120 likes | 211 Views
This paper explores encryption protocols for decentralized authentication and secure communications in large computer networks, presenting techniques for both symmetric and public key algorithms. It discusses authentication servers, one-way communication methods, digital signatures, and more.
E N D
Using Encryption for Authentication in Large Networks of Computers Roger M. Needham Michael D. Schroeder
Purpose • Present protocols for decentralized authentication • Authenticated interactive communication • Authenticated one-way communication • Signed communication
Environment • No centralized information collection • Each computer can perform encryption • Intruder can interpose in all communication paths • Each principal has secure environment in which to compute
Protocols • Conventional algorithms (symmetric crypt.) • each principal has a secret key known to it, and Authentication Server • To set up “secure channel,” a message must have two properties • Must be comprehensive only to receiver. Receiver can then use contents to identify himself to sender. • Receiver must know sender sent it.
Symmetric Two-Way Algorithm • A -> AS: A, B, IA1 • AS -> A: {IA1, B, CK, {CK, A}KB}KA • A -> B: {CK, A}KB • B -> A: {IB}CK • A -> B: {IB - 1}CK
Public Key Two-Way Algorithm • A -> AS: A, B • AS -> A: {PKB, B}SKAS • A -> B: {IA, A}PKB • B -> AS: B, A • AS -> B: {PKA, A}SKAS • B -> A: {IA, IB}PKA • A -> B: {IB}PKB
Authentication Servers • Multiple Authentication Servers • Different AS for A and B • Implementing Authentication Servers • Symmetric & PK differences - secrecy & integrity • not much difference
One-Way communication • Symmetric Key • A -> B: {CK, A}KB • Public Key • A -> B: {A,I,{B}SKA}PKB • Time integrity is a problem due to replay • time-stamps • receiver stores {source, time-stamp} • Signature can be used as well
Digital Signatures • Provide evidence to a 3rd party that a message is unchanged • Verify who sent the message • Sender must have unique signing ability • Characteristic function/One-Way hash func. • Allows “signature” to be smaller than the cleartext message
Digital Signature with Symmetic Encryption • A -> AS: A, {CSM}KA • AS -> A: {A, CSM}KAS • A -> B: {M, {A, CSM}KAS}KB • B -> AS: B, {A, CS}KAS • AS -> B: {A, CS}KB
Signature with PK Encryption • A -> B: {{text-block}SKA}PKB • easier! • Still may want to use CS to speed authentication of signature • Old PK’s must be stored by AS, and signature must contain time.
Conclusions • Protocols using pk and conventional encryption are similar • PK has advantage only in signed communications for these systems • Need means to evaluate the validity of protocols