02.5-keymanage-ovs
DESCRIPTION
Overview of Key ManagementTRANSCRIPT
![Page 1: 02.5-keymanage-ovs](https://reader031.vdocuments.site/reader031/viewer/2022020506/56d6c0261a28ab30169928d1/html5/thumbnails/1.jpg)
1
Key Management
Computer Security
Key Management
2
Key Management
Key Management
• cryptography is used in real systems
• That means the keys exist in real systems
• Some questions– How many are there?
– Who creates them?
– Where are they stored?
– etc
3
Key Management
Key Management
• We’ ll look at key management in a number of parts of this course
• For now a brief introduction will do
4
Key Management
How Many Keys Are There?
• For basic symmetric cryptography there need only be one – The shared secret key
• For basic asymmetric cryptography there needs to be four– Private and public key for each participant
![Page 2: 02.5-keymanage-ovs](https://reader031.vdocuments.site/reader031/viewer/2022020506/56d6c0261a28ab30169928d1/html5/thumbnails/2.jpg)
5
Key Management
Who Knows The Key
• For symmetric cryptography both participants know the key
KAB KAB
A B
6
Key Management
For asymmetric cryptography
• Each secret key is known only by its owner
• The public keys are known by everybody
A B
KPRIV-AKPUB-AKPUB-b
KPRIV-BKPUB-AKPUB-b
7
Key Management
Session keys vs. Long Term Keys
• The above assumes a minimal number of keys
• If one key is used too much and/or for too long it is more vulnerable
• So use more keys for less time each– Session keys
– Replacement keys
8
Key Management
Session Key
• Used for a “session”
• Once the long term secret(s) is (are) used for authentication a session key generated
• Discarded once communication completed
![Page 3: 02.5-keymanage-ovs](https://reader031.vdocuments.site/reader031/viewer/2022020506/56d6c0261a28ab30169928d1/html5/thumbnails/3.jpg)
9
Key Management
Who Knows What Keys?
• For symmetric cryptography with session key SKAB
KABSKAB
KABSKAB
A B
10
Key Management
Who Knows What Keys?
• For assymmetric cryptography with session key SKAB
• Note the session key is a symmetric key
A B
KPRIV-AKPUB-AKPUB-BSKAB
KPRIV-BKPUB-BKPUB-ASKAB
11
Key Management
Replacement Keys
• Once a key (either session or long term) has been used for a while it may be wise to replace it
• Need to tell everyone who knows the key what the new one is - securely
12
Key Management
Who Creates the Keys?
• For a symmetric key (long term or session)– One participant?
– Both?
– A trusted third party?
• For an asymmetric key pair– The owner?
– A trusted third party?
![Page 4: 02.5-keymanage-ovs](https://reader031.vdocuments.site/reader031/viewer/2022020506/56d6c0261a28ab30169928d1/html5/thumbnails/4.jpg)
13
Key Management
How are they Distributed
• For a session (or component) key it can be distributed protected by a long term secret
• For long term keys there is no other key to protect their distribution in the system
• Must be distributed off-line or by special mechanism
14
Key Management
Where are stored
• the keys need to be protected• Have to store them in the user’s storage
space• How are they protected?• Often by passwords• Which are cryptographically much less
secure• Hmmm……
15
Key Management
Summary
• Remember who knows what keys and how many
• The difference between long term and session key
• Key distribution• Key protection• We’ ll look at a lot of this in more detail as
we go through the course