MIKEY: Multimedia Internet KEYing - - PowerPoint PPT Presentation

mikey multimedia internet keying
SMART_READER_LITE
LIVE PREVIEW

MIKEY: Multimedia Internet KEYing - - PowerPoint PPT Presentation

IETF-52, SLC Key Management for Multimedia Sessions <draft-carrara-mm-kmgt-sol-00.txt> <draft-blom-mm-kmgt-00.txt> MIKEY: Multimedia Internet KEYing <draft-ietf-msec-mikey-00.txt> Fredrik Lindholm 1 MIKEY IETF-52, SLC


slide-1
SLIDE 1

MIKEY Fredrik Lindholm IETF-52, SLC 1

MIKEY: Multimedia Internet KEYing

<draft-ietf-msec-mikey-00.txt>

Key Management for Multimedia Sessions <draft-carrara-mm-kmgt-sol-00.txt> <draft-blom-mm-kmgt-00.txt>

slide-2
SLIDE 2

MIKEY Fredrik Lindholm IETF-52, SLC 2

Outline

  • Background
  • Scenarios and goals
  • Overview and Changes
slide-3
SLIDE 3

MIKEY Fredrik Lindholm IETF-52, SLC 3

Background

Work split between MSEC WG an MMUSIC WG

  • Security part in MSEC WG (i.e. MIKEY)
  • Extensions to SDP and RTSP in MMUSIC WG

(draft-ietf-mmusic-kmgmt-ext-00.txt)

slide-4
SLIDE 4

MIKEY Fredrik Lindholm IETF-52, SLC 4

Scenarios (1)

Network

Bob Carol Alice

  • SIP call with small interactive “ad-hoc” groups
  • Heterogeneous environment
  • SRTP for media protection
slide-5
SLIDE 5

MIKEY Fredrik Lindholm IETF-52, SLC 5

Scenarios (2)

  • One-to-“a few”
  • Limited size of group
  • RTSP for set up
  • SRTP for media protection
slide-6
SLIDE 6

MIKEY Fredrik Lindholm IETF-52, SLC 6

Design goals and requirements

  • End-to-end security of the key exchange
  • Suitable for unicast and small groups
  • Simplicity
  • Efficiency

– low extra bandwidth consumption, – low computational workload, – small code size – time efficient

slide-7
SLIDE 7

MIKEY Fredrik Lindholm IETF-52, SLC 7

Changes

  • Protocol remains fairly unchanged
  • Different terminology (more aligned with the other

MSEC WG drafts)

  • Clarifications of

– goals, – scenarios, – message processing, – replay protection.

  • New definitions of payload formats
slide-8
SLIDE 8

MIKEY Fredrik Lindholm IETF-52, SLC 8

Specific Terminology

Audio stream 1 (SRTP) Video stream 1 (SRTP) Video stream 2 (SRTP) Audio stream 2 (SRTP)

Multimedia Crypto Session 1 Multimedia Crypto Session 2 Crypto Session A Crypto Session B Crypto Session C Crypto Session D

slide-9
SLIDE 9

MIKEY Fredrik Lindholm IETF-52, SLC 9

Overview

TEK derivation Crypto Session (Security Protocol) TEK(s) (+ crypto context) Multimedia Crypto Session SA Pre-Master Key (PMK) Key transport/ exchange Crypto Session ID

  • One pre-master key (PMK)

exchanged for each group of crypto sessions (i.e. multimedia crypto session)

  • The TEK is derived from the

exchanged key material

slide-10
SLIDE 10

MIKEY Fredrik Lindholm IETF-52, SLC 10

Key transport and exchange mechanisms

  • Pre-shared key based
  • Public key based
  • Diffie-Hellman based

Initiator Responder Encrypted PMK + attributes Verification message

Note: max 1 roundtrip Example: Key transport

slide-11
SLIDE 11

MIKEY Fredrik Lindholm IETF-52, SLC 11

Transporting MIKEY

  • Extension proposed to the Session Description

Protocol (SDP) and the Real Time Streaming Protocol (RTSP)

  • Can also be used in SIP (as SIP carries SDP)
  • MMUSIC work in progress

(MIKEY over home-pigeon?)

slide-12
SLIDE 12

MIKEY Fredrik Lindholm IETF-52, SLC 12

Replay protection

  • Timestamps prevent against replay attacks assuming

that:

– Each host has a clock which is at least "loosely synchronized" to the time of the other hosts. – If the clocks are to be synchronized over the network, a secure network clock synchronization protocol is be used.

slide-13
SLIDE 13

MIKEY Fredrik Lindholm IETF-52, SLC 13

Replay cache

Client Responder Server Initiator – tradeoff between storage and time synchronization (hash of msg + timestamp ≈ 40 bytes) – Client-Server: The client needs the cache, not the server – Client-Client: both need a replay cache (however, the workload could be assumed to be quite small) Initiator (responder) Responder (Initiator) Caller Callee

slide-14
SLIDE 14

MIKEY Fredrik Lindholm IETF-52, SLC 14

TEK derivation

P P P XOR tek_len tek_len PMK cs_id Key Split TEK Input: PMK - Pre-Master Key of length pmk_len, cs_id - crypto session id Output: TEK of desired length, tek_len (<= pmk_len)

slide-15
SLIDE 15

MIKEY Fredrik Lindholm IETF-52, SLC 15

The P function

HMAC HMAC HMAC tek_len key seed =

(“MIKEYtek”||cs_id||mcs_id)

HMAC HMAC HMAC Output: Concatenation

slide-16
SLIDE 16

MIKEY Fredrik Lindholm IETF-52, SLC 16

Final slide

  • Milestone
  • How to proceed?
  • Questions and Comments?