authentication and key distribution lei zhang oct 31 2011

16
Authentication and Key Distribution Lei Zhang Oct 31 2011

Upload: anissa-johnson

Post on 22-Dec-2015

219 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Authentication and Key Distribution Lei Zhang Oct 31 2011

Authentication and KeyDistribution

Lei ZhangOct 31 2011

Page 2: Authentication and Key Distribution Lei Zhang Oct 31 2011

Necessity of Key distribution

Page 3: Authentication and Key Distribution Lei Zhang Oct 31 2011

Classification of distributed Authentication protocl

Connection Connectionless

Peer process Interactive One-way

C/S Session Request/response

Page 4: Authentication and Key Distribution Lei Zhang Oct 31 2011

Design Principles of Authentication protocols

• Principal is suspicious about anyone else• Delivered secure msg should owns the

features of authenticity, integrity, freshness• Freshness to prevent replay attack• How to assure Freshness– Nonce– Clock-sync

• 3rd party auth server

Page 5: Authentication and Key Distribution Lei Zhang Oct 31 2011

Notation system

Page 6: Authentication and Key Distribution Lei Zhang Oct 31 2011

Classical Auth Protocol(1)

• Needham-Schroeder

Page 7: Authentication and Key Distribution Lei Zhang Oct 31 2011

Classical Auth Protocol(2)

• Denning-Sacco

Page 8: Authentication and Key Distribution Lei Zhang Oct 31 2011

Classical Auth Protocol(3)

• Otway-Rees ( sync – free)

Page 9: Authentication and Key Distribution Lei Zhang Oct 31 2011

The Kerberos Protocol

• Based on Needham-Schroder and Denning&Sacco

• C/S – oriented

Verification process at B

Page 10: Authentication and Key Distribution Lei Zhang Oct 31 2011

X.509

• Auth server free but Directory server needed

Page 11: Authentication and Key Distribution Lei Zhang Oct 31 2011

KSL

• Idea: to reduce the workload of the auth server

Page 12: Authentication and Key Distribution Lei Zhang Oct 31 2011

Currentwork

• Key distribution center(KDC) is a main protocol/server widely used for authentication.[1]

Page 13: Authentication and Key Distribution Lei Zhang Oct 31 2011

Currentwork(2)

• Quantum Key Distribution[2][3][4]– It enables two parties to produce a shared

random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the most well known example of the group of quantum cryptographic tasks.

Page 14: Authentication and Key Distribution Lei Zhang Oct 31 2011

Future work

• Authentication in the mobile peers• Security issues are endless• Quantum might be the trend

Page 15: Authentication and Key Distribution Lei Zhang Oct 31 2011

Reference

• [1] “Key distribution center”, Wikipedia, http://en.wikipedia.org/wiki/KDC

[2] “Quantum key distribution”, Wikipedia, http://en.wikipedia.org/wiki/Quantum_key_distribution [3] “From Bell’s Theorem to Secure Quantum Key Distribution”, Antonio Acín, Nicolas Gisin, and Lluis Masanes, Physical Review Letters [4] “The security of practical quantum key distribution”, Valerio Scarani, Helle Bechmann-Pasquinucci , Review of Modern Physics

Page 16: Authentication and Key Distribution Lei Zhang Oct 31 2011

Q&A