multicast security group key management architecture
play

Multicast Security Group Key Management Architecture - PowerPoint PPT Presentation

Multicast Security Group Key Management Architecture draft-ietf-msec-gkmarch-07.txt Internet Security Tobias Engelbrecht Agenda Introduction Requirements of a GKMP Design of the GKMA Rekey Protocol Group Security Association


  1. Multicast Security Group Key Management Architecture draft-ietf-msec-gkmarch-07.txt Internet Security Tobias Engelbrecht

  2. Agenda � Introduction � Requirements of a GKMP � Design of the GKMA � Rekey Protocol � Group Security Association � Security Considerations MSEC Group Key Management Architecture

  3. Introduction � Defines a common architecture and design for group key-management protocols (GKMP) � Examples: � video broadcast � multicast file transfers MSEC Group Key Management Architecture

  4. Requirements of a Group Key Management Protocol (GKMP) MSEC Group Key Management Architecture

  5. Requirements of a GKMP � A group key management protocol (GKMP) � supports protected communication between members of a secure group � helps to ensure that only members of a secure group gain access to group data (by gaining access to group keys) and can authenticate group data. MSEC Group Key Management Architecture

  6. Requirements of a GKMP � Members receive security associations (SA) � The group owner may define and enforce group membership, key management, data security and other policies � Keys have a predetermined lifetime � Key material should be delivered securely to the members of the group MSEC Group Key Management Architecture

  7. Requirements of a GKMP � The key-management protocol should be secure against replay and DoS attacks � The protocol should facilitate addition and removal of group members � The key management protocol should provide a mechanism to securely recover from a compromise of the key material � … MSEC Group Key Management Architecture

  8. Design of the Group Key Management Architecture (GKMA) MSEC Group Key Management Architecture

  9. Design of the Group Key Management Architecture (GKMA) � The goal of a GKMP is to securely provide the group members with an up-to-date data security association (Data SA) � GKMA Protocols � De- / Registration Protocol � Rekey Protocol MSEC Group Key Management Architecture

  10. Design of the Group Key Management Architecture (GKMA) Policy Authorization Infrastructure Infrastructure GCKS REGISTRATION or REGISTRATION or REKEY DE-REGISTRATION DE-REGISTRATION PROTOCOL PROTOCOL PROTOCOL (OPTIONAL) Sender(s ) Receiver(s ) DATA SECURITY PROTOCOL MSEC Group Key Management Architecture

  11. Design of the Group Key Management Architecture (GKMA) A new member joins the group: a joining member GCKS R R R R S S/R R GROUP MSEC Group Key Management Architecture

  12. Design of the Group Key Management Architecture (GKMA) Registration Protocol (RP) � unicast protocol � the GCKS and the member authenticates each other � supplies the member with information to initialize a Data SA and a Rekey SA � RP must ensure that the transfer is done over a Registration SA MSEC Group Key Management Architecture

  13. Design of the Group Key Management Architecture (GKMA) A new member leaves the group: a leaving member GCKS R R R R S S/R R GROUP MSEC Group Key Management Architecture

  14. Design of the Group Key Management Architecture (GKMA) Rekey Protocol � multicast / unicast protocol from GCKS to members � Rekey Messages are protected by the Rekey SA � Rekey Messages update or change the Data SA and / or the Rekey SA MSEC Group Key Management Architecture

  15. Design of the Group Key Management Architecture (GKMA) Rekey Protocol � Rekey messages are authenticated by � Source Authentication � Group Based Authentication � ensures that all members receive the Rekey information in a timely manner MSEC Group Key Management Architecture

  16. Design of the Group Key Management Architecture (GKMA) � Group keys � key encryption keys (KEKs) � traffic encryption keys (TEKs) � Traffic Protection Keys (TPKs) denote the combination of a TEK and a traffic integrity key � Registration and / or Rekey Protocol establish the keys MSEC Group Key Management Architecture

  17. Design of the Group Key Management Architecture (GKMA) GCKS (Group Controller / Key Server) � creates KEKs and TPKs � performs authentication and authorization according to the group policy � MAY present a credential to the group members signed by the group owner � runs the Rekey protocol to push Rekey messages MSEC Group Key Management Architecture

  18. Rekey Protocol MSEC Group Key Management Architecture

  19. Rekey Protocol Properties � to ensure that all members receive the rekey information in a timely manner � mechanism to re-sync keys � avoid implosion problems MSEC Group Key Management Architecture

  20. Rekey Protocol Transport & Protection � encrypted with the Group KEK � authentication with MAC or digital signature � sequence number protect against replay attacks � reliable transport MSEC Group Key Management Architecture

  21. Rekey Protocol Implosion � Reasons � all members contact the GCKS at the same time � packet loss (feedback implosion) � Solutions � a member waits before sending an out-of sync or feedback message � a member contacts an other server MSEC Group Key Management Architecture

  22. Group Security Association (GSA) MSEC Group Key Management Architecture

  23. Group Security Association (GSA) � consists of the Registration SA, Rekey SA (optional) and Data SA � WITHOUT Rekey SA � Registration Protocol initializes and updates one or more DATA SA � WITH Rekey SA � Registration Protocol initializes the Rekey SA � Data SA is initialized by the Rekey Protocol MSEC Group Key Management Architecture

  24. Group Security Association (GSA) Contents of the Rekey SA � Policy � Group Identity � Key encryption keys � Authentication Key � Replay Protection � Security Parameter Index (SPI) MSEC Group Key Management Architecture

  25. Group Security Association (GSA) Contents of the Data SA � Group Identity � Source Identity � Traffic Protection Keys � Sequence Numbers � Security Parameter Index (SPI) � Data SA Policy MSEC Group Key Management Architecture

  26. Security Considerations MSEC Group Key Management Architecture

  27. Security Considerations � authenticated key exchange techniques limit the effects of man-in-the-middle and connection-hijacking attacks � sequence numbers and low-computation message authentication techniques can be effective against replay and reflection attacks � cookies can reduce the effects of denial of service attacks MSEC Group Key Management Architecture

  28. Security Considerations � sharing of secrets among a group of members can cause problems � the Registration protocol should be so good as the base protocol on which it is developed � the Rekey protocol is new and has unkown risks associated with MSEC Group Key Management Architecture

  29. Thanks for your attention Questions? MSEC Group Key Management Architecture

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend