Public Key Infrastructure

Similar documents
Authentication Applications

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Cryptography and Network Security Chapter 14

Authentication Applications

Authentication Application

Key Management and Distribution

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

APNIC Trial of Certification of IP Addresses and ASes

Key Management and Distribution

Introduction to Network Security Key Management and Distribution

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

How To Make A Trustless Certificate Authority Secure

Asymmetric cryptosystems fundamental problem: authentication of public keys

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

CS 392/681 - Computer Security

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Chapter 14. Key management and Distribution. Symmetric Key Distribution Using Symmetric Encryption

CS 356 Lecture 28 Internet Authentication. Spring 2013

Network Security: Public Key Infrastructure

Neutralus Certification Practices Statement

Public Key Infrastructure (PKI)

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

7 Key Management and PKIs

Network Security Protocols

Lecture VII : Public Key Infrastructure (PKI)

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Key Management and Distribution

Understanding digital certificates

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Ciphermail S/MIME Setup Guide

Federated Identity and Single-Sign On

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

PUBLIC-KEY CERTIFICATES

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Concept of Electronic Approvals

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Number of relevant issues

Security Digital Certificate Manager

Displaying SSL Certificate and Key Pair Information

Security Digital Certificate Manager

[SMO-SFO-ICO-PE-046-GU-

DIMACS Security & Cryptography Crash Course, Day 2 Public Key Infrastructure (PKI)

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Bugzilla ID: Bugzilla Summary:

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

Windows Server 2008 PKI and Certificate Security

Securing Service Access with Digital Certificates

SBClient SSL. Ehab AbuShmais

Trustis FPS PKI Glossary of Terms

Public Key Infrastructure for a Higher Education Environment

DVS DCI Signing Certificate Tool

SSL/TLS: The Ugly Truth

IT Networks & Security CERT Luncheon Series: Cryptography

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

Computer and Network Security. Outline

Djigzo S/MIME setup guide

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012

PKI and OpenSSL part 1 X.509 from the user s and the client software s point of view

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Digital Certificates Demystified

Public Key Infrastructure

Internet banks login - a study of security solutions

IBM i Version 7.3. Security Digital Certificate Manager IBM

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Ciphire Mail. Abstract

ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

PKI: Public Key Infrastructure

Grid Computing - X.509

AD CS.

Class 3 Registration Authority Charter

Overview. SSL Cryptography Overview CHAPTER 1

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Introduction to Cryptography

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

Configuring SSL Termination

X.509 Certificate Generator User Manual

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Displaying SSL Certificate and Key Pair Information

Certificates and network security

Biometrics, Tokens, & Public Key Certificates

CRC Press has granted the following specific permissions for the electronic version of this book:

Network Automation 9.22 Features: RIM and PKI Authentication July 31, 2013

Certification Practice Statement

CS Network Security: Public Key Infrastructure

REVENUE ON-LINE SERVICE CERTIFICATE POLICY. Document Version 1.2 Date: 15 September OID for this CP:

Entrust Managed Services PKI

A PKI case study: Implementing the Server-based Certificate Validation Protocol

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

SSL Overview for Resellers

Business Issues in the implementation of Digital signatures

Aloaha Sign! (English Version)

CS Network Security: Public Key Infrastructure

Transcription:

Public Key Infrastructure R. E. Newman CISE Department UF Gainesville, FL 32611 6120 nemo@cise.ufl.edu +352.392.1488/1220 fax The Key Management Scaling Problem KDC Shared symmetric key Asymmetric key pair With one symmetric key per pair, quadratic explosion Central KDC can distribute session keys on demand (Kerberos, etc.) Public Key approach only requires linear number of keys but still need reliable way to associate public key with entity...

Key Distribution Center (KDC) Trusted third party Should be able to authenticate requestors (at least implicitly) Should be able to provide requestors with information that allows them to authenticate themselves to others Should provide keys to parties as warranted over secure channel If KDC compromised, then all is lost Certification Authority (CA) Trusted third party Should be able to provide requestors with information that allows them to authenticate themselves to others Signs certificates (that may hold keys, etc.) Directory may use insecure channel for communication CA need not be on line Compromised CA can permit spoofing, but cannot decrypt communications established between the true parties

Trusted Intermediate Hierarchies root root int leaf Scaling for distribution, reliability, performance Heirarchical trust relationships, organizations Action at appropriate level (locality) Cross hierarchy trusts X.509 Certificates Version Cert. Serial # algorithm Issuer Name start end Subject Name algorithm key Issuer Unique ID Subject Unique ID Extensions algorithms encrypted Version 3 Version 2 Version 1 All Versions default is 1 unique (within CA) integer given to certificate signature algorithm ID and X.500 name of issuing CA period of validity user name associated with certificate (issuee) subject public key information optional bit string field to identify uniquely issuer in case of X.500 name reuse optional bit string field to identify uniquely subject in case of X.500 name reuse optional extensions signature hash of other fields encrypted with issuing CA s private key

Certificate Chains <X,Kx> root CRLroot <Y,Ky>X CRLx <Z,Kz>Y CRLy... CRLc <A,Ka> C Kroot To get B s public key reliably, A must Obtain copy of B s certificate from a directory service Build certification path (certificate chain) from root CA to certificate Verify temporal validity of all certificates along certificate chain Verify all signatures along certificate chain Check all CRLs to ensure no certificate on chain was revoked A has the root s public key from the start X.509 Certificate Binding Hierarchy CA0 B CA4 CA1 CA2... CA3 CA5 CA6 CA7 A B B B Primary registration Cross registration CA8 X<<Y>> = <SN,SAlgID,X,Y,Ky,LT>Kx A >B: CA5<<A>> A >B : CA5<<A>>,CA1<<CA5>>,CA4<<CA1>> A >B : CA5<<A>>,CA1<<CA5>>,CA0<<CA1>>,CA2<<CA0>>,CA6<<CA2>>...or... CA5<<A>>,CA2<<CA5>>,CA6<<CA2>> certification path can use X.500 Directory Information Tree (DIT) or DIT plus cross registration short cuts

X.509 Certificate Revocation Each CA maintains a CRL (Certificate Revocation List) May have ICRL (individual) and CACRL (CAs) vulnerability in specification look the same Must check the CRL for each CA on certification path Certificate Revocation Lists algorithm Issuer name This update date Next update date user cert. serial # revocation date signature algorithm identifier revoked certificates... algorithms signed signature

X.509 Certificate Version 3 Extensions May need more info than subject field alone gives May need security policy information Need to limit damage from fault CA Need to be able to identify separate keys used by same subject (encrypt, verify) Extension fields provide this in a flexible way Extension identifier Extension criticality can this be ignored safely? Extension value Three main categories Key and policy info Subject and issuer attributes Certification path constraints Constraints included in CA certificates for other CAs May restrict types of certificates that can be issued by the subject CA, or that may occur later in the chain Include: Certification Path Constraint Extensions Basic constraints indicates if subject can act as a CA; may constrain certification path length Name constraints constrains name space of all subject names in rest of certification path Policy constraints may specify explicit policy identification or may inhibit policy mapping for rest of path

Key and Policy Extensions Certificate Policy = named set of rules that indicates applicability of a certificate to a particular community or class of application with common security requirements. Includes: Authority key identifier distinguishes among multiple signing keys for the CA Subject key identifier distinguishes among multiple keys for subject (e.g., verification key, encryption key; useful for updating keys also) Key usage restricts ways in which the key should be used: digital signature, non repudiation, key encryption, data encryption, key agreement, CA signature verification on certificates, CA signature verification on CRLs Private key usage period signing key usually shorter lived than verification key Certificate policies list of policies the certificate supports, along with optional qualifying information Policy mappings used only in certificates issued by CAs for other CAs; allows issuer to indicate equivalencies between policies of issuer and subject CA domains Certificate Subject and Issuer Attribute Extensions Support for alternative names, alternative formats Can provide additional information about a subject for identification purposes (e.g., email address, postal address, position title, photograph, etc.) Includes: Subject alternative name one or more alternative names in a variety of forms; supports IPSEC, email, EDI, etc. Issuer alternative name ditto for issuer Subject directory attributes any X.500 directory attribute values for subject