PUBLIC-KEY CERTIFICATES



Similar documents
associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Authentication Applications

DIMACS Security & Cryptography Crash Course, Day 2 Public Key Infrastructure (PKI)

7 Key Management and PKIs

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

Authentication Applications

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Key Management and Distribution

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Module 7 Security CS655! 7-1!

How To Make A Trustless Certificate Authority Secure

Neutralus Certification Practices Statement

How To Understand And Understand The Security Of A Key Infrastructure

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Asymmetric cryptosystems fundamental problem: authentication of public keys

Authentication Application

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Key Management and Distribution

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

The IVE also supports using the following additional features with CA certificates:

PKI NBP Certification Policy for ESCB Signature Certificates. OID: version 1.5

Introduction to Network Security Key Management and Distribution

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Configuring Digital Certificates

Operational Research Consultants, Inc. Non Federal Issuer. Certificate Policy. Version 1.0.1

Number of relevant issues

TELSTRA RSS CA Subscriber Agreement (SA)

Lecture VII : Public Key Infrastructure (PKI)

Certificates, Certification Authorities and Public-Key Infrastructures

Certificates, Certification Authorities and Public-Key Infrastructures

Network Security: Public Key Infrastructure

Comodo Certification Practice Statement

Public Key Infrastructure

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Authority Product Overview Technology White Paper

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.

TeliaSonera Public Root CA. Certification Practice Statement. Revision Date: Version: Rev A. Published by: TeliaSonera Sverige AB

Introduction to Cryptography

Certificates and network security

Ciphermail S/MIME Setup Guide

X.509 Certificate Revisited

Midterm Solutions. ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED

Displaying SSL Certificate and Key Pair Information

Chapter 7 Managing Users, Authentication, and Certificates

TR-GRID CERTIFICATION AUTHORITY

CMS Illinois Department of Central Management Services

CS 6393 Lecture 7. Privacy. Prof. Ravi Sandhu Executive Director and Endowed Chair. March 8,

Certification Practice Statement

Security Digital Certificate Manager

Security Digital Certificate Manager

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: version 1.2

SECOM Trust.net Root1 CA

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Ericsson Group Certificate Value Statement

Public Key Infrastructure. A Brief Overview by Tim Sigmon

SWITCHaai Metadata CA. Certificate Policy and Certification Practice Statement

Djigzo S/MIME setup guide

Danske Bank Group Certificate Policy

Displaying SSL Certificate and Key Pair Information

KIBS Certification Practice Statement for non-qualified Certificates

Advantage Security Certification Practice Statement

Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004

Visa Public Key Infrastructure Certificate Policy (CP)

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

TR-GRID CERTIFICATION AUTHORITY

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

- X.509 PKI SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

CERTIFICATE POLICY KEYNECTIS SSL CA

Intelligence Community Public Key Infrastructure (IC PKI)

Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5

Certification Practice Statement

DigiCert Certification Practice Statement

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Certificate technology on Pulse Secure Access

Echoworx Encryption Services UK CA Certificate Policy and Certification Practices Statement

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Certificate technology on Junos Pulse Secure Access

Symantec Managed PKI Service for Windows Service Description

Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2

Chapter 4 Virtual Private Networking

CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT

Grid Computing - X.509

Websense Content Gateway HTTPS Configuration

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

Transcription:

INFS 766 Internet Security Protocols Lecture 6 Digital Certificates Prof. Ravi Sandhu PUBLIC-KEY CERTIFICATES reliable distribution of public-keys public-key encryption sender needs public key of receiver public-key digital signatures receiver needs public key of sender public-key key agreement both need each other s public keys 2

THE CERTIFICATE TRIANGLE user X.509 attribute certificate X.509 identity certificate attribute SPKI certificate public-key 3 X.509 CERTIFICATE VERSION SERIAL NUMBER SIGNATURE ALGORITHM ISSUER VALIDITY SUBJECT SUBJECT PUBLIC KEY INFO SIGNATURE 4

X.509 CERTIFICATE 0 1234567891011121314 RSA+MD5, 512 C=US, S=VA, O=GMU, OU=ISE 9/9/99-1/1/1 C=US, S=VA, O=GMU, OU=ISSE, CN=Ravi Sandhu RSA, 1024, xxxxxxxxxxxxxxxxxxxxxxxxx SIGNATURE 5 CERTIFICATE TRUST how to acquire public key of the issuer to verify signature whether or not to trust certificates signed by the issuer for this subject 6

PEM CERTIFICATION GRAPH Policy Certification Authorities (PCAs) IPRA Internet Policy Registration Authority HIGH ASSURANCE MID-LEVEL ASSURANCE RESIDENTIAL PERSONA MITRE Certification Authorities (CAs) GMU Virginia Anonymous Abrams ISSE Fairfax LEO Subjects Sandhu Sandhu 7 CRL FORMAT SIGNATURE ALGORITHM ISSUER LAST UPDATE NEXT UPDATE REVOKED CERTIFICATES SIGNATURE SERIAL NUMBER REVOCATION DATE 8

PGP BOTTOM UP TRUST MODEL How does Alice get Bob s public key directly from Bob through some secure channel (e.g., post, phone, floppy) from Chuck, who is known to both Alice and Bob and introduces Bob to Alice from a trusted certifying authority PGP has mechanisms to support these, and related, alternatives 9 X.509 CERTIFICATES X.509v1 very basic X.509v2 adds unique identifiers to prevent against reuse of X.500 names X.509v3 adds many extensions can be further extended 10

SEPARATE KEYS FOR SEPARATE PURPOSES RSA is the only known public-key cryptosystem in which the same public-private key pair can be used for digital signatures encryption perceived as a major advantage 11 SIGNATURE KEYS private key: must be private for entire life, may never leave smart card needs to be securely destroyed after lifetime no need for backup or archiving (would conflict with above) no need to weaken or escrow due to law public key: must be archive possibly for a long time 12

ENCRYPTION KEY private key: backup or archive required for recovery should not be destroyed after lifetime may be weakened/escrowed due to law public key: no need to backup RSA or other encryption keys need to backup Diffie-Hellman key agreement keys 13 X.509 INNOVATIONS distinguish various certificates signature, encryption, key-agreement identification info in addition to X.500 name name other than X.500 name email address issuer can state policy and usage good enough for casual email but not good enough for signing checks limits on use of signature keys for further certification 14

X.509v3 EXTENSIONS X.509v3 same as X.509v2 but adds extensions provides a general extension mechanism extension type: registered just like an algorithm is registered standard extension types: needed for interoperability 15 X.509v3 EXTENSIONS CRITICALITY non-critical: extension can be ignored by certificate user alternate name can be non-critical critical : extension should not be ignored by certificate user limit on use of signatures for further certification 16

X.509v3 EXTENSIONS CRITICALITY criticality is flagged by certificate issuer certificate user may consider non-critical extensions more important than critical ones certificate user may refuse to use certificate if some extensions are missing critical extensions should be few and should be standard 17 X.509v3 NAMES internet email address internet domain name web uri (url's are subset of uri) IP address X.400 email address X.500 directory name registered identifier other name 18

X.509v3 STANDARD EXTENSIONS Key and policy information Subject and issuer attributes Certification path constraints Extensions related to CRLs will be discussed with CRLs 19 KEY AND POLICY INFORMATION key usage critical: intended only for that purpose, limits liability of CA non-critical: advisory to help find the correct key, no liability implication private-key usage period certificate valid for 2 years for verifying signature key valid only for one year for signing certificate policies for CAs 20

SUBJECT AND ISSUER ATTRIBUTES Subject alternative names Issuer alternative names Subject directory attributes whatever you like position, phone, address etc. 21 CERTIFICATION PATH CONSTRAINTS Basic Constraints can or cannot act as CA if can act as CA limit on certification path limit=1 means cannot certify other CAs Name Constraints limits names of subjects that this CA can issue certificates for Policy Constraints concerned with CA policies 22

CERTIFICATE REVOCATION LISTS CRLs issued periodically as per CA policy off-cycle CRLs may also be needed blank CRLs can be issued 23 CERTIFICATE REVOCATION LISTS CRL distribution pull method push method DMS example pull method with push for compromised key list (CKL) which is broadcast via secure email, single CKL for entire system 24

CERTIFICATE REVOCATION LISTS immediate or real-time revocation needs query to CA on every certificate use maybe ok for small closed communities 25 REVOCATION TIME-LINE Issue Of CRL 1 Revocation Request Issue Of CRL 2 Compromise Event Revocation Time 26

OCSP ON-LINE CERTIFICATE STATUS PROTOCOL consult authoritative server the server in turn can look up CRLs 27 SHORT-LIVED CERTIFICATES Authorization certificates can be short lived minutes, hours, days instead of months, years 28

X.509 CRL EXTENSIONS General Extensions CRL distribution points Delta-CRLs Indirect-CRLs Certificate Suspension 29 GENERAL EXTENSIONS Reason Code Key Compromise CA Compromise Affiliation changed Superseded Cessation of operation Remove from CRL: defer till Delta-CRL Certificate hold: defer Invalidity Date 30

CRL DISTRIBUTION POINTS CRLs can get very big version 1 CRL (1988, 1993) each CA has two CRLs: one for end users, one for CAs end user CRL can still be very big version 2 CRL can partition certificates, each partition associated with one CRL distribution point also can have different distribution points for different revocation reasons 31 CRL DISTRIBUTION POINTS certificate extension field, says where to look CRL extension field distribution point for this CRL and limits on scope and reason of revocation protects against substitution of a CRL from one distribution point to another 32

DELTA-CRLs Delta CRL indicator only carries changes from previous CRL Remove from CRL reason code causes purge from base CRL (stored at certificate user) removal due to expiry of validity period or restoration of suspension 33 INDIRECT-CRL CRL can be issued by different CA than issuer of certificate allows all compromise revocations to be one list allows all CA revocations to be on one list (simplify certificate chasing) 34

CERTIFICATE SUSPENSION Certificate hold reason code in CRL Supporting CRL entry extension Instruction code: instructions on what to do with held certificate call CA, repossess token 35 GENERAL HIERARCHICAL STRUCTURE Z X Y Q R S T A C E G I K M O a b c d e f g h i j k l m n o p 36

GENERAL HIERARCHICAL STRUCTURE WITH ADDED LINKS Z X Y Q R S T A C E G I K M O a b c d e f g h i j k l m n o p 37 TOP-DOWN HIERARCHICAL STRUCTURE Z X Y Q R S T A C E G I K M O a b c d e f g h i j k l m n o p 38

PEM CERTIFICATION GRAPH Policy Certification Authorities (PCAs) IPRA Internet Policy Registration Authority HIGH ASSURANCE MID-LEVEL ASSURANCE RESIDENTIAL PERSONA MITRE Certification Authorities (CAs) GMU Virginia Anonymous Abrams ISSE Fairfax LEO Subjects Sandhu Sandhu 39 SET CA HIERARCHY Root Brand Brand Brand Geo-Political Bank Acquirer Customer Merchant 40

FOREST OF HIERARCHIES 41