key management in cryptography what is key management? why are we talking about key management? key...

20
Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Upload: cameron-ross

Post on 23-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key Management in Cryptography

What is key management?Why are we talking about key

management?Key management techniquesKey management life cycle

Page 2: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

What is key management?

Definition: Key management is the set of techniques and procedures supporting the establishment and maintenance of keying relationships between authorized parties.

A keying relationship is the state wherein communicating entities share common data(keying material) to facilitate cryptography techniques. This data may include public or secret keys, initialization values, and additional non-secret parameters.

Page 3: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

What is key management (cont.)?

Key management encompasses techniques and procedures supporting:

1. initialization of systems users within a domain; 2. generation, distribution, and installation of keying material; 3. controlling the use of keying material; 4. update, revocation, and destruction of keying material; and 5. storage, backup/recovery, and archival of keying material.

Page 4: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Why are we talking about key management?

Most attacks aimed at key management level rather than cryptographic algorithm itself?

Key management objectives, threats, and policy

Page 5: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Why are we talking about key management?

Objectives The objective of key management is to maintain

keying relationships and keying material in a

manner that counters relevant threats

In practice an additional objective is conformance to

a relevant security policy

Page 6: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Why are we talking about key management?

Threats

1. compromise of confidentiality of secret keys

2. compromise of authenticity of secret or public keys.

3. unauthorized use of public or secret keys

Page 7: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Why are we talking about key management?

Security policy Security policy explicitly or implicitly defines the

threats a system is intended to address

Security policy may affect the stringency of

cryptographic requirements, depending on the

susceptibility of the environment in questions to

various types of attack.

Page 8: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Why are we talking about key management?

Security policies also typically specify:1. practices and procedures to followed in carrying out

technical and administrative aspects of key

management, both automated and manual;

2. The responsibilities and accountability of each party

involved; and

3. The types of tecords to be kept, to support subsequent

reports or reviews of security-related events.

Page 9: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

Public-key vs. symmetric-key techniques

Primary advantages offered by public-key (vs. symmetric-key) techniques for applications related to key management include:

1. simplified key management

2. on-line trusted server not required

3. enhanced functionality

Page 10: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

Key management

a) Symmetric-key encryption

encryption decryption plaintextplaintext

symmetric key generator

secret key secret key

ciphertext

Page 11: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

b) public-key encryption

encryption decryption

asymmetric key pair generation

plaintext ciphertext plaintext

public key private key

secure channel (private and authentication)

secure channel (authentication only)

unsecured channel (no protection)

Page 12: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

Techniques for distributing confidential keys - Key layering and symmetric-key certificates Key layering:

1. master keys – keys at the highest level in the hierarchy

2. key-encrypting keys – symmetric keys or encryption public

keys used for key transport or storage of other keys

3. data keys – used to provide cryptographic operations on user

data

Page 13: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

symmetric-key certificates: Symmetric-key certificates provide a means for a KTC(Key

Translation Center) to avoid the requirement of either maintaining a secure database of user secrets (or duplicating such a database for multiple servers), or retrieving such keys from a database upon translation requests.

Page 14: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

Techniques for distributing public keys - Authentication trees Authentication trees provide a method for making public data available with verifiable authenticity, by using a tree structure in conjunction with a suitable hash function, and authenticating the root value. - Public-key certificates Public-key certificates are a vehicle by which public keys may be stored, distributed or forwarded over unsecured media without danger of undetectable manipulation

Page 15: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

- Two public-key systems

a) Identity-based system

b) asymmetric system with implicitly-certified public

keys

Page 16: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

Techniques for controlling key usage - Key separation and constraints on key usage Information that may be associated with cryptographic keys includes

both attributes which restrict their use, and other information of operational use.These include: 1. owner of key 2. validity period 3. key identifier 4. intended use 5. specific algorithm 6. system or environment of intended use, or authorized users of key 7. names of entries associated with key generation, registration, and certification

8. integrity checksum on key

Page 17: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

- Key separation and threat of key misuse The principle of key separation is that keys for different purposes should be cryptographically separated. The threat of key misuse may be addressed by techniques which ensure that keys are used only for those purposes pre-authorized at the time of key creation. Techniques for controlling use of symmetric keys The main technique is the use of control vectors: Control vectors provide a method for controlling the use of keys, by combing

the idea of key tags with the mechanism of simple key notarization.

Page 18: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management techniques

Key management involving multiple domains - Definition A security domain is defined as a (sub)system under the control of a single authority which the entities therein trust.

Trusted between two domains Two parties A and B, belonging to distinct security domains DA

and DB with respectively authorities TA and TB, may wish to communicate securely. This can be reduced to the requirement that A and B either: a) Share a symmetric key b) share trusted public keys

Page 19: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management life cycle

Key management life cycle Key management is simplest when all cryptographic

keys are fixed for all time. Cryptoperiods necessitate the update of keys.

Key update necessitates additional procedures and protocols, often including communications with third parties in public-key systems. The sequence of states which keying material progresses through overt its lifetime is called the key management life cycle. Life cycle stages may include:

Page 20: Key Management in Cryptography What is key management? Why are we talking about key management? Key management techniques Key management life cycle

Key management life cycle

1. user registration 2. user initialization 3. key generation 4. key installation 5. key registration 6. normal use 7. key backup 8. key update 9. archival 10. key de-registration and destruction 11. key recovery 12. key revocation