G. J. Popek and C. S. Kline @ UCLA
ACM Computing Surveys, December 1979, pages 331-356. Only sections 1-3
Tapping of lines |
|
Introduction of forged messages |
|
Replay of valid messages |
|
Disruption of network |
Probability of an error being undetected with k check bits is (1/2k) |
Stream cipher, to cipher a bit of the message, uses:
|
|||||||
Block cipher, to cipher a block of the message, uses:
|
|||||||
Strong stream ciphers are more easily constructed that strong block ciphers |
|||||||
Block stream ciphers make updating blocks easy |
Have a minimum trusted mechanism and minimum centralized authority to reduce the chance of errors |
Processing on the data is done in clear-text, which must be somehow protected from internal threats |
|||||||||
Keys may be passed among entities (like capabilities in HYDAR), resulting in sharing the key between entities. Selective revocation of keys is difficult |
|||||||||
Encryption can detect modification of data, but can't prevent it |
|||||||||
Key must be maintained as long as the data encrypted with the key are valid
|
Initial distribution of keys is difficult since secure distribution depends upon receivers having the key of the sender. This can be broken by securely distributing the key over a previously secure conduit |
|||||||||||
Centralized key control: Fig 1
|
|||||||||||
Fully distributed key control
|
|||||||||||
Hierarchical key distribution
|
Assume each entity has made its public key known to the key authority (KA) and the key authority has a public key known to all |
|||||||||||||||
Suppose A and B want to communicate (Fig 2):
|
|||||||||||||||
Public keys can be cached, eliminating four of the seven message above |
|||||||||||||||
Another way is to use certificate of KA |