Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C



Similar documents
Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Security Digital Certificate Manager

Overview. SSL Cryptography Overview CHAPTER 1

How To Understand And Understand The Security Of A Key Infrastructure

Security Digital Certificate Manager

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

What Are They, and What Are They Doing in My Browser?

Configuring Digital Certificates

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

7 Key Management and PKIs

Using Entrust certificates with VPN

SBClient SSL. Ehab AbuShmais

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Public Key Infrastructure (PKI)

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

TELSTRA RSS CA Subscriber Agreement (SA)

Securing your Online Data Transfer with SSL

Certificate Authority Product Overview Technology White Paper

Cryptography and Network Security Chapter 14

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)


SSL/TLS: The Ugly Truth

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

Certification Practice Statement

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Authentication Applications

Neutralus Certification Practices Statement

IBM i Version 7.3. Security Digital Certificate Manager IBM

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Asymmetric cryptosystems fundamental problem: authentication of public keys

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

Information Security

understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

mod_ssl Cryptographic Techniques

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Ciphire Mail. Abstract

WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW. Entrust All rights reserved.

CS 356 Lecture 28 Internet Authentication. Spring 2013

Class 3 Registration Authority Charter

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Understanding SSL Certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

Introduction to Network Security Key Management and Distribution

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

encryption keys, signing keys are not archived, reducing exposure to unauthorized access to the private key.

DigiCert Certification Practice Statement

Lecture VII : Public Key Infrastructure (PKI)

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

Danske Bank Group Certificate Policy

Certificates and network security

CS 392/681 - Computer Security

Visa Public Key Infrastructure Certificate Policy (CP)

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS

An Introduction to Entrust PKI. Last updated: September 14, 2004

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Lecture 10 - Authentication

Research Article. Research of network payment system based on multi-factor authentication

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Security + Certification (ITSY 1076) Syllabus

Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5

Encrypted Connections

Key Management and Distribution

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

Chapter 7 Managing Users, Authentication, and Certificates

EBIZID CPS Certification Practice Statement

Case Study for Layer 3 Authentication and Encryption

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Enabling SSL and Client Certificates on the SAP J2EE Engine

RSA Security RSA Keon Certificate Authority PKI Product

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

CALIFORNIA SOFTWARE LABS

Comodo Certification Practice Statement

Certificate Policies and Certification Practice Statements

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

National Certification Authority Framework in Sri Lanka

Certification Practice Statement

Advantage Security Certification Practice Statement

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Public Key Applications & Usage A Brief Insight

CMS Illinois Department of Central Management Services

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Understanding digital certificates

Transcription:

Cunsheng Ding, HKUST

Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1

Part I: Digital Certificates Page 2

What is a Digital Certificate? Definition: Digital certificates authenticate that their holders are truly who and what they claim to be. Protect data exchanged online. They are tamper-proof and cannot be forged. Real world example: passport Page 3

Types of Digital Certificate? Server certificates, and personal certificates (e.g., containing a public key). Page 4

Client Certificates Also called personal or browser certificates Signing certificate: bound to key-pair used for digital signatures Encrypting certificate: bound to key-pair used for encryption. Remark: Extensive support found in SSL/TLS Question: Any standard on the format of digital certificates? Page 5

The X.509v3 Certificate Public Key of Subject: main payload of certificate Subject and Issuer Information: X.500 Distinguished Name (DN) Comprised of multiple Relative DNs (RDNs) C = country, ST = state, L = locale, O = organiz. OU = organization unit, CN = common name Digital Signature of the Certificate Authority: The message digest of the certificate encrypted with issuer s private key. Page 6

X.509v3 Format Version/Serial Number hashing algorithm Signature Algorithm Identifier Issuer C=US O=RSA Security OU=Secure Certificate Authority message digest Period of Validity Subject C=US ST=NY L=Albany O=OFT CN=John Doe Subject s Public Key Signature of Issuer Issuer s private key Page 7

X.509v3 Key Usage Extensions Definition: A key usage extension defines for which applications and under which policies a certificated public key can be used. Examples: Digital signature, nonrepudiation, key encryption, data encryption, key agreement, CA signature verification on certificates, CA signature verification on CRL. Usage extension: Any combination of the items above. Remark: CRL: Certificate Revocation List Page 8

Demonstration of Digital Certificates Go to: www.cs.ust.hkfaculty.php Click on some faculty s digital certificate and open the file. Page 9

Part II: Certificate Authority Page 10

Certificate Authority (1) It is a trusted third-party. It is responsible for verifying the identities of cryptographic key holders. (2) It issues digital certificates. Asserts that a public key is part of a key-pair held by an individual, organization, or other entity. (3) It publishes policy detailed in a Certification Practices Statement (CPS). Real World Example: HK Immigration Department. Page 11

Part III: Public Key Infrastructure Page 12

What is a Public Key Infrastructure Public-key infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet. PKIs integrate digital certificates, public-key cryptography, and certificate authorities into a total, enterprise-wide network security architecture. Page 13

Elements of a Public Key Infrastructure Certificate Authority (CA): e.g., OpenSSL, Netscape, Verisign, Entrust, RSA Keon Public/Private Key Pairs - key management X.509 Identity Certificates - certificate management LDAP servers (LDAP: Lightweight Directory Access Protocol) Page 14

Why Do We Need Public Key Infrastructures (I) Authenticate identity: Digital certificates issued as part of your PKI allow individual users, organizations, and web site operators to confidently validate the identity of each party in an Internet transaction. Verify integrity: A digital certificate ensures that the message or document the certificate signs has not been changed or corrupted in transit online. Ensure privacy: Digital certificates protect information from interception during Internet transmission. Page 15

Why Do We Need Public Key Infrastructures (II) Authorize access: PKI digital certificates replace easily guessed and frequently lost user IDs and passwords to streamline intranet log-in security. Authorize transactions: With PKI solutions, your enterprises can control access privileges for specified online transactions. Support for nonrepudiation: Digital certificates validate their users identities, making it nearly impossible to later repudiate a digitally signed transaction, such as a purchase made on a web site Page 16

Issues Scalability: How many certificates can one CA manage? Administration: How to revoke already issued certificates? Trust: Why should I trust your CA? Page 17

Issues: PKI Scalability A large PKI requires distributed CAs Local, Reginal, National CAs International CAs Certificate Hierarchy Intermediate CA certificates are signed by the CA one-step up. End-user certificates are part of a certificate chain. Page 18

Certificate Hierarchy Root CA Intermediate CA Intermediate CA Local CA Local CA Local CA Local CA Certificate Page 19

Verifying Certificate Chains Entity accepting certificates must be able to verify CA in the chain. Should the entire chain be present during a handshake? Must distinguish types of certificates. Otherwise, end-users could sign bogus certificates. X.509v3 extensions indicate use of certificate. Page 20

Methods of Publishing Digital Certificates Without a 3rd party: Own web page, via FTP file With a 3rd party: Dedicated key server, directory Page 21

Why Distributed Digital Certificates on Server? Encrypt data for someone without prior contact. You do not have to store all keys yourself. Easier distribution of new keys and updates. Page 22

Directory as Key Server As a publishing medium for public keys and certificates. Users can put their public key certificate there. CAs may put their certificates there. The directory documents revocation of keys and/or certificates in the CRL. It documents status of a certificate at specific time. Page 23

Implementing PKIs PKI solutions, such as VeriSign OnSite, allow organizations to efficiently set up and maintain their own complete PKI, acting as a CA to issue certificates, while relying on expert services, technology, and practices for support. Before your organization can begin implementing PKI and acting as a CA in issuing certificates, you need to be able to issue certificates that contain company-specific identifying information, and you must be able to control who is issued a certificate. There are two main PKI options: open and closed PKI. Page 24

Open and Closed PKIs Closed PKI: With proprietary PKI software, you can issue digital certificates to a limited, controlled community of users. Applications - including those of extranet users and anyone else outside your enterprise with whom your employees need to communicate securely - need a special software interface from the PKI vendor to work with the certificates. Closed PKI systems require additional training, hardware, software, and maintenance. Open PKI: Applications interface seamlessly with certificates issued under an open PKI, the roots of which are already embedded. Open PKI systems allow enterprises to become their own CA, while taking advantage of the PKI vendor s service and support. Example, VeriSign OnSite. Page 25

Evaluating PKI Solutions (I) As the foundation for the security of your enterprise s Internet transactions, the success of your PKI will have a major impact on your business. Before implementing PKI solutions for your enterprise, there are six critical questions to ask: 1. How experienced is your PKI solution provider? Full PKI functionality can include a full range of services, including certificate issuance, administration, records retention, and key management. Can you rely on your provider for time-tested experience? 2. Will your PKI integrate with your existing applications? Some PKI solutions are based on proprietary desktop software, while others provide digital certificates that integrate with standard web browsers, email clients, and enterprise applications. Page 26

Evaluating PKI Solutions (II) 3. Can the PKI support all of your users? Information security is critical. Make sure your PKI will be available around the clock to employees, partners, and customers. Is it set up to handle disaster recovery? Hacker attacks? Unexpected peaks in demand? 4. Can your PKI grow with your business? As more and more users need digital certificates, can your PKI scale to accommodate demand? Page 27

Evaluating PKI Solutions (III) 5. How secure is the PKI s operating infrastructure? For most companies, operating a PKI presents a new and unique set of risk management challenges. CAs that support key applications use special cryptographic hardware to sign certificates. Is all of this hardware protected from theft? 6. Is your PKI ready for e-commerce? You may need your PKI to support an intranet at first, and then larger communities, such as an extranet for your suppliers and partners; VPNs for a worldwide network of offices, and even a world of e-commerce customers. Page 28