1 Lecture 11 Public Key Infrastructure (PKI) CIS 4362 - CIS 5357 Network Security.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.4 Public Key Infrastructure (PKI) Acknowledgment: Slides revised from.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.
COEN 350 Public Key Infrastructure. PKI Task: Securely distribute public keys. Certificates. Repository for retrieving certificates. Method for revoking.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 4
1 ISA 562 Information Systems Theory and Practice 10. Digital Certificates.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
COEN 351 Certificates, PKI, X509 Standard. Certificates THE authentication mechanism for E- commerce. Allows customers to authenticate the e-merchant.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
COEN 351 Certificates, PKI, X509 Standard. Certificates Key distribution Crucial for authentication, privacy, signing, … Public Key Technology can use.
Communications-Electronics Security Group. PKI interoperability issues for UK Government Richard Lampard
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cryptography and Network Security Chapter 14
Using Public Key Cryptography Key management and public key infrastructures.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
Key management issues in PGP
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
Authentication Applications
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security

2 What is a PKI Components / structure to securely distribute public keys –Repository for certificates –Retrieving and delivering certificates to clients –Methodology for registering clients, and revoking certificates

3 Distributing public keys Public keys allow parties to share secrets over unprotected channels –Extremely useful in an open network: Parties are not under a single manager Symmetric keys cannot be shared beforehand How to distribute public keys? –Not a problem of secrecy (symmetric key) –A problem of legitimacy (identity binding)

4 Certification Public keys must be certified, i.e., an authenticated statement like “Public key PA belongs to user A” must be made by a trusted party. The Public Key Infrastructure defines: –The set of trusted parties or a mechanism to infer trust –An authentication/certification algorithm

5 Example certificate Alice[Alice,PK a ] SKc Charlie The Encrypted Signature Identity of the Certifying Authority Identity of the public key holder

6 Terminology If Alice signs a certificate for Bob, –Alice is the issuer, Bob is the subject If Alice wants to find a trusted path to Bob’s key, Bob’s name is the target A verifier evaluates a certificate or a chain of certificates Anyone having a public key is a principal A trust anchor is a public key that the verifier has decided is trusted

7 Monopoly Model A central Certification Authority (CA) is: –universally trusted –its public key is known to all The central CA signs all public key certificates, or delegates its powers: –to lower level CAs: Certificate chaining –to registration authorities (RAs): check identities, obtain and vouch for public keys This is a “flat” trust model.

8 Oligarchy Model A number of root CAs known in advance Certificate chaining is supported Web browsers support oligarchic PKIs –Come preconfigured with many trust anchors, trusted by the product vendor More security problems than the monopoly model – more points of failure The X.509 PKI is oligarchic

9 Anarchy model PGP: Each user is fully responsible for deciding its trust anchors (roots). –Practical for individual communication Put your public key in your signature or website Call user to verify PK fingerprint –Impractical for automated trust inference How to decide that a certificate chain is trustworthy? “web of trust” versus hierarchical trust model

10 PGP: Details PGP Identity - Name and address associated with a key. PGP Public key ring - a local file/database of keys. Should have all keys that the user plans to correspond with, and any keys that have signed the user's public key. PGP key server - a networked repository for storing, retrieving, and searching for public keys. Key servers can use a few standardized protocols, among them LDAP, HTTP, and SMTP as public interfaces. A PGP key server is basically a centralized networked PGP public key ring. Public key fingerprint - A uniquely identifying string of numbers and characters used to identify public keys. This is the primary means for checking the authenticity of a key.

11 Constrained Naming PKIs Assumptions: –X.509 and other oligarchic PKIs cannot handle a very complex world without becoming very complex themselves –Many certification needs are inherently local –Local certification and local naming uniqueness can be maintained with minimal effort –Global naming conventions exist (e.g.: DNS) –If public keys need global certification, then rely on relationships to infer trust

12 Top-Down Constrained Naming Similar to oligarchic/ monopoly model model, but delegation takes place with domain name constraints: /.com.edu.uk.microsoft.com.fsu.edu.co.uk.amazon.co.uk

13 Bottom-Up Constrained Naming Each organization creates an independent PKI and then link to others: –Top-down links: Parent certifies child –Bottom-up links: Child attests parent –Cross-links: A node certifies another node To certify a node N: 1.Start from your trust anchor: if it is also an ancestor to N, just verify the delegation chain 2.If (1) fails, query your trust anchor for a cross-link to an ancestor of N 3.Else repeat using the parent of your trust anchor.

14 Example.edu.edu/.fsu.edu/.fsu/.cs.edu/.fsu/.math.com.com/.symantech.com/.apple.com/.symantech/.nav.edu/.fsu/.cs/.diablo.edu/.fsu/.cs/.192.x

15 Advantages of constrained naming PKIs Simple and flexible Locally deployable Compartmentalized trust Easy to replace keys at local levels –Lightweight and fast revocation Non-monopolistic, open architecture PKIX/X.509 (oligarchic) has recognized the advantages of constrained naming, and support it though the NameConstraints field.

16 Relative names Aliases, shorthand forms or non-global names that are locally understood: Parent may refer to each child simply the part of the child’s name that extends of its own name Child refers to parent simply as “parent” Think of how file systems work –Cross links can use global names (absolute paths) or relative names SPKI certificates support relative names

17 Certificate Revocation As the trusted parties multiply, so does the possibility of having to revoke trust –Private key of user compromised: Revocation of user certificate Publication of revoked certificates: –Certificate revocation lists, or CRLs. –Private key of trusted party compromised: Update of CA’s public key Re-certification of existing certificates? Timestamping?

18 Certificate revocation CRLs: –Signed, time-stamped list of all revoked certificates –Cost to generate and verify a CRL is proportional to the number of all revoked certificates  CRLs: –Publish only changes from a latest full CRL OLRS (On-line Revocation Server) Affirmation of valid certificates

19 Other issues Directories –A standardized mechanism for querying names is required for some PKIs (e.g. constrained names) –E.g.: DNS directory service Should a certification record be stored with the issuer or subject of the certification? Certificate chaining: –To certify Alice -- start with Alice’s name and go up (forward building) or with our trust anchor and down (reverse building)?

20 X.509 Certificate Management Protocol (CMP: RFC 2510) Online Certificate Status Protocol (OCSP: RFC 2560) Certificate Management Request Format (CRMF: RFC 2511) Time-Stamp Protocol (RFC 3161) Certificate Management Messages over CMS (RFC 2797) Internet X.509 Public Key Infrastructure Time Stamp Protocols (RFC 3161) Use of FTP and HTTP for transport of PKI operations (RFC 2585)

21 X.509 PKIX Working Group (established 1995) Goal: develop Internet standards needed to support an X.509-based PKI: –RFC 2459, profiled X.509 version 3 certificates and version 2 CRLs for use in the Internet. –Profiles for the use of Attribute Certificates (RFC XXXX [pending]) –LDAP v2 for certificate and CRL storage (RFC 2587) –X.509 Public Key Infrastructure Qualified Certificates Profile (RFC 3039) –Internet X.509 Public Key Infrastructure Certificate Policy and certification Practices Framework (RFC Informational)

22 X.509 The IETF chose to use X.500 naming standards for certificates –C=US, O=Sun, OU=Java, CN=java.sun.com Browsers know websites by DNS names, not X.500 names –Initial browser implementations did not check CN. –Today, DNS names are included either in CN or in SubjectAltName field Rationale: DNS does not support certificate lookup

23 X509 + PKIX Certificates Version SerialNumber Signature Issuer Validity Subject SubjectPublicKeyInfo IssuerUniqueIdentifier SubjectUniqueIdentifier AlgorithmIdentifier Encrypted Extensions –AuthorityKeyIdentifier –SubjectKeyIdentifier –KeyUsage –CertificatePolicies –PolicyMappings –NameConstraints –...

24 X.509 Certificate Version Serial Number Signature Issuer Validity Subject Subject Public Key Info Issuer Unique ID Subject Unique ID Extensions Certificate Version (e.g. X.509_v3) Unique Identifier for the Certificate ID of the Algorithm Used to Sign the Certificate Unique Name of the Certificate Issuer Time Period of Certificate Validity Unique Name of the Certificate Owner Public Key and Algorithm ID of the Owner Optional Unique ID of the Certificate Issuer Optional Unique ID of the Certificate Owner Optional Extensions