographic keys.
Key management deals with entire key lifecycle as depicted in the following
illustration –
There are two specific requirements of key management for public key
cryptography.
o Secrecy of private keys. Throughout the key lifecycle, secret keys
must remain secret from all parties except those who are owner and
are authorized to use them.
o Assurance of public keys. In public key cryptography, the public keys
are in open domain and seen as public pieces of data. By default
there are no assurances of whether a public key is correct, with
whom it can be associated, or what it can be used for. Thus key
management of public keys needs to focus much more explicitly on
assurance of purpose of public keys.
Elements of PKI
A typical PKI includes the following key elements:
1) Certificate authority(CA) :
the CA issues certificate to a client and assist other users to verify the
certificate. The CA takes responsibility for identifying correctly the
identity of the client asking for a certificate to be issued, and ensures
that the information contained within the certificate is correct and
digitally signs it.
Key Functions of CA
2) Handshake Protocol:
Phase-1: In Phase-1 both Client and Server send hello-packets to each other.
In this IP session, cipher suite and protocol version are exchanged for security
purposes.
Phase-2: Server sends his certificate and Server-key-exchange. The server
end phase-2 by sending the Server-hello-end packet.
Phase-3: In this phase, Client replies to the server by sending his certificate
and Client-exchange-key.
Phase-4: In Phase-4 Change-cipher suite occurs and after this the Handshake
Protocol ends.
3) Change-cipher Protocol:
4) Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.
1. Clear Levels of Classification: Data and resources within the system are
categorized into different security levels based on their sensitivity and
importance to the organization. These levels typically include classifications such
as public, internal use only, confidential, and top-secret.
2. Access Control Policies: Strict access control policies are implemented to govern
the access rights of users or entities within the system. Access permissions are
granted based on the security clearance or authorization level of the user and the
classification level of the data they are trying to access.
3. Need-to-Know Principle: Access to information is restricted to only those
individuals or entities who have a legitimate need to know or access that
information to perform their job duties. This principle helps minimize the risk of
unauthorized access and data breaches.
4. Compartmentalization: Information is compartmentalized based on its
classification level, with higher classified information being segregated and
protected more rigorously than lower classified information. This segregation
helps contain the impact of security breaches and limits the exposure of sensitive
data.
5. Security Clearance Requirements: Users or personnel within the organization
undergo security clearance procedures to determine their level of access to
classified information. This may involve background checks, security training, and
signing confidentiality agreements.
6. Encryption and Data Protection: Data encryption techniques are often
employed to protect sensitive information, especially during transmission and
storage. Encryption helps safeguard data from unauthorized interception or
access, even if the security measures are breached.
7. Auditing and Monitoring: Continuous monitoring and auditing of access
activities are conducted to detect any unauthorized attempts or suspicious
behavior. Logs of access attempts and actions taken are maintained for
accountability and forensic purposes.
ANS:
o PGP stands for Pretty Good Privacy (PGP) which is invented by Phil Zimmermann.
o PGP was designed to provide all four aspects of security, i.e., privacy, integrity,
authentication, and non-repudiation in the sending of email.
o PGP uses a digital signature (a combination of hashing and public key encryption)
to provide integrity, authentication, and non-repudiation. PGP uses a
combination of secret key encryption and public key encryption to provide
privacy. Therefore, we can say that the digital signature uses one hash function,
one secret key, and two private-public key pairs.
o PGP is an open source and freely available software package for email security.
o PGP provides authentication through the use of Digital Signature.
o It provides confidentiality through the use of symmetric block encryption.
o It provides compression by using the ZIP algorithm, and EMAIL compatibility
using the radix-64 encoding scheme.