Key Management Protocols and Compositionality: John Mitchell Stanford
Key Management Protocols and Compositionality: John Mitchell Stanford
John Mitchell
Stanford
Key Management Options
Out of band
• Can set up some keys this way (Kerberos)
Public-key infrastructure (PKI)
• Leverage small # of public signing keys
Protocols for session keys
• Generate short-lived session key
• Avoid extended use of important secret
• Don’t use same key for encryption and signing
• Forward secrecy
KeyCenter
Shared
Client symmetric
key Ks
Server
Key Center generates session key Kcs and
distributes using shared long-term keys
Kerberos Protocol
Kc KDC
Ktgs
Kv
Service
Public-Key Infrastructure
Known public signature verification key Ka
Certificate
Certificate
Sign(Ka, Ks)
Authority
Ks
A gb mod p
B
ga mod p
A gb mod p B
Authentication?
Secrecy?
Replay attack
Forward secrecy?
Denial of service?
Identity protection?
IKE subprotocol from IPSEC
m1
A, (ga mod p)
Main mode
• Authentication by pre-shared keys
• Auth with digital signatures
• Auth with public-key encryption
• Auth with revised public-key encryption
Quick mode
• Compress number of messages
• Also four authentication options
Aug 2001 Position Statement
In the several years since the standardization of
the IPSEC protocols (ESP, AH, and ISAKMP/IKE),
… several security problems…, most notably IKE.
Formal and semi-formal analyses by Meadows,
Schneier et al, and Simpson, have shown … security
problems in IKE stem directly from its complexity.
It seems … only a matter of time before serious
*implementation* problems become apparent, again
due to the complex nature of the protocol, and the
complex implementation that must surely follow.
The Security Area Directors have asked the
IPSEC working group to come up with a
replacement for IKE.
How to study complex protocol
General Problem in Security
Divide-and-conquer is fundamental
• Decompose system requirements into parts
• Develop independent software modules
• Combine modules to produce required system
Common belief:
• Security properties do not compose
Protocol P1
A B : {message}KB
A B : KA-1
Protocol P2
B A : {message’}KA
B A : KB-1
STS0
cookie
STS0H
JFK (Just Fast Keying)
and RFK (our name)
were proposed
distribute
certificates
open
STSa STSaH
responder
JFK0 successors to IKE
m=gx, n=gy
k=gxy
protect
identities
symmetric
hash
RFK
Example