UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION



Similar documents
Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

7 Key Management and PKIs

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

RSA Security RSA Keon Certificate Authority PKI Product

Public-Key Infrastructure

Number of relevant issues

CS 356 Lecture 28 Internet Authentication. Spring 2013

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Public Key Infrastructure for a Higher Education Environment

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

An Introduction to Entrust PKI. Last updated: September 14, 2004

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Deploying and Managing a Public Key Infrastructure

Axway Validation Authority Suite

A Survey of State of the Art in Public Key Infrastructure

Overview. SSL Cryptography Overview CHAPTER 1

AD CS.

Validity Models of Electronic Signatures and their Enforcement in Practice

Certificate Policies and Certification Practice Statements

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

TeleTrusT European Bridge CA Status and Outlook

Introduction to Network Security Key Management and Distribution

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

RSA Digital Certificate Solution

How To Understand And Understand The Security Of A Key Infrastructure

CERTIFICATE POLICY KEYNECTIS SSL CA

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Conclusion and Future Directions

Using BroadSAFE TM Technology 07/18/05

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

PKI: Public Key Infrastructure

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.

A PKI ARCHITECTURE USING OPEN SOURCE SOFTWARE FOR E- GOVERNMENT SERVICES IN ROMANIA

Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

CMS Illinois Department of Central Management Services

Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

DIMACS Security & Cryptography Crash Course, Day 2 Public Key Infrastructure (PKI)

Public Key Infrastructure

Savitribai Phule Pune University

1 Public Key Cryptography and Information Security

Digital Signatures in a PDF

Visa Public Key Infrastructure Certificate Policy (CP)

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

NIST Test Personal Identity Verification (PIV) Cards

How To Make A Trustless Certificate Authority Secure

Unique Challenges in Architecting a Healthcare PKI that Spans Public and Private Sectors

Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3

Certificate Authority Product Overview Technology White Paper

Key Management and Distribution

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

An Introduction to Cryptography as Applied to the Smart Grid

Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module

National Security Agency Perspective on Key Management

Introduction to Cryptography

Asymmetric cryptosystems fundamental problem: authentication of public keys

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

CALIFORNIA SOFTWARE LABS

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

DEPARTMENT OF DEFENSE ONLINE CERTIFICATE STATUS PROTOCOL RESPONDER INTEROPERABILITY MASTER TEST PLAN VERSION 1.0

Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5

NIST ITL July 2012 CA Compromise

Trust Service Principles and Criteria for Certification Authorities

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

Presented by Jordi Palet Consulintel. University of Murcia (Spain)

Understanding Encryption Services Using Wireshark Sunday June 16th 2013

Federal PKI TWG Federal PKI Directory Profile v2.3 (draft)

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

A PKI case study: Implementing the Server-based Certificate Validation Protocol

Standards and Products. Computer Security. Kerberos. Kerberos

CERTIFICATION PRACTICE STATEMENT. EV SSL CA Certification Practice Statement

Version 2.4 of April 25, 2008

Managing SSL certificates in the ServerView Suite

PUBLIC-KEY CERTIFICATES

epki Root Certification Authority Certification Practice Statement Version 1.2

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Ciphire Mail. Abstract

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Concept of Electronic Approvals

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Symantec Managed PKI Service Deployment Options

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

Cryptography and Network Security Chapter 14

Public Key Infrastructure. A Brief Overview by Tim Sigmon

TeliaSonera Public Root CA. Certification Practice Statement. Revision Date: Version: Rev A. Published by: TeliaSonera Sverige AB

Certification Practice Statement

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Transcription:

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric Ciphers. Secret Key. New Directions: Public Key. Public/Private-Key Pair. Services of Public-Key Cryptography. Security between Strangers. Encryption. Digital Signature. Data Integrity. Key Establishment. Other Services. Algorithms. RSA. DSA. DH. ECDSA and ECDH. SHA-1. Ongoing Work. 3. The Concept of an Infrastructure. Pervasive Substrate. Application Enabler. Secure Sign-On. End-User Transparency. Comprehensive Security. Business Drivers. Public-Key Infrastructure Defined. Certification Authority. Certificate Repository. Certificate Revocation. Key Backup and Recovery. Automatic Key Update. Key History. Cross-Certification. Support for Non-repudiation. Time Stamping. Client Software.

4. Core PKI Services: Authentication, Integrity, and Confidentiality. Definitions. Authentication. Integrity. Confidentiality. Mechanisms. Authentication. Integrity. Confidentiality. Operational Considerations. Performance. Online versus Offline Operation. Commonality of Underlying Algorithms. Entity Naming. 5. PKI-Enabled Services. Secure Communication. Secure Time Stamping. Notarization. Non-repudiation. Connection with Other Services. Need for Secure Data Archive. Complexity of This Service. The Human Factor. Privilege Management. Authentication and Authorization. Authorization Authorities. Delegation. Connection with the PKI. Privacy. Mechanisms Required to Create PKI-Enabled Services. Digital Signatures, Hashes, MACs, and Ciphers. Trusted Time Sources. Privilege Policy Creation Mechanism. Privilege Policy Processing Engines. Privilege Management Infrastructure Mechanisms. Privacy Architecture. Operational Considerations. Trusted Time Delivery Mechanism. Secure Protocols. Server Redundancy. Physically Secure Archive Facilities. Privacy Certificates and Identity Mapping. Real Life. Comprehensive PKI and Current Practice. 6. Certificates and Certification. Certificates. Digital Certificate. Certificate Structure and Semantics. Alternative Certificate Formats.

Certificate Policies. Object Identifiers. Policy Authorities. Certification Authority. Registration Authority. 7. Key and Certificate Management. Key/Certificate Life-Cycle Management. Initialization Phase. Issued Phase. Cancellation Phase. 8. Certificate Revocation. Periodic Publication Mechanisms. Certificate Revocation Lists (CRLs). Complete CRLs. Certification Authority Revocation Lists (CARLs). End-Entity Public-Key Certification Revocation Lists (EPRLs). CRL Distribution Points. Redirect CRLs. Delta and Indirect Delta CRLs. Indirect CRLs. Certificate Revocation Trees (CRTs). Online Query Mechanisms. Online Certificate Status Protocol (OCSP). Simple Certificate Validation Protocol (SCVP). Other Revocation Options. Performance, Scalability, and Timeliness. 9. Trust Models. Strict Hierarchy of Certification Authorities. Loose Hierarchy of Certification Authorities. Policy-Based Hierarchies. Distributed Trust Architecture. Mesh Configuration. Hub-and-Spoke Configuration. Four-Corner Trust Model. Web Model. User-Centric Trust. Cross-Certification. Entity Naming. Certificate Path Processing. Path Construction. Path Validation. Trust Anchor Considerations.

10. Multiple Certificates per Entity. Multiple Key Pairs. Key Pair Uses. Relationship between Key Pairs and Certificates. Real-World Difficulties. Independent Certificate Management. Support for Non-repudiation. 11. PKI Information Dissemination: Repositories and Other Techniques. Private Dissemination. Publication and Repositories. Locating Repositories 162Tradeoffs. Interdomain Repository Issues and Options. Direct Access. Border Repository. Shared Repository. Interdomain Replication. In-band Protocol Exchange. 12. PKI Operational Considerations. Client-Side Software. Off-line Operations. Physical Security. Hardware Components. User Key Compromise. Disaster Preparation and Recovery. Relying Party Notification. Preparation. Recovery. Additional Observations. 13. Electronic Signature Legislation and Considerations. Electronic Signature Legislation. E-Sign. Digital Signatures in Context. EU Electronic Signature Directive. The Significance of Electronic Signature Initiatives. Legal Considerations for PKIs. CA Requirements. Roles and Responsibilities. Private Enterprise PKIs. Other Contractual-Based Frameworks. Confidentiality.

14. PKI in Practice. What PKI Does. What PKI Does Not Do. The Value of PKI. When Certificates and People Meet. An E-mail Scenario. A Web Scenario. 15. The Future of PKI. What Happened? How the World Is Changing. A Recognized Authoritative Body. A Motivation. Users. Reasons for Cautious Optimism. 16. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. II. STANDARDS. 17. Introduction. 18. Major Standards Activities. X.509. PKIX. X.500. LDAP. ISO TC68. ANSI X9F. S/MIME. IPsec. TLS. SPKI. OpenPGP. EDIFACT. IEEE. WAP. XML-Based Activities. Other Activities. U.S. FPKI. MISPC. GOC PKI. SET. SEMPER. ECOM.

JCP. ICE-CAR. 19. Standardization Status and Road Map. Current Standardization Status. X.509. PKIX. X.500. LDAP. S/MIME. IPsec. TLS. Toolkit Requirements (APIs and Mechanisms). Others. Ongoing Standardization Work. 20. Standards: Necessary but Not Sufficient. The Role of Standards, Profiles, and Interoperability Testing. Profiles and Interoperability Testing. Interoperability Initiatives. Automotive Network exchange. Bridge CA Demonstration. Federal PKI. Minimum Interoperability Specification. National Automated Clearing House Association. PKI X.509. Securities Industry Root CA Proof of Concept. EEMA PKI Challenge. 21. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. Certificate/CRL Syntax and Life-Cycle Management Protocols. Certificate/CRL Storage and Retrieval. XML-Based Initiatives. Interoperability Initiatives. Standards Bodies' Web Sites. Books. III. DEPLOYMENT CONSIDERATIONS. 22. Introduction. 23. Benefits and Costs of a PKI. Business Case Considerations. Cost Considerations. Deployment: Now or Later?

24. Deployment Issues and Decisions. Trust Models: Hierarchical versus Distributed. In-sourcing versus Out-sourcing. Build versus Buy. Closed versus Open Environment. X.509 versus Alternative Certificate Formats. Targeted Applications versus Comprehensive Solution. Standard versus Proprietary Solutions. Interoperability Considerations. Certificate and CRL Profiles. Multiple Industry-Accepted Standards. PKI-Enabled Applications. Policy/Business Control Issues. On-line versus Off-line Operations. Peripheral Support. Facility Requirements. Personnel Requirements. Certificate Revocation. End-Entity Roaming. Key Recovery. Repository Issues. Disaster Planning and Recovery. Security Assurance. Mitigating Risk. 25. Barriers to Deployment. Repository Issues. Lack of Industry-Accepted Standard. Multivendor Interoperability. Scalability and Performance. Knowledgeable Personnel. PKI-Enabled Applications. Corporate-Level Acceptance. 26. Typical Business Models. Internal Communications Business Model. External Communications Business Model. Business-to-Business Communication. Business-to-Consumer Communication. Internal/External Business Model Hybrids. Business Model Influences. Government-Sponsored Initiatives. Interdomain Trust. Identrus. Bridge CA. VeriSign Trust Network. GTE CyberTrust/Baltimore Technologies OmniRoot. Other Trust Networks.

27. Conclusions and Further Reading. Conclusions. Suggestions for Further Reading. References. Index.