SlideShare a Scribd company logo
1 of 25
What is key management?
 Key management is the set of techniques and procedures
supporting the establishment and maintenance of keying
relationships between authorizedparties.
 A keying relationship is the state wherein communicating
entities share common data(keying material) to facilitate
cryptography techniques. This data may include public or
secret keys, initialization values, and additionalnon-secret
parameters.
Key management encompasses techniquesand
procedures supporting:
1. initializationof systems users within adomain;
2. generation, distribution, and installation of keying
material;
3. controlling the use of keying material;
4. update, revocation, and destruction of keyingmaterial;
and
5. storage, backup/recovery, and archival of keying
material.
Objectives
The objective of key management is tomaintain
keying relationships and keying material in a
manner that counters relevantthreats
In practicean additional objective is conformance to
a relevant securitypolicy
Threats
1. compromise of confidentiality of secretkeys
2. compromiseof authenticityof secret or public keys.
3. unauthorized useof publicor secret keys
Security Policy
Security policyexplicitlyor implicitlydefines the
threats a system is intended toaddress
Security policy may affect the stringency of
cryptographic requirements, depending on the
susceptibility of the environment in questionsto
various types of attack.
Key management techniques
 Public-key techniques
Primaryadvantages offered by public-key techniques for
applications related to key managementinclude:
1. simplified key management
2. on-line trusted server notrequired
3. enhanced functionality
Key management techniques
 Key management
a) Symmetric-keyencryption
encryption decryption
plaintext
plaintext
symmetric
key
generator
secretkey secretkey
ciphertext
Key management techniques
b) public-keyencryption
encryption decryption
asymmetric keypair
generation
plaintext ciphertext
plaintext
public
key
private key
secure channel (privateand
authentication)
secure channel (authenticationonly)
unsecured channel (noprotection)
Key management techniques
 Techniques for distributing confidentialkeys
Key layering and symmetric-keycertificates
Key layering:
1. masterkeys – keys at the highest level in the hierarchy
2. key-encrypting keys – symmetric keys or encryptionpublic
keys used for key transportorstorageof other keys
3.data keys – used toprovidecryptographicoperationson user
data
Key management techniques
symmetric-keycertificates:
Symmetric-key certificates providea means fora KTC(KeyTranslation
Center) to avoid the requirement of either maintaining a secure
database of user secrets (or duplicating such a database for multiple
servers), or retrieving such keys from a database upon translation
requests.
Key management life cycle
1. userregistration
2. user initialization
3. key generation
4. key installation
5. keyregistration
6. normal use
7. key backup
8. keyupdate
9. archival
10. key de-registration anddestruction
11. key recovery
12. key revocation
Key Distribution
 given parties A and B havevarious keydistribution
alternatives:
1. A can select keyand physicallydeliver to B
2. third partycan select & deliver key to A & B
3. if A & B have communicated previously canuse
previous key to encrypta new key
4. if A & B have securecommunications with a third
party C, C canrelay key between A & B
Key Distribution Task
Key Distribution Scenario
Key Distribution Issues
 hierarchies of KDC’s required for large networks,but
must trust eachother
 session key lifetimes should be limited forgreater
security
 useof automatic keydistributionon behalf of users,
but must trustsystem
 use of decentralized keydistribution
 controlling key usage
Simple Secret Key Distribution
 Merkleproposed thisverysimplescheme
 allows securecommunications
 no keys before/afterexist
Secret Key Distribution with
Confidentiality and Authentication
Distribution of Public Keys
 can beconsidered as using oneof:
 publicannouncement
 publicly availabledirectory
 public-keyauthority
 public-keycertificates
Public Announcement
 usersdistribute public keys torecipients or broadcast
to community atlarge
 eg. append PGP keys toemail messagesor post to news
groups or emaillist
 major weakness isforgery
 anyone can createa keyclaiming to be someone elseand
broadcast it
 until forgery isdiscovered can masqueradeas claimed
user
Publicly Available Directory
 can obtain greatersecurity by registering keyswith a
publicdirectory
 directory must be trusted withproperties:
 contains {name,public-key} entries
 participants register securely withdirectory
 participantscan replace keyat any time
 directory is periodicallypublished
 directory can be accessedelectronically
 still vulnerable to tampering or forgery
Public-Key Authority
 improve security by tightening controlover
distribution of keys fromdirectory
 has properties of directory
 and requires users to know public key for the directory
 then users interact with directory to obtain any desired
public key securely
 does require real-time access to directory when keys are
needed
 may be vulnerable totampering
Public-Key Authority
Public-Key Certificates
certificatesallow keyexchange withoutreal-time
access to public-keyauthority
a certificate binds identity to publickey
 usuallywith other infosuch as period of validity, rights
of useetc
with all contents signed bya trusted Public-Keyor
Certificate Authority(CA)
can beverified byanyonewho knows the public-key
authorities public-key
Public-Key Certificates

More Related Content

Similar to key management in cryptography and network security

2018 acm-scc-presentation
2018 acm-scc-presentation2018 acm-scc-presentation
2018 acm-scc-presentationIronCore Labs
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEEMEMTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...IEEEFINALSEMSTUDENTSPROJECTS
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Guellord Mpia
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudKamal Spring
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...chennaijp
 
JPD1422 Secure Data Retrieval for Decentralized Disruption-Tolerant Military...
JPD1422  Secure Data Retrieval for Decentralized Disruption-Tolerant Military...JPD1422  Secure Data Retrieval for Decentralized Disruption-Tolerant Military...
JPD1422 Secure Data Retrieval for Decentralized Disruption-Tolerant Military...chennaijp
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406pradip patel
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During CommunicationPECB
 

Similar to key management in cryptography and network security (20)

H0362052056
H0362052056H0362052056
H0362052056
 
2018 acm-scc-presentation
2018 acm-scc-presentation2018 acm-scc-presentation
2018 acm-scc-presentation
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
IEEE 2014 DOTNET NETWORKING PROJECTS Secure data-retrieval-for-decentralized-...
 
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic  groups in the cloudA secure anti collusion data sharing scheme for dynamic  groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...JPJ1435   Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
JPJ1435 Secure Data Retrieval For Decentralized Disruption-Tolerant Militar...
 
JPD1422 Secure Data Retrieval for Decentralized Disruption-Tolerant Military...
JPD1422  Secure Data Retrieval for Decentralized Disruption-Tolerant Military...JPD1422  Secure Data Retrieval for Decentralized Disruption-Tolerant Military...
JPD1422 Secure Data Retrieval for Decentralized Disruption-Tolerant Military...
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During Communication
 

More from Sri Latha

owasp features in secure coding techniques
owasp  features in secure coding techniquesowasp  features in secure coding techniques
owasp features in secure coding techniquesSri Latha
 
supraja technologies material for secure coding
supraja technologies material for secure codingsupraja technologies material for secure coding
supraja technologies material for secure codingSri Latha
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGSri Latha
 
Ml Fundamentals and applications using python
Ml Fundamentals and applications using pythonMl Fundamentals and applications using python
Ml Fundamentals and applications using pythonSri Latha
 
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1Sri Latha
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
unit5 graphs (DS).pptx
unit5 graphs (DS).pptxunit5 graphs (DS).pptx
unit5 graphs (DS).pptxSri Latha
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
introdution-to-html.ppt
introdution-to-html.pptintrodution-to-html.ppt
introdution-to-html.pptSri Latha
 

More from Sri Latha (11)

owasp features in secure coding techniques
owasp  features in secure coding techniquesowasp  features in secure coding techniques
owasp features in secure coding techniques
 
supraja technologies material for secure coding
supraja technologies material for secure codingsupraja technologies material for secure coding
supraja technologies material for secure coding
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
 
Ml Fundamentals and applications using python
Ml Fundamentals and applications using pythonMl Fundamentals and applications using python
Ml Fundamentals and applications using python
 
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
COMPUTER ENGINEERING WORKSHOP MATERIALS UNIT-1
 
CNS PPT.ppt
CNS PPT.pptCNS PPT.ppt
CNS PPT.ppt
 
UNIT-4.ppt
UNIT-4.pptUNIT-4.ppt
UNIT-4.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
unit5 graphs (DS).pptx
unit5 graphs (DS).pptxunit5 graphs (DS).pptx
unit5 graphs (DS).pptx
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
introdution-to-html.ppt
introdution-to-html.pptintrodution-to-html.ppt
introdution-to-html.ppt
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

key management in cryptography and network security

  • 1.
  • 2. What is key management?  Key management is the set of techniques and procedures supporting the establishment and maintenance of keying relationships between authorizedparties.  A keying relationship is the state wherein communicating entities share common data(keying material) to facilitate cryptography techniques. This data may include public or secret keys, initialization values, and additionalnon-secret parameters.
  • 3. Key management encompasses techniquesand procedures supporting: 1. initializationof systems users within adomain; 2. generation, distribution, and installation of keying material; 3. controlling the use of keying material; 4. update, revocation, and destruction of keyingmaterial; and 5. storage, backup/recovery, and archival of keying material.
  • 4. Objectives The objective of key management is tomaintain keying relationships and keying material in a manner that counters relevantthreats In practicean additional objective is conformance to a relevant securitypolicy
  • 5. Threats 1. compromise of confidentiality of secretkeys 2. compromiseof authenticityof secret or public keys. 3. unauthorized useof publicor secret keys
  • 6. Security Policy Security policyexplicitlyor implicitlydefines the threats a system is intended toaddress Security policy may affect the stringency of cryptographic requirements, depending on the susceptibility of the environment in questionsto various types of attack.
  • 7. Key management techniques  Public-key techniques Primaryadvantages offered by public-key techniques for applications related to key managementinclude: 1. simplified key management 2. on-line trusted server notrequired 3. enhanced functionality
  • 8. Key management techniques  Key management a) Symmetric-keyencryption encryption decryption plaintext plaintext symmetric key generator secretkey secretkey ciphertext
  • 9. Key management techniques b) public-keyencryption encryption decryption asymmetric keypair generation plaintext ciphertext plaintext public key private key secure channel (privateand authentication) secure channel (authenticationonly) unsecured channel (noprotection)
  • 10. Key management techniques  Techniques for distributing confidentialkeys Key layering and symmetric-keycertificates Key layering: 1. masterkeys – keys at the highest level in the hierarchy 2. key-encrypting keys – symmetric keys or encryptionpublic keys used for key transportorstorageof other keys 3.data keys – used toprovidecryptographicoperationson user data
  • 11. Key management techniques symmetric-keycertificates: Symmetric-key certificates providea means fora KTC(KeyTranslation Center) to avoid the requirement of either maintaining a secure database of user secrets (or duplicating such a database for multiple servers), or retrieving such keys from a database upon translation requests.
  • 12. Key management life cycle 1. userregistration 2. user initialization 3. key generation 4. key installation 5. keyregistration 6. normal use 7. key backup 8. keyupdate 9. archival 10. key de-registration anddestruction 11. key recovery 12. key revocation
  • 13. Key Distribution  given parties A and B havevarious keydistribution alternatives: 1. A can select keyand physicallydeliver to B 2. third partycan select & deliver key to A & B 3. if A & B have communicated previously canuse previous key to encrypta new key 4. if A & B have securecommunications with a third party C, C canrelay key between A & B
  • 16. Key Distribution Issues  hierarchies of KDC’s required for large networks,but must trust eachother  session key lifetimes should be limited forgreater security  useof automatic keydistributionon behalf of users, but must trustsystem  use of decentralized keydistribution  controlling key usage
  • 17. Simple Secret Key Distribution  Merkleproposed thisverysimplescheme  allows securecommunications  no keys before/afterexist
  • 18. Secret Key Distribution with Confidentiality and Authentication
  • 19. Distribution of Public Keys  can beconsidered as using oneof:  publicannouncement  publicly availabledirectory  public-keyauthority  public-keycertificates
  • 20. Public Announcement  usersdistribute public keys torecipients or broadcast to community atlarge  eg. append PGP keys toemail messagesor post to news groups or emaillist  major weakness isforgery  anyone can createa keyclaiming to be someone elseand broadcast it  until forgery isdiscovered can masqueradeas claimed user
  • 21. Publicly Available Directory  can obtain greatersecurity by registering keyswith a publicdirectory  directory must be trusted withproperties:  contains {name,public-key} entries  participants register securely withdirectory  participantscan replace keyat any time  directory is periodicallypublished  directory can be accessedelectronically  still vulnerable to tampering or forgery
  • 22. Public-Key Authority  improve security by tightening controlover distribution of keys fromdirectory  has properties of directory  and requires users to know public key for the directory  then users interact with directory to obtain any desired public key securely  does require real-time access to directory when keys are needed  may be vulnerable totampering
  • 24. Public-Key Certificates certificatesallow keyexchange withoutreal-time access to public-keyauthority a certificate binds identity to publickey  usuallywith other infosuch as period of validity, rights of useetc with all contents signed bya trusted Public-Keyor Certificate Authority(CA) can beverified byanyonewho knows the public-key authorities public-key