Confidentiality Using Symmetric Encryption
Confidentiality Using Symmetric Encryption
Encryption
• Points of Vulnerability
• Placement of Encryption Function
• Traffic Confidentiality
• Key Distribution
• Key Distribution using Asymmetric Encryption
• Distribution of Public Keys
TOPICS COVERED
• Points of Vulnerability
• Placement of Encryption Function
• Traffic Confidentiality
• Key Distribution
• Key Distribution using Asymmetric Encryption
• Distribution of Public Keys
POTENTIAL LOCATIONS FOR CONFIDENTIALITY
ATTACK
“Another point of
Vulnerability”
“First point of
Vulnerability”
• Points of Vulnerability
• Placement of Encryption Function
• Traffic Confidentiality
• Key Distribution
• Key Distribution using Asymmetric Encryption
• Distribution of Public Keys
Placement of Encryption Function
9
Link Encryption
10
Contd..
Disadvantages of Link Encryption
15
TOPICS COVERED
• Points of Vulnerability
• Placement of Encryption Function
• Traffic Confidentiality
• Key Distribution
• Key Distribution using Asymmetric Encryption
• Distribution of Public Keys
Traffic Confidentiality
17
Contd..
• Points of Vulnerability
• Placement of Encryption Function
• Traffic Confidentiality
• Key Distribution
• Key Distribution using Asymmetric Encryption
• Distribution of Public Keys
Key Distribution
• Introduction
21
Key Distribution
3. If A and B have previously and recently used a key, one party can
transmit the new key to the other encrypted using the old
key.
22
Key Distribution
23
Key Distribution
24
Key Distribution
25
Key Hierarchy
• Session key
• Temporary key
• Used for the duration of a logical connection between A and B.
• Generated by the key distribution center.
• [N(N – 1)] / 2 keys are needed at any one time.
• Master key
• Session keys are encrypted using a master key.
• N master keys are required.
• Physically delivered.
26
Contd..
Key
Distribution
Center(KDC)
1
||N
B
||I D
||
s
K
Authentication
,[
A
D
b
(K
)I
Steps
|| E
(1
key
])
1
||N
Distribution
B
D
||I
steps
A
D
||I
s
a ,[
K
ID )E(K
A ])
(2
30
Key Distribution Scenario
31
Key Distribution Scenario
32
Key Distribution Scenario
• Steps (4) and (5) are to confirm that both A and B have the
correct session key.
33
Session Key Lifetime
• The more often the keys are changed, the more secure they are.
• Because the opponent has less ciphertext for any given session key.
• The less often the keys are changed, the more efficient they are.
• Because the key distribution delays data transmission.
34
Session Key Lifetime
• Connection-oriented protocol
• Normally, a session key per connection.
• However, the session is too long, periodically changing the session
key is recommendable.
• Connectionless protocol
• A session key for a fixed period.
35
A Transparent Key Control Scheme
37
Steps of Automatic Key Distribution
• Points of Vulnerability
• Placement of Encryption Function
• Traffic Confidentiality
• Key Distribution
• Key Distribution using Asymmetric Encryption
• Distribution of Public Keys
Key Distribution using Asymmetric Encryption
occur…
Cont…
The Steps…
• Points of Vulnerability
• Placement of Encryption Function
• Traffic Confidentiality
• Key Distribution
• Key Distribution using Asymmetric Encryption
• Distribution of Public Keys
Distribution of Public Keys