Chapter15 Key Management
Chapter15 Key Management
[Part 3]
Integrity, Authenticity, and Key
Management
Chapter 15
Key Management
Forouzan, B.A. Cryptography and Network Security (International Edition). United States: McGraw Hill, 2008.
Chapter 15 Objectives
15.2
m @ 2015/2016-1 1
SCSR3443 Cryptography 9-Dec-15
Chapter 15 Contents
15.1 Introduction
15.2 Symmetric-Key Distribution
15.3 Symmetric-Key Agreement: Diffie-Hellman
15.4 Summary
15.3
15.4
m @ 2015/2016-1 2
SCSR3443 Cryptography 9-Dec-15
15.5
Key Management
https://en.wikipedia.org/wiki/Key_management 15.6
m @ 2015/2016-1 3
SCSR3443 Cryptography 9-Dec-15
Chapter 15 Contents
15.1 Introduction
15.2 Symmetric-Key Distribution
15.3 Symmetric-Key Agreement: Diffie-Hellman
15.4 Summary
15.7
• Problems:
• The number of keys;
• The distribution of keys is another problem.
m @ 2015/2016-1 4
SCSR3443 Cryptography 9-Dec-15
• (Figure 15.1)
• A secret key is established between the KDC and each
members.
15.10
m @ 2015/2016-1 5
SCSR3443 Cryptography 9-Dec-15
Types of KDC
Hierarchical Multiple
Flat Multiple KDCs
KDCs
15.11
15.12
m @ 2015/2016-1 6
SCSR3443 Cryptography 9-Dec-15
Session Keys:
• A KDC creates a secret key for each member.
• This secret key can be used only between the member and
the KDC, not between two members.
Note
A session symmetric key between two parties
is used only once.
15.14
m @ 2015/2016-1 7
SCSR3443 Cryptography 9-Dec-15
Chapter 15 Contents
15.1 Introduction
15.2 Symmetric-Key Distribution
15.3 Symmetric-Key Agreement
• Diffie-Hellman
• Analysis of Diffie-Hellman
• Security of Diffie-Hellman
15.4 Summary
15.15
15.16
m @ 2015/2016-1 8
SCSR3443 Cryptography 9-Dec-15
• Sender
m @ 2015/2016-1 9
SCSR3443 Cryptography 9-Dec-15
R1 = g x mod p
R2 = g y mod p
m @ 2015/2016-1 10
SCSR3443 Cryptography 9-Dec-15
Bob
• Both have reached the
same value without Bob K = g xy mod p
knowing the value of x and
without Alice knowing the
value of y.
Alice
K = g xy mod p
15.21
m @ 2015/2016-1 11
SCSR3443 Cryptography 9-Dec-15
Assoc. Prof. Mazleena Salleh, Cryptography and Network Security, 2014/2015-Semester 2. 15.23
Exercise 15.2: Alice and Bob who wish to swap keys agree on p = 353
and g = 3. Assume that Alice and Bob choose the
private key as x = 97 and y = 233 respectively.
Assoc. Prof. Mazleena Salleh, Cryptography and Network Security, 2014/2015-Semester 2. 15.24
m @ 2015/2016-1 12
SCSR3443 Cryptography 9-Dec-15
m @ 2015/2016-1 13
SCSR3443 Cryptography 9-Dec-15
(Continued)
Analysis of Diffie-Hellman:
• The DH concept is simple but elegant.
• The secret key between Alice and Bob is made of three
parts: g, x, and y.
• However, 1/3 of the key is public: g.
• The other 2/3 of the key must be added by Alice and Bob.
Note Although the key in Alice’s hand (g, y, and x) and the
key in Bob’s hand (g, x, and y), these two keys are the
same because gxy = gyx
Although the two keys are the same, Alice cannot find
the value of y used by Bob because the calculation is
done in modulo p.
m @ 2015/2016-1 14
SCSR3443 Cryptography 9-Dec-15
R1 = g x mod p R2 = g y mod p
Security of Diffie-Hellman:
• The DH key exchange is susceptible to two attacks:
DH Attacks
• Eve can intercept R1 and R2. • Eve does not have to find the value of
• If the x and y found from R1 x and y.
and R2, the symmetric key K • Eve can fool Alice and Bob by creating
can be calculated. two keys; one between herself and
Alice, one between herself and Bob.
(Figure 15.6)
m @ 2015/2016-1 15
SCSR3443 Cryptography 9-Dec-15
Chapter 15 Contents
15.1 Introduction
15.2 Symmetric-Key Distribution
15.3 Symmetric-Key Agreement: Diffie-Hellman
15.4 Summary
15.32
m @ 2015/2016-1 16
SCSR3443 Cryptography 9-Dec-15
15.34
m @ 2015/2016-1 17
SCSR3443 Cryptography 9-Dec-15
Chapter 15 Exercises
Forouzan,B.A. Cryptography and Network Security (International Edition). Singapore: McGraw-Hill, 2008. (page 463) 15.35
Chapter 15 Exercises
Forouzan,B.A. Cryptography and Network Security (International Edition). Singapore: McGraw-Hill, 2008. (page 463)
m @ 2015/2016-1 18
SCSR3443 Cryptography 9-Dec-15
Chapter 15 Exercises
Forouzan,B.A. Cryptography and Network Security (International Edition). Singapore: McGraw-Hill, 2008. (page 464)
m @ 2015/2016-1 19