PKI Robin Burke ECT 582. Outline Discussion Review The need for PKI PKI hierarchical PKI networked PKI bridging Certificate policies rationale examples.

Slides:



Advertisements
Similar presentations
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Public Key Infrastructure (PKI)
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Unit 1: Protection and Security for Grid Computing Part 2
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Update on PKI Activities in the Spanish Academic Network PKI-COORD November 26, Amsterdam.
CSE 543 Computer Security: Risks of PKI - Josh Schiffman & Archana Viswanath Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Jimmy C. Tseng Assistant Professor of Electronic Commerce
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
Public Key Infrastructure (PKI) Chien-Chung Shen
DIGITAL SIGNATURE.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Using Public Key Cryptography Key management and public key infrastructures.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
TAG Presentation 18th May 2004 Paul Butler
Presentation transcript:

PKI Robin Burke ECT 582

Outline Discussion Review The need for PKI PKI hierarchical PKI networked PKI bridging Certificate policies rationale examples X.509 implementation

Review Private key cryptography shared secrets Public key cryptography proving identity Public key certificates trusting a certificate

Certificate trust Bob has a certificate signed by T saying that k is Alice's public key What does Bob need to convince him to trust T? Proof that the signature on the certificate was made by T Proof that T is not a front for Eve, or Proof that T is a trustworthy organization Proof that T's standard of proof for Alice's identity is appropriate

Hand-waving The CA's public key is "well-known" Why doesn't this work? Too many CAs Different public keys for different purposes How are keys published? New assumption Every user has their own certificate Every user has a relationship with some CA

Certification paths Basic idea root CA non-root CAs Really we mean root certificate non-root certificates signed by root or some other CA Certification path A path through hierarchy to a root CA

Path validation Certificate path is not included with the certificate just the signature of the issuing CA Path validation requires a directory where each link of the path can be retrieved Path validation is not just putting all the links together Inefficient path validation is the enemy of PKI

Path validation issues Verifying the digital signature and checking basic constraints Checking that the subject of every certificate is the issuer of the next certificate Checking the validity periods Checking that each certificate has not been revoked Checking the required certificate policies Checking name constraints

New problem How to organize multiple certification authorities? How to manage public keys/certificates on a large scale? Not just a technical problem legal changes business practice changes

Public key infrastructure A system of public key encryption using digital certificates from Certificate Authorities and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. - FOLDOC

Hierarchical PKI Simplest case All certification paths start from the root CA Everyone absolutely trusts the top CA uses it as root CA Advantages Good scalability Easy to find certification path Unique certificate path for any end entity CA restrictions established by root Disadvantage: For commercial world, hard to identify a top CA A single point of failure

Example: Verisign

Forest (multi-root) PKI

How to manage? Combine hierarchical CA relationship, or peer-to-peer Multiple trust points

Hierarchical combination Back to hierarchical PKI Either Add a new master root Select one existing root as master

Combination

Problem Back to hierarchy

Peer-to-peer mesh CA CAs certify each other

Advantages Easy to establish Users don't have to change their trust relationships Resilient Compromise of one CA can't destroy network Other CA's revoke certificates

Disadvantages Certification paths difficult to compute possible loops, dead-ends could be as long as the number of CAs in mesh No controlling CA restrictions hard to establish / enforce

Multiple trust points Don't join trust hierarchies Accept multiple trusted entities Who makes this decision? user / administrator How is it accomplished? direct trust relationship cross-certification

Multi-rooted PKI

User-controlled direct IE model Multiple root certificates available To add a new one user must choose to trust or not Problem can the user make adequate trust decisions?

User-controlled cross- certification Lotus Notes model User acts as a mini-CA each trusted certificate signed by user Converts forest back to hierarchy Again, user has to make trust decisions

Domain-controlled SAP model As above but with an administrator installs trusted certificates, or acts as local CA Problem administrative overhead eventually enterprise is doing its own PKI

Multi-rooted Advantages Each CA forms a hierarchy Easy to add new hierarchies Disadvantages Not scalable Too many trust decisions

PGP Accepts X.509 certificates Also, has alternative to CA "web of trust" Model local key ring trust individuals as introducers levels of trust trusted untrusted case-by-case marginal multiple marginal introducers = 1 trusted

Advantages Simplicity Every user his own CA Free No contracts to sign Counter-cultural Multiple signers independent confirmation of identity

Disadvantages Certification standards Counter-cultural End user responsibility Technical Multiple signatures not part of X.509

Bridge CA Establish a CA just for the bridging function BCA establishes bi-directional trust with the root of each hierarchy cross-signed certificates

Bridge PKI

Advantages Doesn't matter what type of PKI are joining hierarchies can join with meshes Doesn't establish a new hierarchy with attendant political issues Bridge is not a single point of failure if bridge is compromised, joining CAs revoke their certification bridging must be restablished, but CAs still function independently Bridge adds only minimally to the certification path p1 + p2 + 2 hard to see how to do better

Disadvantages New entity (BCA) must be established sufficiently trusted by root CAs

Example Federal Bridge Certification Authority Original plan hierarchical CA infighting about who would control the root Meanwhile federal agencies developed separate PKIs need to integrate Development of Bridge CA (2003) now different agencies can communicate securely

Break

Trusted Third Party The CA is a trusted third party How do we come to trust the CA? published practices how the business operates independent audit fourth party verification of conformance statement of liability assumption of liability for non- performance

CPS "Certification Practice Statement" Documentation of internal practices used in CA Many dimensions technical personnel insurance procedures Example on line

Certificate policy CPS usually sets forth different types of certificates conditions under which those certificates will be issued relevant certificate policy IDs X.509 OID pertinent extensions

Certificate Policies Requirements for various secure transactions usually community-defined Different CAs may issue certificates in accordance with the policy Application software can recognize a key appropriate for a particular task

Examples Procurement Under $100 Under $5000, etc. Inter-library loan General loan Reference/Periodical Music Low-quality download High-quality download

Components of policy key usage security level

Key Usage signature non-repudiation key encipherment data encipherment key agreement certificate signing CRL signing

Security level Two factors how secure the private key is how thoroughly the identity of the holder is verified

Levels of Assurance Test interoperability testing between the FBCA and Principal CAs. Rudimentary lowest degree of assurance concerning identity of the individual. Data integrity only Risk low No for authentication, confidentiality Basic basic level of assurance Risk low May be used to secure private information Medium Transactions having substantial monetary value or risk of fraud Access to private information where likelihood of malicious access is substantial High Consequence of failure are high, or risk is high High-value transactions -- FBCA

Documentation standards Test None Rudimentary address only Basic in-person appearance or data comparison against trusted DB or attestation of authorized agent Medium in-person appearance information shall be verified pre-existing relationship may suffice (employee documents) one Federal Gov't issue photo ID (passport/green card), or State photo ID (drivers license) plus one other form of ID High same as Medium but in-person appearance required

Key protection standards Test, Rudimentary, Basic software OK Medium hardware preferred High hardware only tamper-evident hardware preferred

X.509 Implementation A policy has a OID Book example: {joint-iso-itu-t (2) country (16) us (840) organization (1) sharons (15678) policies (4) general- use (2)} A policy is either critical or not critical

Examples Certificate profile outline of certificate contents Certificate Data format

Midterm take-home due 9 pm 2/4 no class

Midterm, cont'd 3 questions Signature protocol Attacks Infrastructure