Lecture 07
Lecture 07
Lecture 07
Security
Chapter 14
Fifth Edition
by William Stallings
Key Management: Generation,
Transportation, and Distribution
• The Key Exchange Problem
• Although symmetric encryption is commonly used due to its
historical position in the cryptography and its speed, it suffers from a
serious problem of how to safely and secretly deliver a secret key
from the sender to the recipient. This problem forms the basis for
the key exchange problem.
• The key exchange problem involves:
• ensuring that keys are exchanged so that the sender and receiver can perform
encryption and decryption,
• ensuring that an eavesdropper or outside party cannot break the code,
• ensuring the receiver that a message was encrypted by the sender.
Key Distribution
23
• A CA has the following roles:
• It authenticates a communicating element to the other
communicating parties that that element is what it says it
is. However, one can trust the identify associated with a public key
only to the extent that one can trust a CA and its identity verification
techniques.
• Once the CA verifies the identity of the entity, the CA creates a
digital certificate that binds the public key of the element to the
identity. The certificate contains the public key and other identifying
information about the owner of the public key (for example, a human
name or an IP address). The certificate is digitally signed by the CA.
24
Public-Key Certificates
X.509 Authentication Service
• functions:
• registration
• initialization
• certification
• key pair recovery
• key pair update
• revocation request
• cross certification
• protocols: CMP, CMC
Kerberos
• have considered:
• symmetric key distribution using symmetric encryption
• symmetric key distribution using public-key encryption
• distribution of public keys
• announcement, directory, authrority, CA
• X.509 authentication and certificates
• public key infrastructure (PKIX)