Lecture VII : Public Key Infrastructure (PKI)



Similar documents
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Neutralus Certification Practices Statement

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Cryptography and Network Security Chapter 14

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Danske Bank Group Certificate Policy

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Lecture II : Communication Security Services

Module 7 Security CS655! 7-1!

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Public Key Infrastructure for a Higher Education Environment

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

A Draft Framework for Designing Cryptographic Key Management Systems

Ericsson Group Certificate Value Statement

Public Key Infrastructure

TELSTRA RSS CA Subscriber Agreement (SA)

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

Overview. SSL Cryptography Overview CHAPTER 1

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

CS 392/681 - Computer Security

Class 3 Registration Authority Charter

Asymmetric cryptosystems fundamental problem: authentication of public keys

How To Make A Trustless Certificate Authority Secure

7 Key Management and PKIs

CS 356 Lecture 28 Internet Authentication. Spring 2013

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

How To Understand And Understand The Security Of A Key Infrastructure

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Authentication Applications

Lecture 10 - Authentication

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Computer and Network Security. Outline

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Public-Key Infrastructure

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Controller of Certification Authorities of Mauritius

Using BroadSAFE TM Technology 07/18/05

Secure web transactions system

Authentication Applications

CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd.

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Concept of Electronic Approvals

Network Security: Public Key Infrastructure

Internet Banking Internal Control Questionnaire

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Eskom Registration Authority Charter

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

CERTIFICATION PRACTICE STATEMENT UPDATE

Certificate Policies and Certification Practice Statements

AD CS.

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Introduction to Network Security Key Management and Distribution

Key Management and Distribution

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

Content Teaching Academy at James Madison University

NIST ITL July 2012 CA Compromise

Introduction to Cryptography

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

CS Network Security: Public Key Infrastructure

Certification Practice Statement

10/6/2015 PKI. What Is PKI. Certificates. Certification Authorities (CA) PKI Models. Certificates

Security Digital Certificate Manager

Certificate Authority Product Overview Technology White Paper

Security Digital Certificate Manager

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

White paper. Implications of digital certificates on trusted e-business.

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Den Gode Webservice - Security Analysis

Ford Motor Company CA Certification Practice Statement

Comodo Certification Practice Statement

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Application Security: Threats and Architecture

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Certification Practice Statement

HKUST CA. Certification Practice Statement

Savitribai Phule Pune University

CSC574 - Computer and Network Security Module: Public Key Infrastructure

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

X.509 Certification Practices Statement for the U.S. Government Printing Office Principal Certification Authority (GPO-PCA)

Understanding Digital Signature And Public Key Infrastructure

Certificate Policy. SWIFT Qualified Certificates SWIFT

New York State Electronic Signatures and Records Act

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

Transcription:

Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University

2 Problems with Public Key Cryptosystems Where & how can the public key for an entity be found? How to determine if a public key really belongs to whom it is supposed to? What is the legitimate use for a given public key? (e.g., signing checks, signing contracts) When is a public key no longer valid? How can you protect the corresponding private keys? What happens if a private key is lost? Solution Use Public Key Certificates and Public Key Infrastructure (PKI)

3 Public Key Certificates Binds a public key to a subject (e.g., person, employee, officer, company, institution, authority) Signed by an authority that vouches for the integrity of the binding and the identity of the subject Includes a serial number to help detect unauthorized or forged certificates Specifies when certificate will expire Indicates under what policies the certificate was granted and what policies it is used Provides other useful information regarding the subject or use of the certificate

4 X.509 Public Key Certificate Version: 1 Serial #: 0x0273000007 Signature Algorithm: RSA with MD5 Issuer: /C=US/O=BBN, Inc./OU=BBN PKI Services/ Not Valid Before: Sep 3 1995 20:00:00 Not Valid After: Sep 14 1996 20:00:00 Subject: /C=US/O=BBN, Inc./CN=Steve Cohn/ Public Key Algorithm: RSA Public Key: 100001, bb226db7496397756b 2e9e2cc2efa1b7155c 5181f8fdb60d35f08d cafda48c40c9f7873a 281040b1fea073a502 d22337c35e7c94f5cc 627de4a4533adcf18b 1a6d194f33dc517234 175a4a9b4984f88618 b768877f0552ff8a20 567f8302e062848eee 4a3bd6a4ced748e3d5 2f3c064e406e49d1f2 44deb265ba832aadbe 7517 Signature Algorithm: RSA with MD5 Signature: 42ab3847920c0b3418 5181f8fdb60d35f08d dc4a9b02034184cb01 cafda48c40c9f7873a 281040b1fea073a502 d9bc76435e7c94f5cc 627de4a4533adcf18b 2e9e2cc2efa1b7155c 175a4a9b4984f88618 b768877f0552ff8a20 567f8302e062848eee 4a3bd6a4ced748e3d5 9023bcd84572ca1234 44deb265ba832aadbe bc06

5 Uses for Certificates Establish Identity Used to identify subject (authenticated identity) Assign Authority Often referred to as attribute certificates Spells out rights & privileges granted to holder of corresponding private key Secure Confidential Information Used only to encrypt symmetric keys Certificate needs to be readily accessible so other parties can retrieve public key of subjects

6 Public Key Infrastructure (PKI) Major Components Certificate Authorities (s & RAs) Trust Relationships Distribution Mechanisms Management Protocols

7 Certificate Authorities (s) Abstraction of traditional sources of authority (e.g., manager, official, bureaucrat) Responsible for issuing certificates and renewing expired certificates Sets policies for certificate issuing and their use Revokes certificates for cause Establishes operational policies and procedures for issuing, renewing, and revoking certificates

8 Who Will Serve as a? Government Agents Post Office Employers Hospitals, HMOs Financial Institutions Retailers Publishers, Entertainment Providers Internet Service Providers

9 Trust Relationships Schemes by which s authorize each other Enable users certified by a particular to verify certificates issued by other s Enable s to issue certs for end users or other s Basic trust relationship scheme is a hierarchy The root in a hierarchy is trusted by all parties Validating a certificate involves creating a path back to root Simplifies managing relationships Management of trust relationships depends on an organization s operational requirements

10 Trust Hierarchy Root Root Certificate Certificates Bob Alice Leaf Certificates

11 On-line and Off-line Architecture out-of-band Off-Line Tooltalk On-Line Firewall Web Server Certificates and CRLs User Certificate Request (O)RA Web-based RA

12 Certificate Management Certificate Registration Certificate Renewal Certificate Revocation Certificate Distribution Certificate Archiving Process Auditing

13 Potential System Attack Points Registration Authority Internet Firewall Front End User Crypto Module Certificate Authority RDB?

14 Potential Attacks Passive/Active Wire-tapping User-RA Path RA- Path /RA personnel compromise Computer system attacks OS Penetration Firewall & Front-end Penetration Software / Database Manipulation Crypto module attacks Simple Physical Tampering Module Theft / Swapping Close-in Attacks (TEMPEST, Temperature, Timing Analysis, Differential Fault Analysis,...)

15 Security Requirements Protection of Private Keys Confidentiality against wide range of attacks Support for multiple instantiation Support for key recovery Validation of certificate issuance requests User / Organization Identification verification of certificate syntax against rules for a specific or RA (basic certificate fields and extensions) Validated certification revocation requests* Timely distribution of revocation data (CRLs/OCSP)* * Not enforceable via technology

16 Protection: Services Physical Security Operational Security Personnel Security Procedural Security Operating System and Application Security Network Security Cryptographic Module Security

17 Protection: Mechanisms Locks, Sensors, Guards,... Personnel Background Checks Audit Trails Multi-party Authorization Certificate Syntax Filtering (Rule Based) Secure Operating System Software Configuration Management Encrypted/Authenticated RA- Communication Firewall Protection of On-line Hardware Cryptographic Modules