14
Future Key Management Methods David McGrew Fellow, Cisco Systems IRTF Crypto Forum Chair [email protected] Overview Goal: consider methods that might be useful in future Key Management frameworks Threshold Cryptography Manufacturing Certificates Automating Manual Key Distribution Symmetric Key Generation Systems June 8, 2009 Future Key Management Methods 2

Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

     

    

     

                    

 

 

     

     

         

Future Key Management Methods

David McGrew Fellow, Cisco Systems

IRTF Crypto Forum Chair [email protected]

Overview

• Goal: consider methods that might be useful in future Key Management frameworks

• Threshold Cryptography

• Manufacturing Certificates

• Automating Manual Key Distribution

• Symmetric Key Generation Systems

June 8, 2009 Future Key Management Methods 2

Page 2: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

   

Share Creation Operation   

      

Reconstruct Secret Operation

  

   

         

 

                   

   

   

            

               

         

Threshold Secret Sharing

Share Creation Operation

SecretSecret

Share 2

Share 3

Share 1

Share 4

Reconstruct Secret Operation

SecretSecret

Share 1

Share 4

June 8, 2009 3Future Key Management Methods

Threshold Cryptography

• Threshold Secret Sharing – IRTF Crypto Forum RG draft

• Test considerations and cases, usage guidance

– Storage encryption applications

– Split access control

• Threshold signature generation – M out of N entities can sign

– IETF PKIX and DNSSEC interest in threshold RSA

June 8, 2009 Future Key Management Methods 4

Page 3: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

 

     

   

 

         

        

 

         

Manufacturing certificates

Device private key Device certificate

Device ID

Acme CA certificate

Acme CA

Manufacturer

June 8, 2009 Future Key Management Methods 5

Devices shipped with certs, privkeys

ManufacturerDevice ABC

Device XYZ

June 8, 2009 6Future Key Management Methods

Page 4: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

        

 

  

  

         

    

 

   

   

         

Devices can authenticate each other

ManufacturerDevice ABC

Device XYZ

subjectName: ABC Issuer: Acme

subjectName: XYZ Issuer: Acme

June 8, 2009 7Future Key Management Methods

Remaining problem: authorization Device ABC

Do I trust XYZ?

Do I trust ABC?

Device XYZ

June 8, 2009 Future Key Management Methods 8

Page 5: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

   

            

 

       

        

         

   

            

                         

     

   

         

Manufacturing Certificate Use

• Data Over Cable Service Interface Specification (DOCSIS)

• WiMAX Forum

• Digital Transmission Content Protection (DTCP)

• IEEE 802.1AR Secure Device Identity – Pre‐ballot review

June 8, 2009 Future Key Management Methods

Manual Key Distribution

• Manual key generation problematic – Offline and online dictionary attacks

– Randomness assurance difficult • Is NM1FE1R2W good? No, it's a 10/100 Ethernet 1 4/16 Token‐Ring 2 WAN card!

– Key usage assurance difficult

• Key replacement/updating problematic

June 8, 2009 Future Key Management Methods

9

10

Page 6: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

       

                                                      

                                

                    

                                             

                             

                                                          

               

         

       

                

                     

            

       

         

Prevalence of manual key distribution

• Security Protocols – Internet Key Exchange (RFC 2409, RFC 4306) and TLS (RFC 4279) with pre‐shared keys – MIKEY: Multimedia Internet KEYing (RFC 3830) – RADIUS (RFC 2865) – Using Digest Authentication as a SASL Mechanism (RFC 2831)

• Routing Security – Protection of BGP Sessions via the TCP “MD5 Signature Option” (RFC 2385 ) – Open Shortest Path First (OSPFv3) (RFC 4552) – Intermediate System to Intermediate System (IS‐IS) (RFC 3358, RFC 5304)

• Connectivity and Mobility – Layer Two Tunneling Protocol ‐ Version 3 (L2TPv3) (RFC 3931) – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489) – IP Mobility Support (RFC 3220, RFC 3344 , RFC 3012 , RFC 3775, RFC 4285)

• Network Infrastructure – Resource Reservation Protocol (RSVP) (RFC 4230) – Dynamic Host Configuration Protocol (RFC 3315, RFC 3118, RFC 4030) – NBMA Next Hop Resolution Protocol (NHRP) (RFC 2332 ) – Secret Key Transaction Authentication for DNS (TSIG) (RFC 2845)

• Applications – RFC 2195 IMAP/POP AUTHorize Extension for Simple Challenge/Response.

June 8, 2009 Future Key Management Methods

Replace MKD with minimal impact?

• Idea: automated key management that can slip into existing systems

• Requirements – Authenticated/authorized distribution of keys – Keys must persist over long term – System replaces/updates keys when needed – Key creation should not be centralized – Minimal operational impact – Interoperability with MKD is desirable

June 8, 2009 Future Key Management Methods

11

12

Page 7: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

   

         

 

         

Manual Key Distribution

CryptoAlgorithmCrypto

Algorithm

Key

Key

Key

June 8, 2009 13Future Key Management Methods

KeyServiceKey

Service

Automating MKD

KeyClientKey Client

CryptoAlgorithmCrypto

Algorithm

Keyname

Keyname

Keyname

June 8, 2009 14Future Key Management Methods

Page 8: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

 

                

                     

                   

           

         

   

   

 

   

   

     

         

Automating MKD

• Key client authenticates to service using device‐specific key or certificate

• Service checks authorization, passes out keys • ‘Keyname’ replaces ‘key’

– password123 is now a label, not key material!

• Bootstrapping issue – Public key protocol or manufacturing certificate

• E.g. Diffie‐Hellman authenticated by manual key

• Service can be used by multiple applications

June 8, 2009 Future Key Management Methods

MKD Replacement Candidates

Authenticatio n

Transport Key Lifetime Key Creation

AAA (RADIUS)

Shared secret Pull, Push

Short Centralized

Session KM (Kerberos)

Flexible Pull Short Centralized

Group KM (GDOI)

Flexible Pull, Push

Medium Centralized

Storage KM (OASIS KMIP, IEEE

Flexible Pull, Push

Long Decentralized

1619.3)

June 8, 2009 Future Key Management Methods

15

16

Page 9: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

   

   

 

   

   

     

         

   

   

 

   

   

     

         

         

MKD Replacement Candidates

Shared secret

Flexible

Flexible

Flexible

Authenticatio n

Transport Key Lifetime Key Creation

AAA Pull, Short Centralized

(RADIUS) Push

Session KM Pull Short Centralized

(Kerberos)

Group KM Pull, Medium Centralized

(GDOI) Push

Storage KM (OASIS Pull,

Long Decentralized KMIP, IEEE Push 1619.3)

June 8, 2009 Future Key Management Methods

MKD Replacement Candidates

Authenticatio n

Transport Key Lifetime Key Creation

AAA (RADIUS)

Shared secret Pull, Push

Short Centralized

Session KM (Kerberos)

Flexible Pull Short Centralized

Group KM (GDOI)

Flexible Pull, Push

Medium Centralized

Storage KM (OASIS KMIP, IEEE 1619.3)

Flexible Pull, Push

Long Decentralized

Requirements match those of storage encryption

June 8, 2009 Future Key Management Methods

17

18

Page 10: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

     

                         

                                             

         

   

   

   

         

         

Symmetric Key Generation System

• Blom [84], Blundo et. al. [96], Eschenauer and Gligor [02] – Much recent research in wireless/sensor context – Symmetric version of Identity‐based crypto

• Each member holds O(T) secret state • Secure against compromise of C ≤ T members

– Group of C ≤ T gateways cannot compute other pairwise keys

June 8, 2009 Future Key Management Methods 19

Key generation function

KGS

User X Secret

User Y Identifier

Pairwise key for X and Y

June 8, 2009 20Future Key Management Methods

Page 11: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

   

   

   

   

   

 

         

 

         

Key generation function

KGS

User X Secret

User Y Identifier

Same key output

KGS

User Y Secret

User X Identifier

June 8, 2009 21Future Key Management Methods

KGS Example

June 8, 2009 22Future Key Management Methods

Page 12: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

 

         

   

         

T‐compromise resistance

June 8, 2009 23Future Key Management Methods

Generating pairwise keys

f f

June 8, 2009 24Future Key Management Methods

Page 13: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

 

       

           

            

         

      

             

         

     

         

                                  

                          

         

KGS Advantages

• Avoids key‐fetch (latency and computation)

• Peers need not be known in advance

• Provides tradeoff between storage, communication, and compromise resistance

• Does not require online, available TTP

• T‐compromise resistant – Choice of T flexible

– Storage is O(T), independent of number of users

June 8, 2009 Future Key Management Methods

A KGS using GF(2128)

• Uses Galois/Counter Mode (GCM) GF(2128) representation – Up to 2128 ‐ 1 group members – Can use efficient algorithms – similar to GCM – Key generation is equivalent to processing 16T bytes with GCM

– T ~ 90 is equivalent to a typical packet • Key generation as fast as data plane

June 8, 2009 Future Key Management Methods

25

26

Page 14: Cryptographic Key Management Workshop 2009 - Future Key ... · – Teredo: Tunneling IPv6 over UDP through NATs (RFC 4380 ) – Simple Traversal of UDP Through NATs (STUN) (RFC 3489)

     

   

                      

         

Thanks for your attention

• Questions?

• Contact info: [email protected]

For those viewing via webcast, please submit questions for this presentation to [email protected]

June 8, 2009 Future Key Management Methods 27