Multicast Security Group Key Management Architecture - - PowerPoint PPT Presentation

multicast security group key management architecture
SMART_READER_LITE
LIVE PREVIEW

Multicast Security Group Key Management Architecture - - PowerPoint PPT Presentation

Multicast Security Group Key Management Architecture draft-ietf-msec-gkmarch-07.txt Internet Security Tobias Engelbrecht Agenda Introduction Requirements of a GKMP Design of the GKMA Rekey Protocol Group Security Association


slide-1
SLIDE 1

Multicast Security Group Key Management Architecture

draft-ietf-msec-gkmarch-07.txt Internet Security Tobias Engelbrecht

slide-2
SLIDE 2

MSEC Group Key Management Architecture

Agenda

Introduction Requirements of a GKMP Design of the GKMA Rekey Protocol Group Security Association Security Considerations

slide-3
SLIDE 3

MSEC Group Key Management Architecture

Introduction

Defines a common architecture and design for group key-management protocols (GKMP) Examples:

video broadcast multicast file transfers

slide-4
SLIDE 4

MSEC Group Key Management Architecture

Requirements of a Group Key Management Protocol (GKMP)

slide-5
SLIDE 5

MSEC Group Key Management Architecture

Requirements of a GKMP

A group key management protocol (GKMP)

supports protected communication between members of a secure group helps to ensure that only members of a secure group gain access to group data (by gaining access to group keys) and can authenticate group data.

slide-6
SLIDE 6

MSEC Group Key Management Architecture

Requirements of a GKMP

Members receive security associations (SA) The group owner may define and enforce group membership, key management, data security and other policies Keys have a predetermined lifetime Key material should be delivered securely to the members of the group

slide-7
SLIDE 7

MSEC Group Key Management Architecture

Requirements of a GKMP

The key-management protocol should be secure against replay and DoS attacks The protocol should facilitate addition and removal of group members The key management protocol should provide a mechanism to securely recover from a compromise of the key material …

slide-8
SLIDE 8

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

slide-9
SLIDE 9

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

The goal of a GKMP is to securely provide the group members with an up-to-date data security association (Data SA) GKMA Protocols

De- / Registration Protocol Rekey Protocol

slide-10
SLIDE 10

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

Policy Infrastructure Authorization Infrastructure GCKS

DATA SECURITY PROTOCOL

Receiver(s)

REGISTRATION or DE-REGISTRATION PROTOCOL

Sender(s)

REGISTRATION or DE-REGISTRATION PROTOCOL REKEY PROTOCOL (OPTIONAL)

slide-11
SLIDE 11

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

GCKS S S/R R R R R R GROUP a joining member

A new member joins the group:

slide-12
SLIDE 12

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

Registration Protocol (RP) unicast protocol the GCKS and the member authenticates each other supplies the member with information to initialize a Data SA and a Rekey SA RP must ensure that the transfer is done

  • ver a Registration SA
slide-13
SLIDE 13

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

GCKS S S/R R R R R GROUP

A new member leaves the group:

a leaving member R

slide-14
SLIDE 14

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

Rekey Protocol multicast / unicast protocol from GCKS to members Rekey Messages are protected by the Rekey SA Rekey Messages update or change the Data SA and / or the Rekey SA

slide-15
SLIDE 15

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

Rekey Protocol Rekey messages are authenticated by

Source Authentication Group Based Authentication

ensures that all members receive the Rekey information in a timely manner

slide-16
SLIDE 16

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

Group keys

key encryption keys (KEKs) traffic encryption keys (TEKs)

Traffic Protection Keys (TPKs) denote the combination of a TEK and a traffic integrity key Registration and / or Rekey Protocol establish the keys

slide-17
SLIDE 17

MSEC Group Key Management Architecture

Design of the Group Key Management Architecture (GKMA)

GCKS (Group Controller / Key Server)

creates KEKs and TPKs performs authentication and authorization according to the group policy MAY present a credential to the group members signed by the group owner runs the Rekey protocol to push Rekey messages

slide-18
SLIDE 18

MSEC Group Key Management Architecture

Rekey Protocol

slide-19
SLIDE 19

MSEC Group Key Management Architecture

Rekey Protocol

Properties to ensure that all members receive the rekey information in a timely manner mechanism to re-sync keys avoid implosion problems

slide-20
SLIDE 20

MSEC Group Key Management Architecture

Rekey Protocol

Transport & Protection encrypted with the Group KEK authentication with MAC or digital signature sequence number protect against replay attacks reliable transport

slide-21
SLIDE 21

MSEC Group Key Management Architecture

Rekey Protocol

Implosion Reasons

all members contact the GCKS at the same time packet loss (feedback implosion)

Solutions

a member waits before sending an out-of sync

  • r feedback message

a member contacts an other server

slide-22
SLIDE 22

MSEC Group Key Management Architecture

Group Security Association (GSA)

slide-23
SLIDE 23

MSEC Group Key Management Architecture

Group Security Association (GSA)

consists of the Registration SA, Rekey SA (optional) and Data SA WITHOUT Rekey SA

Registration Protocol initializes and updates

  • ne or more DATA SA

WITH Rekey SA

Registration Protocol initializes the Rekey SA Data SA is initialized by the Rekey Protocol

slide-24
SLIDE 24

MSEC Group Key Management Architecture

Group Security Association (GSA)

Contents of the Rekey SA Policy Group Identity Key encryption keys Authentication Key Replay Protection Security Parameter Index (SPI)

slide-25
SLIDE 25

MSEC Group Key Management Architecture

Group Security Association (GSA)

Contents of the Data SA Group Identity Source Identity Traffic Protection Keys Sequence Numbers Security Parameter Index (SPI) Data SA Policy

slide-26
SLIDE 26

MSEC Group Key Management Architecture

Security Considerations

slide-27
SLIDE 27

MSEC Group Key Management Architecture

Security Considerations

authenticated key exchange techniques limit the effects of man-in-the-middle and connection-hijacking attacks sequence numbers and low-computation message authentication techniques can be effective against replay and reflection attacks cookies can reduce the effects of denial of service attacks

slide-28
SLIDE 28

MSEC Group Key Management Architecture

Security Considerations

sharing of secrets among a group of members can cause problems the Registration protocol should be so good as the base protocol on which it is developed the Rekey protocol is new and has unkown risks associated with

slide-29
SLIDE 29

MSEC Group Key Management Architecture

Thanks for your attention Questions?