Introduction to Cryptography and Security Mechanisms Dr Keith Martin McCrea 34901784 443099

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Security Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cryptography and Network Security Chapter 14
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Pooja programmer,cse department
Digital Certificates and X.509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 4 Cryptography / Encryption
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Introduction to Cryptography and Security Mechanisms Dr Keith Martin McCrea

Introduction to Cryptography and Security Mechanisms: Unit 11 Public Key Infrastructures Dr Keith Martin McCrea

Introduction to Cryptography and Security Mechanisms Learning Outcomes Explain the purpose of a digital certificate Appreciate the roles of a certificate authority Identify the security critical operations in the certification process Discuss how to go about establishing trust in a PKI Compare different methods for joining certification domains Compare different trust models for a PKI Recognise the limitations of a PKI Compare a traditional PKI with an identity-based system

Introduction to Cryptography and Security Mechanisms Sections 1.Introduction to certification 2.The certification process 3.Managing trust in a PKI 4.PKI models

1. Introduction to certification

Introduction to Cryptography and Security Mechanisms The need for a PKI Suppose that you have received a digitally signed message that claims to have been signed by Alice and that you want to verify this signature. This requires you to possess a public verification key. By some means (we won’t specify how) you are presented with a key and told “this key is Alice’s public key”. You use it to verify the signature, and it seems to work. It may well be valid – but you should always be suspicious! Write down as many things as you can think of that could mean that in fact you do not have a valid signature by Alice on this message at all.

Introduction to Cryptography and Security Mechanisms Public key certificates Name of owner –could be a person, device, or even role. –Should uniquely identify the owner within the environment in which the public key will be employed. Public key value Validity time period –identifies date and time from which the public key is valid, and more importantly the date and time of its expiry. Signature –Creator of certificate digitally signs all data that forms the public key certificate. This binds the data and acts as a guarantee that the creator of the certificate believes the data is correct. A public key certificate is a set of data that binds an identity to a particular public key value. The four core pieces of information that are contained in a public key certificate are as follows:

Introduction to Cryptography and Security Mechanisms X509 v3 public key certificates Version This specifies the X.509 version being used (in this case v3). Serial Number A unique identifier for the certificate. Signature The digital signature algorithm used to sign the certificate. Issuer The name of the creator of the digital certificate. Validity The dates and times between which the digital certificate is valid. Subject The name of the owner of the digital certificate. Subject Public Key Info The actual public key and the identifier of the public key algorithm associated with it. Issuer Unique ID An optional identifier for the creator of the digital certificate. Subject Unique ID An optional identifier for the owner of the digital certificate. Extensions A range of optional fields that include: a key identifier (in case owner owns more than one public key) key usage information that specifies valid uses of key the location of revocation information identifier of the certificate policy alternative names for the owner

Introduction to Cryptography and Security Mechanisms Digital certificates A digital certificate is a set of data that binds an identity to a particular piece of data. 1.What applications can you think of for digital certificates other than public key certificates? 2.Which of the fields of a public key certificate would you still need in these digital certificates?

Introduction to Cryptography and Security Mechanisms Certificate authorities It should be clear that the “creator” of a public key certificate plays an extremely important role. A creator of a public key certificate is normally referred to as a Certificate Authority (or CA). 1.The CA takes responsibility for ensuring that the information on a certificate is correct. The CA creates (or issues) the public key certificate to the owner. 2.Whenever anyone has need of the owner’s public key they request a copy of the public key certificate. The certificate might be made available on a central server, or the owner or even the CA might send the certificate to whoever requires it. 3.The recipient of the public key certificate checks that the certificate is in order, and if they are happy with it then they are free to use the public key contained in the certificate.

Introduction to Cryptography and Security Mechanisms Trusting a digital certificate 1.The recipient needs to be able to trust (directly or indirectly) the CA to have done their job correctly and to have gone through some process to verify all the fields of the certificate. 2.The recipient needs to have access to the public verification key of the CA in order to verify the CA’s digital signature on the certificate. 3.The recipient needs to check all the fields in the certificate. In particular they must check that the certificate is valid, it applies to the correct owner and that the other fields are all satisfactory. There are three things that the recipient “needs to be able to do” in order to be satisfied that the public key certificate is in order: For each of the above three recipient checks, what are the precise implications of them not being done.

Introduction to Cryptography and Security Mechanisms Meaning of certificates By digitally signing the information in the public key certificate, the Certification Authority is effectively making the statement: I, the CA, certify that the public key of Keith Martin is Can you use a public key certificate directly to encrypt messages or verify digital signatures? 2.If someone presents you with their public key certificate, is this proof of their identity?

Introduction to Cryptography and Security Mechanisms Use of public key certificates r A || sig A (Bob, r A ) || CertA r B || sig B (Alice, r A, r B ) || CertB sig A (Bob, r B ) 1 2 AliceBob

Introduction to Cryptography and Security Mechanisms Certificate protocol questions 1.Why is Bob not able to authenticate Alice after he receives her first message? 2.To what extent is Bob able to “identify” Alice at the end of this protocol? 3.Do Alice and Bob always need to send their public key certificates to one another as part of this protocol? The previous protocol offers mutual entity authentication.

2. The certification process

Introduction to Cryptography and Security Mechanisms Designing a PKI Imagine that you have been asked to design a certification process for your organisation from scratch. In other words, the organisation has identified a need for a PKI that results in every employee having a public key certificate that contains the employee’s public key for internal use only within the organisation. It is your first day on this new project. Write down as many (high level) questions as you can think of that you are going to have to answer concerning the whole process of starting with nothing, to ending up with a PKI for the organisation.

Introduction to Cryptography and Security Mechanisms Example certificate issuing process Verifies credentials Creates certificate Receives (and checks) certificate Presents public key and credentials Generates key set Distribution Certification Authority Owner

Introduction to Cryptography and Security Mechanisms Generating the public key pair Pros Cons Owner Issuer (CA) The owner is placed in full control of their own key material. It may be easier and more secure to manage the generation of key material centrally. The certification process might appear more seamless to the owner. The owner might not have the capability or skill to perform this operation in a secure fashion. The owner needs to prove to the CA that they actually know the private key before the certificate can be issued. The owner must trust the CA to securely deliver the private key to the owner and to dispose of it afterwards.

Introduction to Cryptography and Security Mechanisms Registration The stage of the certification process at which the owner presents their credentials to the CA for checking is arguably the most vital stage in the entire certification process. In many application environments a separate entity known as a Registration Authority (RA) performs this operation. There are two arguments for keeping the roles of CA and RA at least slightly separate: 1.Most of the functionality of a CA can be essentially performed by a computer, whereas for many applications the role of the RA requires human intervention. 2.Checking the credentials of a certificate applicant is often the most complex part of the certification process. There is thus a strong argument for distributing the registration activities across a number of “local” RAs.

Introduction to Cryptography and Security Mechanisms Registration Whether the CA and RA roles are incorporated as one, or kept entirely separate, there remains an important problem to address: It is highly recommended that you attempt the Exercise 1 on this unit concerning the selection of suitable credentials. What credentials should be presented to the RA (CA?) in order to establish the identity of the owner?

Introduction to Cryptography and Security Mechanisms Levels of certificate It is worth noting that many CAs issue different types of certificate (sometimes referred to as levels of certificate) depending upon the thoroughness of the process used to identify the owner. These levels often correspond directly to the credentials by which the owner was identified when the certificate was registered. Certificates of different levels may then be used in different types of application. The liability associated with a certificate is likely to be different for different levels of certificate. It is highly recommended that you attempt the Exercise 2 on this unit concerning the different levels of certificate offered by commercial certificate issuers.

Introduction to Cryptography and Security Mechanisms Proof of possession 1.Why should the CA check ownership of the private key? 2.How can a CA check ownership of a private key without the owner revealing the private key? However registration is done, there is one very important check that must be performed before proceeding with the issuing of a public key certificate – that the owner actually knows the private key corresponding to the public key in the certificate. If the CA does the key generation then this problem does not arise, but if the owner generates the key pair then this check is essential. This process is referred to as demonstrating Proof of Possession.

Introduction to Cryptography and Security Mechanisms Certificate distribution Pushing –the owner of the certificate automatically provides the certificate when it is required –the problem with pushing is that the receiver of the certificate needs to check that the certificate that they have just received is still valid. Pulling –users must request copies of certificates when they need them. –the problem will pulling is that this requires the relevant CAs to be online to distribute the certificates when required to do so. –an advantage is that the receiver is more likely to get the latest valid certificate, although it may still be prudent that the receiver performs checks to ensure that the certificate has not been revoked.

Introduction to Cryptography and Security Mechanisms Certifying the certifiers 1.Who generates the public verification key of a CA? 2.How does a CA arrange to certify its own public verification key? 3.How is the public verification key of a CA distributed to those entities who need to rely on it? Someone, somewhere, must generate the CA’s public key pair, and someone, somewhere, must certify this public key. However it is done, it must be done securely. If someone gets hold of the private key of the CA then they can generate certificates themselves, and the whole system falls apart.

Introduction to Cryptography and Security Mechanisms Revocation Certificate Revocation List (or CRLs) –A lists of certificates that have been revoked. –CRLs need to be maintained carefully, with clear indications of how often they are updated. –CRLs need to be signed by the CA and be made available to users as easily as possible. Online Certificate Status Protocol (OCSP) –A n online database containing the status of certificates issued by the CA. We must consider how to handle certificates that need to be “withdrawn” before their expiry date. This process is often referred to as certificate revocation.

Introduction to Cryptography and Security Mechanisms Revocation 1.For what different reasons might a certificate need to be revoked? 2.Who decides that a certificate can be revoked? 3.Who is responsible if someone uses a certificate without realising it has been revoked? 4.How often should CRLs be updated? 5.What possible problem might arise from the “time gap” between CRL updates?

3. Managing trust in a PKI

Introduction to Cryptography and Security Mechanisms Establishing a PKI We need to consider how trust can be established and managed within a PKI. For example: How is trust in a CA established? Who are the candidates for CAs? How do you choose a CA? How do CAs recognise one another? How is liability managed?

Introduction to Cryptography and Security Mechanisms Some requirements for a CA A physically secure operating environment Tamper resistant modules for cryptographic processing (particularly for high-level keys) The ability to generate cryptographic keys (a pseudorandom number generator?) The ability to check both written and digital signatures The ability to sign certificates Software to support various certificate formats The ability to transport keys securely (perhaps smartcards?) A clearly defined security policy Auditable procedures for producing certificates The ability to maintain certificate revocation lists The ability to cover potential financial liabilities

Introduction to Cryptography and Security Mechanisms Choosing a CA 1.What types of organisation are candidates for CAs, and why? 2.How does a user go about selecting a CA to issue their certificate? 3.How can you guarantee that a CA will behave honourably?

Introduction to Cryptography and Security Mechanisms Joining CA domains An owner of a public key certificate has by necessity placed some trust in the CA who has issued this certificate. However, for larger and more open PKIs, it is likely to be the case that the owner of a certificate will: want users who do not have a business relationship with the owner’s CA to be able to rely on the owner’s certificate want to rely on certificates that were not issued by the owner’s CA. There is thus a need for techniques that somehow “join” different certification domains and allow certificates issued by one CA to be recognised by another CA.

Introduction to Cryptography and Security Mechanisms Cross certification CA1CA2 CA1 and CA2 each certify the other’s public key Clients of CA1Clients of CA2

Introduction to Cryptography and Security Mechanisms Certificate hierarchies CA1CA2 Root CA certifies the two CA’s public keys Clients of CA1Clients of CA2 Root CA

Introduction to Cryptography and Security Mechanisms Certificate chains CA1 CA3 CA2 Alice Bob Public key of CA2 CA1 Public key of CA3 CA2 Public key of Bob CA3 When Alice wants to check the authenticity of Bob’s public key she must verify each link in the chain:

Introduction to Cryptography and Security Mechanisms Liability issues You trust your London based CA, and it has cross-certified with another CA in Luxembourg, who acts as the root CA for a small CA in Belgium, and one of the Belgian CA’s clients has sent you a certificate chain that connects back to its public verification key. You want to use this public verification key to verify the signature on a transaction that the Belgian customer has promised you. What happens if it all goes wrong? Where does the liability lie? Who is responsible to whom? And how much protection is offered?

4. PKI models

Introduction to Cryptography and Security Mechanisms Straight line model Relying Party Subscriber

Introduction to Cryptography and Security Mechanisms L-shaped model Certificate Authority Issues certificate Relying Party Digital signature Subscriber

Introduction to Cryptography and Security Mechanisms Triangular model Subscriber Certificate Authority Single organisation Digital signature Issues certificate Relying Party

Introduction to Cryptography and Security Mechanisms Four corner model Certificate Authority Validation Authority Certificate validation Issues certificate Digital signature Subscriber Relying Party

Introduction to Cryptography and Security Mechanisms The state of PKI In the mid 1990’s it was widely forecast that PKIs would be implemented on a broad scale to provide security services. Every year it was widely forecast that PKI adoption was just round the corner. The next year the same thing happened... We are still waiting for this massive adoption of PKI to take place. Progress has been substantial, but it has been slow and very unsteady. There are any competent business organisations offering CA services, and some efforts are underway to establish PKI standards. We are still awaiting what David Lacey has referred to as “the golden age of PKI”. For what reasons do you think that this is the case?

Introduction to Cryptography and Security Mechanisms Identity-based public key cryptography The whole reason that a PKI is needed at all is to vouch for the authenticity of public keys. One way of eliminating this problem is to make public keys “obviously” authentic without third party certification. This is the motivation behind identity-based public key cryptography (IDPKC). In IDPKC: 1.Your “identity” is your public key. There is a public rule that converts your “identity” into a string of bits, and then some public rule that converts that string of bits into a public key. 2.Your private key can be calculated by a trusted centre from your public key using some secret information. Only the trusted centre can perform this calculation of your private key. The trusted centre then issues you securely with your private key.

Introduction to Cryptography and Security Mechanisms IDPKC AliceBob Authority 1. Alice derives Bob’s public key PubB from some public information and sends message encrypted under PubB to Bob. 2. Bob identifies himself to an authority and requests the private key PrivB corresponding to PubB. 3. Authority derives PrivB from PubB and some secret value, and returns this to Bob. PubB(message) Bob PrivB

Introduction to Cryptography and Security Mechanisms Identity-based public key cryptography IDPKC requires new algorithms – you cannot use existing public key algorithms One “fixed” public key can be associated with many different private keys since the trusted centre can use different secrets to generate different private keys that correspond to that same public key. Public keys do not have to be identities – they can be any data, including decryption policies. For this reason some people prefer to refer to IDPKC as Identifier-based public key cryptography

Introduction to Cryptography and Security Mechanisms Identifier-based public key cryptography Could incorporate policy into the identifier time to decrypt who is authorised to decrypt under what conditions decryption permissible Could generate identifiers “on the fly” in browsers need trusted applications need effective policy management

Introduction to Cryptography and Security Mechanisms In what way is IDPKC an improvement over traditional public key cryptography? 2.What problems with PKI remain? 3.What new problems have you created when using IDPKC? IDPKC v PKC

Introduction to Cryptography and Security Mechanisms Summary Public key infrastructures based on digital certificates and certificate authorities remain the favoured method for trying to securely implement public key cryptography. There are many complicated issues that arise when trying to implement PKIs, most of which do not have simple or technical solutions. PKI s will not be adopted on a large scale until some of these problems are addressed satisfactorily – the best hope for this is through the establishment of recognised standards and best practice procedures that encourage interoperability between different CAs and PKIs. There are alternatives to traditional PKIs, but these come with their own problems and are most likely to be favoured in niche application areas.