protocols part 2 - public key Flashcards
(31 cards)
why is key establishment needed?
protocol possible as A and B share a key
how to set up a session key
using key establishment protocol
how to ensure secure communication is happening
use eachothers public key:
- only one party has private keys everyone else encrypt using public key , no one can decrypt using parties.
use a trusted third party(TTP)
- ttp that trusted between the two principals
certificates
notation for needham schroeder public key protocol
- A →B : EB (Na, A)
- B →A : EA(Na, Nb)
- A →B : EB (Nb)
Nb and Na used to then generate a symmetrivc key
how do we know for sure A is A and B is B in
(As in they are making sure they are talking yo eachother )
1. A →B : EB (Na, A)
2. B →A : EA(Na, Nb)
3. A →B : EB (Nb)
- shows A that it is b as inly b could have decrypted the previous message and sent nonce back with new nonce
- shows b A ia A as only A could have decrypted the message and sent nonce back
what is public key encryption notation in protocol
E_x(-)
what attack is needham schroeder public key protocol susceptible to
man in the middle attack
Needham-Schroeder-Lowe Public Key Protocol notation
- A →B : EB (Na, A)
- B →A : EA(Na, Nb, B)
- A →B : EB (Nb)
what is B in B →A : EA(Na, Nb, B)
in Needham-Schroeder-Lowe Public Key Protocol
b is identity message
what is the Needham-Schroeder-Lowe Public Key Protocol secure
1. A →B : EB (Na, A)
2. B →A : EA(Na, Nb, B)
3. A →B : EB (Nb)
▶ A and B mutually authenticate each other.
▶ The attack where Elvis intercepts and impersonates
Bob is no longer possible.
▶ Mutual Authentication — Alice and Bob both verify
each other.
▶ Protection Against MITM — Attackers cannot
impersonate Bob.
- A →B : EB (Na, A)
- B →A : EA(Na, Nb, B)
- A →B : EB (Nb)
- B →A : {M}key_(Na,Nb)
can adversary read the message encrypted with key_(Na,Nb)
no . secure against adversary
- A →B : EB (Na, A)
- B →A : EA(Na, Nb, B)
- A →B : EB (Nb)
- B →A : {M}key_(Na,Nb)
can the government read the message encrypted with key_(Na,Nb)
after protocol runs , governement can force people to handover private keys
what is foward secrecy
A protocol has Forward Secrecy if it keeps the message secret from an attacker
who has:
▶ A recording of the protocol run.
▶ The long-term keys of the principals.
why does forward secrecy matter?
Protection against:
▶ Governments that can force people to give up their keys.
▶ Hackers that might steal private keys.
describe station to station protocol
uses public key infrastructure
adds digital signatures and encryption of signatures whith Diffie Hellman shared key secret to achieve the goals:
each party has their own key
prevent eavesdroppers from learning about the message or identities
STS notation
- A →B : gx
- B →A : gy, {SB (gy, gx )}gxy
- A →B : {SA(gy, gx )}gxy
- B →A : {M}gxy
notation for signing in protocols
S_x(-)
why is STS secure?
▶ x, y , gxy are not stored after the protocol run.
▶ A and B’s keys don’t let the attacker read M.
▶ STS ensures Forward Secrecy.
what is a problem with STS?
have to verify eachothers public keys
()how does b know a is a and a know b is b)?
solutions to verifying eachothers public key is STS protocol
meet face to face to securely exchange keys
use a pre - shared key mechanism
TTP (trusted third party) -> signs identities and public keys ehich creates certificates-> ensures they can verify eachother public keys
why add certificates to STS protocol
A →B : gx
2. B →A : gy, CertB , {SB (gy, gx )}gxy
3. A →B :CertA, {SA(gy, gx )}gxy
▶ The ”full” STS protocol includes
certificates for A and B.
▶ Certificates contain public keys
signed by a Trusted Third Party (TTP).
▶ Alice and Bob don’t need to know
each other’s public key beforehand
how does the Needham-Schroeder Key Establishment Protocol work?
- A →S : A, B, Na
- S →A : {Na, B, Kab, {Kab, A}Kbs }Kas
- A →B : {Kab, A}Kbs
- B →A : {Nb}Kab
- A →B : {Nb + 1}Kab
▶ S is a Trusted Third Party (TTP) that helps establish a shared key Kab.
▶ S encrypts the session key separately for Alice and Bob.
▶ Alice and Bob mutually authenticate using nonces Na and Nb.
▶ Ensures that only Alice and Bob know Kab.
what are key establishment goals
key freshness
key exclusivity
good key
what is key freshness
key established is new (from TTP or uses a new nonce)