Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
An Introduction to Identity-based Cryptography
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Certificate Management Using Distributed Trusted Third Parties Alexander W. Dent Joint work with Geraint Price.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to Cryptography and Security Mechanisms Dr Keith Martin McCrea
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Security Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
On the Risks of IBE Himanshu Khurana and Jim Basney NCSA, University of Illinois International Workshop on Applied PKC (IWAP), Dalian, China, Nov 2006.
An Efficient Identity-based Cryptosystem for
Active Directory ® Certificate Services Infrastructure Planning and Design Published: June 2010 Updated: November 2011.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
Review of Certificateless Cryptography Yu-Chi Chen.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
Technical Approach Chris Louden Enspier
Presentation transcript:

Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell

30th June 2005 EuroPKI Overview Introduction Technical Background A Simple Certificate-Based Solution Extending Our Analysis Lessons Learnt and Future Work Conclusions

30th June 2005 EuroPKI Introduction Our analysis focuses on the following scenario:  Domain A uses a certificate-based PKI  Domain B uses an ID-based PKI  Users in domains A & B wish to interact securely We consider issues such as:  What are the specific issues arising for interoperation in either direction?  What are the security implications of interoperation?  What lessons can we learn, and where do we go from here?

30th June 2005 EuroPKI Technical Background Certificate management in a conventional PKI adds a significant overhead In 1984 Shamir proposed Identity-based cryptography, where the public-private key pair is generated from public information Until Boneh and Franklin’s work in 2001, no efficient encryption mechanism existed Sender can encrypt a message to a recipient without having to retrieve the recipient’s public key

30th June 2005 EuroPKI Technical Background (II) Main operational differences:  Trusted Authority (analogous to the CA) generates all private keys using a domain secret  Private decryption keys only need to be generated when they are required for decryption  There is no explicit means of revocation, but there are similar associated problems Very little prior work that studies the interaction:  Chen et al [2002] and Smetters and Durfee [2003] propose a tiered approach

30th June 2005 EuroPKI A Simple Certificate-Based Solution We consider the “obvious” solution:  Cross-certification between the two domains How does cross-certification work natively?  In the certificate-based world, there is already plenty of work done in this area  In the ID-based world, no prior work uses ID-based cryptography to secure inter-domain communication It appears that ID-based cryptography is not suitable for supporting inter-domain credentials

30th June 2005 EuroPKI The Certificate-Based User How the scheme would work:  CA for domain A generates a cross-certificate for the TA in domain B  The cross-certificate could contain policy information for domain B that is of relevance to domain A  The user in domain A validates the cross- certificate and checks the policy for acceptability  There will typically be a need for a certificate status check, and possibly some additional path validation

30th June 2005 EuroPKI The Certificate-Based User (II) We now note some potential difficulties Certificate content and type:  Identity certificate or attribute certificate?  We believe that an identity certificate would be preferable in practice CP and CPS:  Cert-based PKIs rely heavily on CPs and CPSs  ID-Based environments allow the offloading of policy creation onto the user

30th June 2005 EuroPKI The Certificate-Based User (III) How does the cert-based user assure themselves that the private keys in domain B conform to the desired policy? Two possible solutions:  The TA in domain B could release a set of policy statements in an similar manner to a CP  The sender in domain A generates a new identity- based key with a reference to the appropriate policy

30th June 2005 EuroPKI The ID-Based User How the scheme would work:  The TA for domain B generates a cross-certificate for the public key of the CA in domain A  This cross-certificate could contain policy information for domain A of relevance to a user in domain B  The user in domain B validates the cross-certificate and checks the policy for acceptability  There will typically be a need for a certificate status check and possibly some additional path validation While this gives the functionality we require, it is a rather inelegant solution

30th June 2005 EuroPKI The ID-Based User (II) An alternative would be to have the TA in domain B issue an identity-based signing key to the CA within domain A This approach is unlikely to be used in practice CP and CPS – two candidate approaches:  Users in domain B would be required to parse the certificate policies of domain A  The TA within domain B could identify suitable CPs from domain A The second option provides for a cleaner approach

30th June 2005 EuroPKI The ID-Based User (III) Revocation: A “pure” identity-based implementation relies on key re-issuance Three candidate mechanisms for users in domain B to validate domain A certificates:  The CA could issue new certificates at the same rate as the TA would issue identity-based keys  The TA could act as a filter for user requests  The user could be required to interrogate the CRL and OCSP servers directly Application level considerations are likely to impact on this design decision

30th June 2005 EuroPKI Extending Our Analysis Potential Alternative Solutions:  Reversal of the burden of work onto the recipient using an identity-based key  Using a trusted intermediary to decrypt and re- encrypt the flow of messages  Less complexity in signature based solution Additional Technologies:  Certificateless Public Key Cryptography (Al- Riyami and Paterson [2003])  Certificate Chaining

30th June 2005 EuroPKI Lessons Learnt and Future Work What are the main differences that impact on interoperation?  How the policy setting and validation is performed  Where and how the policy matching takes place  The difference in what is being certified and what is the content of the identifier What additional work is needed?  An assessment of policy handling in light of actual security requirements  Potential for attribute certificates in cross-certification

30th June 2005 EuroPKI Conclusions Existing technical solutions are far from ideal for the users in an identity-based environment Candidate solutions either force identity- based clients to make use of certificates, or they require the use of trusted intermediaries Building mechanisms to limit the impact at the user level is likely to require additional intermediary services