PKI: A Technology Whose Time Has Come in Higher Education EDUCAUSE Live! Web Seminar May 11, 2004.

Slides:



Advertisements
Similar presentations
April 19-22, 2005SecureIT-2005 How to Start a PKI A Practical Guide Dr. Javier Torner Information Security Officer Professor of Physics.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Dartmouth PKI Deployment Case Study: What Works and Doesn’t Work (so far) Presented by: Mark Franklin Sixth Annual PKI Summit at Snowmass, Colorado August.
Dartmouth PKI Certificate Deployment June 2004 Fed Ed Meeting.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Problems With Centralized Passwords Dartmouth College PKI Lab.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Lecture 23 Internet Authentication Applications
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith This work is the intellectual property of the authors. Permission is granted for.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
The PKI Lab at Dartmouth. Dartmouth PKI Lab R&D to make PKI a practical component of a campus network Multi-campus collaboration sponsored by the Mellon.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
The PKI Lab at Dartmouth Presentation for Mellon Retreat February 9, 2004.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Superhighway Robbery: The Real Cost of Cyber Security NACUBO July 18, 2004 Copyright Mark Franklin, This work is the intellectual property of the.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
David L. Wasley Office of the President University of California Maybe it’s not PKI … Musings on the business case for PKI EDUCAUSEEDUCAUSE PKI Summit.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Internet Security for Small & Medium Business Week 6
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Co Chairs C. W. Goldsmith University of Alabama at Birmingham David L. Wasley University of California Office of the President.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
DIGITAL SIGNATURE.
Problems With Centralized Passwords Dartmouth College PKI Lab.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
PKI: A Technology Whose Time Has Come in Higher Education EDUCAUSE Security Professionals Workshop May 17, 2004 Copyright Mark Franklin, This work.
Introduction to the PKI Issues at UW Madison Presented to ITC on Friday, 3/18/2005 Tom Jordan Systems Engineer,
TAG Presentation 18th May 2004 Paul Butler
TAG Presentation 18th May 2004 Paul Butler
Federated Environments and Incident Response: The Worst of Both Worlds
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

PKI: A Technology Whose Time Has Come in Higher Education EDUCAUSE Live! Web Seminar May 11, 2004

2 Our Systems Are Under Constant Attack The numbers of vulnerabilities and attack techniques continue to mushroom We need to improve how we secure access to applications and data Don’t forget the greatest threat often comes from a disgruntled insider.

3 Some Attacks Succeed Spectacularly Loss of personal data Outages Potentially huge costs: –Productivity loss –Remediation –User notification –Bad publicity –Loss of credibility –Lawsuits? See “Damage Control: When Your Security Incident Hits the 6 O’Clock News”

4 IT Security Risks Escalate More and more important information and transactions are online: –Personal identity information –Financial transactions –Course enrollment, grades –Tests, quizzes administered online –Licensed materials –Confidential research data We must comply with increasingly strict regulations: –Health information - HIPAA –Educational records - FERPA

5 Spoofing is trivial (simple setting in most clients) –Spoofed message from professor postponing a final –Inappropriate message seemingly from College President is like a postcard written in pencil –Others on network can see (or even modify) contents if not encrypted (really easy on wireless!) –You may use SSL, but what about other hops between mail servers? Risk of wayward archives Specific Example:

6 Specific Example: Student Information System Online enrollment, schedule, grades FERPA protected information Potentially available to hackers via network Q: What if someone hacks your authentication system and potentially downloads students grades? A: You are probably obligated by law to notify every individual whose grades may have been exposed!

7 Password Problems: User Perspective Users HATE username/passwords Too many for them to manage: –Re-use same password –Use weak (easy to remember) passwords –Rely on “remember my password” crutches Forgotten password help desk calls cost $25 - $200 each (IDC) and are far too common As we put more services online, it just gets worse…

8 Password Problems: Admin Perspective Many different username/password schemes to learn, set up, and administer: –Backups, password resets, revoking access, initial password values, etc. Multiple administrators have access to usernames/passwords – many points of failure

9 Password Sharing Corrupts value of username/password for authentication and authorization. Users do share passwords: PKI Lab survey of 171 undergraduates revealed that 75% of them shared their password and fewer than half of those changed it after sharing. We need two factor authentication to address password sharing.

10 Ending the Madness Traditional approaches –Single password –Single sign-on, fewer sign-ons PKI –Local password management by end user –Two factor authentication

11 PKI’s Answer to Password Woes Users manage their own (single or few) passwords. Cost-effective two factor authentication. Widely supported alternative for authentication to all sorts of applications (both web-based and otherwise).

12 PKI Passwords Are Local to Client PKI eliminates user passwords on network servers. Password to PKI credentials is local to user’s computer, smartcard, or token. User manages the password and only has one per set of credentials (likely only one or two total). No need for password synchronization. Standard PKI infrastructure. Still need process for forgotten password, but it is less likely to be forgotten (used frequently and not so many of them).

13 Underlying Key Technology Asymmetric encryption uses a pair of asymmetric keys, each is the only way to decrypt data encrypted by the other. One key is private and carefully protected by its holder. The other is public and freely distributed. In authentication, the server challenges the client to encrypt or decrypt something with the private key. Its ability to do so proves its identity. Private key and password always stay in the user’s possession.

14 PKI Provides Two Factor Authentication Requires something the user has (credentials stored in the application or a smartcard or token) in addition to something a user knows (local password for the credentials). Significant security improvement, especially with smartcard or token (a post-it next to the screen is no longer a major security hole). Reduces risk of password sharing.

15 PKI Benefit: Encryption Strong encryption with extensible number of bits in key. Can use same PKI digital credentials as authentication and digital signatures. More leverage of the PK Infrastructure. Encrypt data for any individual without prior exchange of information – just acquire their certificate which contains their public key.

16 How PKI Encryption Works Asymmetric encryption prevents need for shared secrets. Anyone encrypts with public key of recipient. Only the recipient can decrypt with their private key. Private key is secret and protected, so “bad guys” can’t read encrypted data.

17 PKI Benefit: Digital Signatures Our computerized world still relies heavily on handwritten signatures on paper. PKI enables digital signatures, recognized by Federal Government as legal signatures: –Reduce paperwork with electronic forms. –Much faster and more traceable business processes. –Improved assurance of electronic transactions (e.g. really know who that was from).

18 How Digital Signatures Work Signer computes content digest, encrypts with their private key. Reader decrypts with signer’s public key. Reader re-computes the content digest and verifies match with original – guarantees no one has modified signed data. Only signer has private key, so no one else can spoof their digital signature.

19 PKI Benefit: User Convenience Fewer passwords! Consistent mechanism for authentication that users only have to learn once. (UT Houston Medical Center users now request that all network services use PKI authentication.) Same user credentials for authentication, digital signatures, and encryption – lots of payback for user’s effort to acquire and manage the credentials.

20 PKI Benefit: Coherent Enterprise- Wide Security Administration Centralized issuance and revocation of user credentials (goes hand in hand with identity management). Consistent identity checking when issuing certificates. Same authentication mechanism for all network services. Single process to recover from lost passwords or keys (not per application). Leverage investment in tokens or smart cards across many applications.

21 Interoperability With Other Institutions Allows authentication, digital signatures, and encryption using credentials issued by a trusted collaborating institution: –Signed forms and documents for business process (e.g. grant applications, financial aid forms, government reports) –Signed and encrypted from a colleague at another school –Authentication to applications shared among schools (e.g. grid) –Peer to peer authentication for secure information sharing

22 Standards Based Solution Standards provide interoperability among multiple vendors and open source. Wide variety of implementations available and broad coverage of application space. Level playing field for open source and new vendors – promotes innovation and healthy competition.

23 PKI Enjoys Unequaled Client, Server, and Application Support Commercial and open source Windows, Macintosh, Linux, Solaris, UNIX Apache, Oracle, IIS, SSL, Web Services, Shibboleth, Browsers, , VPN, Acrobat, MS Office, AIM, and many others Software and hardware key storage Development libraries, toolkits and applications Certificate Authority, directory, escrow, revocation, and other infrastructure tools

24 Momentum Outside Higher Education Industry support for PKI Federal and State governments major adopters Microsoft, Sun, Johnson and Johnson, Disney, banks heavy industry adopters Major deployment in Europe China pushing WAPI wireless authentication standard that requires PKI Web Services (e.g. SAML uses PKI signed assertions)

25 Federal Collaborations FBCA, HEBCA bridge projects Proof of concept NIH EDUCAUSE project to demonstrate digitally signing documents for submission to the Federal government Possible DOE, NSF, NIH applications for Higher Education?

26 Dartmouth PKI Lab R&D to make client side PKI a practical component of campus networks Multi-campus collaboration sponsored by the Mellon Foundation Dual objectives: –Deploy existing PKI technology to improve network applications (both at Dartmouth and elsewhere). –Improve the current state of the art. Identify security issues in current products. Develop solutions to the problems.

27 Production PKI Applications at Dartmouth Dartmouth certificate authority –780 end users have certificates, 558 of them are students PKI authentication in production for: –Banner Student Information System –Library Electronic Journals –Tuck School of Business Portal –VPN Concentrator –Blackboard CMS –Software downloads S/MIME (Outlook, Mozilla, Thunderbird) AOL AIM (PKI-secured sys admin communications)

28 “Open Source CA in a Box” Hardened open source Certificate Authority (based on OpenCA) bundle suitable for trial and simple deployment PKI Lab’s “Enforcer” TPM-hardened Linux –Controversial “TCPA” technology turned to use for good and freedom (secures Linux boot process and provides much enhanced run-time protection against hackers) Packaging for easy installation (bootable CD) Carefully chosen enhancements to OpenCA We welcome feedback on requirements, contributions, testing, etc!

29 Deploying PKI Client-side PKI is usually a significant undertaking and requires planning and commitment. Get buy in and support from management, legal, audit, others – a little fear in today’s cyber world is healthy. Learn from examples and experiences of others. Deploy in phases, plan for future extensibility. Choose initial applications to maximize benefits versus cost. Take a long term view - PKI ROI is excellent when leveraged broadly, but probably not as strong for individual applications. See

30 Blatant Advertisement We seek a few schools that we can assist as you deploy PKI credentials and applications for end users! An explicit part of our mission is to directly assist you in the planning/justification, implementation, and deployment phases.

31 For More Information