An Analysis of XKMS Yamini Ghadge Shanky Subramanian.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

XML Key Management Services - Tutorial 9 December 01 Blair Dillaway Software Architect Microsoft Corp.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
A Framework for Distributed OCSP without Responders Certificate
MyProxy: A Multi-Purpose Grid Authentication Service
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Public Key Infrastructure (PKI)
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Report on Attribute Certificates By Ganesh Godavari.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
1 XML Encryption Notes from encrypt/index.html by Bilal Siddiqui And “Secure XML” by Eastlake and Niles.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
A centre of expertise in digital information management UKOLN is supported by: Signed metadata : method and application International Conference.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
A centre of expertise in digital information management UKOLN is supported by: Signed metadata : method and application International Conference.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Homework #8 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Security Management.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Configuring Directory Certificate Services Lesson 13.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
A Roaming Authentication Solution for Wifi using IPSec VPNs with client certificates Carlos Ribeiro Fernando Silva
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
1 XML Key Management Specification XKMS Dr Phillip Hallam-Baker FBCS CEng. VeriSign Inc.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
EJBCA Certificate Lifecycle. Contents Different ways to call with EJBCA The dialogue with EJBCA Web Pages command Line Interface API JAVA SCEP CMP & CRMF.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Alternative Governance Models for PKI
OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.
Electronic mail security
Public Key Infrastructure (PKI)
Security is one of the most widely used and regarded network services
Grid Security.
Information Security message M one-way hash fingerprint f = H(M)
TAG Presentation 18th May 2004 Paul Butler
Network Security Unit-IV
CS480 Cryptography and Information Security
KMIP Client Registration Ideas for Discussion
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Security in ebXML Messaging
Public Key Infrastructure
NAAS 2.0 Features and Enhancements
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
Digital Certificates and X.509
CS 465 Certificates Last Updated: Oct 14, 2017.
Chapter 4 Cryptography / Encryption
Microsoft Virtual Academy
PKI (Public Key Infrastructure)
The new EDAMIS and its security
Presentation transcript:

An Analysis of XKMS Yamini Ghadge Shanky Subramanian

Agenda Why XKMS? – Problems with PKI What XKMS? Before XKMS After XKMS Advantages XKRSS XKISS Conclusion

Why XKMS? – Problems with PKI Burden is on the Client to perfom expensive operations -- ASN.1 encoding /decoding -- Signature verification -- Chain Validation -- Revocation Checking Interfacing application to PKI service -- Proprietary PKI vendor toolkits -- need of complex functions -- incompatibility with different PKI vendors

What is XKMS? XML Key Management Specification. A Trust Service solves the client deployment problem by shielding the client from the complexity of the underling PKI. Not bound to a particular PKI

Before XKMS

After XKMS

Advantages Ease of Management Less complex application Application is free from ASN.1 0r X.509 processing Very small client footprint. Deployment of new PKI features does not require deployment of new clients.

Components of XKMS XML Key Registration Service Specification (XKRSS) Mechanism for registering a key pair with the service provider Client - generates a key pair and provides the public key, along with other information, to the service provider for registration. XKMS service - generates a key pair for the client, registers the public key of the pair with itself, and sends the private key of the pair to the client for its use. XKMS service keeps the private key as well in case the client loses its private key.

Components of XKMS XML Key Registration Service Specification (XKRSS) XKRSS defines 4 operations Register – public key with some information Reissue – previously generated key binding reissued when new credentials are added to PKI Revoke – allows clients to destroy data objects to which key is bound. Ex. X.509 certificate bound to the XKMS key destroyed when revoke is called. Recover – client recovers the lost private key only if registered with the service provider

Components of XKMS XML Key Information Service Specification (XKISS) Mechanism that allows client applications to authenticate encrypted/signed data. This is done by passing the corresponding key information to service provider. Service provider responds with “ true” or “false” "True" indicates that the public key corresponding to the private key used for signing belongs to the claiming entity.

Components of XKMS XML Key Information Service Specification (XKISS) XKISS defines 2 operations Locate – Finds the key based on element in the key information that is associated with XML encryption or XML signature Validate – It not only finds the key as locate does but also validates the key binding information associated with it.

Conclusion XKMS is a web service that provides interface between XML application and PKI It simplifies deployment of enterprise PKI by transferring complex processing tasks from client application to a trust service .