Digital Signatures A Brief Overview by Tim Sigmon April, 2001.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Security Management.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Digital Signatures A Brief Overview by Tim Sigmon August, 2000.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
DIGITAL SIGNATURE.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Authentication Applications
Technical Approach Chris Louden Enspier
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

Digital Signatures A Brief Overview by Tim Sigmon April, 2001

GO DUKE!

Digital Signatures u Legal concept of “signature” is very broad –any mark made with the intention of authenticating the marked document u Digital signatures are one of many types of electronic signatures u Example electronic signatures –loginid/password, PIN, card/PIN –digitized images of paper signatures –digitally captured signatures (UPS, Sears, etc.) –typed notations, e.g., “/s/ John Smith” – headers

Digital Signatures (cont’d) u “digital signature” means the result of using specific cryptographic processes u Digital signatures operate within a framework of hardware, software, policies, people, and processes called a Public Key Infrastructure (PKI) u Note: PKI also supports other security requirements; in particular, confidentiality, both during transmission (e.g., SSL) and for storage

Public Key Cryptography u First, “secret key” or symmetric cryptography –same key used for encryption and decryption –orders of magnitude faster than public key cryptography –problem: how to (securely) share the key u Public key technology solves the key exchange problem (no shared secrets!) u Public key and private key that are mathematically linked u Private key not deducible from public key u Confidentiality: one key encrypts, other decrypts u Digital signature: one key signs, other validates

Digital Signature example

Signed example u (show example of sending/receiving digitally signed using Netscape Messenger) u (uses S/MIME)

Problem: relying party needs to verify a digital signature u To do this, must have an assured copy of the signer’s public key –signer’s identity must be assured –integrity of public key must be assured u Potential options for obtaining public keys –signer personally gives their public key to relying party –relying party obtains the desired public key by other “out of band” means that they trust, e.g., transitive relationships, signing parties, etc. u But, what about strangers? what about integrity of the public key?

Public Key (or Digital) Certificates u Purpose: validate both the integrity of a public key and the identity of the owner u How: bind identifying attributes to a public key (and therefore to the holder of the corresponding private key) u Binding is done by a trusted third party, a Certification Authority, who digitally signs the certificate u It is this third party's credibility that provides "trust"

X.509 v3 Certificates u Subject’s/owner’s identifying info (e.g., name) u Subject’s/owner’s public key u Validity dates (not before, not after) u Serial number u Level of assurance u Certification Authority’s name, i.e., the issuer u Extensions u Entire certificate is digitally signed by the CA

Example Certs u (this is where I show and describe the contents of the actual certificates that were used to verify a digitally signed message)

Distribution of Certificates u since certs carry public info and are integrity- protected, they can be distributed and shared by any and all means, e.g., –distribute via floppies or other removable media –publish on web sites –distribute via (e.g., S/MIME) –directory lookups (e.g., LDAP, X.500) u distribution via directories is the ultimate solution u however, many important applications and uses of digital signatures can be implemented without the implementation or use of sophisticated directories

Certification Paths u To validate a cert containing the signer’s PK, relying party needs an assured copy of the issuing CA’s PK. CA 2  CA 1 cert containing CA 1 ’s PK (signed by CA 2 ) CA 3  CA 2 cert containing CA 2 ’s PK (signed by CA 3 ) where does this end? CA N  CA N cert containing CA N ’s PK (signed by CA N ) Note: this is a self-signed or root certificate that is trusted for reasons outside of the PKI u In general, a chain of multiple certificates that ends at a trusted root is needed CA 1  Bob cert containing Bob’s PK (signed by CA 1 ) u Example: verify Bob’s signature on a signed doc

Trust Domains u A trust domain is defined by the root (or self- signed) certificate(s) that the relying party knows and trusts (for reasons outside of the PKI) u Very Important: Root certificates are not integrity-protected since they are self-signed u Expansion of relying party’s trust domain –single top-down hierarchy (yikes!) –multiple hierarchies (Netscape/Microsoft disservice) –cross certifications (e.g., bridge certification architectures)

CA 1  Tim CA 1  CA 1 Simple Hierarchical Trust Relying Party Signed doc and CA 1  Tim e.g., or web form application Trust Domain 1) path construction CA 1  Tim CA 1  CA 1 2) path validation 3) signature verification Trust Domain CA 1  CA 1

Trust Domain Expansion u Hierarchical CA’s CA 1  CA 1 CA 1  CA 2 CA 1  CA 3 CA 2  CA 4 CA 2  CA 5 CA 5  CA 6 CA 5  EE 1 CA 2  CA 5 CA 1  CA 2 Note: relying party follows issuer chain to verify cert of EE 1 CA 5  EE 1 CA 1  CA 1  trusted ( Governor ) (UVa) (SoED) (tms) (Darden) (DGIF)

Trust Domain Expansion u Hierarchical CA’s CA 1  CA 1 CA 1  CA 2 CA 1  CA 3 CA 2  CA 4 CA 2  CA 5 CA 5  CA 6 CA 5  EE 1 Note: if CA 1 ’s private key is compromised, the entire hierarchy collapses CA A  CA A CA Z  CA Z CA C  CA C CA B  CA B... u Multiple root certificates –disservice of Microsoft and Netscape

Trust Domain Expansion (cont’d) u Cross certification –two CA’s issue certificates to each other (a cross-certificate pair), i.e., sign each other’s public keys CA A  CA A... CA B  CA B... CA A  CA B CA B  CA A CA B  EE 1 –N 2 problem if N CA’s want to cross-certify with each other

Bridge Certification Architecture u addresses the N 2 problem by providing a central cross-certification hub for a group of CA’s who wish to interoperate u each CA does one cross-certification with the bridge CA CA bridge  CA 5 CA 1  CA bridge u Certificate path processing (construction & validation) CA 5  EE 2 CA 1  CA 1  trusted

CA 1  Tim CA 2  CA 2 Digital Signature Demo in a bridge cross-certification environment Relying Party Signed form data and CA 1  Tim e.g., web form application Trust Domain 1) path construction CA 1  Tim CA 2  CA 2 BCA  CA 1 CA 2  BCA BCA  CA 2 CA 1  BCA CA 1  CA 1 Trust Domain CA 1  CA 1

CA 1  Tim CA 2  CA 2 Digital Signature Demo in a bridge cross-certification environment Relying Party Signed form data and CA 1  Tim e.g., web form application Trust Domain 1) path construction CA 1  Tim CA 2  CA 2 2) path validation 3) signature verification BCA  CA 1 CA 2  BCA BCA  CA 2 CA 1  BCA CA 2  BCA BCA  CA 1 Trust Domain CA 1  CA 1

Other Important Issues u Protection and storage of private keys –passwords or passphrases –biometrics –hardware tokens for mobility, e.g., smartcards u Binding human to the act of signing –did they see the document? –did they intend to sign? that particular document? –is the signing computer secure? u Key escrow for encryption keys but not signing keys

Other Important Issues (cont’d) u Certificate revocation –CRL (certificate revocation lists) –OCSP (online certificate status protocol) u Certificate profiles –use of extensions –identity vs. attribute certs

Where are we now? u Technologies are still evolving but are very usable u Policies and legal standing exist but still developing (e.g., need case law) –Code of Virginia, Federal law –Uniform Electronic Transactions Act u Browsers/ already contain a lot of capability u Particular uses widely taking place, e.g., SSL u Some entities making more use, e.g., DGIF, MIT u Federal government taking a leadership role u Many deployment projects are underway in both the public and private sectors

DS efforts in Virginia u Digital Signature Initiative (a COTS workgroup) pursued pilot deployments ending in Sept., 2000 u DSI final report and recommendations: u Recommissioned Digital Signature Implementation (DSI) team now pursuing the implementation of the recommendations u Looking for a number of early adopters