cns4 1
cns4 1
cns4 1
‘A’ wishes to establish a logical connection with ‘B’ and requires a one-time session key to
protect the data transmitted over the connection.
A has a master key, Ka, known only to itself and the KDC; similarly, B shares the master key
Kb with the KDC. The following steps occur
Step1: ’ A’ issues a request to the KDC for a session key to protect a logical connection to ‘B’.
The message includes the identity of A and B and a unique identifier, N1, for this
transaction, which we refer to as a nonce. The nonce may be a timestamp, a counter, or a
random number; the minimum requirement is that it differs with each request. Also, to
prevent masquerade, it should be difficult for an opponent to guess the nonce. Thus, a
random number is a good choice for a nonce.
Step2: The KDC responds with a message encrypted using Ka. Thus, A is the only one who
can successfully read the message, and A knows that it originated at the KDC.
■ The original request message, including the nonce, to enable A to match this response
with the appropriate request
Thus, A can verify that its original request was not altered before reception by the KDC and,
because of the nonce, that this is not a replay of some previous request
These last two items are encrypted with Kb (the master key that the KDC shares with B).
They are to be sent to B to establish the connection and prove A’s identity.
Step3:A stores the session key for use in the upcoming session and forwards to B the
information that originated at the KDC for B, namely, E(Kb,[Ks } IDA]). Because this
information is encrypted with Kb, it is protected from eavesdropping. B now knows the
session key (Ks), knows that the other party is A (from IDA), and knows that the information
originated at the KDC (because it is encrypted using Kb).
Step4: Using the newly minted session key for encryption, B sends a nonce, N2, to A.
Step5: Also, using Ks, A responds with f(N2), where f is a function that performs some
transformation on N2 (e.g., adding one).
The approach assumes that communication makes use of a connection- oriented end-to-end
protocol, such as TCP.
This approach is a session security module (SSM), which may consist of functionality at one
protocol layer, that performs end-to-end encryption and obtains session keys on behalf of
its host or terminal.
A decentralized approach requires that each end system be able to communicate in a secure
manner with all potential partner end systems for purposes of session key distribution.
2. B responds with a message that is encrypted using the shared master key. The response
includes the session key selected by B, an identifier of B, the value f(N1), and another nonce,
N2.
we may wish to define different types of session keys on the basis of use, such as
■ PIN-encrypting key, for personal identification numbers (PINs) used in electronic funds
transfer and point-of-sale applications
The control vector is cryptographically coupled with the key at the time of key generation at
the KDC
As a first step, the control vector is passed through a hash function that produces a value
whose length is equal to the encryption key length.
Key input = Km ⊕ H
1.A generates a public/private key pair {PUa, PRa} and transmits a message to B consisting
of PUa and an identifier of A, IDA.
2. B generates a secret key, Ks, and transmits it to A, which is encrypted with A’s public key
3. A computes D(PRa, E(PUa, Ks)) to recover the secret key. Because only A can decrypt the
message, only A and B will know the identity of Ks.
5. A and B can now securely communicate using conventional encryption and the session
key Ks. At the completion of the exchange, both A and B discard Ks.
6. No keys exist before the start of the communication and none exist after the completion
of communication.
Disadvantage:
1. A generates a public/private key pair {PUa, PRa} and transmits a message intended for B
consisting of PUa and an identifier of A, IDA.
2. D intercepts the message, creates its own public/private key pair {PUd, PRd} and
transmits PUd } IDA to B.
1. A uses B’s public key to encrypt a message to B containing an identifier of A(IDA) and a
nonce (N1), which is used to identify this transaction uniquely.
2. B sends a message to A encrypted with PUa and containing A’s nonce (N1) as well as a
new nonce generated by B (N2). Because only B could have decrypted message (1), the
presence of N1 in message (2) assures A that the correspondent is B.
3. A returns N2, encrypted using B’s public key, to assure B that its correspondent is A.
4. A selects a secret key Ks and sends M = E(PUb, E(PRa, Ks)) to B. Encryption of this
message with B’s public key ensures that only B can read it; encryption with A’s private key
ensures that only A could have sent it.
■ Public announcement
■ Public-key authority
■ Public-key certificates
Any participant can send his or her public key to any other participant or broadcast the key
to the community at large .
There are some major disadvantages like That is, some user could pretend to be user A and
send a public key to another participant or broadcast such a public key.
Maintenance and distribution of the public directory would have to be the responsibility of
some trusted entity or organization.
1. The authority maintains a directory with a {name, public key} entry for each participant.
2. Each participant registers a public key with the directory authority. Registration would
have to be in person or by some form of secure authenticated communication.
3. A participant may replace the existing key with a new one at any time, either because of
the desire to replace a public key that has already been used for a large amount of data, or
because the corresponding private key has been compromised in some way.
4. Participants could also access the directory electronically.
3.Public-key authority:
1. A sends a timestamped message to the public-key authority containing a request for the
current public key of B.
2. The authority responds with a message that is encrypted using the authority’s private
key, PRauth. Thus, A is able to decrypt the message using the authority’s public key.
Therefore, A is assured that the message originated with the authority. The message
includes the following:
■ B’s public key, PUb, which A can use to encrypt messages destined for B
■ The original request used to enable A to match this response with the corresponding
earlier request and to verify that the original request was not altered before reception by
the authority ■ The original timestamp given so A can determine that this is not an old
message from the authority containing a key other than B’s current public key
4, 5. B retrieves A’s public key from the authority in the same manner as A retrieved B’s
public key. At this point, public keys have been securely delivered to A and B, and they may
begin their protected exchange. However, two additional steps are desirable:
6. B sends a message to A encrypted with PUa and containing A’s nonce (N1) as well as a
new nonce generated by B (N2). Because only B could have decrypted message (3), the
presence of N1 in message (6) assures A that the correspondent is B.
7. A returns N2, which is encrypted using B’s public key, to assure B that its correspondent
is A.
4.Public-key certificates:
A certificate consists of a public key, an identifier of the key owner, and the whole block
signed by a trusted third party.
A user can present his or her public key to the authority in a secure manner and obtain a
certificate. The user can then publish the certificate.
Anyone needing this user’s public key can obtain the certificate and verify that it is valid by
way of the attached trusted signature.
A participant can also convey its key information to another by transmitting its certificate.
1. Any participant can read a certificate to determine the name and public key of the
certificate’s owner.
2. Any participant can verify that the certificate originated from the certificate authority
and is not counterfeit.
X.509 Certificate:
In x.509 the directory may serve as a repository of public-key certificates .
Each certificate contains the public key of a user and is signed with the private key of a
trusted certification authority.
■ End entity: A generic term used to denote end users, devices (e.g., servers, routers), or
any other entity that can be identified in the subject field of a public-key certificate. End
entities typically consume and/or support PKIrelated services.
■ Certification authority (CA): The issuer of certificates and (usually) certificate revocation
lists (CRLs). It may also support a variety of administrative functions, although these are
often delegated to one or more Registration Authorities.
■ Repository: A generic term used to denote any method for storing certificates and CRLs
so that they can be retrieved by end entities