Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
CP3397 ECommerce.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Public Key Infrastructure (PKI)
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
PGP Overview 2004/11/30 Information-Center meeting peterkim.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Science Public Key Management Lecture 5.
SSL Technology Overview and Troubleshooting Tips.
CSCI 6962: Server-side Design and Programming
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Key management issues in PGP
S/MIME T ANANDHAN.
Information Security message M one-way hash fingerprint f = H(M)
CompTIA Security+ Study Guide (SY0-501)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Unit 8 Network Security.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Digital Certificates With Chuck Easttom

Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's private key. To verify the digital signature, the recipient uses the sender's public key. Good digital signature scheme provides:  authentication  integrity  non-repudiation  RSA algorithm can be used to produce and verify digital signatures; another public-key signature algorithm is DSA.

Digital Signatures - Continued Normal Asymmetric Encryption  Bob wants to send Alice a message that Eve cannot read  Bob uses Alice’s public key.  Even if Eve intercepts and has Alice’s public key, she cannot decrypt it.  Only Alice’s PRIVATE key can decrypt. This protects confidentiality. Digital Signature  Bob wants to send Alice a message and be able to have Alice know for a fact that it came from Bob  Bob uses his own private key.  Anyone who receives the message can use Bob’s public key to decrypt the message. If it works, then it must have been signed with Bob’s private key. This protects integrity.

What is a digital certificate?  It is a digital ‘document’ that contains a public key and some information to allow your system to verify where that key came from.

What are certificates used for?  Web Servers  Authentication of Cisco Secure phones  E-Commerce

X.509  The most widely used digital certificate standard.  First issued in July 3, 1988  In the X.509 system, a certification authority issues a certificate binding a public key to a particular distinguished name in

X.509 certificates  Relied on by S/MIME  Issued by CA  Provide public key  Proof of corresponding private key  Detailed info about yourself  Digitally sign information  Send request to CA  Contains your name, info about you, and signature of person who issued certificate

X.509 certificate content  Version  Certificate holder’s public key  Serial number  Certificate holder’s distinguished name  Certificate’s validity period  Unique name of certificate issuer  Digital signature of issuer  Signature algorithm identifier

X.509 Certificate file extensions .pem - (Privacy Enhanced Mail) Base64 encoded DER certificate, enclosed between "-----BEGIN CERTIFICATE-- ---" and "-----END CERTIFICATE-----" .cer,.crt,.der - usually in binary DER form, but Base64- encoded certificates are common too (see.pem above) .p7b,.p7c - PKCS#7 SignedData structure without data, just certificate(s) or CRL(s) .p12 - PKCS#12, may contain certificate(s) (public) and private keys (password protected) .pfx - PFX, predecessor of PKCS#12 (usually contains data in PKCS#12 format, e.g., with PFX files generated in IIS)

PGP certificates  Defines its own format  A single certificate can contain multiple signatures  PGP certificate includes  PGP version number  Certificate holder’s public key  Certificate holder’s information  Digital signature of certificate owner  Certificate’s validity period  Preferred symmetric encryption algorithm for the key

PKI  Public Key Infrastructure. The infrastructure for distributing digital certificates, that contain public keys. A PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA).

CA  Certificate Authority. The primary role of the CA is to digitally sign and publish the public key bound to a given user. It is an entity trusted by one or more users to mange certificates.  Verisign and Godaddy are two obvious examples.

CA - Verisign  Class 1 for individuals, intended for .  Class 2 for organizations, for which proof of identity is required.  Class 3 for servers and software signing, for which independent verification and checking of identity and authority is done by the issuing certificate authority.  Class 4 for online business transactions between companies.  Class 5 for private organizations or governmental security.

RA  RA ( Registration Authority ) Used to take the burden off of a CA by handling verification prior to certificates being issued. RA acts as a proxy between user and CA. RA receives request, authenticates it and forwards it to the CA.

CRL  Certificate Revocation List. It is a list of certificates that have been revoked for one reason or another.

OCSP  Online Certificate Status Protocol is a real time protocol for verifying certificates.

SCVP  The Server-based Certificate Validation Protocol (SCVP) is an Internet protocol for determining the path between a X.509 digital certificate and a trusted root (Delegated Path Discovery) and the validation of that path (Delegated Path Validation) according to a particular validation policy

Digital certificates Continued - Management  Centralized key-management systems  Decentralized key-management systems  Three phases of key life-cycle  Setup and initialization  Administration  Cancellation

Digital certificates Continued- Setup and initialization phase  Process components  Registration  Key pair generation  Certificate generation  Certificate dissemination

Digital certificates Continued- Administration phase  Key storage  Certificate retrieval and validation  Backup or escrow  Recovery

Digital certificates Continued- Cancellation and history phase  Expiration  Renewal  Revocation  Suspension  Destruction

Digital certificates Continued- Key recovery agents  Person who can recover keys from the keystore on behalf of a user  Highly-trusted person  Issue recovery agent certificate  EFS Recovery Agent certificate  Key Recovery Agent certificate

Trust Models Hierarchical Single authority Web of trust

Certificates and Web Servers  HTTPS means HTTP secured with either SSL (older) or TLS (newer).  The certificate must be installed on the web server for the website to use HTTPS

SSL  Secure Sockets Layer  Developed by Netscape  V 2.0 in 1995

TLS  Transport Layer Security  Successor to SSL  Was first defined in RFC 2246 in January 1999  Is backward compatible with SSL 3.0  Transport Layer Security provides RSA encryption with 1024 and 2048 bit strengths.  TLS also supports the more secure bilateral connection mode (i.e. mutual authentications), in which both ends of the communication session can verify each other.  TLS 1.1 was defined in RFC 4346 in April 2006  TLS 1.2 was defined in RFC 5246 in August 2008.

Microsoft Certificate Services  Certificate authority  Web enrollment  Online responder  Network device enrollment

Windows Certificates  certmgr.msc

Questions  Now it is time for Q&A  And don’t forget to check my website where you can get notes from my classes, find my blog, check out my FaceBook fan page (I put a tech tip up about 3 times a week), find out about my latest books, get lots of free tutorials.