Zusammenfassung der Ressource
Crypto U9 protocols (key
establishment), Authentication and
Key Establishment (AKE)
- security objectives
- need to authenticate key holders
- need to prolong authentication so
communication over time can take place
- typical security goals
- mutual entity authentication
- mutual data origin authentication
- mutual key establishment
- key confidentiality
- key freshness
- mutual key confirmation
- unbiased key control
- Alice and Bob should be happy that
neither party has unduly influenced
the generation of the key
- Bob and Alice create part
of the key by each providing
some randomness
- There is a trusted 3rd
party used to
generate the key
- Diffie Hellman Agreement Protocol
- assumptions
- public key crypto system with the
property that public keys of differen users
can be numbers over the same modulus p
- a combination function where it
does not matter in which order the
exponentiations are conducted
- Goals
- mutual entity authentication
- none provided
- mutual data origin authentication
- none provided
- key confidentiality
- do establish common symmetric key
- key confidentiality
- achieved because of hardness of equation
- key freshness
- achievable assuming Alice and
Bob choose fresh private values
- mutual key confirmation
- not provided
- unbiased key control
- both Bob and Alice contribute
- cryptographic
primitives,
actions, flow
- El Gamal
- open to man in
the middle attacks
- Station to Station protocol
- based on Diffie Hellman, uses
digital signatures & certificates
- solves Diffie Hellman protocol
authentication & mutual key
confirmation problems
- ISO 9798-2 Trusted Third
Party AKE (simplified version)
- assumptions
- Alice has a shared symmetric key with with TTP
- Bob has a shared symmetric key with TTP
- Alice & Bob can generate nonces
- cryptographic primitives, actions, flow
- Goals
- mutual entity authentication
- achieved because of trust in TTP
- mutual data origin authenication
- achieved even without a MAC
- mutual key establishment
- achieved
- key confidentiality
- achieved
- key freshness
- achieved so long as the TTP generates fresh keys
- mutual key confirmation
- achieved
- unbiased key control
- achieved