The Concept of Trust in Network Security



Similar documents
An Introduction to Cryptography and Digital Signatures

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

National Certification Authority Framework in Sri Lanka

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Security Digital Certificate Manager

Security Digital Certificate Manager

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Cross-Certification and PKI Policy Networking

Module 7 Security CS655! 7-1!

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

7 Key Management and PKIs

Cryptography and Network Security Chapter 14

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Midterm Solutions. ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Concept of Electronic Approvals

Public Key Encryption and Digital Signature: How do they work?

Trust Service Principles and Criteria for Certification Authorities

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Business Issues in the implementation of Digital signatures

Digital certificates. Name Vivek kumar EM No Subject E-Business technologies Prof. Dr. Eduard heindl

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

User Manual. For. Digitally Signing of your application

SSL/TLS: The Ugly Truth

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia

Certificate Policies and Certification Practice Statements

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CS Network Security: Public Key Infrastructure

THE SECURITY ISSUE. Chris J Mitchell

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Chapter 7: Network security

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

SECURITY IN NETWORKS

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Public Key Infrastructure

Asymmetric cryptosystems fundamental problem: authentication of public keys

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

How To Secure Cloud Computing

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

What Are Certificates?

Lukasz Pater CMMS Administrator and Developer

DVS DCI Signing Certificate Tool

What is network security?

Content Teaching Academy at James Madison University

Network Security. HIT Shimrit Tzur-David

Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

1 Definitions

Cryptography & Digital Signatures

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Authentication Application

Forging Digital Signatures

HP ProtectTools Embedded Security Guide

Lecture 10 - Authentication

White Paper. Enhancing Website Security with Algorithm Agility

Secure Data Exchange Solution

Authentication Applications

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Securing End-to-End Internet communications using DANE protocol

Article. Robust Signature Capture Using SigPlus Software. Copyright Topaz Systems Inc. All rights reserved.

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Document Management Getting Started Guide

Requiring Digital Signatures and Certificates

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Gateway

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

CS 758: Cryptography / Network Security

Principles of Network Security

ELECTRONIC SIGNATURE LAW. (Published in the Official Journal No 25355, ) CHAPTER ONE Purpose, Scope and Definitions

Information Security

CALIFORNIA SOFTWARE LABS

Qualified Electronic Signatures Act (SFS 2000:832)

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature

Understanding and Integrating KODAK Picture Authentication Cameras

Transcription:

En White Paper Date: August 2000 Version: 1.2

En is a registered trademark of En, Inc. in the United States and certain other countries. En is a registered trademark of En Limited in Canada. All other En product names and service names are trademarks or registered trademarks of En, Inc or En Limited. All other company and product names are trademarks or registered trademarks of their respective owners. Copyright 2000-2003 En. All rights reserved.

2 Introduction Every security system depends on, in one form or another, among users of the system. In general, different forms of exist to address different types of problems and mitigate risk in certain conditions. Which form of to apply in a given circumstance is generally dictated by corporate policy. In a network security solution such as En, there are two important forms of that customers should understand: third-party and direct (personal). The purpose of this paper is to introduce these concepts and provide additional information so that customers understand which form of should be applied in a given situation. To fully explain third-party and direct, the paper also introduces the following concepts: Certification Authorities, domains, certificates, and cross-certification. This paper assumes the reader has a basic understanding of public-key cryptography. 2. Third-Party Trust Third-party refers to a situation in which two individuals implicitly each other even though they have not previously established a personal relationship. In this situation, two individuals implicitly each other because they each share a relationship with a common third party, and that third party vouches for the worthiness of the two people. Third-party is a fundamental requirement for any large-scale implementation of a network security product based on public-key cryptography. Public-key cryptography requires access to users' public keys. In a large-scale network, however, it is impractical and unrealistic to expect each user to have previously established relationships with all other users. In addition, because users' public keys must be widely available, the association between a public key and a person must be guaranteed by a ed third party to prevent masquerading. In effect, users implicitly any public key certified by the third-party because their organization owns and operates the third-party certification agent in a secure manner. In En, the third-party certification agent is referred to as a "" (CA).

3 Alice Bob third-party Figure 1. Third-Party Trust through a 2.1 A (CA) is a ed entity whose central responsibility is certifying the authenticity of users. In essence, the function of a CA is analogous to that of the passport issuing office in the Government. A passport is a citizen's secure document, issued by an appropriate authority, certifying that the citizen is who he claims to be (a "paper identity"). Any other country ing the authority of that country's Government passport office will the citizen's passport -- a good example of third-party. Similar to a passport, a network user's "electronic identity," issued to him by a CA, is that user's proof that he is ed by the CA; therefore, through third-party, anyone ing the CA should also the user. Both a passport issuing office and a are combinations of policies and physical elements. In the case of the passport office, there is a set of policies determined by the Government dictating which people are deemed to be citizens and the process to obtain a passport. Similarly, a CA can be thought of as the group of people in an organization who determine network security policies and decide which people in the organization can be issued electronic identities on the network.

4 From a physical perspective, a passport office can be looked upon as the creator of secure, authorized paper documents. The passport office has special equipment to securely bind together information on a citizen (name, picture, date of birth, ) in such a way that it is extremely difficult to alter the passport without detection. Consequently, someone examining a passport is assured that the passport has integrity. While the passport office has physical equipment to create secure paper documents, a CA has a computing platform and electronic cryptographic keys that are used to create and verify secure electronic identities for network users. Specifically, the CA creates electronic "certificates," the authenticity and integrity of which is guaranteed through a digital signature created by the CA's signing private key. Users verify the CA's signature on certificates by using the CA's verification public key. The passport office must protect physical access to its passport generation equipment to guarantee the authenticity of passports; similarly, access to the CA's signing private key must be carefully protected and granted only to highly ed individuals within the CA domain. Before proceeding to a discussion of certificates, there is one additional network security concept that benefits from the passport office analogy. The concept is that of a "CA domain." The term CA domain refers to the population of users for which the CA has the authority to issue certificates. This is analogous to a passport office because one country does not have the right to issue passports for citizens of another country. The domain of a passport office is restricted solely to citizens of its own country. 2.2 Certificates A network user's certificate is the electronic equivalent of his passport. As such, a certificate contains secure information that can be used to verify the identity of the owner. For instance, a certificate contains the owner's name. One critical piece of information contained in a user's certificate is his public key. The public key in a certificate is used either to encrypt data for the certificate owner or to verify the owner's digital signature. With respect to, there are two central issues relating to certificates. The first issue relates to how the information in a certificate is secured. How can anyone that the name and public key in a certificate actually belong to the certificate's owner? Indeed, without that level of, public-key cryptography completely breaks down because no one is assured that he is encrypting data for the correct person or verifying a digital signature that can be associated with a specific individual.

5 To establish in the binding between a user's public key and other information (e.g., name) in a certificate, the CA digitally signs the certificate information using its signing private key. The CA's digital signature provides three important elements of security and to the certificate. First, by definition, a valid digital signature on a certificate is a guarantee of the certificate's integrity. Second, since the CA is the only entity with access to its signing private key, anyone verifying the CA's signature on the certificate is guaranteed that only that CA could have created the signature. Third, since only the CA has access to its signing private key, the CA cannot deny signing the certificate (a concept often referred to as non-repudiation). Given that a certificate is secured by a CA's digital signature, the second issue relating to ing a certificate concerns whether or not the issuing CA is itself worthy. If we relate this scenario to the passport analogy, the correct interpretation would be a measure of an individual's in the issuer of a passport. For instance, if a citizen entering country A presents an apparently valid passport issued by the passport office of country B, the customs officer must evaluate whether or not country B's passport office is worthy. To make this decision, the customs officer of country A would likely refer to a current list of ed countries, as determined by a higher level policy group within the border control agency. The analogy of ed countries in the context of network security is referred to as "cross-certified CA domains." 2.3 Cross-certification Cross-certification is a process in which two CAs securely exchange keying information so that each can effectively certify the worthiness of the other's keys. Essentially, cross-certification is simply an extended form of third-party in which network users in one CA domain implicitly users in all other CA domains which are cross-certified with their own CA. From a technical perspective, cross-certification involves the creation of cross-certificates between two CAs. When CA X and CA Y crosscertify, CA X actually creates and digitally signs a certificate containing the public key of CA Y (and vice versa). Consequently, users in either CA domain are assured that each CA s the other; therefore, users in one CA domain can users in the other domain through extended third-party. There is a great deal more to cross-certification than the technical details involved in securely exchanging keying information (which are nontrivial in themselves). Since cross-certification extends third-party,

6 it is important for each CA domain to be completely comfortable with the other's security policies. Referring back to the passport analogy, it would be highly unlikely for one country to claim in another country's passports without first examining the policies used to create and distribute passports to citizens of that country. For example, prior to establishing, each country would likely want to understand, in detail, the process by which the other country verifies the identity of an alleged citizen before issuing a passport. Similar issues apply when cross-certifying CA domains. For example, prior to cross-certifying, both CA domains would likely want to understand the other's security policies, including information on which people have access to high-level security functions with the domain. It is also likely that legal agreements would be signed by representatives of both CA domains. These agreements would state the required security policies in both domains and provide signed assurance that these policies would be executed. third-party Alice Bob Bill Anne CA Domain X CA Domain Y Figure 2. Extended Third-Party Trust through Cross-Certification 3. Direct Trust Direct refers to a situation in which two individuals have established a ing relationship between themselves. Whereas thirdparty allows individuals to implicitly each other without a personal relationship, direct is predicated on the existence of a personal relationship prior to exchanging secure information. In network security, direct is required when individuals from separate CA domains (not cross-certified) exchange keying information

7 to secure their communications. Because the respective CA's of these users have not established a relationship (through crosscertification), the users must each other on a personal basis. Without personal in this scenario, exchanging keying information is of no value because the keying information itself should not be ed. When direct is applied to secure communications, it is solely the responsibility of each of the parties to ensure that they are comfortable with their level of personal in the other party. Alice Bob Bill Anne direct CA Domain P CA Domain Q Figure 3. Direct Trust between Individuals When direct is present, key exchanges among individuals with personal relationships provide a powerful mechanism to ensure secure communications.