Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Cryptography and Network Security Chapter 14
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Public Key Management Brent Waters. Page 2 Last Time  Saw multiple one-way function candidates for sigs. OWP (AES) Discrete Log Trapdoor Permutation.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Certification asynchrone à grande échelle avec des arbres de vérification de certificats Josep Domingo-Ferrer Universitat Rovira i Virgili
Configuring Directory Certificate Services Lesson 13.
1 Chapter 9: Key Management All algorithms we have introduced are based on one assumption: keys have been distributed. But how to do that? Key generation,
Networks Management and Security Lecture 3.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Cryptography and Network Security Chapter 14
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Private key
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
Key management issues in PGP
Information Security message M one-way hash fingerprint f = H(M)
Josep Domingo-Ferrer Universitat Rovira i Virgili
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
جايگاه گواهی ديجيتالی در ايران
Information Security message M one-way hash fingerprint f = H(M)
Digital Certificates and X.509
CS 465 Certificates Last Updated: Oct 14, 2017.
Presentation transcript:

Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell Labs, Lucent Technologies, Irene Gassko, Bell Labs, Lucent Technologies, and Peter S. Gemmell, University of New Mexico

Network Communication Man in the Middle Listen to messages Modify messages Forge messages can

Public Key Infrastructure (PKI) Each party has an associated key pair: one public and one private Private keys are not divulged Public keys are published Infrastructure enables both encryption and digital signatures (to thwart man in the middle) Problem: public key spoofing by the man in the middle

PKI Bootstrapping Problem A spoofed public key can render an otherwise secure communication insecure Problem: need a way to guarantee that a public key actually belongs to a specific individual Answer: trusted authorities who sign public keys

Certificate Authorities Certificate - a digitally signed document binding an ID to a public key Certificate Authority - a trusted third party who signs certificates CA public key must be known to verify certificates Certificate directory lists all ID’s and corresponding certificates

Problem of Certificate Revocation Private keys may be stolen before a certificate expires Digital signatures can’t be undone (on the certificate in question) CA must issue a signed revocation statement, invalidating the certificate in question CA must also issue a new signed certificate to the party in question

Existing Revocation Solutions Existing solutions –X.509 Certificate Revocation Lists (CRL) –SDSI (online reconfirmation) – Valicert - Certificate Revocation Trees (CRT) Notice: certificates are not very valuable in these schemes

EFECT Revocation Solution All certificates reissued each day –Infeasible with current schemes which have a signature on each certificate –Possible with EFECT because CA does one signature each day for all certificates Use hashing instead of normal signing/verifying (10,000 times faster) The trick is the data structure: Certificate Verification Tree (a Merkle tree) No revocation!

9 Certificate Verification Tree h7=h(h5,h6) h5=h(h1,h2) h6=h(h3,h4) h1=h(h(cert1),h(cert2)) h2=h(h(cert3),h(cert4))h4=h(h(cert7),h(cert8)) h3=h(h(cert5),h(cert6)) cert1 cert2cert3cert4cert8cert7cert6cert5 Root (RV)= hash+infoSigned by CA

EFECT for Credit Cards One signature per day for CA One signature verification per day per CA for vendor Offline shopping using a smartcard (store hashes from the tree path; smaller than signatures) Better security than current schemes and no online revocation checks

More EFECT Advantages One signature allows better security (threshold signatures, larger keys, etc.) Fewer signatures for cryptanalysis (one a day) No isolated forgeries Efficient recovery from compromise of CA keys Archival storage Atomic Certificates Truly untrusted certificate directories

No Isolated Forgeries In current schemes, isolated forgeries can go undetected With EFECT, forgery is detectable by anyone using the system

Efficient Recovery from CA Key Compromise Notify interested parties about compromise and supply new key out of band (NY Times) Sign root hash of the day with the new key Go drink coffee

Non-repudiation and Archival Storage CA keys can become too short with time CA keys can be stolen Signature algorithms may eventually be broken Solution Archive old roots and resign them with new keys Keep path at signature time with the document Directories archive old tree roots

Atomic Certificates Users may not want each peer to see entire certificate Suggested solution: Atomic Certificates (PKIX draft) Problem: too many signatures with old schemes (smartcard constraint) EFECT: one signature fits all

Truly Untrusted Directories Current PKI schemes distribute certificate directories beyond the CA Creates a trust problem Directories may lie (bribery possible) EFECT directories can prove non-existence of certificates, so we need not trust them

Implementing EFECT Certificate Verification Tree –implemented the B+tree in C++ for maximum speed –used openSSL to overlay the hashes on the B+tree, creating a Merkle tree Client Software –implemented a cross-platform GUI in Java –allows the user to get certificates from any networked directory and save/restore them to/from the local hard drive

Implementing EFECT Certificate Directory Server –holds the CVT and allows clients to query for individual certificates –designed a simple query protocol (EQP) to be spoken between the client software and the directory server –implemented the Directory Server in C speaks EQP over TCP connections single threaded, but handles multiple simultaneous queries

Optimizing EFECT Order of the B+tree (k) –determines the branching factor of the tree –determines the size of the certificate paths –determines the lookup speed Math shows that smallest paths occur when k = 2 Experimental trials show that queries are fastest when k = 4 Some tradeoff between space and speed

EFECT Conclusions EFECT allows one to obtain both a certificate and its validity simultaneously Efficient recovery from CA key compromise More protection for CA keys Archiving and non-repudiation made easy More certificates on a smartcard Other useful properties