Public Key Superstructure It’s PKI Jim, but not as we know it! 7 th Annual “IDtrust” Symposium 5 March 2008, Gaithersburg MD, USA Stephen Wilson Lockstep.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
SSL Implementation Guide Onno W. Purbo
Public Key Infrastructure (PKI)
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 23 Internet Authentication Applications
Grid Security. Typical Grid Scenario Users Resources.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
MPKI Interoperability I-D ChangeLog from -01 to -02 Jan 16, 2004 Masaki SHIMAOKA SECOM Trust.net.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
National Center for Supercomputing Applications PKI and CKM ® Scaling Study NCASSR Kick-off Meeting June 11-12, 2003 Jim Basney
Stephen Wilson Chair, PKI Adoption Technical Committee Managing Director, Lockstep, Australia PKIA Goals for 2007 Stephen Wilson Chair, PKI Adoption Technical.
Public Key Cryptography: Concepts and Applications Chapter Six Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Burton Group Catalyst Meeting Barcelona, Spain 22 October 2007 June Leung OASIS PKI Adoption TC The OASIS PKI Adoption TC Objectives and Case Studies Burton.
Burton Group Catalyst Workshop June Leung on behalf of Stephen Wilson Chair, OASIS PKI Adoption TC The OASIS PKI Adoption TC Objectives and Work Program.
Introduction To Windows NT ® Server And Internet Information Server.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
Computer Science Public Key Management Lecture 5.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Burton Group Catalyst Meeting xxxxxxxxx Stephen Wilson Chair, OASIS PKI Adoption TC The OASIS PKI Adoption TC Objectives and Work Program Burton Group.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
PKI Forum Sydney 2000 Members Meeting Stephen Wilson Chair -- Certification Forum of Australia Director -- PricewaterhouseCoopers beTRUSTed PKI in Australia.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Time/Date Stamp Time/Date Stamp Authorization Secure Non- repudiation Secure Non- repudiation Key Recovery Key Recovery Message Confidentiality Message.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Michael Myers VeriSign, Inc.
Building Security into Your System Bill Major Gregory Ponto.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Jimmy C. Tseng Assistant Professor of Electronic Commerce
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Using Public Key Cryptography Key management and public key infrastructures.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Bulding blocks of e- government Ingmar Pappel. Bulding blocks of e-government  Personal Code  Digital Identity  Digital signature  X-Road  Organizations.
Expectations for the New Secure Network Age panel discussion Asia PKI Forum Conference Tokyo 24 February 2005 Stephen Wilson (OASIS liaison to APKIF) PKI.
Secure, verifiable online voting 29 th June 2016.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
SSL Implementation Guide
Organized by governmental sector (National Institute of information )
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
U.S. Federal e-Authentication Initiative
Dashboard eHealth services: actual mockup
Install AD Certificate Services
Presentation transcript:

Public Key Superstructure It’s PKI Jim, but not as we know it! 7 th Annual “IDtrust” Symposium 5 March 2008, Gaithersburg MD, USA Stephen Wilson Lockstep Consulting Pty Ltd

About Lockstep Consultants specialised in PKI, smartcards & privacy Developing novel de- identification and online safety solutions Consultants specialised in PKI, smartcards & privacy Developing novel de- identification and online safety solutions

About Lockstep Asia PKI Forum Gatekeeper Policy Committee Aust. Law Reform Commission Asia PKI Forum Gatekeeper Policy Committee Aust. Law Reform Commission

Historical PKI experience

The passport metaphor Non-descript applications –impossible for CAs to manage risk Stranger-to-stranger e-business –“It’s good to trust but it’s better not to” Novel TTP business models –Imposed incredible CPSs upon users Notion of a single identity –“Interoperability” = cross certification

“Cross-certification and policy mapping has been a rat hole that has sucked up vast amounts of energy better spent elsewhere” Anonymous, Feb 2008

“Fading PKI Market” June 2003 PKI thickets 1999 RSA Conference Identrus Verisign IPO 2008

PKI in practice Works best in closed communities –Automates transactions in context –This is a Good Thing Embedded keys & certificates Fits with identity plurality

PK Superstructure

CA as Security Printer Stock Exchange Listings Department Listed Company Achieve Listing Announcements Announcement Distribute bar code labels Security Printer Listing Rules Listing Rules Listing Rules Listing Rules Listing Rules Listing Rules Affix bar code Officer Fax OCR

Stock Exchange Listing Rules Listing Rules Listing Rules Listing Rules Listing Rules Listed Company Announcement Listing Rules Distribute certificates, keys Digitally sign CA Listings Department Announcements Message App Message App CA as Security Printer

Security printer implications Decouples registration from production Manages risks associated with registration & production separately No contract between Subscriber & CA No exposure of CPS to Subscriber Easier to novate CA service providers Accreditation not affected by new Policies

Context Health Organisation “Relationship Certificates” e-Prescription Patient name - - Med Dose Repeats Credentials Subject: Ext: Lic No. xyz Issuer: Health Org Policy OID: Public Key: Transaction User CertificateCA Certificate Signed: Dr Lic. xyz Health Org CA Subject: Validity: Issuer: Root CA Policy OID: Public Key: Signed: Health Root CA Signed: Health Org CA

“Relationship Certificates” Form of “Authorization PKI” Kill the holy cow of authentication being primary over authorization Preserves X.509 formats, software Not SPKI: no ‘primary’ ID certificate Not Attribute Certs: we can sign with cert Form of “Authorization PKI” Kill the holy cow of authentication being primary over authorization Preserves X.509 formats, software Not SPKI: no ‘primary’ ID certificate Not Attribute Certs: we can sign with cert

C. Vote Lockstep anonymous e-voting B. Register A. Background Roll Enrol to vote Smartcard distribution process Certificate Serial No. Poll Key Dig Sign Register smartcard CA Identify voter Generate key pair Install anon. certificate Certificate Serial No. Poll Key 2 1 Candidate 2 1 Dig Sign Signed ballot Candidate

Lockstep clinical study privacy Study sponsor Randomisation Logistics Collection Certificate Server (2) Enrol patient into study (3) Load pt smartcard with Stepwise anonymous ID Certificate Patient ID Study ID Key Dig Sign (1) Distribute investigator packs

(4) Patient presents for follow-up Tests (5) Investigations as per protocol Study sponsor Randomisation Logistics Collection Certificate Server Certificate Patient ID Study ID Key (6) De-identified secure follow up data, “sealed” with Stepwise ID Lockstep clinical study privacy

Discussion See also