Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
75 views19 pages

Public Key Algorithm & Authentication Protocols: Click To Edit Master Subtitle Style

This document discusses public key algorithms and authentication protocols. It provides an overview of public key encryption using RSA, describing how keys are generated using large prime numbers. It also discusses authentication protocols including using a shared secret key where a challenge-response mechanism is used, Diffie-Hellman key exchange to establish a shared secret key, and authentication through a trusted key distribution center using protocols like Kerberos.

Uploaded by

Arun Rajan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views19 pages

Public Key Algorithm & Authentication Protocols: Click To Edit Master Subtitle Style

This document discusses public key algorithms and authentication protocols. It provides an overview of public key encryption using RSA, describing how keys are generated using large prime numbers. It also discusses authentication protocols including using a shared secret key where a challenge-response mechanism is used, Diffie-Hellman key exchange to establish a shared secret key, and authentication through a trusted key distribution center using protocols like Kerberos.

Uploaded by

Arun Rajan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Public Key algorithm & Authentication protocols

Click to edit Master subtitle style Presented By: Arun Rajan

4/28/12

Public key Algorithms

Deffie and Hellman 1976 at Stanford University Use different keys for encryption and decryption Denotations:

Encryption algorithm : E Decryption algorithm : D Plain text : P

4/28/12

These algorithms should meet 3 requirements

D ( E(P) ) = P It is exceedingly difficult to deduce D from E. E cannot be broken by a chosen plain text attack.

4/28/12

RSA Algorithm

Rivest, Shamir, Adleman in 1978 Compute the following in advance:

Choose 2 large primes p, q (typically greater than 10^100) Compute n = p*q & z = (p-1)*(q-1) Choose a no. relative prime to z and call it d. Find e such that

4/28/12

Example:

P=3 and q=11 n=33 z=20 d=7 since 7 and 20 has no common factors e 7e = 1 (mod 20)

e= 3 C = p^3 (mod 33) P = c^7 (mod 33)


4/28/12

4/28/12

Authentication Protocols

It is a technique by which a process verifies that its communication partner is who it is supposed to be and not an imposter.

4/28/12

Authentication based on a shared secret key

Notations

A, B are the identities of Alice and Bob R i are the challengers K i are keys, where i indicates the owner

4/28/12

Message sequence: Alice sends her identity , A, to Bob in a way that Bob understands. Bob, of-course, has no way of knowing whether this message came from Alice or from some one else. so he chooses a challenge ie, a large random number, RB and sends it back to Alice as message 2, in plain text. Alice then encrypts the message with the key she shares with Bob and send the cipertext, KAB(RB), back in message 3.
4/28/12 When

Bob sees the message, he

4/28/12

Establishing a shared key: The Diffie Hellman key Exchange

This is a way for strangers to establish a shared secret key in any manner without bothering any intruders.

4/28/12

Diffie-hellman key exchange works as follows.

Alice and Bob have to agree on two large prime numbers, n, and g, where (n-1)/2 is also a prime and certain conditions apply to g. These numbers may be public, so either one of them can just pick n and g and tell the other openly. Now Alice picks a large (say, 512 bit) number, x, and keeps it secret. Similarly, Bob picks a large secret 4/28/12 number, y.

4/28/12

Authentication Using a key distribution center

The wide mouth frog authentication protocol The Needham Schroeder authentication protocol The Otway- Rees authentication protocol
4/28/12

A different approach is to introduce a trusted key distribution center (KDC). In this model, each user has a single key shared with the KDC. Authentication and session key management now goes through the KDC. The idea behind the wide-mouth frog protocol is simple. Alice picks a session key, Ks, and tells the KDC that she wants to talk to Bob using Ks. This message is encrypted with 4/28/12 the secret key Alice shares (only)

It is a variant of Needham Schroeder It is developed to allow workstation users to access network resources in a secure way Widely used version V4

Authentication using Kerberos

Kerberos involves 3 additional servers Authentication server : Verifies users during login Ticket granting server : Issues Proof of

4/28/12

Authentication using Public key cryptography

Here Alice starts by encrypting her identity and a random number, RA, using Bobs public (or encryption) key, EB. When Bob receives this message he has no idea of whether it come from Alice or not, but he plays along and sends Alice back a message containing Alices RA, his own random number, RB, and a proposed session key, Ks.
4/28/12

4/28/12

Thank You

4/28/12

You might also like