protocols ii
play

Protocols II Computer Security Lecture 12 David Aspinall School of - PowerPoint PPT Presentation

Protocols II Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 17th February 2011 Outline Introduction Shared-key Authentication Asymmetric authentication protocols Key exchange protocols Combined


  1. Protocols II Computer Security Lecture 12 David Aspinall School of Informatics University of Edinburgh 17th February 2011

  2. Outline Introduction Shared-key Authentication Asymmetric authentication protocols Key exchange protocols Combined key exchange and authentication Summary

  3. Outline Introduction Shared-key Authentication Asymmetric authentication protocols Key exchange protocols Combined key exchange and authentication Summary

  4. Introduction ◮ Previous lecture examined some simple protocols:

  5. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys

  6. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys

  7. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys ◮ Use of nonces

  8. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys ◮ Use of nonces ◮ This lecture expands and extends these concepts:

  9. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys ◮ Use of nonces ◮ This lecture expands and extends these concepts: ◮ Mutual authentication

  10. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys ◮ Use of nonces ◮ This lecture expands and extends these concepts: ◮ Mutual authentication ◮ Challenge response with public keys

  11. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys ◮ Use of nonces ◮ This lecture expands and extends these concepts: ◮ Mutual authentication ◮ Challenge response with public keys ◮ Authentication and key establishment

  12. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys ◮ Use of nonces ◮ This lecture expands and extends these concepts: ◮ Mutual authentication ◮ Challenge response with public keys ◮ Authentication and key establishment ◮ Digital certificates

  13. Introduction ◮ Previous lecture examined some simple protocols: ◮ Simple authentication using passwords, shared keys ◮ Challenge response with shared keys ◮ Use of nonces ◮ This lecture expands and extends these concepts: ◮ Mutual authentication ◮ Challenge response with public keys ◮ Authentication and key establishment ◮ Digital certificates ◮ More fun with nonces

  14. Outline Introduction Shared-key Authentication Asymmetric authentication protocols Key exchange protocols Combined key exchange and authentication Summary

  15. Reminder: shared-key unilateral authentication ◮ Minimal protocol using a random number : Message 1. S → A : N s Message 2. A → S : { N s , S } K as

  16. Reminder: shared-key unilateral authentication ◮ Minimal protocol using a random number : Message 1. S → A : N s Message 2. A → S : { N s , S } K as ◮ Minimal protocol using timestamps ; the “challenge” is implicit: Message 1. A → S : { T a , S } K as

  17. Reminder: shared-key unilateral authentication ◮ Minimal protocol using a random number : Message 1. S → A : N s Message 2. A → S : { N s , S } K as ◮ Minimal protocol using timestamps ; the “challenge” is implicit: Message 1. A → S : { T a , S } K as ◮ Nonces prevent replay of old messages

  18. Reminder: shared-key unilateral authentication ◮ Minimal protocol using a random number : Message 1. S → A : N s Message 2. A → S : { N s , S } K as ◮ Minimal protocol using timestamps ; the “challenge” is implicit: Message 1. A → S : { T a , S } K as ◮ Nonces prevent replay of old messages ◮ S is included inside the encrypted package to foil a reflection attack (impersonation of S to A).

  19. Reminder: shared-key unilateral authentication ◮ Minimal protocol using a random number : Message 1. S → A : N s Message 2. A → S : { N s , S } K as ◮ Minimal protocol using timestamps ; the “challenge” is implicit: Message 1. A → S : { T a , S } K as ◮ Nonces prevent replay of old messages ◮ S is included inside the encrypted package to foil a reflection attack (impersonation of S to A). ◮ Also, encrypting random strings can be risky: to prevent a chosen-text attack on the encryption scheme in the first case, A may include another random number in the encrypted package.

  20. Shared-key mutual authentication ◮ This protocol achieves mutual authentication using shared keys and nonces: Message 1. S → A : N s Message 2. A → S : { N s , N a , S } K as Message 3. S → A : { N a , N s } K as

  21. Shared-key mutual authentication ◮ This protocol achieves mutual authentication using shared keys and nonces: Message 1. S → A : N s Message 2. A → S : { N s , N a , S } K as Message 3. S → A : { N a , N s } K as ◮ The second nonce N a in message 2 serves both as a challenge for message 3 and to prevent chosen-text attacks. On receiving message 2, S checks N s was the nonce he issued in message 1, and that his name S is included in the encrypted package. He also recovers N a to send in message 3.

  22. Shared-key mutual authentication ◮ This protocol achieves mutual authentication using shared keys and nonces: Message 1. S → A : N s Message 2. A → S : { N s , N a , S } K as Message 3. S → A : { N a , N s } K as ◮ The second nonce N a in message 2 serves both as a challenge for message 3 and to prevent chosen-text attacks. On receiving message 2, S checks N s was the nonce he issued in message 1, and that his name S is included in the encrypted package. He also recovers N a to send in message 3. ◮ Mutual authentication may be obtained by running unilateral authentication twice, but that achieves something slightly weaker: the two authentications are not logically linked by the protocol (TOCTOU).

  23. Outline Introduction Shared-key Authentication Asymmetric authentication protocols Key exchange protocols Combined key exchange and authentication Summary

  24. Challenge-response with PK decryption ◮ Designing public-key based protocols is also subtle. For example, it’s important not to use a key-pair used for authentication for other purposes, since combining usages can compromise security. ◮ First PK approach: Alice demonstrates knowledge of a private key by decrypting a challenge . Message 1. S → A : h ( N s ) , S, { N s , S } K a Message 2. A → S : N s

  25. Challenge-response with PK decryption ◮ Designing public-key based protocols is also subtle. For example, it’s important not to use a key-pair used for authentication for other purposes, since combining usages can compromise security. ◮ First PK approach: Alice demonstrates knowledge of a private key by decrypting a challenge . Message 1. S → A : h ( N s ) , S, { N s , S } K a Message 2. A → S : N s ◮ Server Sam invents a nonce N s , and challenges Alice to discover it.

  26. Challenge-response with PK decryption ◮ Designing public-key based protocols is also subtle. For example, it’s important not to use a key-pair used for authentication for other purposes, since combining usages can compromise security. ◮ First PK approach: Alice demonstrates knowledge of a private key by decrypting a challenge . Message 1. S → A : h ( N s ) , S, { N s , S } K a Message 2. A → S : N s ◮ Server Sam invents a nonce N s , and challenges Alice to discover it. ◮ He sends a packet containing the nonce encrypted with her public key K a and a witness h ( N s ) , where h is a one-way hash function, which prevents chosen-text attacks.

  27. Challenge-response with PK decryption ◮ Designing public-key based protocols is also subtle. For example, it’s important not to use a key-pair used for authentication for other purposes, since combining usages can compromise security. ◮ First PK approach: Alice demonstrates knowledge of a private key by decrypting a challenge . Message 1. S → A : h ( N s ) , S, { N s , S } K a Message 2. A → S : N s ◮ Server Sam invents a nonce N s , and challenges Alice to discover it. ◮ He sends a packet containing the nonce encrypted with her public key K a and a witness h ( N s ) , where h is a one-way hash function, which prevents chosen-text attacks. ◮ Alice decrypts, and responds with N s only if the hash and name both match. When Sam sees his nonce N s returned, Alice is authenticated.

  28. Challenge-response with digital signatures ◮ Alice demonstrates knowledge of her signature private key by signing a challenge . Message 1. S → A : N s Message 2. A → S : N a , S, S A ( N a , N s , S ) ◮ Server Sam sends a nonce N s . Alice replies with a message containing her own nonce N a , the name S , and the signature for a message with both nonces and the name. She constructs the signature using her private signing function S A .

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend