CS 683 - Security and Privacy Fall 2019
Instructor: Karim Eldefrawy
University of San Francisco
http://www.cs.usfca.edu/~keldefrawy/teaching /fall2019/cs683/cs683_main.htm
1
CS 683 - Security and Privacy Fall 2019 Instructor: Karim Eldefrawy - - PowerPoint PPT Presentation
CS 683 - Security and Privacy Fall 2019 Instructor: Karim Eldefrawy University of San Francisco http://www.cs.usfca.edu/~keldefrawy/teaching /fall2019/cs683/cs683_main.htm 1 Lecture 9 Authentication & Key Distribution 2 Where are we
Instructor: Karim Eldefrawy
University of San Francisco
http://www.cs.usfca.edu/~keldefrawy/teaching /fall2019/cs683/cs683_main.htm
1
2
3
entities/parties
4
a) Alarm clock b) Initial start or c) Receive message(s) from other(s)
5
achieve the stated goal of the protocol, e.g.,:
protocol with B
6
Trusted Third Party (TTP)
7
assurance of the other’s identity, but not vice versa
assurance of each other’s identity
8
9
Examples:
Has user’s secrets Doesn’t Send secret
TTP
Peer Or Server
browser software, etc.
cryptographic operations on behalf of a user).
10
11
12
voiceprint, keystroke timing, signature (shape or pressure), etc.
13
(e.g., exema)
affecting skin condition …
14
15
16
recognizing shapes of signatures
17
18
89458920 display power Id-based key (inside)
895980390409982
Serial # TTP/Server: secure & knows all secrets!
19
TTP/Server: secure & knows all secrets!
20
Protocol ap1.0: Alice says “I am Alice” in an open network, Bob can not “see” Alice, so Eve simply declares herself to be Alice
21
Protocol ap2.0: Alice says “I am Alice” in an IP packet containing her source IP address Eve can create a packet “spoofing” Alice’s address
22
Protocol ap3.0: Alice says “I am Alice” and sends her secret password to “prove” it.
playback attack: Eve records Alice’s packet and later plays it back to Bob
“I’m Alice”
Alice’s IP addr Alice’s password
OK
Alice’s IP addr
“I’m Alice”
Alice’s IP addr Alice’s password
23
Protocol ap3.1: Alice says “I am Alice” and sends her encrypted secret password to “prove” it. record and playback still works!
“I’m Alice”
Alice’s IP addr encrypted password
OK
Alice’s IP addr
“I’m Alice”
Alice’s IP addr encrypted password
24
Goal: avoid playback attack Nonce: number used once (R) ap4.0: to prove Alice “live”, Bob sends Alice nonce, R. Alice must return R, encrypted with shared secret key “I am Alice” R E(K,R)
Alice is live, and only Alice knows key to encrypt nonce, so it must be Alice!
ap4.0 requires shared symmetric key
ap5.0: nonces and public key cryptography
msg2=R
Using PKA, Bob verifies Alice’s signature of R in
and only Alice can compute signatures using SKA, Bob concludes that Alice is really there.
msg3=SIGN(SKA,R)
1. A à B: ”Hi Bob, it’s, me, Alice” 2. B à A: R (challenge) 3. A à B: E(K, R||B) (response)
26
Why not simply send E(K,R) in last message?
1.Eve à B: ”Hi Bob, it’s, me, Alice“ 2.B à A (Eve): R (challenge)
(response)
27
1. A à B: ”Hi Bob, it’s, me, Alice” 2. B à A: R 3. A à B: E(Kab,R) or E(K, R||B)
28
identifier in msg
1. A à B: ”Hi Bob, it’s, me, Alice” 2. B à A: Sb (challenge) increment Sb 3. A à B: E(K, Sb||B) (response) ■ No PRNG needed ■ Both A and B must remember Sb
29
Inclusion of date/time-stamp in message allows recipient to check for freshness (as long as time- stamp is protected by cryptographic means).
results in fewer messages in protocol But requires synchronized clocks… (Similar to the SecureID scenario)
30
31
Symmetric Key Problem:
establish shared secret key
network)?
Solution:
key distribution center (KDC) acts as intermediary between entities
Public Key Problem:
key (from a web site, email, disk, bboard), how does she know it is really Bob’s?
Solution:
authority (CA)
32
processes, applications)
session key for establishing a secure “session” with another user/program/host/entity
fashion (in person, by snail-mail, etc.)
33
(many users)
KA and KB for communicating with KDC
34
KB KX KY KZ KP KB KA KA KE
KDC