0 simple key managemen t for pim authen tication keys
play

0 Simple Key Managemen t for PIM Authen tication Keys - PowerPoint PPT Presentation

0 Simple Key Managemen t for PIM Authen tication Keys Thomas Hardjono Brad Cain Ba y Arc hitecture Lab oratory Nortel Net w orks 3 F ederal Steet Billerica, MA 01821 USA f thardjono,b cain g @ba ynet w orks.com 1


  1. 0 Simple Key Managemen t for PIM Authen tication Keys Thomas Hardjono Brad Cain Ba y Arc hitecture Lab oratory Nortel Net w orks 3 F ederal Steet Billerica, MA 01821 USA f thardjono,b cain g @ba ynet w orks.com

  2. 1 Simple Key Managemen t for PIM Keys � Key managemen t for a single PIM domain � In tro duce k ey managemen t en tit y called Domain Key (DKD) Distributor � The approac h relies on limited or \closed" usage of public k ey cryptograph y � Only PIM en tities kno w certain public k eys (eg. P K dk d of DKD). � Notation:

  3. 2 ( P ) denotes Public-Key and Secret-Key pair K ; S K { (asymmetric) denotes symmetric k ey K { Square brac k ets [ ] denote digital-signature / { authen tication (asymmetric/symmetric) Curly brac k ets f g denote encryption { (asymmetric/symmetric) is ciphertext C {

  4. Assigmen t of Man ual Dissemination of Dissemination of Dissemination of Primary Keys con�guration P K K K bsr r p eq DKD ( P ) [ P ] f K g f K g K K ; S K K eq dk d dk d bsr r p eq S K S K S K dk d r pbsr dk d P K P K bsr bsr ( P ) K K ; S K r p r pbsr r pbsr BSR K P K (as ab o v e) (as ab o v e) (as ab o v e) eq dk d ( P ) ( P ) K ; S K K ; S K bsr bsr bsr bsr K ( P K ; S K ) r p r pbsr r pbsr CRPs K P K (as ab o v e) (as ab o v e) (as ab o v e) eq dk d P K bsr K r p Other (as ab o v e) Drop (as ab o v e) K P K eq dk d PIM routers P K Message(?) bsr

  5. 3 Rek eying K r p � Assume DKD generates new k ey (Old k ey is ) K K r p 2 r p 1 � DKD encrypts: = f K g C r p r p 2 S K dk d � DKD further encrypts: = f C g C C r p r p K r p 1 � Unicast C C to BSR and RP/CRPs or m ulticast to r p sp ecial group

  6. 4 Rek eying K eq � Assume DKD generates new k ey (Old k ey is ) K K eq eq 2 1 � DKD encrypts: = f K g C eq eq 2 S K dk d � DKD further encrypts: = f C g C C eq eq K eq 1 � Multicast to sp ecial group

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend