RSA Laboratories’ PKCS Series - a Tutorial

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

PKCS-11 Protocol for Enterprise Key Management
A Profile Of PKCS #11 V2.11 For Mobile Devices Magnus Nyström PKCS Workshop 2002.
PKCS #15 v1.1 Magnus Nyström RSA Laboratories PKCS Workshop, 1999.
Network Security: Lab#2 J. H. Wang Apr. 28, 2011.
14 Sept 00 PKCS#11 Interoperability/Conformance Testing John Hughes PKIForum meeting Montreal - 14 September 00.
Can PKI be made simple enough to be used by non-experts? Signature formats and context Antonio Lioy ( polito.it ) Politecnico di Torino Dip. Automatica.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
FIT3105 Smart card based authentication and identity management Lecture 4.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Cartão de Cidadão Security and authentication Bruno Duarte – ei07136 Pedro Barbosa – ei08036 Rúben Veloso – ei11001.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
第五章 电子邮件安全. Security is one of the most widely used and regarded network services currently message contents are not secure –may be inspected.
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Unit 3 Section 6.4: Internet Security
The Secure Sockets Layer (SSL) Protocol
RSA Laboratories’ PKCS Series - a Tutorial
PV204 Security technologies
RSA Laboratories’ PKCS Series - a Tutorial
Security of Digital Signatures
Operations Management Board 19th Dec. 2013
Public Key Infrastructure (PKI)
RSA Laboratories’ PKCS Series - a Tutorial
Security is one of the most widely used and regarded network services
VNF Package Integrity and Authenticity – Public key based
Unit 3 Section 6.4: Internet Security
Cryptography and Network Security
Cryptography Why Cryptography Symmetric Encryption
e-Health Platform End 2 End encryption
Authentication.
Magnus Nystrom RSA Laboratories PKCS Workshop, 1999
Chapters 14,15 Security.
Digital Signatures Last Updated: Oct 14, 2017.
NET 311 Information Security
KMIP Key Management with Vormetric Data Security Manager
Cryptography and Network Security
RSA Laboratories’ PKCS Series - a Tutorial
CS 465 TLS Last Updated: Oct 31, 2017.
Security at the Application Layer: PGP and S/MIME
Pooja programmer,cse department
Cyber Security Authentication Methods
Chapt. 10 – Key Management Dr. Wayne Summers
ELECTRONIC MAIL SECURITY
OASIS PKCS#11 RSA Conference 2018.
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
SSL (Secure Socket Layer)
ACS Architecture
ELECTRONIC MAIL SECURITY
Cryptographic Usage Mask
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
ACS Architecture.
Workshop on algorithms and parameters for Electronic Signatures draft ETSI TS V ( ) November 25, Brussels.
Chapters 14,15 Security.
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
e-Security Solutions Penki Kontinentai Vladas Lapinskas
PKI (Public Key Infrastructure)
CSC 774 Advanced Network Security
Asymmetric Cryptographic Algorithms
End User and SU training
Cryptography Lecture 22.
Cryptography and Network Security
Integrated Security System
Presentation transcript:

RSA Laboratories’ PKCS Series - a Tutorial Magnus Nyström October, 1999

Cryptographic Token Interface Standard Different from other PKCS documents in that it defines an application programming interface (API) Shields applications from details of cryptographic tokens such as smart cards Concentrates on cryptographic matters The API is written for ANSI C Also known as “Cryptoki”

Cryptographic Token Interface Standard, II Widely used in many token-aware products, e.g. Netscape Communicator Simplified user model: Just one user and a security officer (SO)

General model

PKCS #11’s object model Objects may be created, read, updated and deleted All access is governed by security states

PKCS #11 states (or sessions)

PKCS #11 Read-write sessions

Functional overview General purpose functions Initialize, cleanup, information about the library itself Slot and token management GetSlotInfo, GetTokenInfo,… Session management OpenSession, CloseSession… Object management Create, Destroy, Copy

Functional overview, II Encryption functions Decryption functions Digest functions Signing functions MAC functions Key management (e.g. generate a key pair) Callbacks (e.g. error handling)

Future enhancements Support for new types of certificates (e.g. attribute certificates) Support for multiple PINs More fine-grained access control Support for “signature-only” keys Time plan: v2.1 in Q4’99 v3.0 perhaps Q3’00

More information As usual: http://www.rsasecurity.com/rsalabs/pkcs