Nicholas A. Davis DoIT Middleware September 29, 2005.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Making Digital Security a Reality With PKI Nicholas A. Davis, UW-Madison November 28, 2006.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Masud Hasan Secue VS Hushmail Project 2.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Digital Certificates Securing Communication Nicholas Davis, IS Consultant/Admin DoIT Middleware.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Digital Signatures and Digital Certificates Monil Adhikari.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
The Decision to Buy vs. Build Nicholas Davis (UW-Madison) Tom McDonnell (Geotrust)
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
PKI Implementation at the University of Wisconsin-Madison
S/MIME T ANANDHAN.
Pooja programmer,cse department
Presentation transcript:

Nicholas A. Davis DoIT Middleware September 29, 2005

Overview AuthN/Z at UW-Madison What is PKI? How can PKI be used? Why should PKI be used? Who can use PKI? Where can I get my own UW-Madison digital certificate? When can I start using PKI? Q&A session

AuthN/Z Coordinating Team Founded in 2003 Campus & DoIT collaboration Goals: 1.Develop, maintain, publish and publicize UW- Madison AuthNZ Roadmap 2.Solicit and document campus requirements for shared AuthNZ services 3.Recommend products and technologies based on an evaluation of candidates against functional and architectural requirements

Communities to be served

AuthN/Z Roadmap Implementation process: –Go to campus requirements –Release RFI and evaluate available technologies against requirements –Get approval from DoIT management to proceed with a specific, defined implementation. –Determine service implementation plan Web-ISO Service PKI Service Next in the queue: –Kerberos –Attribute delivery requirements gathering –Federated AuthN/Z

DoIT’s PKI activity 2000 September 2000 Created PKILab with CS and others 2001 IAIMS Secure Pilot Fall 2003 CA server installed in production Summer 2004 Campus Requirements Gathering and RFI 2003 – Present Pilot CA service made available to selective applications 2002 – Present Provided Digital Certs to Shibboleth Testing Community 2002 Participated in Federal Bridge Pilot Project February 2005 Presentation to DoIT CIO Office Sept End user cert Deployment

What is PKI? PKI is the acronym for Public Key Infrastructure. The PKI system ensures confidentiality, authenticity, integrity and non-repudiation of electronic data. Principles of public key cryptography and the public-private key relationship are the basis for any PKI The Infrastructure part of PKI is the underlying system needed to issue keys and certificates and to publish public information.

Confidentiality, Authenticity, Integrity, and Non-repudiation As the “wired world” progresses, we will become increasingly reliant upon electronic communication both within and outside of the UW-Madison campus network. We want to be careful to protect our online identity and confidential information. PKI can help us with this.

Confidentiality Means that the information contained in the message is kept private and only the sender and the intended recipient will be able to read it

Authenticity Verification that the people with whom we are corresponding actually are who they claim to be

Integrity Verification that the information contained in the message is not tampered with, accidentally or deliberately, during transmission

Non-repudiation There can be no denial on the part of the sender of having sent a message that is digitally signed

How does PKI accomplish all of these things? Data Encryption Digital Signature Root Authorities

Encryption refers to the conversion of a message into an unintelligible form of data, with the aim of ensuring confidentiality Decryption is the reversal of encryption; it is the process of transforming encrypted data back into an intelligible message In public key cryptography, encryption and decryption are performed with the use of a pair of public and private keys

The public and private key pair is comprised of two distinct and uniquely matched strings of numbers. The public key is available to everyone and a private key is personal and confidential, known to and maintained by the designated owner. Although related, it is computationally infeasible to derive the private key from the public key and vice-versa. When one of the keys in the key pair is used for encryption, the other key has to be used for decryption.

This relationship of public to private keys not only enables protection of data confidentiality, but also provides for the creation of a digital signature, which serves to ensure the authenticity and integrity of the message as well as its non-repudiation by the sender

Digital Signature Addresses the issues of authenticity, integrity and non-repudiation. Like its hand-written counterpart, a digital signature proves authorship of a particular message. Technically, a digital signature is derived from the content of the sender's message in combination with his private key, and can be verified by the recipient using the sender's public key to perform a verification operation.

Digital Certificates and Certificate Authorities A digital certificate is a digital document that proves the relationship between the identity of the holder of the digital certificate and the public key contained in the digital certificate. It is issued by a trusted third party called a Certificate Authority (CA.) Our digital certificate contains our public key and other attributes that can identify us.

When a person sends a digitally signed message to another person, the recipient may verify the validity of the signature via a mathematical operation, using the sender’s chained public key to verify the digital signature created by the sender.

How is a certificate issued? When a person applies for a digital certificate from a CA, the CA usually checks the person's identity and then generates the key pair on the user’s computer. Alternatively, the CA may generate the key pair for the person and deliver the private key to the person via secure means. The private key is kept by the person (stored on the person's computer or possibly on a smart card).

Encryption Example Peter wants to send Ann his super secret resume.

Encrypting an (continued) Peter encrypts using Ann’s public key Ann decrypts using her private key

Encryption (Continued) If Ann wishes to send Peter a confidential reply, she encrypts her message using Peter's public key. Peter then uses his private key to decrypt and read Ann's reply.

Digital Signature Example Ann signs the with her private key Peter verifies Ann’s signature by running an operation of the digital signature against her public key.

The UW-Madison Branded PKI Requirements gathering effort conducted in Summer/Fall 2004 Request For Information (RFI) developed by DoIT staff in Fall, Replies from commercial PKI vendors and DoIT internal staff (for Open Source solution) solicited in Fall, 2004 RFI results presentation delivered to DoIT CIO’s in Winter, 2005 Decision to proceed with a specific solution made by DoIT CIO’s Office in Spring, 2005 Contract negotiations in Summer, 2005 Pilot Rollout, Fall 2005

UW-MSN Use Cases University Health Services (Theresa Regge) –PKI alternative to firewall and VPN for UHS network Computer Sciences Department (Ian Alderman) –PKI use in grid computing Graduate School (Pat Noordsij) –NSF Fastlane grant submission

PKI System is Co-Managed The U.W.-Madison PKI is co- managed by a vendor named Geotrust, for several reasons: Time to implement was less than an in-house solution Initial implementation costs were less than in-house solution Off site key backup provides enhanced security The Geotrust Root certificate is pre- installed in 99% of all Internet browsers in use today.

Where is my Certificate Stored? You digital certificate is stored either on your machine or on a cryptographic USB hardware device Dual factor authentication

How can this certificate protect my data? You can encrypt sensitive and attachments sent to co-workers and friends. You can use Microsoft Office (Word, Excel, Powerpoint, Access) as well as other PKI enabled applications to protect data which you store on your local hard drive and on any network drive. Comply with HIPAA, FERPA, protect your privacy as well as the privacy of others who you do business with. Provide assurance to others that you are indeed who you claim to be.

Supported OS and Applications on the UW-Madison PKI Both Windows and Macintosh are supported. Macintosh users can store their certificate in encrypted form on their hard disk Windows users have the additional option of storing their certificate on a hardware token. Outlook, Outlook Express, Thunderbird, Novell Groupwise, and Mail.app are all supported packages. Microsoft Office applications are supported for encrypting and digitally signing documents, spreadsheets, etc.

What does it actually look like in practice? -Sending-

What does it actually look like in practice (unlocking my private key) -sending-

What does it actually look like in practice? -receiving- (decrypted)

Digitally signed and verified; Encrypted

What does it actually look like in practice? -receiving- (intercepted)

Summary Points Digital Signatures can: –Provide verified assurance to the recipient of your or document that you are indeed a member of the UW-Madison community –Prove that the contents of an or a document have not been altered from their original form –Provide certified proof that you did indeed send a specific or author a specific document.

Summary Points PKI based encryption allows you to: Encrypt and files for others so that they are protected end to end while in transit Maintain protection of and files in storage on your local computer hard drive, or on any network drive. Assist in complying with HIPAA, FERPA and other such government regulations.

Summary Points PKI provides official verification of your status as a current member of the UW- Madison community. It is supported in both the Windows and Macintosh environments, in popular software and Microsoft Office. PKI is available either by contacting Nicholas Davis directly (now), or by visiting the DoIT Tech Store (end of October.)

How to get started You must have a valid UW-Madison ID to become a PKI user Sign up today to have your certificate delivered to you automatically. Feel free to set up a meeting with me if you need assistance getting setup with PKI

Question and Answer Session As you seek to find the truth, don’t forget to protect your information!