Tim Polk, NIST wpolk@nist.gov PKI Overview Tim Polk, NIST wpolk@nist.gov.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Chapter 5 Network Security Protocols in Practice Part I
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (X509 PKI)
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
The U.S. Federal PKI and the Federal Bridge Certification Authority
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
Chapter 11: Active Directory Certificate Services
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
HEPKI-TAG UPDATE Jim Jokl University of Virginia
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate revocation list
1 June Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.
Communications-Electronics Security Group. PKI interoperability issues for UK Government Richard Lampard
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Module 9: Fundamentals of Securing Network Communication.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Stroeder.COM TF-LSD Meeting S/MIME Certificate Collector  Motivation  Proposed Solution  Discussion.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Using Public Key Cryptography Key management and public key infrastructures.
15 May 2001© 2001 University of Salford1 Deficiencies in LDAP when used to support Public Key Infrastructures David W Chadwick
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
Public Key Infrastructure Using X.509 (PKIX) Working Group March 20,
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Cryptography and Network Security
S/MIME T ANANDHAN.
CompTIA Security+ Study Guide (SY0-501)
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Tim Polk, NIST PKI Program Manager March 2000
Presentation transcript:

Tim Polk, NIST wpolk@nist.gov PKI Overview Tim Polk, NIST wpolk@nist.gov

Background Secret key cryptography works, but key management is a nightmare Public key cryptography uses two keys one that is secret to the “owner” one that is widely available And all our problems were solved? who’s key is this anyway? who says so?

Public Key Infrastructure Secure, reliable, and scalable method for distributing public keys for secrecy, correctness, and sender verification “Binds” the owner to the public key using a digital certificate Maintains and distributes status information for the life of that binding

Roles of PKI Components CA is like the DMV and issues and revokes certificates RA is the person that checks your identity Client have and use certificates Repository stores the certificate and status information so clients don’t have to

A Basic PKI We can deploying these right now CA repository Clients Bob Alice We can deploying these right now

Growing A PKI bigger PKIs can be constructed by connecting CAs they issue certificates to remote CAs, binding the remote CA to it’s public key clients can construct “chains” of linked bindings

Public Key Infrastructure repository Carol CA-1 repository CA-2 CA-3 Alice Bob A “real” PKI has multiple CAs with clients CAs and repositories are the basic building block

PKIs are simple... as long as you have just one CA and one repository theoretically, they are like lego blocks in practice, they can be like a box of bicycle parts on Christmas Eve the complexity is the result of unstable standards non-interoperable products and applications

Standardization Activities IETF (PKIX WG) ISO JTC1/SC6 directory work ANSI X9F and ISO TC68/SC 2/WG 8

IETF Public Key Infrastructure Using X.509 (PKIX) WG Formed in 1995 Five RFCs issued in ‘99, four more approved in the last month certificate and CRL formats PKI transaction formats and protocols Certificate Policy Statements certificate and certificate status retrieval mechanisms

Certificate and CRL Formats Base profile is complete (RFC 2459) based on X.509, but adds semantics to Internet-specific fields and data Supporting documents are (nearly) complete KEA (RFC 2527) and ECDSA (I-D) enhanced CRLs (I-D) enhanced name semantics (I-D)

Transaction Formats and Protocols Three major specifications Certificate Request Message Format, or CRMF (RFC 2511) Certificate Management Protocol, or CMP (RFC 2510) [references 2511] Certificate Management Messages over CMS, or CMC (I-D) [references 2511] Is there room for CMP and CMC?

Certificate and Certificate Status Retrieval A wealth of choices LDAP V2 schema LDAP V2 profile FTP and HTTP OCSP

New PKIX Work Timestamp service protocol Data certification service protocol Attribute certificates

ISO Directory Work Three projects in the directory area were assigned to JTC1/SC6 X.509 maintaining the public key certificate work new work in attribute certificates X.500 directory work ASN.1 (X.680?)

ANSI X9F Provider of cryptographic standards Developing certificate and certificate extension profiles for banking community TC68 documents 15782-1 and 15782-3 Defining short certificates for bandwidth or storage impaired environments smart cards, cell phones, etc. Attribute certificate work (15782-2)

Standardization Summary ISO, IETF and ANSI are making good progress Most of the work is complementary, or at least well-aligned There are still too many choices in some areas (transaction and retrieval protocols) Parallel attribute certificate projects may result in divergent standards

Interoperability Testing The new frontier PKI interoperability PKI component interoperability Issues: are certificates and CRLs well-formed? can components request/revoke certificates? can clients build/validate paths?

NIST’s PKI Interoperability Testbed Project Goals: Creation of complex directory systems Creation of heterogeneous PKIs Determination of client functionality Summary: the state of the art is a homogeneous PKI with a very small number of CAs and exactly one directory

PKI Component Interoperability Testing Three basic components CAs: X.509 certificate and CRL generation Clients: X.509 path validation CAs, RAs, clients: transaction message formats and protocols As protocols stabilize, interoperability testing is the logical next step

Tools for Interoperability Testing reference implementations MISPC Reference Implementation from NIST (X.509, CMP, and CRMF) IBM (X.509, CMP, and CRMF) Conformance tests NIST (CMP, CRMF)

PKI deployment Many pilots ongoing or planned Why? “many will play, few will win!” Why? directory infrastructure application vacuum unreasonable expectations

Directories Often the problem, instead of the solution! X.500 directories LDAP directories Alternative solutions alternative retrieval protocols all-inclusive packaging

X.500 the global X.500 directory is a myth it would resolve most access problems it would introduce new problems DIT management shadowing, replication and chaining well specified not well tested (different implementations don’t actually interoperate!)

LDAP LDAP is ubiquitous, but: resolves localized access problems relies on referrals to scale performance bottleneck poor client support shadowing, replication and chaining proprietary solutions, if they exist at all may be addressed in LDAP V3 extensions

Alternative Solutions Why rely on directories at all? FTP/HTTP/DNS retrieval we’ve already got these servers, and they work! requires a pointer in the certificate all-inclusive packaging (S/MIME) just include the certificate(s) and CRL(s) in each transaction and the client doesn’t have to search not a complete solution because you can’t always predict the path for the receiving client

The Application Vacuum PKI-aware products are limited TLS and SSL (browsers), S/MIME Why aren’t there more PKI-aware products? chicken and egg problem (what PKI?) not a straightforward upgrade (e.g., adding digital signatures to insecure applications) no standard API (rewrite for every product)

Unreasonable Expectations PKI is a not going to solve all your problems first and foremost, PKI is a key management solution overloading with additional semantics (e.g., roles and complex policies) is beyond the state of the art

Piloting for Success choose an existing application with: a close-knit community of users security in place (esp. access control), but a known key management problem use a single repository for all information focus on the key management problem first attempt to leverage certificates for access control second (if at all)

Current Market Players PKI product providers rudimentary assurance high assurance Service providers certificate issuers status information providers Community of Interest Groups ANX, Federal Government, financial

Community of Interest Groups Rule they determine the winners and losers communities of interest that use the PKI will determine the features and protocols if no communities emerge to use PKI, it will all disappear they are emerging (ANX, US government, SET, etc.) and PKI will appear in more applications

Summary The standards bodies have gotten their act together, but a few thorns remain The state of the art PKI products can support focused applications today can’t support a global infrastructure today aren’t interoperable, but will be “soon” Application and directory solutions are lagging, but vendors will respond to communities of interest deploying PKIs

For More Information http://csrc.nist.gov/pki wpolk@nist.gov