EP2206276A1 - Vorrichtung und verfahren zur lenkung von austauschflüssen für öffentliche oder nicht vertrauliche werte zur erstellung gemeinsamer geheimschlüssel zwischen mehreren bereichen - Google Patents

Vorrichtung und verfahren zur lenkung von austauschflüssen für öffentliche oder nicht vertrauliche werte zur erstellung gemeinsamer geheimschlüssel zwischen mehreren bereichen

Info

Publication number
EP2206276A1
EP2206276A1 EP08837866A EP08837866A EP2206276A1 EP 2206276 A1 EP2206276 A1 EP 2206276A1 EP 08837866 A EP08837866 A EP 08837866A EP 08837866 A EP08837866 A EP 08837866A EP 2206276 A1 EP2206276 A1 EP 2206276A1
Authority
EP
European Patent Office
Prior art keywords
entities
public
entity
value
mac
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP08837866A
Other languages
English (en)
French (fr)
Inventor
Eric Grall
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales SA
Original Assignee
Thales SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thales SA filed Critical Thales SA
Publication of EP2206276A1 publication Critical patent/EP2206276A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols

Definitions

  • the invention relates to a device and a method for routing public or non-sensitive value exchange flows making it possible to create common secret keys between several zones.
  • OSI level 2 virtualization through the implementation of IEEE 802.1 P, Q IEEE 802.1 p - Traffic Class Expediting and Dynamic Multicast Filtering (published in 802.1 D-1998) and 802.1 Q - Virtual LANs) ( "Using Doc Ref: Article: Author: E 5 NICLAS, IEEE 802.1 P 1 Q - QoS on the MAC level...
  • IGC management key management method
  • the main disadvantage of the prior art is the requirement for an IT department to have a key management infrastructure, and to configure each level 2 or 3 routing equipment at each commissioning.
  • RFC 802.1 P, Q allows in the case of an Ethernet network to provide the ability to create virtual private networks by setting a network number associated with a network. delimited area of the network by Ethernet switches.
  • One of the drawbacks is the fact of not having a sufficient level of security in case of modification of the parameters of the standard 802. P, Q and thus the re-assignment of the network numbers associated with one or more zones. This standard does not provide securing partitioning between configured switch equipment.
  • the present invention relates to an equipment for autonomously configuring security between entities that are made to communicate with each other, by group of confidence or partitioning. It also provides an autonomous group key negotiation mechanism between the aforementioned entities in order to be able to create, from the equipment, a cryptographic filtering of the flows flowing in their respective domains.
  • the invention relates to a method for routing exchange flows of public or non-sensitive values making it possible to create common keys between several zones in a system where the entities communicate with one another by a group of confidence, characterized in that it comprises minus the following steps: o each entity generates a public value and communicates this public value to a switcher, o said switcher has a table of correspondence between a virtual network number and the MAC addresses of the associated entities, where the switcher retrieves all the addresses entities transmitted by the entities by associating them with their MAC address, and retransmits to each of said entities associated with a virtual network from its correspondence table, a public value of another entity belonging to the same trusted group, this step being reiterated for all entities, where each entity recovers the public value of another entity ntity belonging to the same trusted group then determines the value of the encryption key common to the entities of the same trusted group, where an entity belonging to the same trusted group uses this key to encrypt the data to be transmitted to another entity .
  • the invention relates to a system for routing public or non-sensitive value exchange flows making it possible to create common keys between several zones, in a system where the entities communicate with each other by a group of confidence, characterized in that it includes at least the following elements: o an entity includes a cryptography module adapted to generate a public value and a common secret, a referral device comprising a correspondence table establishing the links existing between the virtual network numbers and the MAC addresses of the associated entities, means of communication between the referral device and the entities in such a way that an entity transmits to the referral device a public value, the referral device transmits said public value to another entity belonging to the same confidentiality group and an entity determining the value of the key to encrypt its data.
  • Figure 1 a reminder concerning the mechanism of the Diffie-Hellman protocol
  • Figure 2 a system architecture implementing the router according to the invention
  • Figure 3 a possible correspondence table between a virtual network and MAC addresses (Medium access ..) 4
  • Figure 5 the diagram of the sending of public values Diffie-Hellman to the switchman according to the invention
  • Figure 5 the routing of public values Diffie-Hellman by the FIG. 6, a first example of secure virtual networks generated
  • FIG. 8 the Ethernet Trame format integrating the security option
  • FIG. FIG. 9 the format of a frame integrating the option of calculation of integrity.
  • the invention can, however, apply as soon as entities can communicate with each other, by trust group or partitioning.
  • the router according to the invention makes it possible to create trust groups and to convey the public values of each of the entities in order to enable them to generate a secret element associated with each of the groups.
  • Figure 1 recalls the Diffie-Hellman or DH protocol, whose principles are described in the article published by Diffie-Hellman in 1976, under the title "New Directions in Cryptography.” IEEE Trans. On The Information Theory, Vol.lT-22-6, November 1976. The main result of this article is the possibility for two users communicating via an unsafe network to agree on a session key, intended to encode their communications later.
  • G ⁇ g> be a cyclic group.
  • the two participants U 1 , U 2 each randomly choose X 15 X 2 belonging to G respectively and exchange the values g x1 , g x2 on the network.
  • the user Ui (respectively U 2 ) then calculates the Diffie-Hellman secret g x1x2 by receiving the message of U 2 (resp Ui).
  • FIG. 2 represents an example of an architecture integrating the mechanism and the switchman according to the invention comprising:
  • the network implements, for example, the IP internet protocol.
  • the router the various entities communicate with each other via a switch 4 for example, which allows the connection of the entities to each other according to the configuration data from the switchman.
  • the design of this switch is known to those skilled in the art and will not be detailed in the present patent application.
  • the router 1 is characterized, for example by means of its MAC (Medium Access Control) address and IP Internet address, in the example. It includes ways to manage group rules and the associated protocol. It is designated "switchman".
  • An encryption module (or cryptography) in the form of a software or a circuit (in English term “Hardware") is integrated in each of the equipment or entity 2i of the network.
  • This encryption module 5 has the particular function of enabling the implementation of the Diffie-Hellman protocol or any other similar protocol for each entity and calculating the group DH secret value for the common secret.
  • An entity is for example characterized by its MAC address and has cryptographic capabilities.
  • the device according to the invention implements in this example a protocol on the Ethernet layer 2, integrating several fields characterizing the identification of a virtual network generated by the router, and the integrity patterns of the level 2 frame. .
  • the "switchman" equipment 1 has a set of rules for creating virtual networks. For this, it has a correspondence table described in Figure 3 between the virtual network numbers and the MAC addresses of the associated entities.
  • Each of the entities of the network generates a secret or public value Diffie Hellman g IDl , then each of the entities sends a message to the switchman with his public value Diffie-Hellman g IDl .
  • the transmitted messages are shown schematically in Figure 4 by arrows F, an arrow being indexed with a public value g IDl .
  • the router 1 retrieves all the public values transmitted by the entities by associating them with their MAC address:
  • the public value g ID1 is associated with the MACi address of the entity 1 and so on for the following entities 2 to N, g ID2 , MAC address 2 , g IDN , Address
  • the router then sends each entity the Diffie-Hellman value corresponding to the entities associated with a virtual network (component of the trusted network) from its correspondence table.
  • the sender transmits the public value generated by the entity 2 g ID2
  • the sender transmits the public value generated by the entity 1g ID1
  • the frame format used is for example the format described in FIG. 8.
  • the frame comprises the following fields: a source MAC field, a destination MAC field, a SKP field corresponding to the security option, a DATA data field and a security field. Error control field or CRC.
  • the SKP field comprises, for example, the number RV (virtual network number), the identifier of the entities belonging to the virtual network concerned and the value of Diffie-
  • Each of the entities retrieves the Diffie-Hellman value of the entity associated with the same virtual network and will calculate from this value the secret common to the entities belonging to the same virtual network. For example, in Figure 5.
  • entity 1 calculates the common secret g ID1
  • ID2 ID1 (MACi): (g ID2 ) ID1 -> g ID1 ID2 ; entity 2, ID2 (MAC 2 ): (g ID1 ) ID2 -> g ID1 ID2
  • ID3 (MAC 3 ) and ID4 (MAC 4 ) ID3 (MAC 3 ) entity (g ID4 ) ID3 -> g ID3 ID4 ;
  • Each of the entities then calculates the integrity pattern from a SHA1 hash algorithm described for example in the FIPS 180-2 reference "Federal Information Processing Standards Publications”: FIPS PUB 180-2 - Secure Hash Standard (SHS) - August 2002, and integrates it into the ETHERNET frame to define the partitioning between virtual networks by the verification of the integrity reason.
  • This step is shown in FIG. 6.
  • the partitioning of the networks is represented by solid lines Ci which connect, for example, the addresses ID 1 and ID 2 , the virtual network formed corresponding to the virtual network 1, etc.
  • the parameters defining the virtual network and its security will take the form of an option to be inserted in the Ethernet.v2 format.
  • the format is for example that described in FIG. 9.
  • the field SKP is replaced by a field RVS (Secure Virtual Network) which includes the identifier ID, the label and the control of message integrity or "MIC" abbreviated Billboard Integrity Control message.
  • RVS Secure Virtual Network
  • each of the control modules of the flow direction between the entities has all the security elements that allows it to secure the flow through its referral module (via the creation of a common key by the DH mechanism).
  • the switching equipment will have to send the public values defined by the pairs formed by the network entities by repeating the above phase so that each entity can calculate the Diffie-Hellman group secret.
  • the operation of the invention is therefore defined in several phases described below:
  • Each of the network entities generates a Diffie Hellman secret ID1 , then each entity will send a message to the switchman with its public value Diffie-Hellman g IDi (FIG 4).
  • the switcher will retrieve all the values of the entities by associating them with their MAC address: g ID1 , MACi address g ID2 , MAC address 2 g IDN , MAC address N
  • the switcher will exchange (according to the format figure 8) with each of the entities the value Diffie-Hellman with respect to entities associated with a virtual network from its correspondence table (FIG.5).
  • Virtual Network 1 MACi
  • Each of the entities will then recover the Diffie-Hellman value of the entity associated with the same virtual network and will calculate from this value a first common secret, and will return this value to the switchman as long as the number of public secret received is different from the number of participants in the virtual network.
  • ID3 (MAC 3 ): (g ID4 ) ID3 -> g ID4 ID3 ; ID4 (MAC 4 ): (g ID3 ) ID4 -> g ID3 ID4
  • ID4 (MAC 4 ): (g ID5 ) ID4 -> g ID4 ID5 ; ID5 (MAC 5 ): (g ID4 ) ID5 -> g ID4 ID5 For ID3 (MAC 3 ) and ID5 (MAC 5 )
  • ID3 (MAC 3 ): (g ID5 ) ID3 -> g ID3 ID5 ; ID5 (MAC 5 ): (g ID3 ) ID5 -> g ID3 ID5
  • Each of the entities will then return this value to the switchman until the number of public secret received is equal to the number of participants in the virtual network.
  • the referral device will then direct these values to the network entity to finalize the group value.
  • ID3 (MAC 3 ) entity ID4 ID5 g) ID3 -> g ID3 ID4 ID5
  • ID4 (MAC 4 ) entity ( ID3 ID5 g) ID4 -> g ID3 ID4 ID5
  • ID5 (MAC 5 ) entity (g ID3 ID4 ) ID5 -> g ID3 ID4 ID5
  • Each of the entities will then be able to calculate the integrity pattern from a SHA1 type hashing algorithm, and integrate it. in the ETHERNET frame to define the partitioning between virtual networks by checking the reason of integrity.
  • the partitioning is represented by the arrows Dj in solid lines of FIG.
  • an entity is, for example, equipment that is usually used in an Ethernet network and the flows exchanged are IP flows.
  • the switcher according to the invention is therefore an entity that allows to create trusted groups, and to route the public values of each entity to allow them to create a secret element associated with each group.
  • Each entity has crypto (DH) capabilities.
  • the switcher has only abilities to manage group rules and the associated protocol.
  • the invention can be implemented with software bus techniques (middleware, or middleware in English), in which the entities are represented by the notion of interconnected software services (between them following a service d 'phone book).
  • the router according to the invention will be a particular service accessible by all other services.
  • the application to partitioned networks is also possible, for example, the invention is used for Ethernet / IP networks via a local virtual network system or in English VLAN (virtual local area network) based on switches or based on on routers in the case of VPN (Virtual Private Network).
  • the invention particularly has the following advantages: a simplification in the configuration and flexibility in the parameterization of the equipment in a virtual network, and secondly, the security in terms of integrity and confidentiality of the communication flow between the equipment forming a virtual network.
  • the method and the system according to the invention are based on the fact of distributing the notion of trust and groups between the switcher and the communicating nodes, and thus to manage the creation of dynamic keys in a compartmentalized manner, in which the switcher has no concept of cryptographic security but just a notion of trust group, while the nodes individually bear this cryptographic capacity but without notion of security associations.
  • the invention thus allows the effective separation between the group management and the dynamic securing of these groups.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
EP08837866A 2007-10-12 2008-10-10 Vorrichtung und verfahren zur lenkung von austauschflüssen für öffentliche oder nicht vertrauliche werte zur erstellung gemeinsamer geheimschlüssel zwischen mehreren bereichen Withdrawn EP2206276A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0707180A FR2922392B1 (fr) 2007-10-12 2007-10-12 Dispositif et procede pour aiguiller des flux d'echange de valeurs publiques (ou non sensibles) permettant de creer des cles secretes communes entre plusieurs zones.
PCT/EP2008/063609 WO2009047325A1 (fr) 2007-10-12 2008-10-10 Dispositif et procede pour aiguiller des flux d'echange de valeurs publiques ou non sensibles permettant de creer des cles secretes communes entre plusieurs zones

Publications (1)

Publication Number Publication Date
EP2206276A1 true EP2206276A1 (de) 2010-07-14

Family

ID=39491370

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08837866A Withdrawn EP2206276A1 (de) 2007-10-12 2008-10-10 Vorrichtung und verfahren zur lenkung von austauschflüssen für öffentliche oder nicht vertrauliche werte zur erstellung gemeinsamer geheimschlüssel zwischen mehreren bereichen

Country Status (4)

Country Link
US (1) US20110093696A1 (de)
EP (1) EP2206276A1 (de)
FR (1) FR2922392B1 (de)
WO (1) WO2009047325A1 (de)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8401024B2 (en) * 2004-01-14 2013-03-19 Telefonaktiebolaget Lm Ericsson (Publ) Ethernet address management system
FR2970134B1 (fr) * 2010-12-29 2013-01-11 Viaccess Sa Procede de transmission et de reception d'un contenu multimedia
US8627076B2 (en) * 2011-09-30 2014-01-07 Avaya Inc. System and method for facilitating communications based on trusted relationships
CN103414691B (zh) * 2013-07-17 2017-02-08 中国人民解放军国防科学技术大学 基于地址即公钥的自信任网络地址及密钥分配方法
MY197976A (en) 2013-10-07 2023-07-25 Fornetix Llc System and method for encryption key management, federation and distribution
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
CN105141597B (zh) * 2015-08-13 2018-08-14 中国人民解放军国防科学技术大学 一种基于标识即公钥的自表示安全路由授权方法
CN105072116B (zh) * 2015-08-13 2018-09-18 中国人民解放军国防科学技术大学 基于标识即公钥的自信任路由资源标识及密钥分配方法
US10860086B2 (en) 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
US11063980B2 (en) 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US10931653B2 (en) 2016-02-26 2021-02-23 Fornetix Llc System and method for hierarchy manipulation in an encryption key management system
US10880281B2 (en) 2016-02-26 2020-12-29 Fornetix Llc Structure of policies for evaluating key attributes of encryption keys
US10917239B2 (en) 2016-02-26 2021-02-09 Fornetix Llc Policy-enabled encryption keys having ephemeral policies
CA3051851A1 (en) 2017-01-26 2018-08-02 Semper Fortis Solutions, LLC Multiple single levels of security (msls) in a multi-tenant cloud
CN112910784B (zh) * 2019-12-03 2023-03-24 华为技术有限公司 路由的确定方法、装置和系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19847941A1 (de) * 1998-10-09 2000-04-13 Deutsche Telekom Ag Verfahren zum Etablieren eines gemeinsamen krytografischen Schlüssels für n Teilnehmer
SE9900472L (sv) * 1999-02-12 2000-08-13 Ericsson Telefon Ab L M Förfarande och arrangemang för att möjliggöra krypterad kommunikation
US6684331B1 (en) * 1999-12-22 2004-01-27 Cisco Technology, Inc. Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
US7260648B2 (en) * 2001-01-25 2007-08-21 Ericsson, Inc. Extension of address resolution protocol (ARP) for internet protocol (IP) virtual networks
US7234063B1 (en) * 2002-08-27 2007-06-19 Cisco Technology, Inc. Method and apparatus for generating pairwise cryptographic transforms based on group keys
US7587591B2 (en) * 2003-10-31 2009-09-08 Juniper Networks, Inc. Secure transport of multicast traffic
EP1870814B1 (de) * 2006-06-19 2014-08-13 Texas Instruments France Verfahren und Vorrichtung für sicheren, nachfragebasierten Seitenabruf für Prozessorvorrichtungen
US7509491B1 (en) * 2004-06-14 2009-03-24 Cisco Technology, Inc. System and method for dynamic secured group communication
JP4692258B2 (ja) * 2005-12-07 2011-06-01 株式会社日立製作所 ルータ装置及び通信システム

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2009047325A1 *

Also Published As

Publication number Publication date
FR2922392B1 (fr) 2011-03-04
FR2922392A1 (fr) 2009-04-17
WO2009047325A1 (fr) 2009-04-16
US20110093696A1 (en) 2011-04-21

Similar Documents

Publication Publication Date Title
EP2206276A1 (de) Vorrichtung und verfahren zur lenkung von austauschflüssen für öffentliche oder nicht vertrauliche werte zur erstellung gemeinsamer geheimschlüssel zwischen mehreren bereichen
US12034703B2 (en) Dynamic, user-configurable virtual private network
Perrig et al. SCION: a secure Internet architecture
US9258282B2 (en) Simplified mechanism for multi-tenant encrypted virtual networks
US8966270B2 (en) Methods and systems for providing controlled access to the internet
EP1351440B1 (de) Vorrichtung zur sicheren Mehrfachsendung
FR2872983A1 (fr) Systeme de pare-feu protegeant une communaute d'appareils, appareil participant au systeme et methode de mise a jour des regles de pare-feu au sein du systeme
FR2988942A1 (fr) Methode et systeme d'etablissement d'une cle de session
Paillisse et al. IPchain: Securing IP prefix allocation and delegation with blockchain
EP3695571B1 (de) System und verfahren zur datenübertragung
EP2186252B1 (de) Verfahren zur verteilung kryptografischer schlüssel in einem kommunikationsnetz
WO2011151573A1 (fr) Procede et dispositifs de communications securisees dans un reseau de telecommunications
EP2243247A1 (de) Verfahren zum austausch von schlüsseln durch indexierung in einem mehrwegenetzwerk
Alzahrani et al. Key management in information centric networking
US20080082822A1 (en) Encrypting/decrypting units having symmetric keys and methods of using same
WO2004036867A1 (en) Multi-path secured network communication
Paillissé Vilanova Next generation overlay networks: security, trust, and deployment challenges
FR3144730A1 (fr) Procédé de transmission sécurisée d'un élément secret entre un premier équipement de télécommunication et au moins un deuxième équipement de télécommunication
WO2022219551A1 (en) Computer-implemented methods and systems for establishing and/or controlling network connectivity
EP4156606A1 (de) Verfahren zur verwaltung eines benutzers, der in einer gruppenkommunikation beteiligt ist
Kadimbadimba On the design of a secure and anonymous publish-subscribe system
SIGCOMM Internet Routing & Addressing (FIRA)
FR2900776A1 (fr) Procede de securisation de donnees

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20100422

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

17Q First examination report despatched

Effective date: 20101210

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20110621