1 ISA 562 Information Systems Theory and Practice 10. Digital Certificates.

Slides:



Advertisements
Similar presentations
DIGITAL CERTIFICATES Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC-KEY CERTIFICATES reliable distribution of public-keys public-key encryption sender needs.
Advertisements

SSL Trust Pitfalls Prof. Ravi Sandhu.
SSL Trust Pitfalls Prof. Ravi Sandhu. 2 © Ravi Sandhu 2006 SERVER-SIDE SSL (OR 1-WAY) HANDSHAKE WITH RSA Record Protocol Handshake Protocol.
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
SSL Trust Pitfalls Prof. Ravi Sandhu. 2 © Ravi Sandhu 2002 THE CERTIFICATE TRIANGLE user attributepublic-key X.509 identity certificate X.509 attribute.
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
SSL Prof. Ravi Sandhu. 2 © Ravi Sandhu CONTEXT  Mid to late 90’s  SSL 1.0 never released  SSL 2.0 flawed  SSL 3.0 complete redesign  TLS from Netscape.
Grid Computing Basics From the perspective of security or An Introduction to Certificates.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
Public Key Cryptography: Concepts and Applications Chapter Six Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Computer Science Public Key Management Lecture 5.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Module 9: Fundamentals of Securing Network Communication.
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cryptography and Network Security Chapter 14
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
GRID-FR French CA Alice de Bignicourt.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Cryptography and Network Security
Asymmetric Cryptography
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Public-Key Certificates
Digital Certificates and X.509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

1 ISA 562 Information Systems Theory and Practice 10. Digital Certificates

2 PUBLIC-KEY CERTIFICATES-1 What is a certificate?: –A statement claiming some binding of attribute values Why do we need them? –Identifying entities outside of domain –Distributed access control What do they do? –Propagates claims: Certifier makes a claim that can be checked for authenticity and accepted if the recipient believe the claimant to be truthful –Manages trust – distributed trust management

3 X.509v1 CERTIFICATE VERSION SERIAL NUMBER SIGNATURE ALGORIT ISSUER VALIDITY SUBJECT SUBJECT PUB KEY INFO SIGNATURE RSA+MD5, 512 C=US, S=VA, O=GMU, OU=ISE 9/9/99-1/1/1 C=US, S=VA, O=GMU, OU=ISE, CN=Alice RSA, 1024, xxxxxx SIGNATURE

4 PUBLIC-KEY CERTIFICATES For public-key based encryption –sender needs public key of receiver For public-key digital signatures –receiver needs public key of sender To establish an agreement –both need each other’s public keys

5 CERTIFICATE TRUST Acquisition of public key of the issuer to verify the signature –Go to through a certificate chain Whether or not to trust certificates signed by the issuer for this subject

6 PEM CERTIFICATION GRAPH Internet Policy Registration Authority Policy Certification Authorities (PCAs) HIGH ASSURANCE MID-LEVEL ASSURANCE RESIDENTIAL PERSONA Certification Authorities (CAs) Abrams Grover Subjects Grover LEO IPRA MITRE GMU CS Virginia Fairfax Anonymous

7 PUBLIC-KEY CERTIFICATES What is a certificate?: –A statement claiming some binding of attribute values Why do we need them? –Identifying entities outside of domain –Distributed access control What do they do? –Propagate claims: Certifier makes a claim that can be checked for authenticity and accepted if the recipient believe the claimant to be truthful –Manages trust – distributed trust management

8 SECURE ELECTRONIC TRANSACTIONS (SET) CA HIERARCHY Root Brand Geo-Political BankAcquirer CustomerMerchant

9 Certificate Revocation Sometimes, the issuer need to recant certificate –The subject’s attributes have changed –The subject misused the certificate –There are forged certificates Published in a certificate revocation list

10 CRL FORMAT SIGNATURE ALGORITHM ISSUER LAST UPDATE NEXT UPDATE REVOKED CERTIFICATES SIGNATURE SERIAL NUMBER REVOCATION DATE

11 X.509 CERTIFICATES X.509v1 –basic X.509v2 –adds unique identifiers to prevent against reuse of X.500 names X.509v3 –adds many extensions –can be further extended

12 X.509v3 CERTIFICATE INNOVATIONS distinguish various certificates –signature, encryption, key-agreement identification info in addition to X.500 name –internet names: addresses, host names, URLs issuer can state policy and usage –good enough for casual but not for signing checks limits on use of signature keys for further certification extensible –proprietary extensions can be defined and registered attribute certificates –ongoing work

13 X.509v2 CRL INNOVATIONS CRL distribution points indirect CRLs delta CRLs revocation reason push CRLs

14 HIERARCHICAL STRUCTURE Z X Q A Y RST CEGIKMO abcdefghijklmnop

15 HIERARCHICAL STRUCTURE WITH ADDED LINKS Z X Q A Y RST CEGIKMO abcdefghijklmnop

16 TOP-DOWN HIERARCHICAL STRUCTURE Z X Q A Y RST CEGIKMO abcdefghijklmnop

17 FORREST OF HIERARCHIES

18 MULTIPLE ROOT CA’s + INTERMEDIATE CA’s MODEL X Q A R ST CEGIKMO abcdefghijklmnop

19 THE CERTIFICATE TRIANGLE user attributepublic-key X.509 identity certificate X.509 attribute certificate SPKI certificate

20 2-WAY SSL HANDSHAKE WITH RSA Record Protocol Handshake Protocol

21 SINGLE ROOT CA MODEL Root CA abcdefghijklmnop Root CA User

22 SINGLE ROOT CA MULTIPLE RA’s MODEL Root CA abcdefghijklmnop Root CA UserRA UserRA UserRA

23 MULTIPLE ROOT CA’s MODEL Root CA abcdefghijklmnop Root CA User Root CA Root CA Root CA User Root CA User

24 ROOT CA + INTERMEDIATE CA’s MODEL Z X Q A Y RST CEGIKMO abcdefghijklmnop

25 MULTIPLE ROOT CA’s PLUS INTERMEDIATE CA’s MODEL X Q A R ST CEGIKMO abcdefghijklmnop

26 MULTIPLE ROOT CA’s PLUS INTERMEDIATE CA’s MODEL X Q A R ST CEGIKMO abcdefghijklmnop

27 MULTIPLE ROOT CA’s PLUS INTERMEDIATE CA’s MODEL X Q A R ST CEGIKMO abcdefghijklmnop

28 MULTIPLE ROOT CA’s + INTERMEDIATE CA’s MODEL Essentially the model on the web today Deployed in server-side SSL mode Client-side SSL mode yet to happen

29 SERVER-SIDE MASQUERADING Bob Web browser Web server Server-side SSL Ultratrust Security Services

30 SERVER-SIDE MASQUERADING Bob Web browser Web server Server-side SSL Ultratrust Security Services Mallory’s Web server BIMM Corporation Server-side SSL

31 SERVER-SIDE MASQUERADING Bob Web browser Web server Server-side SSL Ultratrust Security Services Mallory’s Web server Server-side SSL BIMM Corporation Ultratrust Security Services

32 MAN IN THE MIDDLE MASQUERADING PREVENTED Bob Web browser Web server Client-side SSL Ultratrust Security Services Mallory’s Web server BIMM Corporation Client-side SSL Ultratrust Security Services Client Side SSL end-to-end Ultratrust Security Services Bob BIMM Corporation Ultratrust Security Services Bob

33 ATTRIBUTE-BASED CLIENT SIDE MASQUERADING Web browser BIMM.com Web server Client-side SSL Ultratrust Security Services BIMM.com Ultratrust Security Services

34 ATTRIBUTE-BASED CLIENT SIDE MASQUERADING Web browser BIMM.com Web server Client-side SSL Ultratrust Security Services BIMM.com SRPC

35 ATTRIBUTE-BASED CLIENT SIDE MASQUERADING Web browser BIMM.com Web server Client-side SSL Ultratrust Security Services BIMM.com PPC

36 ATTRIBUTE-BASED CLIENT SIDE MASQUERADING Web browser BIMM.com Web server Client-side SSL Ultratrust Security Services BIMM.com SRPC PPC