Key Management
Key Management
Key Management
Thus, A can verify that its original request was not altered before
reception by the KDC and, because of the nonce, that this is not a replay
of some previous request. In addition, the message includes two items
intended for B:
These last two items are encrypted with Kb (the master key that the
KDC shares with B). They are to be sent to B to establish the connection
and prove A's identity.
3. A stores the session key for use in the upcoming session and forwards
to B the information that originated at the KDC for B, namely, E(Kb,
[Ks || IDA]). Because this information is encrypted with Kb, it is
protected from eavesdropping. B now knows the session key (Ks),
knows that the other party is A (from IDA), and knows that the
information originated at the KDC (because it is
encrypted using Kb).
4. Using the newly minted session key for encryption, B sends a nonce,
N2, to A.
5. Also using Ks, A responds with f(N2), where f is a function that
performs some transformation on N2 (e.g., adding one).
The proposed technique is for use with DES and makes use of the extra
8 bits in each 64-bit DES key. That is, the eight non-key bits ordinarily
reserved for parity checking form the key tag.
The bits have the following interpretation:
One bit indicates whether the key is a session key or a master key.
One bit indicates whether the key can be used for encryption.
One bit indicates whether the key can be used for decryption.
The remaining bits are spares for future use.
The Diffie-Hellman key exchange works by allowing two parties (Alice and
Bob) to agree on a shared secret key over an insecure channel, without
any other party being able to intercept the key or learn anything about it.
Man-In-Middle attack
Alice and Bob wish to exchange keys, and Darth is the adversary. The
attack proceeds as follows
1. Darth prepares for the attack by generating two random private keys
XD1 and
XD2 and then computing the corresponding public keys YD1 and YD2.
2. Alice transmits YA to Bob.
3. Darth intercepts YA and transmits YD1 to Bob. Darth also calculates
K2 = (YA) XD2 mod q.
4. Bob receives YD1 and calculates K1 = (YD1) XB mod q.
5. Bob transmits YB to Alice.
6. Darth intercepts YB and transmits YD2 to Alice. Darth calculates
K1 = (YB)XD1 mod q.
7. Alice receives YD2 and calculates K2 = (YD2) XA mod q.