Public Key Infrastructure

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Public Key Infrastructure and Applications
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Digital Signatures and applications Math 7290CryptographySu07.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
OOP/Java1 Public Key Crytography From: Introduction to Algorithms Cormen, Leiserson and Rivest.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Security Management.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Computer and Network Security - Message Digests, Kerberos, PKI –
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key management issues in PGP
Chapter 5 Network Security Protocols in Practice Part I
Digital Signatures.
Public Key Infrastructure (PKI)
Basics of Cryptography
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Chapter 15 Key Management
Public-Key Cryptography and RSA
Chapter 8 Network Security.
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Message Security, User Authentication, and Key Management
Security at the Application Layer: PGP and S/MIME
Public Key Infrastructure (PKI)
Celia Li Computer Science and Engineering York University
Information Security message M one-way hash fingerprint f = H(M)
The Secure Sockets Layer (SSL) Protocol
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 4 Cryptography / Encryption
Key Management Network Systems Security
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Install AD Certificate Services
Public-Key, Digital Signatures, Management, Security
Electronic Payment Security Technologies
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Secure Diffie-Hellman Algorithm
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Public Key Infrastructure Jonathan Baulch

Public Key Infrastructure Introduction Digital Certificates Web of Trust ADSAFDSAFDSAFSADFADSFDSAF

Introduction Security architecture to increase the level of confidence when passing information Multiple meanings Methods, technologies, and techniques to provide a secure infrastructure Use of a public and private key pair for authentication and proof of content

Introduction Expected benefits of Public Key Infrastructure (PKI) Certainty of the quality of information sent and received electronically Certainty of the source and destination of that information Assurance of the time and timing of that information Certainty of the privacy of that information Assurance that the information may be introduced as evidence in a court of law

Components of PKI Certification Authority Revocation Registration Authority Certificate Publishing Methods Certificate Management System PKI ‘aware’ applications

Diffie-Hellman Protocol Developed by Diffie and Hellman in 1976 Published in ground-breaking paper “New Directions in Cryptography Allows two users to exchange a secret key over an unsecure channel without any prior secrets

Diffie-Hellman Protocol Uses a prime number p and parameter g (g < p) with the following property For every number n between 1 and p-1 inclusive, there is a power k of g such that n = gk mod p Alice and Bob agree on a p and g Each pick a secret number Each send the value A/B of gsecret number mod p Each then compute A/Bsecret number mod p Alice and Bob will then have the same value

Digital Certificates Four types of certificates Personal certificates Server certificates Software publisher certificates Certificate authority certificates

X.509 Standard Defines what information can go into a certificate and how to write it down All X.509 certificates contain Version Serial Number Signature Algorithm Identifier Issuer Name Validity Period Subject Name Subject Public Key Information

Web of Trust Concept used in PGP, GnuPGP, and other Open PGP compatible systems to establish authenticity of public key and its owner Decentralized model Any user can be a part of, and a link between, multiple webs Developed by Phillip Zimmermann in 1992

Pretty Good Privacy Uses a combination of public key and symmetric encryption Serial combination of hashing, data compression, symmetric key cryptography, and public key cryptography Each public key is bound to a user name or email Created to contrast the X.509 system of a hierarchal approach based on certificate authority

Problems with PGP Users who lose the private key can no longer decrypt messages Without central controller, web of trust depends on other users for trust Those with new certificates will not be readily trusted by other users’ systems Possible that a new user could not find anyone else to endorse a new certificate