Namespaces in SPKI Carl M. Ellison Intel Architecture Labs

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Presentation Two: Grid Security Part Two: Grid Security A: Grid Security Infrastructure (GSI) B: PKI and X.509 certificates C: Proxy certificates D:
Grid Security. Typical Grid Scenario Users Resources.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Computer Security Key Management. Introduction We distinguish between a session key and a interchange key ( long term key ). The session key is associated.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
Computer Security Key Management
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Key Management CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 1, 2004.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
® © 2003 Intel Corporation Security Issues with Names Carl Ellison Sr. Security Architect Network Architecture Lab Intel Corporation June 17, 2003.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
Computer Science Public Key Management Lecture 5.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Directories and PKI Keith Hazelton Senior IT Architect, UW-Madison PKI Summit, Snowmass, 9-Aug-01.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI Wade Trappe.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
SDSI -- A Simple Distributed Security Infrastructure by Ronald L. Rivest MIT Lab for Computer Science (joint work with Butler Lampson)
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Grid technology Security issues Andrey Nifatov A hacker.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Digital Signatures and Digital Certificates Monil Adhikari.
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Unified Identity for Access Control Carl Ellison 7 April 2011 IDtrust.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
JLR, Tozny, and DHS Isaac Potoczny-Jones
SSL Certificates for Secure Websites
Grid Security.
Cryptography and Network Security
SPKI/SDSI 2.0 A Simple Distributed Security Infrastructure
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Namespaces in SPKI Carl M. Ellison Intel Architecture Labs

19 August 1999 Diffie, Hellman and Kohnfelder D-H: key management problem is solved. Instead of a courier, if you want to send me a message for my eyes only, look me up in the modified phone book and find my key. Kohnfelder: the central phone book is a bottleneck. Sign the (name,key) entries, call them certificates and let them wander the net.

19 August 1999 Early Assumptions You know the people with whom you deal. Names function as identifiers. Therefore, if you learn the name of a keyholder you can make security decisions. System security depends on the security and practices of the CA.

19 August 1999 New Realizations In the Global Village, names retain their social role but are not good identifiers. Even if there were a name that functioned as an identifier (e.g., a domain name), you probably don’t know the identified person. E.g., do you grant access to classified information to anyone who has a valid passport? …from Iraq?

19 August 1999 Most Basic Flaw A telephone book does not claim to tell you whether a person should have access to classified information. It does not even tell you which Bob Smith is your old friend Bobby from summer camp. It gives clues but lets you do trial and error. Access control needs more than weak clues.

19 August 1999 Certificate Classes (1) Name Key Permission [ID] Certificate ACL / Attribute Certificate

19 August 1999 Authorization (1) Distinguished Name [DN] Key Permission [ID] Certificate ACL / Attribute Certificate Access Control Security Perimeter =

19 August 1999 The Third Attack DN = common name + other information to make it globally unique. The DN’s common name field is defended as an aid to human users. This leads to the potential flaw that a human will look at the common name and assume he knows the person. That flaw can be exploited to create an attack.

19 August 1999 Example (1/3) Date: Mon, 24 Aug :48: From: (Dan Geer) To: Subject: discussion next week Cc:

19 August 1999 Example (2/3) Gentlemen, I've decided to ask Bob Blakley to moderate rather than do it myself. He'll be in touch and if you've already got a lot of format and/or questions worked out, please bring him up to speed. See you next week. --dan

19 August 1999 Example (3/3) So, I saw Bob Blakley outside a conference session on 8/26/98 and I approached him, saying that we needed to talk about the panel session the next week. He responded, “What panel session?” I was speaking to the father, not the son. Worse, the father is Bob Junior.

19 August 1999 Certificate Classes (2) Name KeyPermission [ID] Certificate ACL / Attribute Certificate ACL / Authorization Certificate

19 August 1999 Authorization (2) Name KeyPermission ID ACL / Authorization Certificate Access Control Security Perimeter Lawyer’s Security

19 August 1999 Credential Formats ID Certificates –X.509 –PGP –SDSI/SPKI Attribute Forms –X9 attribute cert –SPKI attribute cert –ACL by name Authorization Forms –SPKI authorization cert –X.509 SSL –X.509v3 extension –X.509 SET –PGPticket –ACL by key ~/.ssh/authorized_keys AADS / X9.59 SSL root key list

19 August 1999 Three Namespaces Global keyholder ID Local human-friendly name Local (to the verifier) permission tag

19 August : Key as Global ID The keyholder is the entity holding the private key, by definition. A public key is mathematically associated with a single private key. A public key is a byte string  an ID. A collision-free hash of the public key is also a byte string  an ID of the keyholder.

19 August 1999 Lack of Public Key Anonymity Because a key is a global ID for the keyholder, use of the public key when the key is transmitted in the clear by the protocol, gives the attacker the equivalent of an ID codebook puzzle to solve. The televangelist problem… Need multiple keys, one per function or function class

19 August : Local Names People use names. We think with them. The names we use are local to our own heads and can be good identifiers when limited to our own small communities. SDSI defines local names and rules for linking name spaces, with a resulting increase in security.

19 August 1999 Fully-qualified Names (1) To be used away from its locality, a name must be globally unique. Let us call this a fully-qualified name. A name local to one keyholder, paired with the public key of that keyholder, is a global ID, mapping to a key: (name fred) = k 1 (name n 1 n 2 … n N ) = k N

19 August 1999 Fully-qualified Names (2) SDSI name chain reduction, recursively: (name n 1 n 2 … n N ) & (name n 1 ) = k 1  (name n 2 … n N ) Identical to the process with X.509 If there were one naming root, then the root key could be just assumed and not stated. There will never be one root, so all attribute certs need FQNs, probably as shown above.

19 August : Tag Namespaces Permissions need to be named to be verified The verifier is in charge of that naming -- and verification is local to it. Anyone delegating that permission must also be aware of it, unless delegation is by group.

19 August 1999 Authorization Flow ACL K 3 do X? Y N Verifier’s Machine AB ACL: I say ( K 1 may delegate or do { X, Y, Z } ) A: K 1 says ( K 2 may delegate or do { X, Y } ) B: K 2 says ( K 3 may do { W, X } )  I say (K 3 may do {X}), by logical reduction Certificates

19 August 1999 Tag Uniqueness A tag is visible only along a verification path. The verifier defines it and can get agreement from its delegates as to the meaning, syntax and use of the tag. Since entities are free to have as many keys as desired, a delegate can create a key for a specific tag delegation.