Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)

Description

IYM002 (Unit 9 - cryptographic protocols) Mind Map on Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE), created by jjanesko on 27/04/2013.
jjanesko
Mind Map by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko over 11 years ago
122
9

Resource summary

Crypto U9 protocols (key establishment), Authentication and Key Establishment (AKE)
  1. security objectives
    1. need to authenticate key holders
      1. need to prolong authentication so communication over time can take place
      2. typical security goals
        1. mutual entity authentication
          1. mutual data origin authentication
            1. mutual key establishment
              1. key confidentiality
                1. key freshness
                  1. mutual key confirmation
                    1. unbiased key control
                      1. Alice and Bob should be happy that neither party has unduly influenced the generation of the key
                        1. Bob and Alice create part of the key by each providing some randomness
                          1. There is a trusted 3rd party used to generate the key
                      2. Diffie Hellman Agreement Protocol
                        1. assumptions
                          1. public key crypto system with the property that public keys of differen users can be numbers over the same modulus p
                            1. a combination function where it does not matter in which order the exponentiations are conducted
                            2. Goals
                              1. mutual entity authentication
                                1. none provided
                                2. mutual data origin authentication
                                  1. none provided
                                  2. key confidentiality
                                    1. do establish common symmetric key
                                    2. key confidentiality
                                      1. achieved because of hardness of equation
                                      2. key freshness
                                        1. achievable assuming Alice and Bob choose fresh private values
                                        2. mutual key confirmation
                                          1. not provided
                                          2. unbiased key control
                                            1. both Bob and Alice contribute
                                          3. cryptographic primitives, actions, flow
                                            1. El Gamal
                                            2. open to man in the middle attacks
                                            3. Station to Station protocol
                                              1. based on Diffie Hellman, uses digital signatures & certificates
                                                1. solves Diffie Hellman protocol authentication & mutual key confirmation problems
                                              2. ISO 9798-2 Trusted Third Party AKE (simplified version)
                                                1. assumptions
                                                  1. Alice has a shared symmetric key with with TTP
                                                    1. Bob has a shared symmetric key with TTP
                                                      1. Alice & Bob can generate nonces
                                                      2. cryptographic primitives, actions, flow
                                                        1. Goals
                                                          1. mutual entity authentication
                                                            1. achieved because of trust in TTP
                                                            2. mutual data origin authenication
                                                              1. achieved even without a MAC
                                                              2. mutual key establishment
                                                                1. achieved
                                                                2. key confidentiality
                                                                  1. achieved
                                                                  2. key freshness
                                                                    1. achieved so long as the TTP generates fresh keys
                                                                    2. mutual key confirmation
                                                                      1. achieved
                                                                      2. unbiased key control
                                                                        1. achieved
                                                                    Show full summary Hide full summary

                                                                    Similar

                                                                    Crypto U9, Cryptographic Protocols
                                                                    jjanesko
                                                                    Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
                                                                    jjanesko
                                                                    Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
                                                                    jjanesko
                                                                    Crypto U3, Theoretical vs. Practical Security
                                                                    jjanesko
                                                                    Crypto U1, Basic Principles
                                                                    jjanesko
                                                                    Crypto U4, Stream Cipher
                                                                    jjanesko
                                                                    Crypto U4, Block Cipher, Counter Mode
                                                                    jjanesko
                                                                    Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
                                                                    jjanesko
                                                                    Crypto U2, Crypto design principles
                                                                    jjanesko
                                                                    Crypto U10 (part 2), Key Management and Lifecycle
                                                                    jjanesko
                                                                    Crypto U10 (part 1), Key Management & Lifecycle
                                                                    jjanesko