NetSP/Krypto-Knight

Key Distribution and Authentication

Presented by: Charlie Perkins

Contact: Amir Herzberg
amir@watson.ibm.com

IBM T. J. Watson Research Center
Hawthorne, New York


NetSP/KryptoKnight


___________________________________________________________
NetSP              | Kerberos          | Public-key
___________________|___________________|___________________ 
                   |                   |
Key distribution,  | Key distribution, | Key distribution,
Authentication     | Authentication,   | Authentication,
                   | Access control    | Signatures
-------------------|-------------------|-------------------
Secure Server      | Secure server     | Req. only
                   | and sync. clocks  |  secure off-line
                   |                   | certification srvr
-------------------|-------------------|-------------------
64-240 b/pkt       | 265-1024 b/pkt    | 1024-2048 b/pkt
-------------------|-------------------|-------------------
10^-5 sec/pkt      | 10^-4 sec/pkt     | 10^-1 s/pkt
-------------------|-------------------|-------------------
Exportable         | Crypto routines   | Non-exportable
                   | not exportable    |
-------------------|-------------------|-------------------
All configurations | Only A-AS-A-B-A   | n/a
___________________|___________________|___________________

Versatile Connectivity Configurations

Figure (GIF - 10134 bytes)


2PP Protocol: Auth + Key Exchange

Figure (GIF - 12676 bytes)

Simple 3PP: Key Distribution by A-B-AS-B-A

Figure (GIF - 7346 bytes)


Power Functionality


Why semi-secure servers?

Algorithm remains secure as long as even one system is not compromised.