SlideShare uma empresa Scribd logo
1 de 17
Key management
KodeGear
(http://www.kodegear.co.kr)
1
Contents
• Introduction
• Fixed Key
• Master / Session Key
• DUKPT
• Closing
2
Introduction
• Cryptography
– Confidentiality: keep information secret
– Authentication: legitimate author/user?
– Integrity: Is the data compromised?
– Non-repudiation: Protect denial
3
Introduction
• Cryptography
– Encryption/Decryption: make a cryptogram
for the unauthorized not be able to figure
out the data
– Hash (Message Digest): digest a message
into a fixed length hash value, no key is
needed
– MAC (Massage Authentication Code): make
a fixed length MAC value, key is needed
4
Introduction
• Symmetric Algorithm
– Same key (Symmetric Key) is used for
encryption and decryption
– Example: DES, AES
– Easier and faster than asymmetric algorithm
– Must transfer key in secure manner
5
Introduction
• Asymmetric Algorithm
– Different keys (Asymmetric Key) are used
– Key pairs (private/public keys) are
mathematically linked
– Example: RSA
– Harder and slower than symmetric algorithm
– No need to transfer decryption key
6
Fixed Key
• Physically load a key (fixed) to the client
• The client encrypt a data with the key
• The host decrypt the data with the key
• The key is replaced on either plan or key
compromise
• Same key is used over and over for
encipherment
7
Fixed Key
Host Client (device)
Network
Data
encryption
Data Data Data
decryption
8
Master / Session Key
• Share a master key between host and
client beforehand
• Host generates a session key before
transaction
• Host encrypts the session key with the
master key and send to client
• Client decrypts the encrypted session
key with the master key shared
beforehand
9
Master / Session Key
• Must generate and share a new master
key if the master key is compromised
• Still popular because of effectiveness
• Adoption of asymmetric for master key
• Developed before asymmetric algorithm
was developed
10
Master / Session Key
PRIVATEPUBLIC
Host Client (device)
Generate asymmetric key pair and tra
nsfer private key to client at factory
Symmetric Key
PRIVATE
Encrypted
Symmetric Key
Encrypted
Symmetric Key
encryption decryption
Symmetric Key
Network
11
Master / Session Key
Host Client (device)
Data encryption and decryption with
symmetric key
Data
encryption
Data
Network
Data Data
decryption
12
DUKPT
• Derived Unique Key Per Transaction
• Host has BDK (Base Derivation Key) and
generates IPEK (Initial Pin Encryption Key)
• IPEK is inserted into client
• Client generates Future Key sets and
remove IPEK
13
DUKPT
• Future Key is used for data encryption
• The used future key is replaced with a
newly generated future key
• Client transmits key set id, client id and
transaction counter with encrypted data
• Host calculates the encryption key with
the transmitted data and decrypt
14
DUKPT
IPEKBDK
Host Client (device)
IPEK
generation
Network
generation
21 Future Keys
Will be remove
d after generati
on of future key
Used future key
is replaced with
a new one
15
DUKPT
BDK
Host Client (device)
Network
21 Future Keys
DataData
encryption
DataData
decryption
calculation
16
Closing
• Key managements are not limited with
these three ways – can be used mingled
• The devices should be tamper proof
• Reference: ANS X9.24-1
17

Mais conteúdo relacionado

Mais procurados

12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Mais procurados (20)

Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
SSL
SSLSSL
SSL
 
SSL intro
SSL introSSL intro
SSL intro
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
IP Security
IP SecurityIP Security
IP Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Destaque

Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
mmubashirkhan
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 

Destaque (20)

Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Snort
SnortSnort
Snort
 
Snort ppt
Snort pptSnort ppt
Snort ppt
 
Hcl
HclHcl
Hcl
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Wireshark
WiresharkWireshark
Wireshark
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 

Semelhante a Key management

Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 

Semelhante a Key management (20)

Steve Jones - Encrypting Data
Steve Jones - Encrypting DataSteve Jones - Encrypting Data
Steve Jones - Encrypting Data
 
Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013Data Security Essentials - JavaOne 2013
Data Security Essentials - JavaOne 2013
 
501 ch 10 cryptography
501 ch 10 cryptography501 ch 10 cryptography
501 ch 10 cryptography
 
Protecting Your Data with Encryption
Protecting Your Data with EncryptionProtecting Your Data with Encryption
Protecting Your Data with Encryption
 
Crypto academy
Crypto academyCrypto academy
Crypto academy
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Webinar: Technical Introduction to Native Encryption on MongoDB
Webinar: Technical Introduction to Native Encryption on MongoDBWebinar: Technical Introduction to Native Encryption on MongoDB
Webinar: Technical Introduction to Native Encryption on MongoDB
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Encryption
EncryptionEncryption
Encryption
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Arcanum - Client side encryption based file storage service.
Arcanum - Client side encryption based file storage service.Arcanum - Client side encryption based file storage service.
Arcanum - Client side encryption based file storage service.
 
fengmei.ppt
fengmei.pptfengmei.ppt
fengmei.ppt
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
fengmei.ppt
fengmei.pptfengmei.ppt
fengmei.ppt
 
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 

Último

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Último (20)

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 

Key management

  • 2. Contents • Introduction • Fixed Key • Master / Session Key • DUKPT • Closing 2
  • 3. Introduction • Cryptography – Confidentiality: keep information secret – Authentication: legitimate author/user? – Integrity: Is the data compromised? – Non-repudiation: Protect denial 3
  • 4. Introduction • Cryptography – Encryption/Decryption: make a cryptogram for the unauthorized not be able to figure out the data – Hash (Message Digest): digest a message into a fixed length hash value, no key is needed – MAC (Massage Authentication Code): make a fixed length MAC value, key is needed 4
  • 5. Introduction • Symmetric Algorithm – Same key (Symmetric Key) is used for encryption and decryption – Example: DES, AES – Easier and faster than asymmetric algorithm – Must transfer key in secure manner 5
  • 6. Introduction • Asymmetric Algorithm – Different keys (Asymmetric Key) are used – Key pairs (private/public keys) are mathematically linked – Example: RSA – Harder and slower than symmetric algorithm – No need to transfer decryption key 6
  • 7. Fixed Key • Physically load a key (fixed) to the client • The client encrypt a data with the key • The host decrypt the data with the key • The key is replaced on either plan or key compromise • Same key is used over and over for encipherment 7
  • 8. Fixed Key Host Client (device) Network Data encryption Data Data Data decryption 8
  • 9. Master / Session Key • Share a master key between host and client beforehand • Host generates a session key before transaction • Host encrypts the session key with the master key and send to client • Client decrypts the encrypted session key with the master key shared beforehand 9
  • 10. Master / Session Key • Must generate and share a new master key if the master key is compromised • Still popular because of effectiveness • Adoption of asymmetric for master key • Developed before asymmetric algorithm was developed 10
  • 11. Master / Session Key PRIVATEPUBLIC Host Client (device) Generate asymmetric key pair and tra nsfer private key to client at factory Symmetric Key PRIVATE Encrypted Symmetric Key Encrypted Symmetric Key encryption decryption Symmetric Key Network 11
  • 12. Master / Session Key Host Client (device) Data encryption and decryption with symmetric key Data encryption Data Network Data Data decryption 12
  • 13. DUKPT • Derived Unique Key Per Transaction • Host has BDK (Base Derivation Key) and generates IPEK (Initial Pin Encryption Key) • IPEK is inserted into client • Client generates Future Key sets and remove IPEK 13
  • 14. DUKPT • Future Key is used for data encryption • The used future key is replaced with a newly generated future key • Client transmits key set id, client id and transaction counter with encrypted data • Host calculates the encryption key with the transmitted data and decrypt 14
  • 15. DUKPT IPEKBDK Host Client (device) IPEK generation Network generation 21 Future Keys Will be remove d after generati on of future key Used future key is replaced with a new one 15
  • 16. DUKPT BDK Host Client (device) Network 21 Future Keys DataData encryption DataData decryption calculation 16
  • 17. Closing • Key managements are not limited with these three ways – can be used mingled • The devices should be tamper proof • Reference: ANS X9.24-1 17