Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1



Similar documents
7 Key Management and PKIs

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

TELSTRA RSS CA Subscriber Agreement (SA)

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Understanding Digital Certificates and Secure Sockets Layer (SSL)

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Certification Practice Statement

Neutralus Certification Practices Statement

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

Ericsson Group Certificate Value Statement

How To Understand And Understand The Security Of A Key Infrastructure

Asymmetric cryptosystems fundamental problem: authentication of public keys

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Comodo Certification Practice Statement

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Security Digital Certificate Manager

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Midterm Solutions. ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED

Security Digital Certificate Manager

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Concept of Electronic Approvals

How To Make A Trustless Certificate Authority Secure

Introduction to Network Security Key Management and Distribution

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

Configuring Digital Certificates

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Comodo Certification Practice Statement

Cryptography and Network Security Chapter 14

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

Public Key Infrastructure

1. Lifecycle of a certificate

CS 356 Lecture 28 Internet Authentication. Spring 2013

GEOSURE PROTECTION PLAN

Comodo Extended Validation (EV) Certification Practice Statement

Public Key Infrastructure (PKI)

Key Management and Distribution

What Are They, and What Are They Doing in My Browser?

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

Understanding digital certificates

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Danske Bank Group Certificate Policy

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

SSL/TLS: The Ugly Truth

National Certification Authority Framework in Sri Lanka

Class 3 Registration Authority Charter

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

CALIFORNIA SOFTWARE LABS

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

SECOM Trust.net Root1 CA

PUBLIC-KEY CERTIFICATES

CMS Illinois Department of Central Management Services

TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 2.0

phicert Direct Certificate Policy and Certification Practices Statement

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Websense Content Gateway HTTPS Configuration

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

Reducing Certificate Revocation Cost using NPKI

DVS DCI Signing Certificate Tool

Key Management and Distribution

Business Issues in the implementation of Digital signatures

NIST Test Personal Identity Verification (PIV) Cards

Lecture VII : Public Key Infrastructure (PKI)

Certification Practice Statement

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

StartCom Certification Authority

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

- X.509 PKI SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1

Visa Public Key Infrastructure Certificate Policy (CP)

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

HKUST CA. Certification Practice Statement

Version 2.4 of April 25, 2008

CS 392/681 - Computer Security

CS Network Security: Public Key Infrastructure

esign Online Digital Signature Service

Chapter 7 Managing Users, Authentication, and Certificates

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

Public Key Infrastructure for a Higher Education Environment

What security and assurance standards does Trustis use for TMDCS certificate services?

X.509 Certificate Policy for India PKI

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

Authentication Application

Ford Motor Company CA Certification Practice Statement

Digital Certificates Demystified

PKI: Public Key Infrastructure

APPLICATION FOR DIGITAL CERTIFICATE

Transcription:

PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1

Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority Page 2

Public Key Cryptography Refresher Course Public Key Private Key Each user has 2 keys - What one key encrypts, only the other key in the pair can decrypt Public Key Private Key It works both ways! Page 3

Public / Private Key Pair Public Key Cryptography provides the basis for: Digital Envelopes anyone can encrypt data with the public key; only the holder of the private key can decrypt. Digital Signatures the holder of the private key can encrypt (sign); anyone can verify that the owner of the private key did the encryption (signature). The Private key must be kept secret by its owner. The Public Key is freely distributed for others to use. Page 4

Public Key Is it really yours? How to Find Out Someone s Public Key? Send with message Lookup From Database How to Trust the Result? Digital Certificates Trusted Certificate Authorities Signed Message that proves Bob s Key is N Page 5

Digital Certificate Name, Organization, Address Document Owner s Public Key Digital Signature Certificate Validity Dates Digital Certificate Serial Number Certifying Authority s Digital Signature Page 6

Certificate Authority What is a Certificate Authority (CA)? CA functions Responsibilities Delegation Page 7

What is a Certificate Authority (CA)? A fundamental component of PKI Collection of Software, Hardware and people managing it. Attributes Name Public key Issues a self-signed certificate Root CA Page 8

Certificate Authority Functions Issue certificates Maintain certificate status and issue Certificate Revocation Lists (CRLs) Publish current certificates and CRLs Maintain archives of expired and revoked certificates Page 9

Issue Certificates Root CA Root CA Issue certificates to Other CAs Level 1 CA Authorizes Level 1 CA to issue certificates Level 1 CA can issue other CA certificates if authorized. A CA chain is created in this manner Page 10

Issue Certificates Issue certificates to users Information in the certificate is binding to the entity Name, Organization, Address Public key Validity Dates Serial number Certifying authority s digital signature Page 11

Issue Certificates Process User Submits a Certificate Signing Request (CSR) with name, public key and other information CA Follows Known Policies & Procedures to validate request as defined in the Certificate Practice Statement (CPS) CA Attaches Extra Information Validity Dates, Key Usage, Account ID, Etc. CA Signs Certificate Page 12

Maintain Relevant Information Maintain certificate directory for Certificate lookup Maintain a List of Revoked Certificates (CRL) Manage User Changes Page 13

Publish Current Certificates and CRLs Distribute its certificates Distribute list of Revoked Certificates (CRL) Distribution need not be secure - But it should be made secure if required for privacy. Page 14

Maintain Archives Maintain information about old certificates Person or system named in certificate Certificate request Validity period of certificate If certificate was revoked Any other activity performed by CA in certificate s lifetime Page 15

Certificate Authority Responsibilities Protect its private key Verify subject information in CSR Adhere to profile defined in CPS Maintain list of revoked certificates Distribute its certificates and CRLs Maintain certificate archives after expiration Page 16

Certificate Authority - Delegation CA can delegate its responsibilities to - Registration authority (RA) - Repository (certificate directory) - Archive Page 17

Public Key Infrastructure Users Root Certificate Authority Registration Authority Intermediate Certificate Authority Archive Certificate Directory Page 18

Certificate Authority Delegation Registration Authority (RA) verifies certificate request Repository distributes certificates and CRLs Archive provides long term secure storage CA can create multiple of these entities to offload and distribute work Page 19