key management

23
Key Management cryptography

Upload: sujata-regoti

Post on 07-Jan-2017

38 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Key management

Key Managementcryptography

Page 2: Key management

What is Key Management?

★Key management is the management of cryptographic keys in a cryptosystem.

★This includes dealing with the generation, exchange, storage, use, and replacement of keys.

★It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.

★It deals with entire key lifecycle.

Page 3: Key management

Why are we talking about key management?

★With the rise of Cybercrime, companies are investing significant amounts in Information Security in order to protect themselves, their employees and partners, but in the end that might not be enough.

★Threats:○ compromise of confidentiality of secret keys

○ compromise of authenticity of secret or public keys.

○ unauthorized use of public or secret keys

Page 4: Key management

Key management techniques

a)Symmetric-key encryption:

Page 5: Key management

Key management techniques

b)Public-key

encryption:

Page 6: Key management

Key LifeCycle

Page 7: Key management

Distribution of Public Keys

★ Public announcement

★ Publicly available directory

★ Public-key authority ★ Public-key

certificates

Page 8: Key management

Public announcement

Page 9: Key management

Publicly available directory

Page 10: Key management

Public-key authority

Page 11: Key management

Public-key certificates

Page 12: Key management

Diffie Hellman key exchange algorithm

★First public key algorithm proposed by Diffie and Hellman in

1976.

★Used only for key exchange

★Used In many commercial products

Page 13: Key management

All users agree on two parameters 1) large prime number q 2) primitive root a each user (eg. A) generates their key: chooses a secret key(number): xA < q

compute their public key: yA = a^xA mod q

public keys are stored in universal directory

Algorithm:

Page 14: Key management

shared session key for users A & B is KAB: KAB = axA.xB mod q = yA^xB mod q (which B can compute) = yB^xA mod q (which A can compute) KAB is used as session key in private-key encryption scheme between Alice and Bob

if Alice and Bob subsequently communicate, they will have the same key as before, unless they choose new public-keys Disadvantage: 1)man in the middle attack 2) authentication is needed

Algorithm:

Page 15: Key management

Digital Certificate

Page 16: Key management

Digital Certificate

★A digital identity document binding a public key to a specific

person or organization

★Certification Authorities are the digital world’s equivalent to

passport offices. They issue digital certificates and validate

holders’ identity and authority

Page 17: Key management

What is the Process of obtaining a certificate?

Page 18: Key management

How do You Obtain An Individual’s Public Key?

Page 19: Key management

How Digital Certificates are Used for Message Encryption?

Page 20: Key management

X.509 Certificates

Page 21: Key management

In Chrome, Settings->Advanced Setting->Manage Certificates

Page 22: Key management

In Wireshark, SSL packets captured

Page 23: Key management

Thank You