Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Chapter 14
(n)Code Solutions A division of GNFC
Public Key Infrastructure (PKI)
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Public Key Management and X.509 Certificates
Report on Attribute Certificates By Ganesh Godavari.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (X509 PKI)
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Secure Communications … or, the usability of PKI.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Internet & Web Security Syrian Virtual University MWS/MWT AWS Course Prof. Dr. Moutasem Shafa’amry
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Configuring Directory Certificate Services Lesson 13.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Cryptography and Network Security Chapter 14
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
Security in ebXML Messaging
زير ساخت كليد عمومي و گواهي هويت
جايگاه گواهی ديجيتالی در ايران
CS 465 Certificates Last Updated: Oct 14, 2017.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
PKI (Public Key Infrastructure)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian

Digital Signature A Digital Signature is a data item that vouches the origin and the integrity of a Message The originator of a message uses a signing key (Private Key) to sign the The originator of a message uses a signing key (Private Key) to sign the message and send the message and its digital signature to a recipient message and send the message and its digital signature to a recipient The recipient uses a verification key (Public Key) to verify the origin of The recipient uses a verification key (Public Key) to verify the origin of the message and that it has not been tampered with while in transit the message and that it has not been tampered with while in transit IntranetExtranetInternet Alice Bob

Digital Signature Hash Function Message Signature Private Key Encryption Digest Message Decryption Public Key ExpectedDigestActualDigest Hash Function SignerReceiver Channel DigestAlgorithmDigestAlgorithm

Digital Signature There is still a problem linked to the “Real Identity” of the Signer. Why should I trust what the Sender claims to be? Moving towards PKI …

Digital Certificate

A Digital Certificate is a binding between an entity’s Public Key and one or more Attributes relating its Identity. The entity can be a Person, an Hardware Component, a Service, etc. The entity can be a Person, an Hardware Component, a Service, etc. A Digital Certificate is issued (and signed) by someone A Digital Certificate is issued (and signed) by someone A self-signed certificate usually is not very trustworthy A self-signed certificate usually is not very trustworthy -Usually the issuer is a Trusted Third Party (TTP)

CERTIFICATE Digital Certificate Issuer Subject IssuerDigitalSignature Subject Public Key

Digital Certificate How are Digital Certificates Issued? How are Digital Certificates Issued? Who is issuing them? Who is issuing them? Why should I Trust the Certificate Issuer? Why should I Trust the Certificate Issuer? How can I check if a Certificate is valid? How can I check if a Certificate is valid? How can I revoke a Certificate? How can I revoke a Certificate? Who is revoking Certificates? Who is revoking Certificates? Problems Moving towards PKI …

Public Key Infrastructure (PKI)

A Public Key Infrastructure is an Infrastructure to support and manage Public Key-based Digital Certificates

Public Key Infrastructure (PKI) “A PKI is a set of agreed-upon standards - Certificate structure - Certificate structure - Structure between multiple CAs - Methods to discover and validate Certification Paths -Operational Protocols -Management Protocols “Digital Certificates” book – Jalal Feghhi, Jalil Feghhi, Peter Williams

Public Key Infrastructure (PKI) X509 Digital Certificates standard  Standards defined by IETF, PKIX WG: … however X509 is not the only approach

X509 PKI – Technical View Basic Components: Certificate Authority (CA) Certificate Authority (CA) Registration Authority (RA) Registration Authority (RA) Certificate Distribution System Certificate Distribution System PKI enabled applications PKI enabled applications “Consumer” Side “Provider” Side

X509 PKI – Simple Model CA RA CertificationEntity Directory ApplicationService Remote RemotePersonLocalPerson Certs,CRLs Cert. Request Signed Certificate Internet

X509 PKI Certificate Authority (CA) Basic Tasks: Key Generation Key Generation Digital Certificate Generation Digital Certificate Generation Certificate Issuance and Distribution Certificate Issuance and Distribution Revocation Revocation Key Backup and Recovery System Key Backup and Recovery System Cross-Certification Cross-Certification

X509 PKI Registration Authority (RA) Basic Tasks: Registration of Certificate Information Registration of Certificate Information Face-to-Face Registration Face-to-Face Registration Remote Registration Remote Registration RevocationRevocation

X509 PKI Certificate Distribution System Provide Repository for: Digital Certificates Digital Certificates Certificate Revocation Lists (CRLs) Certificate Revocation Lists (CRLs)Typically: Special Purposes Databases Special Purposes Databases LDAP directories LDAP directories

Certificate Revocation List Revoked Certificates remain in CRL until they expire Certificate Revocation List

Certificate Revocation List (CRL) CRLs are published by CAs at well defined CRLs are published by CAs at well defined interval of time interval of time It is a responsibility of “Users” to “download” a CRL and verify if a certificate has been revoked It is a responsibility of “Users” to “download” a CRL and verify if a certificate has been revoked User application must deal with the revocation User application must deal with the revocation processes processes

Online Certificate Status Protocol (OCSP) An alternative to CRLs An alternative to CRLs IETF/PKIX standard for a real-time check if a IETF/PKIX standard for a real-time check if a certificate has been revoked/suspended certificate has been revoked/suspended Requires a high availability OCSP Server Requires a high availability OCSP Server

CRL vs OCSP Server UserCA CRL Directory Download CRL CRL User CA CRL Directory DownloadCRL Certificate IDs to be checked Answer about Certificate States OCSPServer OCSP

X509 PKI PKI-enabled Applications Functionality Required: Cryptographic functionality Cryptographic functionality Secure storage of Personal Information Secure storage of Personal Information Digital Certificate Handling Digital Certificate Handling Communication Facilities Communication Facilities

X509 PKI Trust and Legal Issues

X509 PKI Trust and Legal Issues Why should I Trust a CA? Why should I Trust a CA? How can I determine the liability of a CA? How can I determine the liability of a CA?

X509 PKI Approaches to Trust and Legal Aspects Why should I Trust a CA? Why should I Trust a CA? How can I determine the liability of a CA? How can I determine the liability of a CA? Certificate Hierarchies, Cross-Certification Certificate Policies (CP) and Certificate Practical Statement (CPS)

X509 PKI Approach to Trust Certificate Hierarchies andCross-Certification

CA RA CA RA LRA CA RA CA RA Directory Services Internet Internet CA Technology Evolution

Each entity has its own certificate (and may have more than one). The root CA’s certificate is self signed and each sub-CA is signed by its parent CA. Each CA may also issue CRLs. In particular the lowest level CAs issue CRLs frequently. End entities need to “find” a certificate path to a CA that they trust. Simple Certificate Hierarchy Root CA Sub-CAs End Entities

 Alice Bob Simple Certificate Path Alice trusts the root CA Bob sends a message to Alice Alice needs Bob’s certificate, the certificate of the CA that signed Bob’s certificate, and so on up to the root CA’s self signed certificate. Alice also needs each CRL for each CA. then Alice can verify that Bob’s certificate is valid and trusted and so verify the Bob’s signature. Trusted Root

Multiple Roots 2.Simple cross-certificate 3.Complex cross-certificate Cross-Certification and Multiple Hierarchies

Things are getting more and more complex if Hierarchies and Cross-Certifications are used X509 PKI Approach to Trust : Problems

Trusted Root 3  Cross-Certification and Path Discovery