How To Understand And Understand The Security Of A Key Infrastructure



Similar documents
APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Network Security Fundamentals

Case Study for Layer 3 Authentication and Encryption

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Virtual Private Networks

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Network Access Security. Lesson 10

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

Chapter 7 Transport-Level Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Savitribai Phule Pune University

Chapter 17. Transport-Level Security

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Fundamentals of Network Security - Theory and Practice-

Introduction to Computer Security

Grid Computing - X.509

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Site to Site Virtual Private Networks (VPNs):

Cornerstones of Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Virtual Private Networks: IPSec vs. SSL

Transport Layer Security Protocols

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Overview. SSL Cryptography Overview CHAPTER 1

Standards and Products. Computer Security. Kerberos. Kerberos

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Introduction to Computer Security

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 32 Internet Security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Exam Questions SY0-401

Computer Networks. Secure Systems

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Configuring Digital Certificates

TELSTRA RSS CA Subscriber Agreement (SA)

CS 4803 Computer and Network Security

Security Digital Certificate Manager

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

TLS/SSL in distributed systems. Eugen Babinciuc

Security + Certification (ITSY 1076) Syllabus

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Network Security. Lecture 3

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

7.1. Remote Access Connection

Lecture 9 - Network Security TDTS (ht1)

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Internet Privacy Options

CTS2134 Introduction to Networking. Module Network Security

Secure Substation Automation for Operations & Maintenance

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

How To Pass A Credit Course At Florida State College At Jacksonville

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority

Comodo Certification Practice Statement

Chapter 10. Network Security

VPN. Date: 4/15/2004 By: Heena Patel

AD CS.

Security Digital Certificate Manager

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

SSL BEST PRACTICES OVERVIEW

Certificate Policy for. SSL Client & S/MIME Certificates

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

SSL/TLS: The Ugly Truth

Chapter 8. Network Security

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Chapter 5. Data Communication And Internet Technology

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

Lecture 10: Communications Security

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Network Management Card Security Implementation

VPN. VPN For BIPAC 741/743GE

SSL VPN vs. IPSec VPN

Study on Remote Access for Library Based on SSL VPN

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

CS 356 Lecture 28 Internet Authentication. Spring 2013

Web Security: Encryption & Authentication

Network Security Essentials Chapter 5

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Application Note: Onsight Device VPN Configuration V1.1

Securing an IP SAN. Application Brief

Clearswift Information Governance

Transcription:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography

Objectives Define digital certificates List the various types of digital certificates and how they are used Describe the components of Public Key Infrastructure (PKI) List the tasks associated with key management Describe the different cryptographic transport protocols 2

Digital Certificates Using digital certificates involves: Understanding their purpose Knowing how they are authorized, stored, and revoked Determining which type of digital certificate is appropriate for different situations 3

Defining Digital Certificates Digital certificate Can be used to associate or bind a user s identity to a public key The user s public key that has itself been digitally signed by a reputable source entrusted to sign it Digital certificates make it possible for Alice to verify Bob s claim that the key belongs to him When Bob sends a message to Alice he does not ask her to retrieve his public key from a central site Instead, Bob attaches the digital certificate to the message 4

5

Defining Digital Certificates (continued) A digital certificate typically contains the following information: Owner s name or alias Owner s public key Name of the issuer Digital signature of the issuer Serial number of the digital certificate Expiration date of the public key 6

Authorizing, Storing, and Revoking Digital Certificates Certificate Authority (CA) An entity that issues digital certificates for others A user provides information to a CA that verifies her identity The user generates public and private keys and sends the public key to the CA The CA inserts this public key into the certificate Registration Authority (RA) Handles some CA tasks such as processing certificate requests and authenticating users 7

Authorizing, Storing, and Revoking Digital Certificates (continued) Certificate Revocation List (CRL) Lists revoked certificates Can be accessed to check the certificate status of other users Most CRLs can either be viewed or downloaded directly into the user s Web browser Certificate Repository (CR) A publicly accessible directory that contains the certificates and CRLs published by a CA CRs are often available to all users through a Web browser interface 8

9

Authorizing, Storing, and Revoking Digital Certificates (continued) 10

Types of Digital Certificates Digital certificates can also be used to: Encrypt channels to provide secure communication Encrypt messages for secure Internet e-mail communication Verify the identity of clients and servers on the Web Verify the source and integrity of signed executable code Categories of digital certificates Personal digital certificates Server digital certificates Software publisher digital certificates 11

12

Types of Digital Certificates Single-sided certificate (continued) When Bob sends one digital certificate to Alice along with his message Dual-sided certificates Certificates in which the functionality is split between two certificates Signing certificate Encryption certificate 13

Types of Digital Certificates (continued) Dual-sided certificate advantages: Reduce the need for storing multiple copies of the signing certificate Facilitate certificate handling in organizations X.509 Digital Certificates The most widely accepted format for digital certificates 14

Types of Digital Certificates (continued) 15

16

17

Public Key Infrastructure (PKI) Public key infrastructure involves public-key cryptography standards, trust models, and key management 18

What Is Public Key Infrastructure (PKI)? Public key infrastructure (PKI) A framework for all of the entities involved in digital certificates to create, store, distribute, and revoke digital certificates Includes hardware, software, people, policies and procedures PKI is digital certificate management 19

Public-Key Cryptographic Standards (PKCS) Public-key cryptography standards (PKCS) A numbered set of PKI standards that have been defined by the RSA Corporation These standards are based on the RSA public-key algorithm 20

21

22

23

Trust Models Trust may be defined as confidence in or reliance on another person or entity Trust model Refers to the type of trusting relationship that can exist between individuals or entities Direct trust A relationship exists between two individuals because one person knows the other person Third party trust Refers to a situation in which two individuals trust each other because each trusts a third party 24

Trust Models (continued) Direct trust is not feasible when dealing with multiple users who each have digital certificates Three PKI trust models that use a CA Hierarchical trust model Distributed trust model Bridge trust model 25

Trust Models (continued) 26

Trust Models (continued) 27

28

Managing PKI Certificate policy (CP) A published set of rules that govern the operation of a PKI Provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components Certificate practice statement (CPS) Describes in detail how the CA uses and manages certificates A more technical document than a CP 29

Managing PKI (continued) Certificate life cycle Creation Suspension Revocation Expiration Security+ Guide to Network Security Fundamentals 30

Key Management Proper key management includes key storage, key usage, and key handling procedures 31

Key Storage Public keys can be stored by embedding them within digital certificates While private keys can be stored on the user s local system The drawback to software-based storage is that it may leave keys open to attacks Storing keys in hardware is an alternative to software-based storage Private keys can be stored on smart cards or in tokens 32

Key Usage If more security is needed than a single set of public and private keys Then multiple pairs of dual keys can be created One pair of keys may be used to encrypt information The public key could be backed up to another location The second pair would be used only for digital signatures The public key in that pair would never be backed up 33

Key Handling Procedures Procedures include: Escrow Expiration Renewal Revocation Recovery Key recovery agent (KRA) M-of-N control Suspension Destruction 34

35

Cryptographic Transport Protocols Cryptographic transport protocols can be categorized by the applications that they are commonly used for: File transfer, Web, VPN, and e-mail 36

File Transfer Protocols File Transfer Protocol (FTP) Part of the TCP/IP suite Used to connect to an FTP server Vulnerabilities Usernames, passwords, and files being transferred are in cleartext Files being transferred by FTP are vulnerable to manin-the-middle attacks One of the ways to reduce the risk of attack is to use encrypted Secure FTP (SFTP) 37

File Transfer Protocols (continued) Secure Sockets Layer (SSL) A protocol developed by Netscape for securely transmitting documents over the Internet Uses a public key to encrypt data that is transferred over the SSL connection Transport Layer Security (TLS) A protocol that guarantees privacy and data integrity between applications communicating over the Internet An extension of SSL Are often referred to as SSL/TLS or TLS/SSL 38

File Transfer Protocols (continued) A second protocol that can be used with SFTP is Secure Shell (SSH) Also called SFTP/SSH SSH A UNIX-based command interface and protocol for securely accessing a remote computer Suite of three utilities: slogin, scp, and ssh Both the client and server ends of the connection are authenticated using a digital certificate Passwords are protected by being encrypted 39

File Transfer Protocols (continued) 40

Web Protocols Another use of SSL is to secure Web HTTP communications between a browser and a Web server Hypertext Transport Protocol over Secure Sockets Layer Plain HTTP sent over SSL/TLS Secure Hypertext Transport Protocol Allows clients and the server to negotiate independently encryption, authentication, and digital signature methods, in any combination, in both directions 41

VPN Protocols Point-to-Point Tunneling Protocol (PPTP) Most widely deployed tunneling protocol Allows IP traffic to be encrypted and then encapsulated in an IP header to be sent across a public IP network such as the Internet Based on the Point-to-Point Protocol (PPP) Point-to-Point Protocol over Ethernet (PPPoE) Another variation of PPP that is used by broadband Internet providers with DSL or cable modem connections 42

VPN Protocols (continued) 43

VPN Protocols (continued) Layer 2 Tunneling Protocol (L2TP) Merges the features of PPTP with Cisco s Layer 2 Forwarding Protocol (L2F) L2TP is not limited to working with TCP/IP-based networks, but supports a wide array of protocols An industry-standard tunneling protocol that allows IP traffic to be encrypted And then transmitted over any medium that supports point-to-point delivery 44

VPN Protocols (continued) IP Security (IPsec) A set of protocols developed to support the secure exchange of packets Because it operates at a low level in the OSI model IPsec is considered to be a transparent security protocol for applications, users, and software IPsec provides three areas of protection: Authentication, confidentiality, and key management 45

46

VPN Protocols (continued) IPsec supports two encryption modes: Transport mode encrypts only the data portion (payload) of each packet yet leaves the header unencrypted Tunnel mode encrypts both the header and the data portion Both AH and ESP can be used with transport or tunnel mode Creating four possible transport mechanisms 47

48

49

VPN Protocols (continued) 50

E-mail Transport Protocol S/MIME (Secure/Multipurpose Internet Mail Extensions) One of the most common e-mail transport protocols Uses digital certificates to protect the e-mail messages S/MIME functionality is built into the vast majority of modern e-mail software and interoperates between them 51

Summary Digital certificates can be used to associate a user s identity to a public key An entity that issues digital certificates for others is known as a Certificate Authority (CA) Types of certificates Personal, server, and software publisher certificates PKI is digital certificate management One of the principal foundations of PKI is that of trust 52

Summary (continued) An organization that uses multiple digital certificates on a regular basis needs to properly manage those digital certificates One cryptographic transport protocol for FTP is Secure Sockets Layer (SSL) A secure version for Web communications is HTTP sent over SSL/TLS and is called HTTPS (Hypertext Transport Protocol over Secure Sockets Layer) There are several tunneling protocols (when a packet is enclosed within another packet) that can be used for VPN transmissions 53