1 / 22

Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures

Learning to Ski

zareh
Download Presentation

Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures Burt Kaliski, RSA, The Security Division of EMC, 02/06/07 DEV-208

    2. Learning to Ski Again Around 1980, I first learned to ski downhill at the McIntyre Ski Area in Manchester, NH Over 20 years later, I started skiing again with my family Skiing has changed a lot in two decades: Shaped skis offer easier turns Snowboards provide a single-board alternative Still, skiing is just as much fun

    3. Symmetric Key Infrastructure A symmetric key infrastructure or SKI is a coordinated set of components and services for managing symmetric keys Symmetric keys include: Data encryption and integrity-protection keys Key encryption keys Device authentication keys Passwords can also be considered a type of symmetric key Managing includes full key lifecycle

    4. Why Symmetric Key Management? As information becomes more valuable, data protection also grows in importance Encryption safe harbor in breach notification legislation is a significant driver But data is stored and processed in many different layers, locations Databases, files, disks, tapes, virtual images Encrypting data is the (relatively) easy part Managing all the decryption keys is the hard part Symmetric keys are needed for many other purposes as well

    5. Why SKI? Typical key management solutions are application-specific Enterprise IT managers need policy, auditing across the solutions Keys sometimes have to be shared among multiple applications A common key management infrastructure enables IT managers to focus on policy, and applications to focus on security integration SKI = an infrastructure of key managers not a single server

    6. SKI Functions Application interface (illustrative): Get Key (keyID) ? key, attributes Get Key (attributes) ? key, keyID -- lookup, or generate as needed Set Key (keyID, attributes, key) Administrative operations Policy management Key lifecycle: create, distribute, archive, retrieve, revoke, destroy Built on a foundation of identity & access management A role for PKI within the SKI!

    7. Uber versus Meta Key Managers ber key manager stores the keys for other key managers Meta key manager coordinates policies and placement Probably need some of each

    8. SKI vs. PKI Similarities: Policy and lifecycle administration Application interfaces e.g., PKI GetKey (issuer / serial) ? public key / certificate PKI SetKey ~= local generation + certificate registration Differences in key secrecy, availability: PKI public keys: Public, available to everyone PKI private keys: Secret, available to one principal SKI keys: Secret, available to a group of principals typically associated with one data classification

    9. SKI over the Years Even before public-key encryption and PKI, there have always been symmetric keys to manage Data Encryption Standard published in 1976 IBMs work leading to Common Cryptographic Architecture dates back to 1978 X9.17 - Financial Institution Key Management (Wholesale), introduced in 1985 for the banking industry. Kerberos, released in 1987, manages keys for user authentication Conditional access systems have long delivered symmetric keys for cable and satellite TV Branstad-Smid developed Key Notarization Facility for NBS, c. 1983 X9.17 defines: Triple-DES Three-level symmetric key hierarchy (master, key-encrypting, data)Branstad-Smid developed Key Notarization Facility for NBS, c. 1983 X9.17 defines: Triple-DES Three-level symmetric key hierarchy (master, key-encrypting, data)

    10. Towards a Renaissance In a sense, PKI has been the dark ages of SKI SKIs have continued, but have been out of focus for the last decade Risks of renewal without reflection: Trying to use an existing SKI as is Trying to make a new SKI fit the PKI mold Forgetting about lessons learned from both SKI and PKI Better: Apply the experiences of three decades from both areas

    11. Some Lessons to Consider Key hierarchies reduce compromise risk. Master Key / Key Encrypting Key / Data Encrypting Key Lower-levels keys wrapped with (next) higher-level key Time- and context-limited keys PKI trust hierarchies are similar, but for certification, not secrecy Key derivation gives more flexibility and reduces risk, without additional key distribution. Key2 = KDF (Key1, parameters) Benefits: key separation; forward security; subscription models PKI counterparts: forward-secure signatures, ID-based encryption Key derivation needs more explicit support in key management infrastructure, e.g., a way of recording the associations between derived keys and other keys so that its not necessary to do a lookup Key derivation needs more explicit support in key management infrastructure, e.g., a way of recording the associations between derived keys and other keys so that its not necessary to do a lookup

    12. Key Derivation: Example Verifier-specific keys for one-time password tokens: KTV = KDF (KT, IDV) Key manager stores token key KT, distributes KTV to verifier V Token stores KT, derives KTV given IDV Token can authenticate to verifier via KTV; verifiers dont have to share keys Another example: KB = KDF (KA, time) parties can subscribe to supply of keys for a given time interval (Micali 94 for key escrow) Also: KB = KDF (KA, next) KA remains secret if KB compromised ? forward security for non-repudiation

    13. Some Lessons to Consider Key wrapping is more than just encryption. AES-KeyWrap encrypts & integrity-protects key, and can associate with attributes (usage, etc.) Various public-key encryption schemes also offer associated data Keys are security objects, not just sensitive data. Encrypt at security module layer, not (only) application layer i.e., key wrapping and SSL Key usage restrictions provide better control. Encryption vs. authentication vs. key transport vs. MAC generation separate from verification, though same key

    14. Some Lessons to Consider Key classification should be driven by data classification and policy. More than just encryption vs. signature. Key access control should model need to know: more often groups of applications than single principals. Algorithm agility is essential. Not just DES and triple-DES anymore Trusted software execution can help provide assurances required for security modules as well as non-repudiation. Side channel attacks continue to be a threat. Short-lived keys are a valuable countermeasure.

    15. Final Thought: What if There Were No PKI? More accurately: What if there were no PK encryption? Related question: What if PK encryption hadnt been invented? Quantum computing makes this a realistic possibility over a 30-year timeframe

    16. Typical Cryptographic Security Services Today PKI assumes certificates, i.e., a signature algorithm, for identity and attribute managementPKI assumes certificates, i.e., a signature algorithm, for identity and attribute management

    17. The Picture without Todays PK Encryption PKI assumes certificates, i.e., a signature algorithm, for identity and attribute managementPKI assumes certificates, i.e., a signature algorithm, for identity and attribute management

    18. Next, with a Renaissance of SKI PKI assumes certificates, i.e., a signature algorithm, for identity and attribute managementPKI assumes certificates, i.e., a signature algorithm, for identity and attribute management

    19. and Some Other Technologies (Old & New) PKI assumes certificates, i.e., a signature algorithm, for identity and attribute managementPKI assumes certificates, i.e., a signature algorithm, for identity and attribute management

    20. Conclusions Symmetric Key Infrastructures are seeing a renaissance, thanks to increased interest in data protection PKI was perhaps the dark ages for SKI Lessons learned from SKI past as well as PKI present can be applied to SKI future

    21. Questions? Questions?

    22. Contact Information Burt Kaliski RSA Laboratories burt@rsa.com kaliski_burt@emc.com http://www.rsasecurity.com/rsalabs

More Related