Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
SSL Implementation Guide Onno W. Purbo
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 ISA 562 Information Systems Theory and Practice 10. Digital Certificates.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate revocation list
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Cryptography and Network Security Chapter 14
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Building and extending the internal PKI
GRID-FR French CA Alice de Bignicourt.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Key management issues in PGP
Cryptography and Network Security
S/MIME T ANANDHAN.
Information Security message M one-way hash fingerprint f = H(M)
زير ساخت كليد عمومي و گواهي هويت
Digital Certificates and X.509
Presentation transcript:

Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan

Basic Terms Public Key Cryptographic Standards, PKCS A collection of 12 papers PKCS #1 to PKCS #12 developed by RSA Labs and representatives from the academia and industry. PKCS #1RSA Algorithm PKCS #3Diffie-Hellman Algorithm PKCS #7Cryptographic Message Syntax Std PKCS #10Key Certification Request PKCS #11Standard API for developers PKCS #12Certificate Interchange Format PKCS #13Elliptic Curves Algorithm

Basic Terms Digital Signatures DSS issued by NIST Message Digest Algorithms Non Reversible (One way function) Examples

Digital Certificates Certificates are the framework for identification information, and bind identities with public keys. They provide a foundation for identification, authentication and non-repudiation.

Sample View of a Certificate Certificate Types : Private/PersonalServerDeveloper

X.509 v3 Certificate Format Version Certificate Serial Number Signature Algorithm Identifier Issuer Name Validity Period Subject Name Subject Public Key Information Optional Fields

X.509 v3 Extension Fields Associate additional information for subjects, public keys, managing certification hierarchy and certificate revocation lists. Extension type Extension value Criticality indicator

X.509 Profiles Tailor the authentication model of X.509 to specific environments based on Risk perception. IETF Public Key Infrastructure (PKIX -1) : Application-independent certificate based key distribution mechanism. SET Standard : Secure messaging for payment-service transactions over open-networks.

Certification Authorities Trusted organization that issues certificates and maintains status information about certificates. Certification Practice Statement

How Digital Certificates work? Generate Public and Private Keys. Get Certificate from the CA Sign the document/page using the private key. Send signed document over open networks along with the CA’s certificate. Recipient verifies using the signing CA’s public key Trust Chain and Fingerprints

Web Server Security Server Authentication using SSL Information to/from the correct Web Site Information in encrypted form Setting up SSL on a Web Site Create a Server Certificate Request Obtain the Server Certificate from a CA/locally Install it on the Web Server Establishing an SSL connection Need root certificate of the issuing CA

Client Authentication Anonymous Basic Challenge Response (NT) SSL Client Authentication

Application Subject Authentication Certificate Generation Certificate Distribution Certificate Revocation Certification and Registration

Subject Authentication Confirm the identity of the subject Based on the class of certificate Local Registration Authority(LRA) model Example : Verisign Onsite

Importing a Certificate To send an encrypted message or document to a person who has a certificate. From a Certification AuthorityCertification Authority From a Directory Service (LDAP) From a signed message From a local file (encoded Binary PKCS #7)

Certificate Revocation Lists A data structure that has the list of all the serial numbers of the revoked certificates. Standard X.509 CRL format (ISO/ITU) Propagation Polling for CRLs Pushing CRLs Online status checking

Formal Specification ( PKCS #7 ) Abstract Syntax Notation (ASN.1) Design tool used for expressing syntax of messages. Widely used to describe protocols interfaces etc. PKCS #7 syntax for SignedData type ASN.1objects are encoded using BER/DER.

Key Certification Request PKCS #10 syntax using ASN.1 notation

Certificate Management Value and Validity of Certificates will be questioned Cross Certification (Multiple CA’s)

Applications of Certificates Sandbox Code Signing Vs Shrink-Wrapped Software Accountability and Authenticity Microsoft Authenticode 1.0 based on X.503 v3 and PKCS #7 Commercial Vs Individual Publishers Object Signing Netscape’s technology Signs any kind of Files

Applications (continued) Secure Messaging & S/MIME Web Server Security Microsoft ASP for Access Control