Public Key Infrastructure



Similar documents
Lecture 10 - Authentication

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Lecture 10 - Authentication

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

CS Network Security: Public Key Infrastructure

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

7 Key Management and PKIs

Key Management and Distribution

Conclusion and Future Directions

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Asymmetric cryptosystems fundamental problem: authentication of public keys

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Overview. SSL Cryptography Overview CHAPTER 1

CS Network Security: Public Key Infrastructure

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Websense Content Gateway HTTPS Configuration

How To Understand And Understand The Security Of A Key Infrastructure

How To Make A Trustless Certificate Authority Secure

Lecture VII : Public Key Infrastructure (PKI)

Introduction to Cryptography

Security Digital Certificate Manager

Security Digital Certificate Manager

Key Management and Distribution

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

CSC574 - Computer and Network Security Module: Public Key Infrastructure

Certificates and network security

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

DIMACS Security & Cryptography Crash Course, Day 2 Public Key Infrastructure (PKI)

SSL/TLS: The Ugly Truth

Internet Programming. Security

NIST ITL July 2012 CA Compromise

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Authenticity of Public Keys

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Public Key Infrastructure (PKI)

White Paper. The risks of authenticating with digital certificates exposed

Reducing Certificate Revocation Cost using NPKI

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Ciphermail S/MIME Setup Guide

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Extended SSL Certificates

Server Certificates based on DNSSEC

10/6/2015 PKI. What Is PKI. Certificates. Certification Authorities (CA) PKI Models. Certificates

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Introduction to Network Security Key Management and Distribution

Computer and Network Security. Outline

What Are Certificates?

Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3

CS 356 Lecture 28 Internet Authentication. Spring 2013

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

Digital certificates and SSL

Authentication Applications

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Securing your Online Data Transfer with SSL

Department of Defense PKI Use Case/Experiences

Certificate Management in Ad Hoc Networks

Network Security Protocols

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions


Authentication is not Authorization?! And what is a "digital signature" anyway?

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Number of relevant issues

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Public Key Infrastructures

esign Online Digital Signature Service

Chapter 7 Managing Users, Authentication, and Certificates

[SMO-SFO-ICO-PE-046-GU-

What Are They, and What Are They Doing in My Browser?

TELSTRA RSS CA Subscriber Agreement (SA)

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

epki Root Certification Authority Certification Practice Statement Version 1.2

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

Authentication Applications

CS 392/681 - Computer Security

Cryptography and Network Security Chapter 14

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

WiMAX Public Key Infrastructure (PKI) Users Overview

Neutralus Certification Practices Statement

End User Encryption Key Protection Policy

Introduction. About Image-X Enterprises. Overview of PKI Technology

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

Managing CA-Signed Certificates

Signature policy for TUPAS Witnessed Signed Document

Network Security: Public Key Infrastructure

CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES

Technical Certificates Overview

why PKI and digital signatures suck

Bugzilla ID: Bugzilla Summary:

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

Transcription:

UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu

What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported public key really is Bob s key (not Charlie s) A PKI is a secure system that is used to manage and control certificates Several aspects: The system should function without the active intervention of the user. Public key signature scheme is used No need to keep prior shared secret keys between two parties

Components of PKI Certificate Issuance: Most PKIs have one or more trusted authorities (certification authorities) that control the issuing of certificates. Before a certificate issued the identity of the user must be verified. A secure procedure is needed to generate and transmit the public key and private key to the user

Components of PKI Certificate Revocation: Revoking certificate before a normal expiration date When private key being lost or other fraudulent use of the key Similar to credit cards stolen Additional infrastructure is required to recognize revoked certificates

Components of PKI Key backup / recovery / update: Secure storage of users private keys by the administrator of the PKI, in case users lose or forget their private keys User has to prove its identity before being allowed to access a stored private key When a certificate is about to expire the old key can be used to transfer the new key More efficient than generating new keys and certificates from scratch

Components of PKI Timestamping: Certificates usually have fixed length validity periods.

Secure Socket Layer SSL is used to facilitate online purchases from a company s web page using a web browser Only the server is required to supply a certificate during an SSL session The client may not even have a public key or certificate

Setting up an SSL Session client verify PK generate MS K 1, K 2 =h(ms) I m Alice I m Bob, Inc. PK, sig CA (PK) y = e PK (MS) server MS = d PK (y) K 1, K 2 =h(ms)

Certificates Certificates are building blocks of PKIs A certificate binds an identity to a public key Everyone has access to an authentic copy of the public key of the CA X.509 v3 certificates contain the following fields: Version number Serial number Signature algorithm ID

Certificates X.509 v3 certificates contain the following fields: Issuer name Validity period Subject name (i.e. the certificate owner) The cert. owner public key Optional fields The CA s signature on all the previous fields

Trust Models Using certificate paths to sign a certificate Trust models: Strict hierarchy Networked PKIs Web browser model User centric model

1) Strict Hierarchy Model The root CA is called a trust anchor Root CA may issue certificates for lower level CAs Any CA can issue certificates for end users x y means that the entity corresponding to node x has signed a certificate for the entity corresponding to node y.

1) Strict Hierarchy Model (Cont.) CA root CA 1 CA 2 CA 3 CA 4 U 1 U 2 U 3 U 4 U 5 U 6

2) Networked PKIs Strict hierarchy may work well within a single organization. Sometimes it may be desirable to connect root CAs of two or more different PKI domains.

Networked PKIs The Mesh Configuration CA root1 CA root2 CA root3 Cross certification is used among multiple CAs n root CAs will require n(n-1) cross certifications

The Hub-and-spoke Configuration CA hub CA root1 CA root2 CA root3 n root CAs each cross-certify independently with a new hub CA. 2n cross certifications are required

3) The Web Browser Model Web browsers come preconfigured with a set of independent root CAs These are treated by the user of the browser as trust anchors. The provider of the browser is assumed to be trusted. Problems: No information about the preconfigured CAs Not enough expertise to edit the lists

3) The Web Browser Model (Cont.) Problems: No mechanism to revoke a root CA User may accept self signed certificates Expiration dates

4) Pretty Good Privacy (PGP) Every user is his or her own CA. A PGP certificate contains an e-mail address (ID), a public key (PK) and one or more signatures on this (ID, PK) pair. Alice s self signed certificate: Cert(Alice) : (data, signatures) where data : (ID = alice@utdallas.edu, PK = 12345) signatures : sig Alice (data )

4) Pretty Good Privacy (PGP) Other users might also create signatures on the data on Alice s certificate. signatures : (sig Alice (data), sig Bob (data)) The signatures on a certificate help to verify the certificate s authenticity to other users Collection of certificates: keyring Associated with each certificate in the keyring is an owner trust field (OTF) and a key legitimacy field (KLF)

The Future of PKI Many potential difficulties associated with large-scale deployments of PKIs Who should be responsible for development, maintenance and regulation of PKIs? Governments? Industry? What standards should be used in PKIs? Interoperability problems Different PKI needs in different environments