PUBLIC KEY INFRASTRUTURE Don Sheehy

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
(n)Code Solutions A division of GNFC
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lecture 23 Internet Authentication Applications
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapter 5 Network Security Protocols in Practice Part I
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Introduction to Cryptography
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Computer Science Public Key Management Lecture 5.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Secure Socket Layer (SSL)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
Types of Electronic Infection
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Understand Internet Security LESSON Security Fundamentals.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Key management issues in PGP
Chapter 5 Network Security Protocols in Practice Part I
S/MIME T ANANDHAN.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
Security in ebXML Messaging
Electronic Payment Security Technologies
Presentation transcript:

PUBLIC KEY INFRASTRUTURE Don Sheehy

WHO HAS HEARD ABOUT  Verisign  EnTrust  Baltimore

First – The Basics  PKI – A public-key infrastructure is a set of services for managing public keys.  Keys –A key is a string of bits used to encrypt and/or decrypt data. Encryption makes data unintelligible. Decryption restores the data to its pre-encrypted form, making it intelligible again.  Cryptography –Cryptography is the science and practice of encrypting and decrypting. There are two kinds of cryptography in common use: secret key and public key.

Basics - Encryption  Secret Key Encryption –Same key is used to encrypt and decrypt. Problem of secure key distribution. - if you want to send me an encrypted message, you have to securely send me the secret key first. This creates a chicken-and-egg dilemma: To set up a secure communication system, you need a secure communication system.  Public Key Encryption –Uses key pairs – each having one public and one private key. Data encrypted with one key in the pair is decrypted using the other key. To send encrypted message, you encrypt it with my public key – not a secret. Decryp. requires private key, only I possess.

Certificates  Certificates –Public keys are usually combined with other information in a certificate, a digital document (i.e. a formatted file) attesting to the binding of a public key to an individual, computer, program, or other entity. A certificate verifies that a specific public key does in fact belong to a specific entity.

Contents  Certificate Contents –At a minimum, a certificate contains a public key and a name. Typically, a certificate also contains a serial number, an expiration date, and the name of the Certification Authority (CA) that issued the certificate. Also included in the certificate is the digital signature of the CA, proving the certificate really did originate from that CA.

Digital Certificates  Digital Signatures –A digital signature is a block of data that has been encrypted with the sender's private key. The recipient decrypts the data with the sender's public key, verifying the sender's identity in a fashion that cannot be repudiated.

What is a CA?  The Certification Authority is an org that provides a level of assurance that the public key contained in the dig certificate does indeed belong to the entity named in the certificate.  This document is digitally signed by a trusted organization referred to as a Certification Authority (CA). The basic premise is that the CA is vouching for the link between an individual’s identity and his or her public key.

What is an RA?  A Registration Authority (RA) is an entity that is responsible for the identification and authentication of subscribers, but does not sign or issue certificates.  In some cases, the CA performs the subscriber registration function internally. In other cases, the CA might delegate the RA function to external registration authorities that may or may not be part of the same legal entity as the CA.

The Process

PKI Functions  Key registration: The Registration Authority (RA) issues a new certificate for a public key. The CA signs the certificate, stamps it with an expiration date, and either returns it to the requester or stores it in a repository.  Certificate revocation: Through an administrative console, the security manager cancels a previously issued certificate by placing it on a Certificate Revocation List (CRL).

PKI Functions  Storing and retrieving certificates and Certificate Revocation Lists (CRL): Upon request, typically via a directory, the CA provides a CRL and/or a particular entity's certificate.  Trust evaluation: The CA determines whether a certificate is valid and what operations it authorizes.

PKI Standards  The main group developing standards for PKI interoperability is the PKI working group of the Internet Engineering Task Force (IETF), known as the PKIX group (which stands for PKI for X.509 certificates).  PKIX standards permit multiple PKIs to interoperate, or multiple applications to interface with a single PKI. There are also a number of standards that assume PKI. Among the most important are Secure Sockets Layer (SSL) and Internet Protocol Security Protocol (IPSEC).

SSL  Secure Sockets Layer (SSL) – One common use of PKI today is within the Secure Sockets Layer (SSL) protocol. SSL can negotiate encryption keys and authenticate the server before data is exchanged by the higher- level application. The SSL protocol maintains the security and integrity of the transmission channel by using encryption, authentication and message authentication codes. –Optimized for HTTP

IPSEC  The IETF Internet Protocol Security Protocol (IPSEC) standard, which defines protocols for IP encryption, is one of the main protocols used for Virtual Private Networks (VPNs). IPSEC uses keys for encryption and authentication.  Ideally, PKI would provide end-to-end security from client to client, including authentication of the individuals using those client machines.

What is PKI Used For  Most computers unable to secure private keys properly  Main use is for identifying non-client computers: Web servers, messaging servers, routers, and VPN gateways.  Online banking, the bank's Web server may give your browser a certificate proving that you have accessed the correct server. However, you probably use a username and password, not a certificate, to prove your identity to the Web server.

Secure and Messaging  Secure , messaging and groupware applications may encrypt messages and files and use digital signatures, to ensure authentication, privacy, and data integrity. EDI systems use PKI for financial transactions.  The IETF standard secure /messaging protocol is Secure Multipurpose Internet Mail Extensions (S/MIME), which extends the Multipurpose Internet Mail Extensions (MIME) standard. S/MIME typically uses a PKI to digitally sign messages and to encrypt messages and attachments.

High-Value Web Transactions  Increasingly, Web applications such as e- business and online stock trading, must support high-value transactions. For such applications, browsers, Webservers, and commerce servers can use PKI for authentication and confidentiality. As with messaging, servers authenticate themselves to clients using SSL, while clients are not typically authenticated. Web servers also use SSL to encrypt traffic.

Virtual Private Networks (VPNs)  Encryption and authentication convert public Internet links into Virtual Private Networks (VPNs), for site-to-site (router-to- router) or client-to-server links. VPNs also use tunneling protocols that wrap, or encapsulate, one protocol in another. IPSEC is the emerging standard for site-to-site tunneling.

Digitally Signed Code And Files  Digital signatures can be used to verify the source and the integrity of downloaded content, preventing the spread of viruses. Technologies like Microsoft's Authenticode support PKI to make it possible to use this approach on a mass scale.

Implementation Issues  PKI-enabling applications and training personnel. Planning must encompass both new technology and existing security infrastructure and business practices. Extensive staff may be needed for PKI tasks  Interoperability and cross-validation of certs  Legal Issues – who is liable for misuse

What are the Risks with CAs  Unless they are subject to governmental licensing and regulation, CAs may use different standards or procedures to verify the identity of persons to whom they issue certificates.  Thus a digital signature is only as reliable as the CA is trustworthy in performing its functions. Consequently, a relying party needs some way to gauge how much reliance it should place on a digital signature supported by a certificate issued by a particular CA.

Risks  CA topology (for example, a hierarchical, cross- certified, or a hybrid model) is a developing issue. Which model is most appropriate depends on the particular business circumstances.  Although it is important that public keys be certified, the issuance of nonstandard certificates can be a concern. For example, if X.509 data format standard is not used, subscribers and relying parties may be unable to process such certificates.  Implementing the cross-certified CA model (discussed above) would also be very difficult.

What We Can Do  WebTrust for Certification Authorities  Key Witnessing and Other

WebTrust for Certification Auth.  Developed 2000  Provides a new framework for reporting activities of certification authorities  Requires reporting on compliance with the AICPA/CICA WebTrust Principles and Criteria for Certification Authorities.  Differs from SAS 70/ Handbook 5900

The Principles  CA Business Practices Disclosure  Service Integrity  CA Environmental Controls

CA Business Practices Disclosure  The Certification Authority discloses its key and certificate life cycle management business and information privacy practices and provides its services in accordance with its disclosed practices  The criteria were derived primarily from X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework  Request For Comments Draft (RFC 2527)

Service Integrity  The Certification Authority maintains effective controls to provide reasonable assurance that  –- Subscriber information was properly authenticated (for the registration activities performed by ABC-CA). –The integrity of keys and certificates it manages is established and protected throughout their life cycles.

CA Environmental Controls  -Subscriber and relying party information is restricted to authorized individuals and protected from uses not specified in the CA’s business practices disclosure.   The continuity of key and certificate life cycle management operations is maintained.  -CA systems development, maintenance, and operation are properly authorized and performed to maintain CA systems integrity.

Microsoft  The public keys of many common Root CAs are pre-loaded into standard Web browser software (for example, Netscape Navigator or Microsoft Internet Explorer).  This allows the relying party to verify the issuing CA’s signature using the CA’s public key to determine whether the certificate was issued by a trusted CA.