Professional Documents
Culture Documents
Computer Security
Key Management
Outline
Symmetric keys.
– Diffie-Hellman Key exchange.
– Man-in-the-Middle attack.
PKC keys.
– Certificates.
• X.509.
– Key generation and storage.
– Handshakes.
– Certification paths.
Key management
Alice Bob
XA YA K
DH DH
YB XB
K
XA, g, p XB, g, p
1: A B: YA
2: B A: YB
Example: p = 13, g = 2.
– A chooses XA = 4.
– B chooses XB = 5.
– YA = 24 mod 13 = 3.
– YB = 25 mod 13 = 6.
– (YB)XA mod p = 64 mod 13 = 9.
– (YA)XB mod p = 35 mod 13 = 9.
DH DH
YB XB
K’=YEXA YE
XA, g, p XB, g, p
K’=(YA)XE K’’=(YB)XE
1: A E: YA
2: E B: YE There are various ways of fixing
this problem (although we aren’t
3: B E: YB
going to look at them here).
4: E A: YE
Key Exchange in PKC
To use a public key algorithm, Alice must have Bob's
public key.
This can be obtained
– Directly from Bob.
– From a public directory.