Public Key Infrastructure and Applications

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Isiah Collins. mathematical scheme for demonstrating the authenticity of a digital message or document. (Wiki) A way to protect important documents sent.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Principles of Information Security, 2nd edition1 Cryptography.
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Encryption Methods By: Michael A. Scott
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Public Key Infrastructure Ammar Hasayen ….
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
James Higdon, Sameer Sherwani
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
DIGITAL SIGNATURE.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Network Security Celia Li Computer Science and Engineering York University.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
RSA Laboratories’ PKCS Series - a Tutorial
Unit 3 Section 6.4: Internet Security
Public Key Infrastructure and Applications
e-Health Platform End 2 End encryption
Chapter 8 Network Security.
S/MIME T ANANDHAN.
IS3230 Access Security Unit 9 PKI and Encryption
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Pooja programmer,cse department
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
e-Security Solutions Penki Kontinentai Vladas Lapinskas
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

Public Key Infrastructure and Applications

Agenda PKI Overview Digital Signatures Digital Certificates What is it? How does it work? Digital Certificates Public Key Infrastructure PKI Components Policies Internet Security Web Security with SSL Smart Cards Email signing – S/MIME

What’s the problem? Information over the Internet is Free, Available, Unencrypted, and Untrusted. Not desirable for many Applications Electronic Commerce Software Products Financial Services Corporate Data Healthcare Subscriptions Legal Information

Multiple Security Issues Privacy Authentication Interception Spoofing Integrity Non-repudiation Modification Proof of parties involved

Security Algorithms Symmetric Algorithms Public Key Algorithms Triple-DES, DES, CAST, RC2, IDEA Public Key Algorithms RSA, DSA, Diffie-Hellman, Elliptic Curve Hashing Algorithms SHA-1, MD5, RIPEMD

Symmetric Key Encryption If any one’s key is compromised, all keys need to be replaced Not practical or cost effective for Internet environments INTERNET

Public Key Cryptography Public-Key Cryptography is an encryption scheme that uses mathematically related, but not identical keys. Each user has a key pair (public key/private key). Public Encryption Original Document Encrypted Private Decryption Sender Receiver Information encrypted with the public key can only be decrypted using the private key.

What is a Digital Signature ? A Digital Signature is the result of encrypting the Hash of the data to be exchanged. A Hash (or Message Digest) is the process of mathematically reducing a data stream down to a fixed length field. The Hash uniquely represents the original data. The probability of producing the same Hash with two sets of different data is <.001%. Signature Process is opposite to Encryption Process Private Key is used to Sign (encrypt) Data Public Key is used to verify (decrypt) Signature

Digital Signature Process Data Hash Encrypt Digital Signature Private Step 1. Step 2. Step 3. Public Step 1. Hash (digest) the data using one of the supported Hashing algorithms, e.g., MD2, MD5, or SHA-1. Step 2. Encrypt the hashed data using the sender’s private key. Step 3. Append the signature (and a copy of the sender’s public key) to the end of the data that was signed.

Signature Verification Process Data Hash Decrypt Digital Signature Public Key Step 2. Step 3. Step 1. Step 1. Hash the original data using the same hashing algorithm. Step 2. Decrypt the digital signature using the sender’s public key. All digital signatures contain a copy of the signer’s public key. Step 3. Compare the results of the hashing and the decryption. If the values match then the signature is verified. If the values do not match, then the data or signature was probably modified in transit.

The Critical Questions How can the recipient know with certainty the sender’s public key? (to validate a digital signature) How can the sender know with certainty the recipient’s public key? (to send an encrypted message)

Digital Certificates ~~~~ Digital Signature Before two parties exchange data using Public Key cryptography, each wants to be sure that the other party is authenticated Before B accepts a message with A’s Digital Signature, B wants to be sure that the public key belongs to A and not to someone masquerading as A on an open network One way to be sure, is to use a trusted third party to authenticate that the public key belongs to A. Such a party is known as a Certification Authority (CA) Once A has provided proof of identity, the Certification Authority creates a message containing A’s name and public key. This message is known as a Digital Certificate.

Digital Certificates A Digital Certificate is simply an X.509 defined data structure with a Digital Signature. The data represents who owns the certificate, who signed the certificate, and other relevant information When the signature is generated by a Certification Authority (CA), the signature can be viewed as trusted. Since the data is signed, it can not be altered without detection. Extensions can be used to tailor certificates to meet the needs of end applications. Version # Serial # Signature Algorithm Issuer Name Validity Period Subject Name Subject Public Key Issuer Unique ID Subject Unique ID Extensions Digital Signature X.509 Certificate CA Authorized

Certificate Life Cycle Key pair generated Certificate issued Key pair in use Private key compromised Certificate revoked Certificate expires Key pair lifetime exceeded? New key pair generated Re-certify

Certificate Revocation Lists CA periodically publishes a data structure called a certificate revocation list (CRL). Described in X.509 standard. Each revoked certificate is identified in a CRL by its serial number. CRL might be distributed by posting at known Web URL or from CA’s own X.500 directory entry.

PKI Players Registration Authority (RA) to identity proof users Certification Authorities (CA) to issue certificates and CRL’s Repositories (publicly available databases) to hold certificates and CRLs

Certification Authority (CA) Trusted (Third) Party Enrolls and Validates Subscribers Issues and Manages Certificates Manages Revocation and Renewal of Certificates Establishes Policies & Procedures What’s Important Operational Experience High Assurance Security Architecture Scalability Flexibility Interoperability Trustworthiness Certification Authority = Basis of Trust

Registration Authority (RA) Enrolling, de-enrolling, and approving or rejecting requested changes to the certificate attributes of subscribers. Validating certificate applications. Authorizing requests for key-pair or certificate generation and requests for the recovery of backed-up keys. Accepting and authorizing requests for certificate revocation or suspension. Physically distributing personal tokens to and recovering obsolete tokens from people authorized to hold and use them.

Certificate Policy (CP) is … the basis for trust between unrelated entities not a formal “contract” (but implied) a framework that both informs and constrains a PKI implementation a statement of what a certificate means a set of rules for certificate holders a way of giving advice to Relying Parties

Certification Authorities Public Key Security Services Public Key Technology Digital Certificates Certification Authorities Security Management Technology Infrastructure PRIVACY AUTHENTICATION INTEGRITY NON-REPUDIATION Public Key Technology Best Suited to Solve Business Needs Infrastructure = Certification Authorities

Authentication/Access Control Can Public Key Technology be used to perform Authentication and Access Control? Sure Can How? Digital Signature Using Digital Signatures and Digital Certificates

SSL Protocol Secure Socket Layer (SSL) is a Network Layer protocol used to secure data on TCP/IP networks. Secure Socket Layer Application and so on ….. HTTP TCP/IP Layer Network Layer FTP NNTP

SSL 2.0 Protocol SSL 2.0 provides encryption between the server and the browser. Browser Connects to Secure Server CertS {SessKeyB } CertS {Data} SessKeyB Browser verifies signature on CertS Browser generates session key (SessKeyB) Browser encrypts SessKeyB using CertS Server sends copy of Server certificate (CertS) to Browser, indicating that SSL 2.0 is enabled Server decrypts SessKeyB using it’s private key Browser and Server use SessKeyB to encrypt all data exchanged over the Internet

SSL 3.0 with Client Authentication Browser Connects to Secure Server CertS - SSL 3.0 {SessKeyB } CertS + CertB {Data} SessKeyB Browser verifies signature on CertS Browser generates session key (SessKeyB) Browser encrypts SessKeyB using CertS Browser asks operator to select a Browser certificate (CertB) to access server Server sends copy of Server certificate (CertS) to Browser, indicating that SSL 3.0 is enabled with client authentication Server verifies signature on CertB (Server can check other information as well) Server decrypts SessKeyB using it’s private key Browser and Server use SessKeyB to encrypt all data exchanged over the Internet

Smart Cards Microprocessor with memory that can generate and store keys and certificates Different form factors and interface mechanisms Cryptographic functions using private key are processed on the card itself

Smart Cards and PKI Smart cards are «certificate wallets» Secure storage for: Owner private key Smart Cards are a «PC-in-your-Pocket» Generation of owner’s digital signature Smart cards provide: Mobility Security Transparency

Digital ID Asymmetric key-pair public key private key X.509 certificate ISO standard credentials

Smart card application example: Digital Signature

Smart card in heterogeneous environments Smart cards need readers and drivers Readers desktop or embedded (keyboard, floppy slot) optional display and keypad PC world ready for installation Mac, Unix & Linux ‘waiting’ for USB Drivers PC/SC standard for Windows PC custom developments

Pay-TV, did you know it’s PKI ? Pay-TV systems installed worldwide 22 millions customers pay-per-view electronic purse Internet Managed and secured with a very high proprietary secured PKI solution based on a smartcard

Signed and Encrypted Email – S/MIME S/MIME – Secure Multipurpose Internet Mail Extensions Prevent email spoofing Helps preventing forged email Helps preventing spam Protect sensitive messages & documents Secure business processes Signed messages S/MIME-based applications

Using PKI Certificates in Outlook (1)   Open Outlook. Select Tools from the main menu then choose Options from the drop-down menu.

Using PKI Certificates in Outlook (2)   Click on the Security tab.

Using PKI Certificates in Outlook (3)   Click the Settings button.

Using PKI Certificates in Outlook (4)   In the Security Settings Name field, enter a name for the new Security Setting . Type S/MIME in the Secure Message Format field. Click the Choose button next to the Signing Certificate field.

Using PKI Certificates in Outlook (5)   Click on the certificate issued by C3 Mail CA. This is your Email Signing certificate. Click OK.

Using PKI Certificates in Outlook (6)   Choose SHA1 from the Hash Algorithm drop down menu. Click on the Choose button next to the Encryption Certificate field.

Using PKI Certificates in Outlook (7)   Click on the certificate issued by C3 Mail CA. This is your Email Encryption certificate. Click OK.

Using PKI Certificates in Outlook (8)   Choose 3DES from the Encryption Certificate drop down box. Check all 3 boxes in the Change Security Settings window. Click OK.

Using PKI Certificates in Outlook (9)   Click the Apply button then click OK.

Questions?