04 Cryptographic Protocols Flashcards
How is a cryptographic protocol defined?
A cryptographic protocol is defined as a series of steps and message exchanges between multiple entities in order to achieve a specific security objective.
What are some general properties of a protocol?
- Everyone involved in the protocol must know the protocol and all the steps to follow in advance
- Everyone involved in the protocol must agree to follow it
- The protocol must be unambiguous, every step is well defined and there is no chance of misunderstanding
- The protocol must be complete (a specified action for every possible situation)
* Additional property of a cryptographic protocol:
- It should not be possible to do or learn more than what is specified in the protocol
What are some applications of Cryptographic Protocols?
- Key exchange
- Authentication
- Data origin authentication
- Entity authentication
- Combined authentication and key exchange
- Secret splitting (all parts needed for reconstruction)
- Secret sharing (m out of n parts needed for reconstruction)
- Time-stamping
- Key escrow (ensuring that only an authorized entity can recover keys)
- Zero-Knowledge proofs (proof of knowledge of an information without revealing the information)
- Bling signatures (privacy-preserving time-stamping services)
- Secure elections
- Electronic money (like Bitcoins)
Explain some concerns about the Diffie-Hellman (cryptographic protocol) for key exchange:
- The protocol does not realize any authentication
- Both parties (Alice, Bob)
How does PFS (Perfect Forward Secrecy) takes place?
- PFS (Perfect Forward Secrecy) takes place when a separation of key exchange and authentication of the exchange happens.
- If a key exchange ensures PFS, then a compromise of one key in the future will not allow to compromise any data that has been protected with other keys exchanged before that compromise.
- Example: Alice and Bob sign the data exchanged to compute sk with their private keys. Even the compromise of a private key in the future will not allow to decrypt recorded data that has been protected with sk.
What is Data Origin Authentication?
Data origin authentication is the security service that enables entities to verify that a message has been originated by a particular entity and that it has not been altered afterwards.
Also called: data integrity.
What is the relation of data integrity to cryptographic protocols?
- There are cryptographic protocols to ensure data integrity. They comprise just one protocol step and are not very “exciting”:
- Example 1: everybody knows Alice’s public RSA key and its sure to know really Alice’s key, Alice then can insure data integrity of her messages by encrypting them with her private key.
- Example 2: Alice can also compute MDC over her messages and append the MDC encrypted with her private key to the message.
- Data integrity of messages exchanged is often an important property in cryptographic protocols, so data integrity is a building block to cryptographic protocols.
What is Entity Authentication?
- Entity Authentication is a security service that enables communication partners to verify the identity of their peer entities.
- Entity authentication is the most fundamental security service, as all other security services build upon it.
How can Entity Authentication be accomplished?
- Knowledge: passwords.
- Possession: physical keys or cards.
- Immutable characteristics: biometric properties.
- Location: evidence to verify that an entity is at a specific place.
- Delegation of authenticity: the verifying entity accepts, that somebody who is trusted has already established authentication.
- ^ In communication networks, direct verification of the above means is difficult or insecure which motivates the need for cryptographic protocols.
Why entity authentication is more than an exchange of (data-origin) authentic messages?
- Timeliness:
- A party B receiving authentic messages from A, can not be sure if the other member is actually participating in the communication at THAT specific moment or if a third party C is replaying old messages from A.
- This is of specific significance, when authentication is only performed at
connection-setup time (tranmission of a PIN).
What 2 means can be used to ensure timeliness in cryptographic protocols?
- Timestamps (requiring synchronized clocks)
- Random numbers (challenge-response exchanges)
Most authentication protocols do also establish a secret session key for securing the current session following the authentication exchange.
What are the two main categories of protocols for entity authentication?
- Arbitrated authentication:
- Arbiter as a TTP (Truted Third Party) directly involved in every authentication exchange.
- Direct authentication:
- A and B directly authenticate to each other.
Describe the advantages and drawbacks of Arbitrated authentication:
- Advantages:
- Allows two parties A and B to authenticate to each other without knowing any pre-established secret.
- Even if A and B don’t know each other, symmetric crypto can be used.
- Drawbacks:
- The TTP (Trusted Third Party) can become a bottleneck
- The availability of the TTP is critical
- The TTP can monitor ALL authentication activity
Describe the advantages and drawbacks of Direct authentication:
- Advantages:
- No online participation of a third party is required and no possible performance bottleneck is introduced.
- Requires asymmetric cryptography or pre-established secret keys.
Describe the meaning of some notation of Cryptographic Protocols (1):