120 likes | 208 Views
Using Encryption for Authentication in Large Networks of Computers. Roger M. Needham Michael D. Schroeder. Purpose. Present protocols for decentralized authentication Authenticated interactive communication Authenticated one-way communication Signed communication. Environment.
E N D
Using Encryption for Authentication in Large Networks of Computers Roger M. Needham Michael D. Schroeder
Purpose • Present protocols for decentralized authentication • Authenticated interactive communication • Authenticated one-way communication • Signed communication
Environment • No centralized information collection • Each computer can perform encryption • Intruder can interpose in all communication paths • Each principal has secure environment in which to compute
Protocols • Conventional algorithms (symmetric crypt.) • each principal has a secret key known to it, and Authentication Server • To set up “secure channel,” a message must have two properties • Must be comprehensive only to receiver. Receiver can then use contents to identify himself to sender. • Receiver must know sender sent it.
Symmetric Two-Way Algorithm • A -> AS: A, B, IA1 • AS -> A: {IA1, B, CK, {CK, A}KB}KA • A -> B: {CK, A}KB • B -> A: {IB}CK • A -> B: {IB - 1}CK
Public Key Two-Way Algorithm • A -> AS: A, B • AS -> A: {PKB, B}SKAS • A -> B: {IA, A}PKB • B -> AS: B, A • AS -> B: {PKA, A}SKAS • B -> A: {IA, IB}PKA • A -> B: {IB}PKB
Authentication Servers • Multiple Authentication Servers • Different AS for A and B • Implementing Authentication Servers • Symmetric & PK differences - secrecy & integrity • not much difference
One-Way communication • Symmetric Key • A -> B: {CK, A}KB • Public Key • A -> B: {A,I,{B}SKA}PKB • Time integrity is a problem due to replay • time-stamps • receiver stores {source, time-stamp} • Signature can be used as well
Digital Signatures • Provide evidence to a 3rd party that a message is unchanged • Verify who sent the message • Sender must have unique signing ability • Characteristic function/One-Way hash func. • Allows “signature” to be smaller than the cleartext message
Digital Signature with Symmetic Encryption • A -> AS: A, {CSM}KA • AS -> A: {A, CSM}KAS • A -> B: {M, {A, CSM}KAS}KB • B -> AS: B, {A, CS}KAS • AS -> B: {A, CS}KB
Signature with PK Encryption • A -> B: {{text-block}SKA}PKB • easier! • Still may want to use CS to speed authentication of signature • Old PK’s must be stored by AS, and signature must contain time.
Conclusions • Protocols using pk and conventional encryption are similar • PK has advantage only in signed communications for these systems • Need means to evaluate the validity of protocols