Midterm Solutions. ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED



Similar documents
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

7 Key Management and PKIs

Neutralus Certification Practices Statement

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Cryptography and Network Security Chapter 14

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The Concept of Trust in Network Security

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Module 7 Security CS655! 7-1!

Authentication Applications

Certification Practice Statement

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

PUBLIC-KEY CERTIFICATES

Computer and Network Security. Outline

Security Digital Certificate Manager

Security Digital Certificate Manager

Asymmetric cryptosystems fundamental problem: authentication of public keys

Authentication Applications

Understanding Digital Certificates and Secure Sockets Layer (SSL)

SSL/TLS: The Ugly Truth

Concept of Electronic Approvals

NIST ITL July 2012 CA Compromise

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Information Security

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

TPM Key Backup and Recovery. For Trusted Platforms

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

PKI: Public Key Infrastructure

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Authentication Application

An Introduction to Entrust PKI. Last updated: September 14, 2004

HKUST CA. Certification Practice Statement

Lecture VII : Public Key Infrastructure (PKI)

Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities

White Paper. The risks of authenticating with digital certificates exposed

HMRC Secure Electronic Transfer (SET)

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

TELSTRA RSS CA Subscriber Agreement (SA)

Ericsson Group Certificate Value Statement

1 Definitions

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

CALIFORNIA SOFTWARE LABS

Secure Web Access Solution

How To Understand And Understand The Security Of A Key Infrastructure

DIGIPASS CertiID. Getting Started 3.1.0

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

DEPARTMENT OF DEFENSE ONLINE CERTIFICATE STATUS PROTOCOL RESPONDER INTEROPERABILITY MASTER TEST PLAN VERSION 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

National Certification Authority Framework in Sri Lanka

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

Virginia Commonwealth University School of Medicine Information Security Standard

Introduction to Network Security Key Management and Distribution

Guidelines Related To Electronic Communication And Use Of Secure Central Information Management Unit Office of the Prime Minister

An Introduction to Cryptography and Digital Signatures

Websense Content Gateway HTTPS Configuration

CS 392/681 - Computer Security

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures

Guidelines on use of encryption to protect person identifiable and sensitive information

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Introduction to Cryptography

Security Model in E-government with Biometric based on PKI

X.509 Certificate Revisited

MCSA Security + Certification Program

Content Teaching Academy at James Madison University

SENDING AND RECEIVING PROTECTED INFORMATION VIA ELECTRONIC MAIL. Naval Medical Center Portsmouth IMD Training Division

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

TELE 301 Network Management. Lecture 18: Network Security

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Public Key Infrastructure for a Higher Education Environment

Chapter 7: Network security

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Understanding and Integrating KODAK Picture Authentication Cameras

What is network security?

Database Security. The Need for Database Security

Frequently Asked Questions

Department of Defense PKI Use Case/Experiences

Danske Bank Group Certificate Policy

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

GT 6.0 GSI C Security: Key Concepts

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS Aristotle University of Thessaloniki PKI ( WHOM IT MAY CONCERN

Capital District Vulnerability Assessment

Transcription:

Midterm Solutions ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED Name: 1) Alice wants to send Bob a digitally-signed piece of email from her desktop computer to his. Assume the following: a) Alice uses certification authority X and has a public key certificate issued by X. b) Bob uses certification authority Y and has a public key certificate issued by Y. c) Y is a root CA and X is a non-root CA, certified by X. d) Alice has a true copy of X's public key certificate. e) Bob has a true copy of Y's public key certificate. f) X and Y each have a directory service by which users can retrieve public key certificates each CA has signed. g) Alice and Bob both use the same email program that uses public key-based digital signatures. Only the signature will be attached to the message. The first and last steps of the process are given in below. Fill in the rest of the steps needed for the protocol to be successful. Be complete, including steps that would most likely be automated. (Hint: there are more than ten steps.) Begin: Alice writes a message M to send to Bob. Alice uses her public key to sign the message. Alice sends the message to Bob. Bob opens the message and detects the digital signature. Bob queries X for a copy of Alice's public key certificate, or Bob asks for and receives from Alice for a copy of her certificate. Bob detects X's signature on Alice's public key certificate. He queries X for a copy of its public key certificate. Bob detects Y's signature on the public key certificate. Bob retrieves Y's certificate from Y and discovers that it is a root certificate. Bob checks that the certificate is valid, can be used for certificate issuance, and is associated with Y. Bob verifies the signature on Y's self-signed certificate. Bob retrieves a CRL from Y and makes sure that X's certificate is not revoked. Bob checks that the certificate is valid, can be used for certificate issuance, and is associated with X. Bob verifies the signature of Y on X's certificate. Bob retrieves a CRL from X and makes sure that Alice's certificate is not revoked. Bob verifies the signature of X on Alice's certificate.

Bob checks that the certificate is valid, can be used for signing, and is associated with Alice. Bob verifies the signature of Alice on the email message. End: Bob reads the message M, knowing that it is the message that Alice signed.

2) Eve is attempting to prevent Alice and Bob from communicating securely. She cannot physically disconnect Alice, Bob and the certification authorities X and Y, and she does not have the resources to break the cryptography and forge Alice's signature. What else might she do to disrupt the process described in Question #1? Denial of service against Bob's email program and/or email service. Host attack against Alice's computer to steal her private key. Host attack against Bob's computer to alter the message after signature validation. Host attack against Bob's computer to alter the signature verification software. Host attack against Bob's computer to delete Alice's message. Masquerade attack against X to get Alice's certificate revoked. Denial of service attack against X and/or Y to prevent certificate validation.

3) You have passed ECT 582 with flying colors and are now in great demand as an e-commerce security consultant. Your client Alice owns and operates a defense contracting business of around 80 employees with close ties with the federal government. The Department of Defense is requiring that all contractors encrypt their email communications regarding the technical details of contracted work using public key encryption. They are also requiring that electronically-submitted proposals and bids for contracts be digitally signed. Alice is not familiar with public key encryption and has hired you to help her decide how to implement encryption policies for her company. Alice's organization is very flexible and organized around its contracts of which there may be 10 or more going on at once. Most employees work on multiple contracts, but each contract has a single project manager responsible for interacting at an official level with contacts in the government and military. There is usually a great deal of interaction with government managers, scientists and other personnel during the course of a project. There is a separate Contracting department (10 employees) that works on bids and project proposals. There may be dozens of proposals being prepared at any one time. Because the government's security requirements, all private keys must be generated and stored in secure hardware tokens, certificate issuance policies might provide high assurance, those possessing such keys must have background checks, and only government-approved certification authorities can be used. This makes certificate generation expensive, and Alice's first idea was that she, her chief operating officer, and the head of the Contracting division will each get one certificate. Write a memo to Alice outlining an effective strategy for meeting the DoD requirements and integrating public-key cryptography into her business. Address the following points: a. Certificate issuance: Explain why Alice's idea of obtaining three certificates is not a good one. Provide an alternate policy for certificate issuance. Who in the organization needs to have a public key certificate? Do some individuals need more than one certificate? Can you prioritize the need for certificates if Alice decides to get some immediately and others later? b. Infrastructure: Outline the technical infrastructure that Alice will need. You can assume that her engineers and office staff use standard PC workstations. What additional components will be necessary to make effective use of encryption / digital signatures and meet the contracting requirements? There is no single right answer to this question. I was looking for thoughtful and thorough consideration of various issues involved. 1. Three certificates is not enough. The primary reason is that encryption and signature keys have different purposes and different life cycles and one key cannot serve both purposes. If Alice's COO has an encryption certificate and the Contracting Officer has a signing certificate, what type does Alice have? If she has a signing key, then she can't interact securely with the government. If she has an encryption key, then she can't sign. To avoid a single point of failure, she (at the very least) would need to have both kinds of keys. 2. An encryption key is useful only for receiving encrypted mail, and because the key is issued to an individual and stored in a hardware token, it will need to be closely associated with an individual. It would be theoretically possible for a small number of individuals to do all the decryption for the whole company. (Necessarily more than one for single point of failure reasons.) However, a solution like this seems to introduce a bottleneck into the regular communication between Alice's company and its contacts. If we are going to introduce such a concentration point, the most logical place is probably the project manager. (Just for backup, a senior person under the manager might also having a key.)

3. As far as signing is concerned, there may only be a few individuals in the organization who are authorized to engage the company in contractual matters. Alice and the head of the contracting unit would be the absolute minimum for signing keys. It could be argued that more members of the contracting unit might ultimately need keys. 4. Alice will need to augment her technical infrastructure to meet the new requirements of encryption and digital signature. She will need software for encrypting email and for digitally signing documents. She will need hardware and software for interacting with the hardware tokens that are used to store private keys. She will need software to interact with the CA when keys are generated and certificates need to be issued. She will probably need to consider the problem of archiving encryption keys. She will have to develop key management policies including key lifetime, procedures for generating keys and requesting certificates (probably in conjunction with the CA's policies.)