Building trust on the internet Extending Attribute Protocols for Status Management and “Other Things” Patrick Richard, Xcert International.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Continuous Knowing: Know who is in your Network Freedom Drive, Suite 710, Reston, VA Phone: (703) | Web:
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
National Center for Supercomputing Applications PKI and CKM ® Scaling Study NCASSR Kick-off Meeting June 11-12, 2003 Jim Basney
Obstacles to PKI Deployment and Usage - Survey Results and Draft Action Plan Steve Hanna, Co-chair, OASIS PKI TC.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
HEBCA – Higher Education Bridge Certification Authority Presented by Scott Rea and Mark Franklin, Fed/Ed Meeting, 12/14/2005.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Josh Benaloh Brian LaMacchia Winter Side-Channel Attacks Breaking a cryptosystem is a frontal attack, but there may be easier access though a side.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate revocation list
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Symmetric Encryption Mom’sSecretApplePieRecipe Mom’sSecretApplePieRecipe The same key is used to encrypt and decrypt the data. DES is one example. Pie.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Identity in the Virtual World: Creating Virtual Certainty David L. Wasley Information Resources & Communications UC Office of the President.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Online Certificate Status Protocol ‘OCSP’ Dave Hirose July Outline: What is OCSP? Digital Signatures Certificate Revocation List Technical aspects.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Shibboleth 1.2 Technical Overview “So you thought 1.1 was complicated…” Scott Cantor The Ohio State University and Internet2 Scott Cantor.
TAG Presentation 18th May 2004 Paul Butler
TAG Presentation 18th May 2004 Paul Butler
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Building trust on the internet Extending Attribute Protocols for Status Management and “Other Things” Patrick Richard, Xcert International

Extending Attribute Protocols for Status Management and “Other Things” Company Background Size: 80+ employees Incorporated:1996 (Vancouver, BC) HQ:Walnut Creek, CA Funding:Private, backed by founder of RSA & Verisign) Key partners & customers:

Extending Attribute Protocols for Status Management and “Other Things” Agenda (40 minutes) –Conceptual History –Products in Action –Application Potential

Extending Attribute Protocols for Status Management and “Other Things” PKI Enables Risk Management PKI provides a means to reduce the risk of business-to-business and business-to- consumer internet transactions PKI enables institutions to define trust relationships that can be: –Published –Audited –Insured

Extending Attribute Protocols for Status Management and “Other Things” Digital Certificates Role in Risk Management Digital certificates are the ONLY technology to satisfy the requirements for secure transactions among trusted parties.

Extending Attribute Protocols for Status Management and “Other Things” Certificate Formats and Risk Management Digital Certificates, as they are commonly used: –contain generalized end-entity information –this is used as part of the risk mitigation process –Examples: name, address, where you work, etc..

Extending Attribute Protocols for Status Management and “Other Things” Certificate Attributes and Risk Management The collection of information carried in a Certificate is the lowest common denominator for risk-managing transactions –Sometimes too little information –Sometimes too much Normally no one cares who you are… they care about your ability to transact.

Extending Attribute Protocols for Status Management and “Other Things” What is important Are the transaction-specific bindings between the participants and their relevant attributes Example: –Joe Customer is the owner of the card –The card is still valid –The card has enough credit space for a transaction

Extending Attribute Protocols for Status Management and “Other Things” The key concept PKI is really the practice of end-entity attribute assertion and management I.e.: –CA asserts and distributes your name attribute –VA asserts and distributes your status attribute –AA asserts and distributes your credit attribute

Extending Attribute Protocols for Status Management and “Other Things” Attribute Management Protocols A good, generalized and scaleable attribute management protocol can be the basis for a highly efficient and effective PKI Eliminates re-inventing the wheel, solves scaleability problems Relevant elements of the transaction are transmitted, nothing else

Extending Attribute Protocols for Status Management and “Other Things” Effective Attribute Management Protocol Characteristics Ability to serve signed attributes Ability to generate static collections of signed attributes Ability to serve dynamic collections of signed attributes Ability to deal with cacheing and freshness

Extending Attribute Protocols for Status Management and “Other Things” Real World Example: Certificate Status Management Most OCSP implementations rely upon CRLs (I.e. they proxy CRLs) Certificate Status is really just an attribute of the certificate being queried

Extending Attribute Protocols for Status Management and “Other Things” Status Management in an Attribute-driven model Relating the current semantics against the model: –CRL : static collection of status attributes –Online query : signed response of status attribute –OCSP : standard protocol front-end on CRL/online query

Extending Attribute Protocols for Status Management and “Other Things” Technical Benefits A singular protocol and method for resolving identity and attribute bindings Works online and off-line Can be applied to multiple attributes, not just status Is 100% backwards compatible Provides infinite design flexibility

Extending Attribute Protocols for Status Management and “Other Things” Business Benefits Most implementations hit a “Chinese Wall” when they attempt to scale Only cost effective way to scale Customers with 100,000 + users on 1.x products (circa 1997), also Powers Public CAs Provides business opportunities for Attribute Assertion Providers

Extending Attribute Protocols for Status Management and “Other Things” Current Real World Applications Pseudo-anonymous certificates High-assurance web transactions Value-based dynamic assertions Rollover and Revocation simplified Single certificate, many models (I.e. GUC)

Extending Attribute Protocols for Status Management and “Other Things” PKI Elements

Extending Attribute Protocols for Status Management and “Other Things” Future Implications Natural evolution is to Index attribute databases from certificates Truly Internet-wide certificates should ideally have minimized content Businesses are arising that focus exclusively on attribute management

Extending Attribute Protocols for Status Management and “Other Things” Conclusion A comprehensive attribute management system can provide the backbone for a global deployment of PKI Common PKI problems can be easily resolved through the use of attribute management Primary obstacles today are not technical, but rather philosophical