144551742010

download 144551742010

of 12

Transcript of 144551742010

  • 8/12/2019 144551742010

    1/12

  • 8/12/2019 144551742010

    2/12

    Conventional encryption toprovide confidentiality .

    Historically, the focus of cryptology has beenon the use of conventional encryption toprovide confidentiality.

    Authorization, Integrity, Digital signatures, andthe use of public-key encryption, have beenincluded in the theory only in the last severaldecades.

  • 8/12/2019 144551742010

    3/12

    Placement of EncryptionFunction

    The location of encryption function is neededto be decided if the encryption is to be used tocounter attacks on Confidentiality.

    First, we have to find out the potentiallocations of security attacks.

    Second, decide where to place the encryptionfunction.

  • 8/12/2019 144551742010

    4/12

    Potential Locations forConfidentiality Attacks.

    An attack can take place at any of thecommunications links.

    The communications links can be:

    - Cable (telephone, twisted pair, coaxial cable,or optical fiber).

    - Microwave links.- Satellite channels.

  • 8/12/2019 144551742010

    5/12

    Potential Locations forConfidentiality Attacks

    Invasive taps or inductive taps are used tomonitor electromagnetic emanation with bothTwisted pair and Coaxial cables.

    Neither type of tap is particularly useful withoptical fiber.

    Physically breaking the cable seriouslydegrades signal quality and it is thereforedetectable.

  • 8/12/2019 144551742010

    6/12

    Placement of Encryption Function

    There are two major approaches to encryptionplacement:

    1- Link encryption.

    2- End-to-end encryption.

  • 8/12/2019 144551742010

    7/12

    Key Distribution

    For conventional encryption to work, the twoparties to an exchange must share the samekey, and that key must be protected fromaccess by others.

    Frequent key changes are required. Therefore, the strength of cryptographic

    system relays on the key distributiontechnique.

  • 8/12/2019 144551742010

    8/12

    Key Distribution

    There are a number of ways to deliver the key:

    1- Physical delivery between two parties A,B.

    2- Third party physically delivered the key.3- A and B use used key to encrypt the newkey and transmit it to the other party.

    4- Using an encrypted connection to thirdparty, then the third party delivers a key onencrypted links to A and B.

  • 8/12/2019 144551742010

    9/12

    A Key Distribution Scenario One scenario to deploy the key distribution

    assumes that each user share a unique masterkey with the key distribution center (KDC).

    Let us assume that user A wishes to establish alogical connection with B and require a one timesession key to protect the data transmission overthe connection.

    A has a secret key ka, known only to itself and theKDC; similarly, B shares the master key k b with theKDC.

  • 8/12/2019 144551742010

    10/12

    A Key Distribution Scenario Steps:

    1- A issues a request to the KDC for a session key,the message includes the identity of A and B anda unique identifier N1 for this transaction.2- the KDC responds with a message encryptedusing Ka, the message includes two itemsintended for A:- the one time session key Ks to be used for thesession.- the original request message for matching.

  • 8/12/2019 144551742010

    11/12

    A Key Distribution Scenario

    Steps (Continue):

    And two items intended for B:

    - the one time session key, k s- An identifier of A IDA

    these two items are encrypted using k b

    3- A stores the session key for use in theupcoming session and forwards to B theinformation that originated at the KDC for B.

  • 8/12/2019 144551742010

    12/12

    A Key Distribution Scenario

    Steps (Continue): Because this information is encrypted with k b,

    it is protected. B now knows the session key k s , knows that the other party is A (from theIDA), and knows that the informationoriginated at the KDC.

    At this point, a session key has been securelydelivered to A and B, and they may begin theirprotected exchange.