Steve Lamb IT Pro Evangelist Microsoft Ltd What Do I Need To Know About PKI To.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure – tell me in plain English AND THEN deep technical how PKI works Steve Lamb
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Security and Policy Enforcement Mark Gibson Dave Northey
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Public Key Infrastructure – Deep Dive PKI session SHOWING you how to embrace PKI Steve Lamb
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography 101 Frank Hecker
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Enhancing Security with S/MIME Chuck Connell,
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Masud Hasan Secue VS Hushmail Project 2.
Week #7 Objectives: Secure Windows 7 Desktop
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS8: File System 8.3. Encrypting File System Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Potential vulnerabilities of IPsec-based VPN
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Private key
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Security Protecting information data confidentiality
Web Applications Security Cryptography 1
Basics of Cryptography
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Secure Sockets Layer (SSL)
e-Health Platform End 2 End encryption
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Implementing Client Security on Windows 2000 and Windows XP Level 150
Install AD Certificate Services
Presentation transcript:

Steve Lamb IT Pro Evangelist Microsoft Ltd What Do I Need To Know About PKI To Make Sense of BitLocker?

2 Objectives Review and teach you enough about Public Key Infrastructure to enable you to understand how Windows Vista’s Bitlocker feature set works Not bore you silly!

3 Agenda Introduction to Data Protection Cryptography Primer IPSec S/MIME BitLocker EFS

4 Introduction to Data Protection

5 Defense in Depth Using a layered approach: Each layer can be compromised Multiple layers reduce overall probability of penetration Policies, Procedures, & Awareness OS hardening, updates, BitLocker authentication, secure startup Firewalls, VPN quarantine Guards, locks, tracking devices, HSM, TPM Compartments, IPSec, IDS Application hardening Encryption (EFS, BitLocker), IRM, RMS User education against social engineering Physical Security Perimeter Internal Network Host Application Data

6 Digital Security Relies on Physical Security of Key Assets Strong Physical Security of KA Strong Digital Security Good Security Everywhere Weak Physical Security of KA Strong Digital Security Insecure Environment Strong Physical Security of KA Weak Digital Security Insecure Environment

7 Physical Security – How? Your data is only as secure as the physical security of the keys that encrypt it How do I secure the key? 1. Obfuscate it! Hackers will find it soon, so you must change the mechanism often enough. 2. Encrypt it! This only shifts the problem somewhere else, especially if the key is removed from one machine and put in another (AD?) 3. Lock it in a TPM or a smartcard! Excellent choice if device is “hard” and you trust it, but can anyone open it if they wish to? PINs? Passwords? Metrics? 4. Print it on paper! Great for occasionally used keys – but keep the paper safe, or memorise it.

8 Foundation of Data Protection Cryptography All existing data protection mechanisms rely on cryptography Differences in: Key protection Recovery strategies Deployment UI Purpose

9 Cryptography Primer

10 Symmetric Key Cryptography Encryption “The quick brown fox jumps over the lazy dog” “AxCv;5bmEseTfid3) fGsmWe#4^,sdgfMwi %” “The quick brown fox jumps over the lazy dog” Decryption Plain-text input Plain-text output Cipher-text Same key (shared secret)

11 Symmetric Pros and Cons Strength: Simple and really very fast (order of 1000 to faster than asymmetric mechanisms) Super-fast (and somewhat more secure) if done in hardware (DES, Rijndael) Weakness: Must agree the key beforehand Securely pass the key to the other party

12 Public Key Cryptography Knowledge of the encryption key doesn’t give you knowledge of the decryption key Receiver of information generates a pair of keys Publish the public key in a directory Then anyone can send him messages that only she can read

13 Public Key Encryption Encryption “The quick brown fox jumps over the lazy dog” “Py75c%bn&*)9|fDe^ mdFg$5knvMd’rkveg Ms” “The quick brown fox jumps over the lazy dog” Decryption Clear-text Input Clear-text Output Cipher-text Different keys Recipient’s public key Recipient’s private key private public

14 Public Key Pros and Cons Strength Solves problem of passing the key Allows establishment of trust context between parties Weakness: Extremely slow Susceptible to “known ciphertext” attack Problem of trusting public key (see later on PKI)

15 Hybrid Encryption (Real World) As above, repeated for other recipients or recovery agents Digital Envelope Other recipient’s or agent’s public key (in certificate) in recovery policy €25m hidden at 221b Baker St. Access code is… Symmetric key encrypted asymmetrically (e.g., RSA) Digital Envelope User’s public key (in certificate) RNG Randomly- Generated symmetric “session” key Symmetric encryption (e.g. AES) *#$fjda^ju539!3t t389E 5e%32\^kd

16*#$fjda^ju539!3t t389E 5e%32\^kd €25m hidden at 221b Baker St. Access code is… €25m hidden at 221b Baker St. Access code is… Symmetric decryption (e.g. AES) Digital Envelope Asymmetric decryption of “session” key (e.g. RSA) Symmetric “session” key Session key must be decrypted using the recipient’s private key Digital envelope contains “session” key encrypted using recipient’s public key Recipient’s private key Hybrid Decryption

17 Vista Supports NSA Suite B Required cryptographic algorithms for all US non- classified and classified (SECRET and TOP-SECRET) needs Except a small area of special-security needs (e.g. nuclear security) – guided by Suite A (definition is classified) Announced by NSA at RSA conference in Feb 2005

18 Suite-B Algorithms Encryption: AES Digital Signature: EC-DSA Key Exchange: EC-DH or EC-MQV Hashing: SHA-2

19 IPSec Layer 3 Security IPSec, or Internet Protocol (IP) Security Optional in IPv4, required in IPv6 IPv4 IPSec RFCs: 1828, 1829, 2085, 2104, 2401, 2402, 2403, 2404, 2406, 2407, 2408, 2409, 2410, 2411, 2451 plus a few drafts Purpose: Firewall-like filtering and end-point authentication See Steve Riley’s excellent sessions on the subject Confidentiality of data at IP level, i.e. Data Protection Independent of security of layers 4+ (SSL/TLS) Limitation: Host-to-host network security, not application-to-application

20 Secure / Multipurpose Internet Mail Extension Office 2007 uses S/MIME v3 (prior versions used v2) Purposes: Confidentiality of in transit over Internet Mailbox Reader-to-Mailbox Reader Causes problems of trust with web-mail, generally not implemented Digital signatures Integrity Authenticity and Identity Non-repudiation

21 BitLocker

22 BitLocker™ Purpose: Protection against laptop theft But only with secondary TPM protection (PIN/dongle etc) OS integrity assurance Hardware or disk-level offline attack protection Indirect protection of other secrets and keys Fast computer disposal Full volume encryption of the hard drive containing OS Fast and efficient 5-6% CPU usage on average, 15% in extreme cases

23 BitLocker Algorithms Suite-B naturally! AES-128 CBC with a diffuser for data Great, fast choice – use it! Diffuser (Elephant) prevents cipher-text manipulation attacks AES-256-CBC with/without diffuser is offered Much slower, not really necessary AES-256 is used for key management (no choices) Recovery key is 128 bits (48 digits)

24 BitLocker Recommendations Turn it on. For laptops, you really should enable additional key protection: PIN, Password, USB-dongle etc. Fingerprint? Ehm, no – weak security Recovery: Save the password well For extra security, remove it from escrow (in AD) See the session by Russ Humphries! All my security problems solved? No! Shared files, server folders, , workgroup and SharePoint...

25 Encrypting File System

26 EFS Purpose: folder-level confidentiality not limited to a machine Workgroups Files encrypted for multiple individuals Server locations Simple to use (right-click), but best if managed via policies Multiple recovery strategies based on: Recovery agents Escrow Key backup In Vista/Longhorn EFS can use smartcards

27 EFS Algorithms EFS supports: AES-256 (default on Server 2003/Longhorn), 192, 128 3DES – slow DESX – Algorithm unique to Microsoft, derived from DES, do not use it, as security is low Warning: this was the default on Windows XP! Change with policy: System cryptography: Use FIPS compliant algorithms for encryption, hashing and signing In Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\ Key exchange uses RSA and hashing SHA-1 before Vista, and it moves to Suite-B as of Vista/Longhorn

28 EFS Recommendations Set-up on file servers at departmental level Ensure all users’ public certificates are in AD and available For private key protection (on laptop/workstation) use: Smartcard BitLocker On Windows XP protection is afforded by “Protected Storage” Strength depends on the user’s password Observe: it does not replace, nor is replaced by BitLocker

29 Data Protection on Windows Platform IPSec BitLocker S/MIME EFS IRM/ERM

30 Summary Data Protection is your innermost layer of Defence-in- Depth, with cryptography at heart Never rely on any one technique alone Do risk assessment to know benefits and costs Windows Vista and Longhorn greatly build on the existing and already available platform

©2006 Microsoft Corporation & Project Botticelli Ltd. All rights reserved. This presentation is for informational purposes only. MICROSOFT AND PROJECT BOTTICELLI LTD MAKE NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. E&OE. Thanks to Rafal and Project Botticelli for the material used in this presentation