CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.4 Public Key Infrastructure (PKI) Acknowledgment: Slides revised from.
Advertisements

Chapter 14 – Authentication Applications
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.
COEN 350 Public Key Infrastructure. PKI Task: Securely distribute public keys. Certificates. Repository for retrieving certificates. Method for revoking.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Report on Attribute Certificates By Ganesh Godavari.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 15 Jonathan Katz.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Computer Science Public Key Management Lecture 5.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Configuring Directory Certificate Services Lesson 13.
Certificate revocation list
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Infrastructure (PKI) Chien-Chung Shen
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Using Public Key Cryptography Key management and public key infrastructures.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
Key management issues in PGP
IT443 – Network Security Administration Instructor: Bo Sheng
CS 465 Certificates Last Updated: Oct 14, 2017.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz

PKI and certificate authorities

“Public-key infrastructure” (PKI)  In our discussion of public-key crypto, we have assumed users know each others’ public keys  But how can public keys be reliably distributed? –Download from web page: insecure against man-in-the- middle attack –Can be obtained from CD-ROM or in person, but this is impractical in general  One solution: bootstrap new public keys from public keys you already know! –Certificates vouch for binding of public keys to names

PKI components  Certificates –(Means for obtaining/retrieving certificates) –(Trust model/method for using certificates)  “Trust anchors”/CAs –(Naming conventions; authentication policy)  Revocation

Certificates  One party can vouch for the public key of another  Cert(A  B) = Sign SKA (“B”, PK B, info) –“info” can include expiration time, restrictions, etc.  Can view this as a directed edge in a graph:  If you know A’s public key (and trust its certification), you can learn B’s public key A/PK A B/PK B

Transitivity/“certificate chains”  Can learn keys via multiple hops:  Semantics are slightly different here: you may trust A to certify B, but do you trust A to certify that B can certify others? PK A PK B PK C Cert(A  B) Cert(B  C)

Transitivity  Can also infer trust from multiple (disjoint?) paths to the same public key for the same identity –Edges may also have weights indicating level of trust –A difficult problem in general PK A PK B PK C PK D PK E Public keys already known

Obtaining certificates  How does B get a certificate on its public key?  For best security, done in some out-of-band manner –E.g., B shows a physical ID along with a USB stick containing its public key  Other mechanisms possible –E.g., via (under certain assumptions on reliability of )

Retrieving certificates  How does A retrieve certificates for B? –“Trust anchors” = set of public keys already known to A (and trusted to certify others)  Some possibilities: –B “collects” certificate(s) for itself, sends them all when starting a connection –A finds certificates/certificate chains beginning at its own trust anchors and terminating at B –A tells B its trust anchors; B (finds and) sends certificates or certificate chains beginning at those trust anchors and terminating at itself

Trust anchors?  Who are A’s trust anchors?  Two main possibilities: –Certificate authorities –“Web of trust”

CAs and certificates  A certificate authority (CA) is a widely used trust anchor  CA authentication policy determines the level of authentication needed to identify the principal before the certificate is issued  CA issuance policy describes the principals to whom the CA will issue certificates  A single entity can “act” as multiple CAs, each with their own policies… –Use distinct public keys (with different security)

Example: Verisign  Multiple levels of authentication –Verification of valid address –Verification of name/address –Background check  Different authentication policies with the same issuance policy (i.e., individuals)  Another issuance policy for issuing certificates to corporations

Trust  How much to trust a particular certificate?  Based on: –CA authentication policy –Rigor with which policy is followed –Security of CA’s secret key –…  In practice (for most people), all CAs trusted equally

Naming  Identifiers correspond to principals –Must uniquely identify the principal –(Real) names alone are not enough! Need disambiguation  A principal may have multiple identifiers –Depending on that principal’s roles –E.g., work/personal

Monopoly model  A single CA certifies everyone  Drawbacks –Single point of failure –Not very convenient –Complete monopoly…  Monopoly model does not scale to the Internet, but may be used within a single organization

Monopoly + RAs…  The CA can appoint registration authorities (RAs)  RAs check identities and vouch for keys, but the CA does all actual signing –More convenient –Not necessarily more secure (possibly less)  RAs can be integrated into other models as well

Monopoly + delegated CAs  CA can issue certificates to other CAs –Vouch for their key and their trustworthiness as a CA –Delegated CA can sign certificates itself  Users must now obtain a certificate chain  Delegation can be incorporated into other models as well

Oligarchy  Multiple trust anchors –E.g., multiple keys pre-configured in software –User can add/remove trust anchors  Issues: –Security can reduce to least secure trust anchor –Who says the user trusts the trust anchors? –Can users be tricked into using “bad” trust anchors? –Can public keys of “good” trust anchors be changed in the software?

“Web of trust” model  Users responsible for defining the trust anchors they want to use –E.g., their friends; people they met in person (“key- signing parties”)  Drawbacks –Scalability/usability? –How much trust to place in a certificate chain

PKI in the real world  PKI is implemented in modern web browsers –Firefox: Tools →Options→Advanced →Encryption –IE/Chrome (via Windows): Windows XP: Start →Run →”certmgr.msc” Windows Vista and later: Start →”certmgr.msc” –“Trust” is only as good as your trust anchors Do you know who your trust anchors are?  “Web of trust” model –PGP keyserver (

Revocation  Revocation is a key component of a PKI –Secret keys stolen/compromised, user leaves organization, etc.  This is in addition to expiration dates included in certificates –Certificate might need to be revoked before expiration date  Why use expiration dates at all? –Expiration dates improve efficiency –Revocation may not be implemented

Cert. revocation lists (CRLs)  CA issues signed list of (un-expired) revoked certificates –Must be updated and released periodically –Must include timestamp –Verifier must obtain most recent CRL before verifying a certificate  Using “delta CRLs” improves efficiency

OLRS (“On-line revocation server”)  Also known as OCSP (“Online Certificate Status Protocol”)  Verifier queries an OLRS to find out if a certificate is still valid –OLRS somewhat mitigates advantages of having a public-key model in the first place –But OLRS is not as security sensitive as a KDC/CA, and certs can be used even if OLRS is unavailable  If OLRS has its own key, it can certify for a user that the user’s certificate is valid at a certain time

Self revocation  Sign a message revoking your own public key; send to the CA who issued your certificate  This is how revocation is done in the web-of-trust model –Deposit revocation into keyserver

Revocation in practice (2011)  Browsers (or users) tend to ignore a failure to obtain a current CRL/connect to an OLRS  Google Chrome disabling revocation checks –Instead, pushing CRLs into software updates

Midterm review  A:  B:  C:  D/F: < 50  Re-grade policy: –Submit brief write-up of what question(s) should be re- graded, and why –I will re-grade the entire exam