BUY-ORIGINAL ESSAYS ONLINE

SUBJECT: Cryptography

DISCUSSION

Find attached PPT as reference.

After reading chapter 15, describe how federated identity management will impact the processes behind identifying end users.

WRITE THIS ESSAY FOR ME

Tell us about your assignment and we will find the best writer for your paper.

Get Help Now!

Make sure to cover 300 words and 2 references.

Stallings_8e_Accessibl

e_fullppt_15.pdf

Cryptography and Network Security:

Principles and Practice Eighth Edition

Chapter 15

Cryptographic Key Management

and Distribution

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Cryptographic Key Management

• The secure use of cryptographic key algorithms depends on the protection of the cryptographic keys

• Cryptographic key management is the process of administering or managing cryptographic keys for a cryptographic system

– It involves the generation, creation, protection, storage, exchange, replacement, and use of keys and enables selective restriction for certain keys

• In addition to access restriction, key management also involves the monitoring and recording of each key’s access, use, and context

• A key management system will also include key servers, user procedures, and protocols

• The security of the cryptosystem is dependent upon successful key management

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Key Distribution Technique

• Term that refers to the means of delivering a key to two

parties who wish to exchange data without allowing others

to see the key

• For symmetric encryption to work, the two parties to an

exchange must share the same key, and that key must be

protected from access by others

• Frequent key changes are desirable to limit the amount of

data compromised if an attacker learns the key

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Symmetric Key Distribution

• Given parties A and B, key distribution can be achieved in a

number of ways:

– A can select a key and physically deliver it to B

– A third party can select the key and physically deliver it to A

and B

– If A and B have previously and recently used a key, one

party can transmit the new key to the other, encrypted using

the old key

– If A and B each has an encrypted connection to a third party

C, C can deliver a key on the encrypted links to A and B

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.1 Key Distribution Between

Two Communicating Entities

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.2 Symmetric Key Hierarchy

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.3 Simple Use of Public-Key

Encryption to Establish a Session Key

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.4 Another Man-in-the-Middle

Attack

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.5 Public-Key Distribution of

Secret Keys

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.6 Uncontrolled Public-Key

Distribution

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.7 Public-Key Publication

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.8 Public-Key Distribution

Scenario

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.9 Exchange of Public-Key

Certificates

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

X.509 Certificates

• Part of the X.500 series of recommendations that define a directory service

– The directory is, in effect, a server or distributed set of servers that maintains a database of information about users

• X.509 defines a framework for the provision of authentication services by the X.500 directory to its users

– Was initially issued in 1988 with the latest revision in 2016

– Based on the use of public-key cryptography and digital signatures

– Does not dictate the use of a specific algorithm but recommends R S A

– Does not dictate a specific hash algorithm

• Each certificate contains the public key of a user and is signed with the private key of a trusted certification authority

• X.509 defines alternative authentication protocols based on the use of public-key certificates

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.10 X.509 Public-Key

Certificate Use

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Certificates

Created by a trusted Certification Authority (C A) and have the following

elements:

• Version

• Serial number

• Signature algorithm identifier

• Issuer name

• Period of validity

• Subject name

• Subject’s public-key information

• Issuer unique identifier

• Subject unique identifier

• Extensions

• Signature

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.11 X.509 Formats

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Obtaining a Certificate

• User certificates generated by a C A have the following characteristics:

– Any user with access to the public key of the C A can verify the

user public key that was certified

– No party other than the certification authority can modify the

certificate without this being detected

• Because certificates are unforgeable, they can be placed in a directory

without the need for the directory to make special efforts to protect

them

– In addition, a user can transmit his or her certificate directly to

other users

• Once B is in possession of A’s certificate, B has confidence that

messages it encrypts with A’s public key will be secure from

eavesdropping and that messages signed with A’s private key are

unforgeable

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.12 X.509 Hierarchy: A

Hypothetical Example

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Certificate Revocation

• Each certificate includes a period of validity

– Typically a new certificate is issued just before the

expiration of the old one

• It may be desirable on occasion to revoke a certificate

before it expires, for one of the following reasons:

– The user’s private key is assumed to be compromised

– The user is no longer certified by this C A

– The C A’s certificate is assumed to be compromised

• Each C A must maintain a list consisting of all revoked but

not expired certificates issued by that C A

– These lists should be posted on the directory

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

X.509 Version 3

• Version 2 format does not convey all of the information that recent design and implementation experience has shown to be needed

• Rather than continue to add fields to a fixed format, standards developers felt that a more flexible approach was needed

– Version 3 includes a number of optional extensions

• The certificate extensions fall into three main categories:

– Key and policy information

– Subject and issuer attributes

– Certification path constraints

Each extension consists of:

• An extension identifier

• A criticality indicator

• An extension value

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Key and Policy Information • These extensions convey additional information about the subject and

issuer keys plus indicators of certificate policy

• A certificate policy is a named set of rules that indicates the

applicability of a certificate to a particular community and/or class of

application with common security requirements

• Included are:

– Authority key identifier

– Subject key identifier

– Key usage

– Private-key usage period

– Certificate policies

– Policy mappings

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Certificate Subject and Issuer Attributes

• These extensions support alternative names, in alternative

formats, for a certificate subject or certificate issuer

• Can convey additional information about the certificate subject

to increase a certificate user’s confidence that the certificate

subject is a particular person or entity

• The extension fields in this area include:

– Subject alternative name

– Issuer alternative name

– Subject directory attributes

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Certification Path Constraints

• These extensions allow constraint specifications to be

included in certificates issued for C A s by other C A s

• The constraints may restrict the types of certificates that

can be issued by the subject C A or that may occur

subsequently in a certification chain

• The extension fields in this area include:

– Basic constraints

– Name constraints

– Policy constraints

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Figure 15.13 P K I Scenario

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Summary

• Discuss the concept of a key hierarchy

• Understand the issues involved in using asymmetric

encryption to distribute symmetric keys

• Present an overview of public-key infrastructure concepts

• Present an overview of approaches to public-key

distribution and analyze the risks involved in various

approaches

• List and explain the elements in an X.509 certificate

Copyright © 2020 Pearson Education, Inc. All Rights Reserved.

Copyright

This work is protected by United States copyright laws and is

provided solely for the use of instructors in teaching their

courses and assessing student learning. Dissemination or sale of

any part of this work (including on the World Wide Web) will

destroy the integrity of the work and is not permitted. The work

and materials from it should never be made available to students

except by instructors using the accompanying text in their

classes. All recipients of this work are expected to abide by these

restrictions and to honor the intended pedagogical purposes and

the needs of other instructors who rely on these materials.

Introducing our Online Essay Writing Services Agency, where you can confidently place orders for a wide range of academic assignments. Our reputable homework writing company specializes in crafting essays, term papers, research papers, capstone projects, movie reviews, presentations, annotated bibliographies, reaction papers, research proposals, discussions, and various other assignments. Rest assured, our content is guaranteed to be 100% original, as every piece is meticulously written from scratch. Say goodbye to concerns about plagiarism and trust us to deliver authentic and high-quality work.

WRITE MY ESSAY NOW

PLACE YOUR ORDER