WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES



Similar documents
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

NIST Test Personal Identity Verification (PIV) Cards

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Certificate Management in Ad Hoc Networks

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Authentication Application

CS 356 Lecture 28 Internet Authentication. Spring 2013

Overview. SSL Cryptography Overview CHAPTER 1

Public-Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

Cryptography and Network Security Chapter 14

Danske Bank Group Certificate Policy

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Savitribai Phule Pune University

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Introduction to Network Security Key Management and Distribution

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Security Digital Certificate Manager

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Trustis FPS PKI Glossary of Terms

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Public Key Encryption and Digital Signature: How do they work?

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

Security Digital Certificate Manager

White Paper. Enhancing Website Security with Algorithm Agility

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Ciphire Mail. Abstract

I N F O R M A T I O N S E C U R I T Y

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

Installation and usage of SSL certificates: Your guide to getting it right

Client Server Registration Protocol

Research on Mobile E-business Security Model based on WPKI Technology and its Application

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Key Management Interoperability Protocol (KMIP)

Chapter 1: Introduction

Introduction to Cryptography

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

UML BASED MODELING OF ECDSA FOR SECURED AND SMART E-GOVERNANCE SYSTEM

Module 7 Security CS655! 7-1!

CERTIFICATION PRACTICE STATEMENT UPDATE

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

PKI: Public Key Infrastructure

Understanding and Integrating KODAK Picture Authentication Cameras

Microsoft Trusted Root Certificate: Program Requirements

Bit Chat: A Peer-to-Peer Instant Messenger

Lightweight Security using Identity-Based Encryption Guido Appenzeller

7 Key Management and PKIs

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ARCHIVED PUBLICATION

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Digital Certificates Demystified

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Reducing Certificate Revocation Cost using NPKI

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

White Paper: Managing Security on Mobile Phones

CMS Illinois Department of Central Management Services

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

SSL BEST PRACTICES OVERVIEW

I N F O R M A T I O N S E C U R I T Y

Sync Security and Privacy Brief

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Case Study for Layer 3 Authentication and Encryption

Information Security

Securing MANET Using Diffie Hellman Digital Signature Scheme

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Websense Content Gateway HTTPS Configuration

CRYPTOGRAPHY IN NETWORK SECURITY

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Dynamic Query Updation for User Authentication in cloud Environment

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure

2014 IBM Corporation

Certification Practice Statement

Transcription:

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal University, Manipal, India. bala_muniyal@yahoo.com 2 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal University, Manipal, India. kkp_prakash@yahoo.com 3 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal University, Manipal,India. shanks406@gmail.com ABSTRACT- Mobile devices play an important role in the wireless network environment for providing different services over internet. The business transactions over wireless electronic devices are not secure and hence the messages are prone to be intercepted and modified by an intruder. So, devices supporting wireless internet must be guaranteed at the same level of security as the wired network. PKI (Public Key Infrastructure) used in the wired environment is not suitable for wireless environment because of the less powerful processor and small memory. This arises a need for the development of a Wireless Public Key Infrastructure (WPKI) that provides the similar security level as the wired PKI suitable for mobile phone. In this paper, a discussion of public key infrastructure and an experimental set up for Wireless Public key Infrastructure for mobile phones are made. KEYWORDS WPKI, Digital Certificate, Wireless internet, M-commerce 1. INTRODUCTION Several kinds of e-services are provided by mobile phones over internet. Due to unreliable wireless media, dynamic topology and limitations on infrastructure these services are vulnerable to security threats and also impose restrictions on the usage of conventional PKI. PKI is a security architecture that provides high level of confidence for the information to be exchanged over internet. To guarantee security of Mobile commerce(m-commerce) via wireless internet, public key infrastructure technology suitable for wireless environment must be required. Wireless internet has many restrictions compared to wired one. A mobile phone does not have the same computational ability and storage capacity as a desktop computer, and wireless communication has lower transmission bandwidth than its wired counterpart [1-4]. Applying wired internet protocols to mobile phone has many problems such as the limitations in screen size, computing power, memory capacity and these limitations should be addressed while designing PKI environment for the wireless devices. Optimization of certification management protocols and size of the data processed in the mobile device are the major factors to be considered in the design which has a considerable reduction in the size of the module to be installed in the mobile phone. DOI : 10.5121/ijnsa.2012.4608 111

2. PUBLIC KEY INFRASTRUCTURE A Public Key Infrastructure (PKI) is a system consisting of set of hardware and software used for the management of public key and distribution of digital certificates which are used to verify a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository, and revokes them if needed when it is not in use. Public key cryptography is used to transmit user s public key in PKI environment. Public key of the user is advertised and corresponding private key kept secret. A PKI consists of Certification Authorities (CAs), Registration Authorities (RAs), Certificate holders, Clients, Repositories, Cryptographic Algorithms and Protocols. As shown in Figure 1, validating the identity of user and then issuing a digital certificate is done by CA. RA is a third party that validates the identity of those applying for a digital certificate. The PKI directory contains information regarding the CA s digital certificate[2][3]. A Public Key Infrastructure ensures the following: Ensures the quality of information transmitted over the network. Lifetime and validity of the information. Certainty of the privacy, and source and destination of that information of that information. To ensure non repudiation.. Figure 1 - PKI Model and Scenario 3. IMPORTANCE OF WIRELESS PUBLIC KEY INFRASTRUCTURE Wireless devices have some technical limitations such as less powerful CPU, less memory size, restricted battery power, small display and input devices compared to devices in wired infrastructure. A mobile phone lacks computing capabilities of PKI services such as key generation, digital signature generation and verification, certificate validation, Certificate Revocation List (CRL) verification, memory size of storing certificate and CRL. Because of the technical limitations of wireless environment, processing of CMP (Certificate Man agement 112

Protocol) in the mobile phone, and downloading CRL required for certificate verification becomes very hard. Following paragraphs discuss how wireless public key infrastructure can be deployed for mobile phones. 3.1 Wireless PKI for mobile phones WPKI through wireless internet with the same level of security as that of wired internet, the following requirements must be satisfied: Select optimal digital signature algorithm to be calculated in mobile phone. Small piece of data to be stored in mobile phone and transmitted over networks. Optimize CMP protocol to be processed in mobile phone and through wireless bandwidth. Optimize certificate validation scheme. 3.1.1 Optimal Digital Signature Following are the two important algorithms for the generation of optimal signature: ECDSA (Public-Key Algorithm) DES (Symmetric-Key Algorithm) The principal attraction of Elliptic Curve Digital Signature Algorithm is that, it offers equal security for a small key size as that of RSA, thereby reducing processing overhead. ECC based Elliptic Curve Digital Signature Algorithm generates 163-bit key size, equivalent to RSA 1024- bit key size, it takes shorter time to generate public key pair in mobile phone than RSA algorithm. Since ECDSA 163-bit key size is less than RSA 1024-bit key size, a certificate size including the public key could be reduced [5]. The Data Encryption Standard (DES) played a vital role in the area of cryptography for the encryption of electronic data. It is no longer secure in its original form, but in a modified form it is still useful. DES is now considered to be insecure for many applications. This is chiefly due to the 56-bit key size being too small [6]. 3.1.2 Optimal Certificate Profiles We describe Wireless X.509 certificate profile issuing for mobile phone and server, and shortlived certificate profile issuing for server to reduce verification load of mobile phone.(figure 2 and Figure3)[3]. X.509 certificate consists of basic field and extension field. Generation implies that a certificate has to include the specified field, and process implies that if the specified filed is present in the certificate, the field must be examined when the certificate is verified. Basic purpose is to reduce the size of the certificate by eliminating unnecessary and unused fields from the certificate. 113

Figure 2 - Wireless X.509 Certificate Figure3 - Short-lived Certificate 114

3.1.3 Optimal Certificate Request and Management Protocol The mobile phone has to send a secured request for the certificate to a CA and CA issues it to the mobile phone. The followings are requirements of certificate request protocol: Certificate request message is constructed at mobile phone. This value should include a public key, end-entity s reference number like ID and password. Corresponding to the public key for which a certificate is being requested,a Proof of Possession of the private key value is included in certificate request message Method that the certificate request message is securely communicated to a CA. To satisfy these requirements, wireless certificate management protocol is developed (Figure4). Figure. 4 - Certificate Management Protocol. 115

3.1.4. Optimal Validation Scheme A mobile phone delegates validation authority to a third party server such as OCSP (Online Certificate Status Protocol) to validate certificate in this model. As shown in Figure 6, the mobile phone can avoid burden of CRL download and storage as well as the complicated procedure to acquire and verify certificate chain. 4. Sequence of operations in the proposed set-up Figure 5- Activities between CA and Mobile phone for generating certificate. 116

New mobile user (Client) requests for registration at certification authority. A request for registration is received at CA (Server) and a random code is generated specific for each requesting wireless device. The CA then generates a username and password specific to the user and stores the values along with the random code in the database. The user supplied with username and password. The user can now generate a public key-private key/secret key using a digital signature algorithm. A message is then entered by the user or the username and password and public/secret key is used as the message. The message digest is generated using a hash algorithm. Using the message digest and the private/secret key the digital signature is generated. The digital signature along with the message and public/secret key is sent from the user to the CA for verification purposes. The digital signature is then unlocked using the public/secret key of the user at CA and the message digest is matched with the message digest generated on the CA. Once the digital signature is verified, CA issues a Digital Certificate for the user. The values are stored in a notepad file and this file is stored in a directory assigned to CA. The URL/Pathname of the certificate in the directory is sent to the user for future transactions with other servers and thus reducing the load on wireless devices such as mobile phones. Whenever a transaction happens between mobile phone and a server, initially, the server sends its certificate to the mobile. The mobile sends this certificate to the OCSP server. OCSP server then downloads the CRL list from the directory and checks for certificate validation. Once validated, the OCSP server sends its response to the mobile which then carries on the future transactions with the mobile device thus reducing future transactions. As shown in Figure 6, the server on receiving the Certificate URL of the mobile, sends it to OCSP server for validation. In turn, the CRL is sent to the CA. 5. CONCLUSIONS Figure 6: Interaction with OSCP server In this article, the concept of PKI is discussed briefly and the limitations of PKI for wired network is addressed. For the wireless environment, same security level as wired PKI supporting mobile phone is considered. The proposed wireless PKI model aimed at secure M- commerce based on mobile phone through wireless communication. To reduce the complexity of certificate validation, the optimal certificate profile for X.509 and short-lived certificate, which reduced the size of the certificate, and applied OCSP model to efficiently validate X.509 certificate in mobile phone. WPKI services within the WAP environment, must be optimized using more efficient cryptography and data transport techniques which suits for an environment where fundamental limitations over memory, processor exists.. The proposed model can be utilized not only in M- commerce but also diverse wireless data communication such as mobile hospital and government, based on mobile phone through wireless internet. 117

References [1] Yong Lee, Jaeil lee, Goo Yeon Lee, (2008), Wireless certificate management protocol supporting mobile phones, IEEE congress on services 2008-Part1, pp353-355 [2] Sean Lancaster, David C.Yen, Shi-Ming Huang, (200 3) Computer Standards and Interfaces25, pp437-439 [3] Yong Lee, Jaeil Lee, JooSeok Song, (2006), Design and Implementation of wireless PKI technology suitable for mobile phone in mobile-commerce, ScienceDirect, computer communications 30(2007), pp893-899 [4] Christian Schwingenschlogl, Stephan Eichler,Brend Muller, (2006), Performance of PKI based security Mechanism in Mobile adhoc netwoks, International Journal of Electronics and Communications 60(2006), 20-24. [5] B.Schneier,Applied Cryprography, second ed, Wiley, new York,1996 [6] Cryptography and network security,william stallings,prentice hall,2005 118