blended cryptography
play

Blended Cryptography: Public Key Infrastructure for Devices that - PowerPoint PPT Presentation

Blended Cryptography: Public Key Infrastructure for Devices that dont Public key Phillip Hallam-Baker Principal Scientist VeriSign Inc. Small is not beautiful Not When you write the code PIC 16F88 368 bytes RAM 4K Word ROM 20MHz


  1. Blended Cryptography: Public Key Infrastructure for Devices that don’t Public key Phillip Hallam-Baker Principal Scientist VeriSign Inc.

  2. Small is not beautiful

  3. Not

  4. When you write the code

  5. PIC 16F88 368 bytes RAM 4K Word ROM 20MHz RS232/485 serial i/f 1kWh in 2,000 years

  6. <$1 (In quantity)

  7. The situation • Fact: Can’t do Public Key – No, really, it can’t • Fact: Can’t use bigger chip – Can’t grow out of the problem • Myth : Cannot do PKI – Just have to do the PKI elsewhere

  8. Why PKI?

  9. Automated Administration

  10. SCADA

  11. Delegated Key Agreement Prob SCADA Service e Device ID Certificate Device ID Master Secret Master Secret Shared Shared Secret Secret Nonces

  12. Mobile [User] Device • Public Key Capable • Limited Storage

  13. Device Authentication ≠ User Authentication

  14. Transparent TLS Authentication Web Server Client [SSL Cert] [Master Key] Radius Shared Secret = MAC (ServerID, Master Key) ServerID = H(Public Key) or H(Issuer + Domain name) or EV-ID

  15. Strong Authentication Credentials • Implement TTLSA in microchip – Does not require public key

  16. Traditional Approach • Use public key to do all the interesting stuff – Use symmetric key for bulk crypto only • Heavy number theory is impressively difficult – Get paper published at Crypto – No customer will ever accept it • Wait for the symmetric key guys to

  17. Blended Approach

  18. Public Key Establishes Context • If: – Party A knows the public key of Party B • Or if: – Party A knows the public key of Party C that has a symmetric key relationship with party B • Provides non-repudiation – (Whatever that might be)

  19. Symmetric Key does ‘exotic’ effects • Any random 128 value is a strong key – If k is a strong key then so is • H(k) • Mac (x, k) • Enc (x, k) • Enc (k, x)

  20. Conclusions • Every device that supports RS485 – Can support strong cryptography – Can leverage PKI • Even if the device itself can’t • Blended Cryptography allows exotic effects – Without exotic public key

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend