SlideShare uma empresa Scribd logo
1 de 23
Key Management
cryptography
What is Key Management?
★ Key management is the management of cryptographic keys in a
cryptosystem.
★ This includes dealing with the generation, exchange, storage, use, and
replacement of keys.
★ It includes cryptographic protocol design, key servers, user procedures,
and other relevant protocols.
★ It deals with entire key lifecycle.
Why are we talking about key management?
★ With the rise of Cybercrime, companies are investing significant amounts
in Information Security in order to protect themselves, their employees and
partners, but in the end that might not be enough.
★ Threats:
○ compromise of confidentiality of secret keys
○ compromise of authenticity of secret or public keys.
○ unauthorized use of public or secret keys
Key management techniques
a)Symmetric-key encryption:
Key management techniques
b)Public-key
encryption:
Key LifeCycle
Distribution of
Public Keys
★ Public announcement
★ Publicly available
directory
★ Public-key authority
★ Public-key certificates
Public announcement
Publicly available
directory
Public-key
authority
Public-key certificates
Diffie Hellman key exchange algorithm
★ First public key algorithm proposed by Diffie and Hellman in 1976.
★ Used only for key exchange
★ Used In many commercial products
All users agree on two parameters 1) large prime number q 2)
primitive root a
each user (eg. A) generates their key:
chooses a secret key(number):
xA < q
compute their public key:
yA = a^xA mod q
public keys are stored in universal directory
Algorithm:
shared session key for users A & B is KAB:
KAB = axA.xB mod q
= yA^xB mod q (which B can compute)
= yB^xA mod q (which A can compute)
KAB is used as session key in private-key encryption scheme between Alice and Bob
if Alice and Bob subsequently communicate, they will have the same key as before,
unless they choose new public-keys
Disadvantage:
1)man in the middle attack
2) authentication is needed
Algorithm:
Digital Certificate
Digital Certificate
★ A digital identity document binding a public key to a specific person or
organization
★ Certification Authorities are the digital world’s equivalent to passport
offices. They issue digital certificates and validate holders’ identity and
authority
What is the Process of obtaining a
certificate?
How do You Obtain An Individual’s Public
Key?
How Digital Certificates are Used for
Message Encryption?
X.509 Certificates
In Chrome, Settings->Advanced Setting->Manage Certificates
In Wireshark, SSL packets captured
Thank You

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
IP Security
IP SecurityIP Security
IP Security
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Web Security
Web SecurityWeb Security
Web Security
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
DES
DESDES
DES
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
S/MIME
S/MIMES/MIME
S/MIME
 

Semelhante a Key management

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
Workshop on 03 11-2012
Workshop on 03 11-2012Workshop on 03 11-2012
Workshop on 03 11-2012
Gaurav Gautam
 
Hybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colonyHybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colony
قصي نسور
 
Unicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - Cryptolab
Unicaseed
 

Semelhante a Key management (20)

Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
 
man in the middle
man in the middleman in the middle
man in the middle
 
Workshop on 03 11-2012
Workshop on 03 11-2012Workshop on 03 11-2012
Workshop on 03 11-2012
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Hybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colonyHybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colony
 
Crypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT AuditorCrypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT Auditor
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
 
Module 21 (cryptography)
Module 21 (cryptography)Module 21 (cryptography)
Module 21 (cryptography)
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptxManagement of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Automation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret ManagementAutomation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret Management
 
16974 ch 15 key management
16974 ch 15 key management16974 ch 15 key management
16974 ch 15 key management
 
Unicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - CryptolabUnicaseeds Demo Days - Cryptolab
Unicaseeds Demo Days - Cryptolab
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 

Mais de Sujata Regoti

Mais de Sujata Regoti (9)

Social media connecting or disconnecting
Social media connecting or disconnectingSocial media connecting or disconnecting
Social media connecting or disconnecting
 
Image retrieval
Image retrievalImage retrieval
Image retrieval
 
Web mining tools
Web mining toolsWeb mining tools
Web mining tools
 
Servlet and jsp interview questions
Servlet and jsp interview questionsServlet and jsp interview questions
Servlet and jsp interview questions
 
Git,Github,How to host using Github
Git,Github,How to host using GithubGit,Github,How to host using Github
Git,Github,How to host using Github
 
Technical aptitude test 2 CSE
Technical aptitude test 2 CSETechnical aptitude test 2 CSE
Technical aptitude test 2 CSE
 
Technical aptitude Test 1 CSE
Technical aptitude Test 1 CSETechnical aptitude Test 1 CSE
Technical aptitude Test 1 CSE
 
Big Data
Big DataBig Data
Big Data
 
Inflation measuring
Inflation measuringInflation measuring
Inflation measuring
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Key management

  • 2. What is Key Management? ★ Key management is the management of cryptographic keys in a cryptosystem. ★ This includes dealing with the generation, exchange, storage, use, and replacement of keys. ★ It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. ★ It deals with entire key lifecycle.
  • 3. Why are we talking about key management? ★ With the rise of Cybercrime, companies are investing significant amounts in Information Security in order to protect themselves, their employees and partners, but in the end that might not be enough. ★ Threats: ○ compromise of confidentiality of secret keys ○ compromise of authenticity of secret or public keys. ○ unauthorized use of public or secret keys
  • 7. Distribution of Public Keys ★ Public announcement ★ Publicly available directory ★ Public-key authority ★ Public-key certificates
  • 12. Diffie Hellman key exchange algorithm ★ First public key algorithm proposed by Diffie and Hellman in 1976. ★ Used only for key exchange ★ Used In many commercial products
  • 13. All users agree on two parameters 1) large prime number q 2) primitive root a each user (eg. A) generates their key: chooses a secret key(number): xA < q compute their public key: yA = a^xA mod q public keys are stored in universal directory Algorithm:
  • 14. shared session key for users A & B is KAB: KAB = axA.xB mod q = yA^xB mod q (which B can compute) = yB^xA mod q (which A can compute) KAB is used as session key in private-key encryption scheme between Alice and Bob if Alice and Bob subsequently communicate, they will have the same key as before, unless they choose new public-keys Disadvantage: 1)man in the middle attack 2) authentication is needed Algorithm:
  • 16. Digital Certificate ★ A digital identity document binding a public key to a specific person or organization ★ Certification Authorities are the digital world’s equivalent to passport offices. They issue digital certificates and validate holders’ identity and authority
  • 17. What is the Process of obtaining a certificate?
  • 18. How do You Obtain An Individual’s Public Key?
  • 19. How Digital Certificates are Used for Message Encryption?
  • 21. In Chrome, Settings->Advanced Setting->Manage Certificates
  • 22. In Wireshark, SSL packets captured