Network Security UNIT 2
Network Security UNIT 2
KEY MANAGEMENT
One of the major roles of public-key encryption has been to address the
problem of key distribution. Two distinct aspects to use of public key
encryption are present.
The distribution of public keys.
Use of public-key encryption to distribute secret keys.
2. The KDC responds with a message encrypted using Ka Thus, A is the only
one who can successfully read the message, and A knows that it originated at
the KDC. The message includes two items intended for A:
The one-time session key, Ks, to be used for the session
The original request message, including the nonce, to enable A to match this
response with the appropriate request
Thus, A can verify that its original request was not altered before reception by
the KDC and, because of the nonce, that this is not a replay of some previous
request. In addition, the message includes two items intended for B:
The one-time session key, Ks to be used for the session
These last two items are encrypted with Kb (the master key that the KDC shares
with B). They are to be sent to B to establish the connection and prove A's
identity.
3. A store the session key for use in the upcoming session and forwards to B the
information that originated at the KDC for B, namely, E (Kb, [Ks || IDA]).
Because this information is encrypted with Kb, it is protected from
eavesdropping. B now knows the session key (Ks), knows that the other party is
A (from IDA), and knows that the information originated at the KDC (because
it is encrypted using Kb). At this point, a session key has been securely
delivered to A and B, and they may begin their protected exchange.
5. Also using Ks, A responds with f(N2), where f is a function that performs
some transformation on N2 (e.g., adding one).
A Hybrid Scheme:
This scheme retains the use of a key distribution center (KDC) that
shares a secret master key with each user and distributes secret session
keys encrypted with the master key.
A public-key scheme is used to distribute the master keys. The following
rationale is provided for using this three-level approach:
Performance: There are many applications, especially
transaction-oriented applications, in which the session keys
change frequently. Distribution of session keys by public-key
encryption could degrade overall system performance because of
the relatively high computational load of public-key encryption
and decryption. With a three-level hierarchy, public-key
encryption is used only occasionally to update the master key
between a user and the KDC.
Backward compatibility: The hybrid scheme is easily overlaid
on an existing KDC scheme with minimal disruption or software
changes. The addition of a public-key layer provides a secure,
efficient means of distributing master keys. This is an advantage
in a configuration in which a single KDC serves a widely
distributed set of users.
In a public key cryptography, such as RSA, any user can send his/her key to
any other user or broadcast it to the group as shown in figure.
Step – 2: The authority responds with a message that is encrypted using the
authority’s private key, PRauth. Thus, A is able to decrypt the message using
the authority’s public key. Therefore, A is assured that the message
originated with the authority.
The message includes the following: B’s public key, PUb, which A can use
to encrypt messages destined for B. The original request used to enable A to
match this response with the corresponding earlier request and to verify that
the original request was not altered before reception by the authority. The
original timestamp given so A can determine that this is not an old message
from the authority containing a key other than B’s current public key.
Step – 3: A stores B’s public key and also uses it to encrypt a message to B
containing an identifier of A (IDA) and a nonce (N1), which is used to
identify this transaction uniquely.
Step – 4 & 5: B retrieves A’s public key from the authority in the same
manner as A retrieved B’s public key.
Step – 7: A returns N2, which is encrypted using B’s public key, to assure B
that its correspondent is A.
Public-Key Certificates
Step – 1: Any participant can read a certificate to determine the name and
public key of the certificate’s owner.
Step – 2: Any participant can verify that the certificate originated from the
certificate authority and is not counterfeit.
Step – 3: Only the certificate authority can create and update certificates.
X.509 Certificate:
X.509 is a digital certificate that is built on top of a widely trusted
standard known as ITU or International Telecommunication Union X.509
standard, in which the format of PKI certificates is defined.
X.509 digital certificate is a certificate-based authentication security
framework that can be used for providing secure transaction processing
and private information.
These are primarily used for handling the security and identity in
computer networking and internet-based communications.
The core of the X.509 authentication service is the public key certificate
connected to each user.
These user certificates are assumed to be produced by some trusted
certification authority and positioned in the directory by the user or the
certified authority.
These directory servers are only used for providing an effortless
reachable location for all users so that they can acquire certificates. X.509
standard is built on an IDL known as ASN.1.
With the help of Abstract Syntax Notation, the X.509 certificate format
uses an associated public and private key pair for encrypting and
decrypting a message.
Once an X.509 certificate is provided to a user by the certified authority,
that certificate is attached to it like an identity card. The chances of
someone stealing it or losing it are less, unlike other unsecured
passwords. With the help of this analogy, it is easier to imagine how this
authentication works: the certificate is basically presented like an identity
at the resource that requires authentication.
Format of X.509 Authentication Service Certificate:
Many protocols depend on X.509 and it has many applications, some of them
are given below:
User authentication:
1. Password-Based Authentication:
o Users provide a unique alphanumeric password associated with
their account.
o Weaknesses include susceptibility to password cracking, phishing,
and the challenge of remembering complex passwords.
2. Multi-Factor Authentication (MFA):
o Requires users to present two or more types of credentials from
different authentication factors.
o Factors include something you know (password), something you
have (smart card or mobile token), and something you are
(biometric data like fingerprint or iris scan).
3. Biometric Authentication:
o Involves the use of unique biological traits for identification, such
as fingerprints, retina scans, voice recognition, or facial
recognition.
o Enhances security by adding a physical aspect to authentication.
4. Smart Cards and Tokens:
o Users carry a physical device (smart card or token) that contains an
embedded chip or generates time-based codes.
o The device is used in conjunction with a PIN or password to
authenticate the user.
5. Single Sign-On (SSO):
o Allows a user to log in once and gain access to multiple systems
without being prompted to log in again for each system.
o Increases convenience but requires robust security measures to
protect against unauthorized access.
6. Certificate-Based Authentication:
o Involves the use of digital certificates issued by a certificate
authority (CA) to verify the identity of the user.
o Commonly used in Public Key Infrastructure (PKI) systems.
7. Time-Based Authentication:
o Authentication is valid only for a specific time period.
o Temporary codes generated by authentication apps or sent via SMS
are examples.
8. Knowledge-Based Authentication (KBA):
o Users answer questions based on personal information, such as
date of birth or favorite color.
o Often used as an additional layer of security.
9. Behavioral Authentication:
o Analyzes patterns of behavior, such as typing speed or mouse
movements, to verify the user's identity.
o Provides continuous authentication based on user behavior.
10.Adaptive Authentication:
o Adjusts the level of authentication required based on contextual
factors, such as the user's location, device, or behavior.
o Enhances security while providing a smoother user experience.
Mutual Authentication:
The protocols enable communicating parties to satisfy themselves
mutually about each other’s identity and to exchange session keys.
Central to the problem of authenticated key exchange are two issues:
Confidentiality: To prevent masquerade and to prevent
compromise of session keys, essential identification and session-
key information must be communicated in encrypted form. This
requires the prior existence of secret or public keys that can be
used for this purpose.
Timeliness: It is important because of the threat of message
replays. Such replays, at worst, could allow an opponent to
compromise a session key or successfully impersonate another
party. At minimum, a successful replay can disrupt operations by
presenting parties with messages that appear genuine but are not.
Some of the examples of replay attacks:
1. The simplest replay attack is one in which the opponent simply
copies a message and replays it later.
2. An opponent can replay a time stamped message within the valid
time window. If both the original and the replay arrive within
then time window, this incident can be logged.
3. As with example (2), an opponent can replay a time stamped
message within the valid time window, but in addition, the
opponent suppresses the original message. Thus, the repetition
cannot be detected.
4. Another attack involves a backward replay without modification.
This is a replay back to the message sender. This attack is
possible if symmetric encryption is used and the sender cannot
easily recognize the difference between messages sent and
messages received on the basis of content.
One approach to coping with replay attacks is to attach a sequence
number to each message used in an authentication exchange. A new
message is accepted only if its sequence number is in the proper order.
The difficulty with this approach is that it requires each party to keep
track of the last sequence number for each claimant it has dealt with.
Because of this overhead, sequence numbers are generally not used for
authentication and key exchange.
Instead, one of the following two general approaches is used:
Timestamps: Party A accepts a message as fresh only if the
message contains a timestamp that, in A’s judgment, is close
enough to A’s knowledge of current time. This approach requires
that clocks among the various participants be synchronized.
Challenge/response: Party A, expecting a fresh message from
B, first sends B a nonce (challenge) and requires that the
subsequent message (response) received from B contain the
correct nonce value.
One-Way Authentication:
One application for which encryption is growing in popularity is
electronic mail (email).
The very nature of electronic mail, and its chief benefit, is that it is not
necessary for the sender and receiver to be online at the same time.
Instead, the e-mail message is forwarded to the receiver’s electronic
mailbox, where it is buffered until the receiver is available to read it.
The “envelope” or header of the e-mail message must be in the clear, so
that the message can be handled by the store-and-forward e-mail
protocol, such as the Simple Mail Transfer Protocol (SMTP) or X.400.
However, it is often desirable that the mail-handling protocol not require
access to the plaintext form of the message, because that would require
trusting the mail-handling mechanism.
Accordingly, the e-mail message should be encrypted such that the mail-
handling system is not in possession of the decryption key.
Remote User-Authentication Using Symmetric Encryption:
Mutual Authentication:
An important application area is that of mutual authentication
protocols. Such protocols enable communicating parties to satisfy
themselves mutually about each other’s identity and to exchange
session keys.
To prevent masquerade and to prevent compromise of session keys,
essential identification and session-key information must be
communicated in encrypted form.
Suppress replay attack:
The Denning protocol requires reliance on clocks that are synchronized
throughout the network.
A risk involved is based on the fact that the distributed clocks can
become unsynchronized as a result of sabotage on or faults in the clocks
or the synchronization mechanism.
The problem occurs when a sender’s clock is ahead of the intended
recipient’s clock
An opponent can intercept a message from the sender and replay
it later when the timestamp in the message becomes current at
the recipient’s site
Such attacks are referred to as suppress-replay attacks
lists the following examples of replay attacks:
The very nature of electronic mail, and its chief benefit, is that it is
not necessary for the sender and receiver to be online at the same
time.
Kerberos Version 5 :