Real-World Problems of PKI Hierarchies Daniel Cvrček Department of Computer Science and Engineering, Brno University of Technology SPI Conference 2001,

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Symmetric Key Infrastructure Karel Masarik, Daniel Cvrcek Faculty of Information Technology Brno University of Technology
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Key Management in Cryptography
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cryptography and Network Security Chapter 14
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Authentication Applications
CS 465 Certificates Last Updated: Oct 14, 2017.
PKI (Public Key Infrastructure)
Presentation transcript:

Real-World Problems of PKI Hierarchies Daniel Cvrček Department of Computer Science and Engineering, Brno University of Technology SPI Conference 2001, Daniel Cvrček, 1/18

Media Image of Digital Signature Implicitly assumes X.509 standard Allows easy use of public key technology Secures , web access, authenticates documents Part of office packages - nothing else needed to buy Security of digital signature is 99, % Ready to use professionally (court proof) Ready to use technology with no risks SPI Conference 2001, Daniel Cvrček, 2/18

However, it is not true! SPI Conference 2001, Daniel Cvrček, 3/18

Facts and Problems The technology is very complex Commercial products are very complex - security cannot be efficiently evaluated Vendors are not able to implement the technology entirely –why to discern certificates for , web access, object-signing,... when it is all the time one certificate just slightly changing –when issued two certificates for alleged MS employees there were introduced more than twenty patches for MS software to cover that Pure software solutions do not ensure security of users’ public keys SPI Conference 2001, Daniel Cvrček, 4/18

General Classes of Problems Secure signature creation (signing) device Secure signature verification device Signer’s document viewer Signature attributes viewer Signer interaction component Signer’s authentication component Data hashing component Signer’s document composer Certificate content viewer Signed data object composer All parts have to satisfy some general level of security Following slides cover not the implementation problems but problems resulting from the very technology - X.509 SPI Conference 2001, Daniel Cvrček, 5/18

Problems of The X.509 Technology Technology the problems related to the principles on which the X.509 PKI ideas are based Administration the problems resulting from application and usage of the technology General security application of the technology seems to violate some general security requirements SPI Conference 2001, Daniel Cvrček, 6/18

Technology Problems Revocation of certificates –implicit assumption - certificate is valid –detection of secret key disclosure –time delay for certificate revocation –time delay for distribution of revoked certificates –amount of data distributed periodically by CA Secure devices –secure HW able to perform cryptographic operations and verify certificate validity and conditions for its usage SPI Conference 2001, Daniel Cvrček, 7/18

Detection of Secret Key Disclosure Very hard to detect at all Time between disclosure and detection may be in hours or days, time needed for abuse may be counted in milliseconds according to law - owner is responsible for private key usage until requesting CA to revoke appropriate certificate There is no trusted way to identify place or time of signature creation assuming digital signature as defined by the Czech Law Certificate validity is typically measured in years SPI Conference 2001, Daniel Cvrček, 8/18

Distribution of Revocation Information When implemented then CRL –one needs next CRL to be sure that the key has not been misused in the previous period On-line response protocols have worse security properties (manipulation with secret keys) CRL is not suitable for time-critical applications –time-validity of CRL is typically 24 hours –we suppose that frequently changed symmetric key may be more secure Conditional validity may be a solution –one confirms validity of a secret key when using it SPI Conference 2001, Daniel Cvrček, 9/18

Case Study relying parties verifying 10 signatures per day, 24 hour-validity of CRL, size of CRLs 10 kB. CRL - it implies load peak 35 requests per second and data connection 2.8 Mbps. Over-issued CRLs - load peak decreased, with over-issuing with period 3 hours is the peak 9.25 requests per second and data connection needed is 740 kbps. Problem: which CRL is valid? Segmented CRLs - CRL is split into several smaller ones (e.g. 1 kB); risk of necessity to download several CRLs; with a good, very good luck 280 kbps. Problem: additional processing requirements (which CRL is the correct one). On-line status protocol - the size of the response is under 1 kB but frequency is about 35 per second all the day. Problem: treatment of signature secret keys. SPI Conference 2001, Daniel Cvrček, 10/18

Secure Devices The problem is for a separate lecture –determination of the necessary security level (risk analysis?) –methodology for evaluation of the security –the process of evaluation itself –cost of secure devices Should the law specify requirements for secure usage of digital signature? Definitely yes, but how to do it? SPI Conference 2001, Daniel Cvrček, 11/18

Administration Problems Certification policies - cooperation among CAs –expressing the policy used for the certificate –ensuring fulfillment of some quality requirements –comparison of certificates from different CAs Trustfulness of trusted third parties –again, the basic problem with security evaluation Registration processes –contact between human and digital environment SPI Conference 2001, Daniel Cvrček, 12/18

Certification Policies Non-existence of a common recommendation for policy specification implies vendor solutions –how to explain policies in certificates –how to compare policies from different CAs –how to compare certificates’ quality Federal Bridge Certification Authority Initiative - already running from mid-1998 bottom-up model general model for the CAs cooperation through a bridge CA pilot projects SPI Conference 2001, Daniel Cvrček, 13/18

Registration Processes There are conflicts –one CA’s signature key vs. tens or hundreds RAs’ keys security of RAs is not the same as for CA (economic reasons) –responsibility of registration process lays fully on the registration clerk requirements for registration are higher then for police identification –security of RA is less important than security of CA however, just stupid attacker (or a very special one, e.g. competitor) would want to destroy the whole PKI structure SPI Conference 2001, Daniel Cvrček, 14/18

General Security Secret key generation holder's control / certifiably secure manner Secret key storage and backup secure / uninterrupted possession of the holder Secret key escrow - why at all? Secret key access exempt from court orders and search warrants Certification identification requirements overwhelming requirements Registers of certificates obligatory / multipurpose identification database SPI Conference 2001, Daniel Cvrček, 15/18

Alternatives Symmetric key encryption PGP - PKI with very strong users’ responsibility for the security of the scheme SPKI/SDSI –different treatment of names - subject identification –different principles for certificate revocations (positive CRL - revalidation) Private credentials allow signature verification without revealing signer identity prevent linking separate actions SPI Conference 2001, Daniel Cvrček, 16/18

Authentication of bank clients - typical identification 1:n (n clients and 1 bank) Solution 1 authentication calculator for each client allows secure authentication during bank transactions just symmetric key cryptography used - simple scheme and implementation Solution 2 public key certificates used - several visits of the bank (2 at least) symmetric and asymmetric cryptography just software solution implies lower security of the scheme Case Study SPI Conference 2001, Daniel Cvrček, 17/18

Real security is hard work. There is no cure-all, especially not PKI Ellison, Schneier SPI Conference 2001, Daniel Cvrček, 18/18