Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.4 Public Key Infrastructure (PKI) Acknowledgment: Slides revised from.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Infrastructure (PKI)
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.
COEN 350 Public Key Infrastructure. PKI Task: Securely distribute public keys. Certificates. Repository for retrieving certificates. Method for revoking.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
TAG Presentation 18th May 2004 Paul Butler
Key Management and Distribution
Key management issues in PGP
Cryptography and Network Security Chapter 14
Public Key Infrastructure (PKI)
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
TAG Presentation 18th May 2004 Paul Butler
Authentication Applications
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Security in ebXML Messaging
Cryptography and Network Security Chapter 14
APNIC Trial of Certification of IP Addresses and ASes
Cryptography and Network Security Chapter 14
Information Security message M one-way hash fingerprint f = H(M)
Digital Certificates and X.509
CS 465 Certificates Last Updated: Oct 14, 2017.
Lecture 4 - Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography and Network Security Chapter 14
PKI (Public Key Infrastructure)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptography and Network Security Chapter 14
Presentation transcript:

Public Key Infrastructure

A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management of keys in distributed system

Public Key Infrastructure A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management of keys in distributed system Goal: protect and distribute information that is needed in a widely distributed environment, where the users, resources and stake-holders may all be in different places at different times

Public Key Infrastructure A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management of keys in distributed system Goal: protect and distribute information that is needed in a widely distributed environment, where the users, resources and stake-holders may all be in different places at different times Provides: 1. Data integrity 2. Data confidentiality 3. Authentication

Public Key Infrastructure A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management of keys in distributed system Goal: protect and distribute information that is needed in a widely distributed environment, where the users, resources and stake-holders may all be in different places at different times Provides: 1. Data integrity 2. Data confidentiality 3. Authentication Integrates: 1. Digital certificates 2. Public key cryptography 3. Certification authorities for enterprise-wide network security architecture

Public Key Infrastructure Components: 1. Certification Authority - confirms the identity of transmitting parties

Public Key Infrastructure Components: 1. Certification Authority - confirms the identity of transmitting parties 2. Registration Authority - trusted by a CA to register or vouch for users of the CA - verifies user requests for a digital certificate and tells the CA to issue it

Public Key Infrastructure Components: 1. Certification Authority - confirms the identity of transmitting parties 2. Registration Authority - trusted by a CA to register or vouch for users of the CA - verifies user requests for a digital certificate and tells the CA to issue it 3. Repository - database of active digital certificates for a CA - provides data that allows users to confirm the status of digital certificates for individuals and businesses that receive digitally signed messages

Public Key Infrastructure Components: 1. Certification Authority - confirms the identity of transmitting parties 2. Registration Authority - trusted by a CA to register or vouch for users of the CA - verifies user requests for a digital certificate and tells the CA to issue it 3. Repository - database of active digital certificates for a CA - provides data that allows users to confirm the status of digital certificates for individuals and businesses that receive digitally signed messages 4. Archive - to store and protect sufficient information to determine if a digital signature on an "old" document should be trusted

Public Key Infrastructure Components: 1. Certification Authority - confirms the identity of transmitting parties 2. Registration Authority - trusted by a CA to register or vouch for users of the CA 3. Repository - database of active digital certificates for a CA - confirm status of digital certificates for individuals and businesses 4. Archive - to store and protect sufficient information to determine if a digital signature on an "old" document should be trusted 5. Certificates - includes public key, information about the identity of the party holding the corresponding private key, the operational period for the certificate, and the CA's own digital signature - may contain other information about the signing party or information about the recommended uses for the public key

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI 2. Collection of hardware, software, and people who operate it

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI 2. Collection of hardware, software, and people who operate it 3. Performs four basic PKI functions: - issues certificates (creates and signs them) - maintains certificate status information and issues CRLs - publishes its current (e.g., unexpired) certificates and CRLs, so users can obtain the information they need to implement security services - maintains archives of status information about the expired certificates that it issued

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI 2. Collection of hardware, software, and people who operate it 3. Performs four basic PKI functions: - issues certificates (creates and signs them) - maintains certificate status information and issues CRLs - publishes its current (e.g., unexpired) certificates and CRLs, so users can obtain the information they need to implement security services - maintains archives of status information about the expired certificates that it issued 4. May delegate some functions to other components of the PKI

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI 2. Collection of hardware, software, and people who operate it 3. Performs four basic PKI functions: - issues certificates (creates and signs them) - maintains certificate status information and issues CRLs - publishes its current (e.g., unexpired) certificates and CRLs, so users can obtain the information they need to implement security services - maintains archives of status information about the expired certificates that it issued 4. May delegate some functions to other components of the PKI 5. By creating a certificate, CA asserts the subject of the certificate has the private key associated with the public key of the certificate

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI 2. Collection of hardware, software, and people who operate it 3. Performs four basic PKI functions: - issues certificates (creates and signs them) - maintains certificate status information and issues CRLs - publishes its current (e.g., unexpired) certificates and CRLs, so users can obtain the information they need to implement security services - maintains archives of status information about the expired certificates that it issued 4. May delegate some functions to other components of the PKI 5. By creating a certificate, CA asserts the subject of the certificate has the private key associated with the public key of the certificate 6. May assert that certificates issued by other CAs are trustworthy

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI 2. Collection of hardware, software, and people who operate it 3. Performs four basic PKI functions: - issues certificates (creates and signs them) - maintains certificate status information and issues CRLs - publishes its current (e.g., unexpired) certificates and CRLs, so users can obtain the information they need to implement security services - maintains archives of status information about the expired certificates that it issued 4. May delegate some functions to other components of the PKI 5. By creating a certificate, CA asserts the subject of the certificate has the private key associated with the public key of the certificate 6. May assert that certificates issued by other CAs are trustworthy 7. Signs every certificate

Public Key Infrastructure Certification Authority: 1. Basic building block of the PKI 2. Collection of hardware, software, and people who operate it 3. Performs four basic PKI functions: - issues certificates (creates and signs them) - maintains certificate status information and issues CRLs - publishes its current (e.g., unexpired) certificates and CRLs, so users can obtain the information they need to implement security services - maintains archives of status information about the expired certificates that it issued 4. May delegate some functions to other components of the PKI 5. By creating a certificate, CA asserts the subject of the certificate has the private key associated with the public key of the certificate 6. May assert that certificates issued by other CAs are trustworthy 7. Signs every certificate 8. CA must provide adequate protection for its own private key

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert - examples (credit card company): a. drivers license b. recent pay stub c. data from a company's human resources department d. letter from a company official

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert - examples (credit card company): a. drivers license b. recent pay stub c. data from a company's human resources department d. letter from a company official 2. Information is collected and sent to the CA

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert - examples (credit card company): a. drivers license b. recent pay stub c. data from a company's human resources department d. letter from a company official 2. Information is collected and sent to the CA 3. Usually operated by a single person (CA is larger)

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert - examples (credit card company): a. drivers license b. recent pay stub c. data from a company's human resources department d. letter from a company official 2. Information is collected and sent to the CA 3. Usually operated by a single person (CA is larger) 4. A CA maintains a list of trusted (accredited) RAs

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert - examples (credit card company): a. drivers license b. recent pay stub c. data from a company's human resources department d. letter from a company official 2. Information is collected and sent to the CA 3. Usually operated by a single person (CA is larger) 4. A CA maintains a list of trusted (accredited) RAs 5. Is known to the CA by a name and public key

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert - examples (credit card company): a. drivers license b. recent pay stub c. data from a company's human resources department d. letter from a company official 2. Information is collected and sent to the CA 3. Usually operated by a single person (CA is larger) 4. A CA maintains a list of trusted (accredited) RAs 5. Is known to the CA by a name and public key 6. By verifying RA's signature, CA is sure info obtained is reliable

Public Key Infrastructure Registration Authority: 1. Verify certificate contents for the CA - Certificate contents can represent info presented by requester of cert - examples (credit card company): a. drivers license b. recent pay stub c. data from a company's human resources department d. letter from a company official 2. Information is collected and sent to the CA 3. Usually operated by a single person (CA is larger) 4. A CA maintains a list of trusted (accredited) RAs 5. Is known to the CA by a name and public key 6. By verifying RA's signature, CA is sure info obtained is reliable 7. RAs must provide adequate protection for their private keys

Public Key Infrastructure Repositories: 1. Directory service for distribution of certificates and certificate status - provides means of storing and distributing certificates - manages updates to certificates - typically implementations of the X.500 standard

Public Key Infrastructure Repositories: 1. Directory service for distribution of certificates and certificate status - provides means of storing and distributing certificates - manages updates to certificates - typically implementations of the X.500 standard 2. Directory servers work across international, company, system borders

Public Key Infrastructure Repositories: 1. Directory service for distribution of certificates and certificate status - provides means of storing and distributing certificates - manages updates to certificates - typically implementations of the X.500 standard 2. Directory servers work across international, company, system borders 3. Suite of protocols is specified for different kinds of services needed in server-to-server communication - chaining - shadowing (replication) - referral (if server cannot satisfy the request)

Public Key Infrastructure Repositories: 1. Directory service for distribution of certificates and certificate status - provides means of storing and distributing certificates - manages updates to certificates - typically implementations of the X.500 standard 2. Directory servers work across international, company, system borders 3. Suite of protocols is specified for different kinds of services needed in server-to-server communication - chaining - shadowing (replication) - referral (if server cannot satisfy the request) 4. Lightweight Directory Access Protocol (LDAP) for client-server Communications

Public Key Infrastructure Repositories: 1. Directory service for distribution of certificates and certificate status - provides means of storing and distributing certificates - manages updates to certificates - typically implementations of the X.500 standard 2. Directory servers work across international, company, system borders 3. Suite of protocols is specified for different kinds of services needed in server-to-server communication - chaining - shadowing (replication) - referral (if server cannot satisfy the request) 4. Lightweight Directory Access Protocol (LDAP) for client-server Communications 5. Directory servers need to be interoperable to be able to retrieve CRLs and certificates from remote sites for signature verification

Public Key Infrastructure Archives: 1. Accepts responsibility for long term storage of data needed by CA

Public Key Infrastructure Archives: 1. Accepts responsibility for long term storage of data needed by CA 2. Asserts information is good at the time it is received and has not been modified since it entered the archive

Public Key Infrastructure Archives: 1. Accepts responsibility for long term storage of data needed by CA 2. Asserts information is good at the time it is received and has not been modified since it entered the archive 3. Information provided by the CA to the archive must be sufficient to determine if a certificate was actually issued by the CA as specified in the certificate, and valid at that time.

Public Key Infrastructure Archives: 1. Accepts responsibility for long term storage of data needed by CA 2. Asserts information is good at the time it is received and has not been modified since it entered the archive 3. Information provided by the CA to the archive must be sufficient to determine if a certificate was actually issued by the CA as specified in the certificate, and valid at that time. 4. The archive protects that information through technical mechanisms and appropriate procedures while in its care.

Public Key Infrastructure Archives: 1. Accepts responsibility for long term storage of data needed by CA 2. Asserts information is good at the time it is received and has not been modified since it entered the archive 3. Information provided by the CA to the archive must be sufficient to determine if a certificate was actually issued by the CA as specified in the certificate, and valid at that time. 4. The archive protects that information through technical mechanisms and appropriate procedures while in its care. 5. If a dispute arises at a later date, the information can be used to verify that the private key associated with the certificate was used to sign a document.

Public Key Infrastructure Archives: 1. Accepts responsibility for long term storage of data needed by CA 2. Asserts information is good at the time it is received and has not been modified since it entered the archive 3. Information provided by the CA to the archive must be sufficient to determine if a certificate was actually issued by the CA as specified in the certificate, and valid at that time. 4. The archive protects that information through technical mechanisms and appropriate procedures while in its care. 5. If a dispute arises at a later date, the information can be used to verify that the private key associated with the certificate was used to sign a document. 6. This permits the verification of signatures on old documents (such as wills) at a later date.

Public Key Infrastructure Trust Models: Monopoly model: One organization is trusted by all others to issue certificates. All software contains public key of that CA Monopoly + Registration Authorities: Use other organizations to check identities and vouch for public keys Delegated CAs: Trust anchor issues certificates to other CAs. Users can get a certificate from one of the other CAs. Oligarchy (Browsers): Many trust anchors, certificate from one is sufficient Anarchy (PGP): Each user responsible for configuring TAs.

Public Key Infrastructure Monopoly: There is no one universally trusted organization Infeasible to change the key in all software if it is compromised CA could charge whatever it wants to issue certificates Monopoly + RAs: More convenient than above – many places to get certified Delegated CAs: Recipient may see a chain of certificates vs. one for Mon+RAs Oligarchy (e.g. browsers): Worse than monopoly since any of trust anchors could be comp. Trust anchors may be trusted by vendor but not user! It is easy to trick a naive user into accepting a bogus trust anchor Users do not understand what's up: ex: use of public terminal Unlikely a user will check trust anchor list to see if it's tampered Anarchy (PGP): Could become unworkable on large scale

Public Key Infrastructure Name Constraints: Assume CA trusted to issue certs for only some users or domains Top-Down with Name Constraints: Tree of CAs, each can only issue certs in their domain. Bottom-Up with Name Constraints: Each org creates its own PKI and links to the WWW of PKIs A/B/X A/B A A/C A/B/K A/C/Y B/Y/Z/A B/Y/Z B/Y/Z/G B/Y/Z/A/F

Public Key Infrastructure Bottom-Up with Name Constraints: 1. Easy to determine whether path exists 2. Hierarchy corresponding to the name of the principal is intuitive 3. PKI can be deployed in any org, no need to pay someone to do it Can have a PKI in your org even if lots of other orgs do not 4. Damage due to compromised CA is limited to that org No one can impersonate you from a compromised CA outside of your org 5. Configuration is easy: all CAs can be reached beginning with your key pair - new employee gets a key just like a badge

Public Key Infrastructure Relative Names: Certificates carry relative names, not absolute names e.g. Use cs instead of cs.uc.edu If an entire subtree of names has to be moved, no certificates need to be reissued Do not use name A/B/C/D but only D on certificates from A/B/C - then if that moves to H/Y, say, only certificates between H/Y and ancestors need be reissued.

Public Key Infrastructure Relative Names: Certificates carry relative names, not absolute names e.g. Use cs instead of cs.uc.edu If an entire subtree of names has to be moved, no certificates need to be reissued Do not use name A/B/C/D but only D on certificates from A/B/C - then if that moves to H/Y, say, only certificates between H/Y and ancestors need be reissued. Name Constraints in Certificates: Field in certificate stating names Allows issuer to specify names that subject is trusted to certify Can also disallow names. In building Bottom-Up model Child: subject only allowed to certify names below subject's Parent: allow certification of any names except mine and below

Public Key Infrastructure Policies in Certificates: Statement of how carefully the identity of requester is checked. If not obeyed, no certificate is issued. Can deny certificates to users not at high level of security.

Public Key Infrastructure Expiration and Revocation: Revocation important – someone may realize their key is stolen.

Public Key Infrastructure Expiration and Revocation: Revocation important – someone may realize their key is stolen. Expiration important – many orgs do not bother with revocation companies collecting money for issuing certs want to issue lots of them

Public Key Infrastructure Expiration and Revocation: Revocation important – someone may realize their key is stolen. Expiration important – many orgs do not bother with revocation companies collecting money for issuing certs want to issue lots of them If certificates of web service providers expire or are revoked, then new ones have to be issued - thus, down time

Public Key Infrastructure Expiration and Revocation: Revocation important – someone may realize their key is stolen. Expiration important – many orgs do not bother with revocation companies collecting money for issuing certs want to issue lots of them If certificates of web service providers expire or are revoked, then new ones have to be issued - thus, down time So, browsers typically do not check certificates

Public Key Infrastructure Expiration and Revocation: Revocation important – someone may realize their key is stolen. Expiration important – many orgs do not bother with revocation companies collecting money for issuing certs want to issue lots of them If certificates of web service providers expire or are revoked, then new ones have to be issued - thus, down time So, browsers typically do not check certificates Verisign demands are so high, people do not get new certificates from them - depending on browsers not to check

Public Key Infrastructure Expiration and Revocation: Revocation important – someone may realize their key is stolen. Expiration important – many orgs do not bother with revocation companies collecting money for issuing certs want to issue lots of them If certificates of web service providers expire or are revoked, then new ones have to be issued - thus, down time So, browsers typically do not check certificates Verisign demands are so high, people do not get new certificates from them - depending on browsers not to check Hence, security is down the tubes.

Public Key Infrastructure Certificate Revocation Lists (CRL): CA periodically issues a timestamped, signed list of revoked certs Delta CRL – just the changes since a particular time/day On-Line Revocation Server (OLRS): System that can be queried over the net Can this service be trusted? Not security-sensitive - Contains no vulnerable database of secrets Worst thing it can do is to claim an invalid cert is still valid – damage from this is limited