Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

Chapter 14 – Authentication Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Computer Security Key Management. Introduction We distinguish between a session key and a interchange key ( long term key ). The session key is associated.
Computer Security Key Management
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Secure Communications … or, the usability of PKI.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Chapter 9: Key Management
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Security Standards under Review for esMD. Transaction Timeline An esMD transaction begins with the creation of some type of electronic content (e.g. X12.
Chapter 31 Network Security
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
1 Chapter 9: Key Management All algorithms we have introduced are based on one assumption: keys have been distributed. But how to do that? Key generation,
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Authentication 3: On The Internet. 2 Readings URL attacks
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Digital Signatures, Message Digest and Authentication Week-9.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Public Key Infrastructure (PKI) Chien-Chung Shen
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
Key management issues in PGP
Computer Communication & Networks
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
S/MIME T ANANDHAN.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Message Digest Cryptographic checksum One-way function Relevance
Information Security message M one-way hash fingerprint f = H(M)
PKI (Public Key Infrastructure)
Presentation transcript:

Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica Slovak republic

Matej Bel University Cascaded signatures A cascaded signature is a signature over a document and other signatures over the same document that had been issued a priori Some real applications of this structure How cascaded signatures improve efficiency of Public Key Infrastructure

Matej Bel University Terminology Public Key Infrastructure (PKI) enables to exchange data securely and privately Digital signature integrity and non-repudiation Certificate a binding, through a cryptographic digital signature, of a public key, a validity interval and/or conditions, and identity, authorization, or other information

Matej Bel University Terminology Certification Authority (CA) is a trusted third party, which issues certificates to subjects by signing it Certification Path a set of certificates that provide a chain of trust that together with the public key of the initial object in the path can be processed to obtain the final object in the path.

Matej Bel University Using of cascaded signature The models

Matej Bel University SDSI/SPKI Certificates are defined as signed objects A cascaded signature is what we get if we sign the signed object at the end of a previously signed list ( Signed: ( Object-Hash: ( SHA1: & ) ) ( Date: T11:46: ) ( Signer: ( Principal: ( Global-Name: VeriSign!!’s "Bob" )... ) ) ( Signature: &8dff4123 ) ( Signed: ) ( Object-Hash: ( SHA1: &86731b) ( Date: T07:00: ) ( Signer: ( Principal: ( Global-Name: VeriSign!!’s "Alice" )...)) ( Signature: &7830ca12 ) ) )

Matej Bel University SDSI/SPKI digital time-stamping running the correct program reconfirmation –SDSI does not have CRL - Certificate Revocation List (CRL) - a data structure that enumerates digital certificates that have been invalidated by their issuer prior –the signer can specify the reconfirmation period that is appropriate for that signature

Matej Bel University S/MIME Secure Multipurpose Internet Mail Extensions (S/MIME) is a protocol for sending secure Signing certificates are one extension in S/MIME They are useful in any environment where certificates might be transmitted with signed messages This attribute is used to thwart attacks based on falsification of certificates

Matej Bel University Security Embassy If trustworthy authority masquerades it makes it difficult for the client to prove that this has happened One solution Security Embassy SE builds electronic evidence on behalf of her owner in a remote (untrusted) domain SE received in input some signed data, performs a signature verification with the public key configured, then SE sings these data using its private key. Signed data serve for audit trail

Matej Bel University Chained protocol A delegates rights to B, which acts on D using the delegated rights A  B: where T A = A A gives rights Pr a to B, for duration limited by t a B can sent itself signed request to D, request token chaining with delegated token B  D:, where T A = A T B = B Delegation of rights B,T B A,T A

Matej Bel University Delegation of rights Nested protocol The second delegation protocol based on nested tokens The single stage delegation is exactly the same as that given in the case of chained tokens A  B: where T A = A Here is the message for a second stage delegation, from B to C B  C: > B, A> TATA B,C,Pr b,r b,t b

Matej Bel University Delegation of rights Misplaced assumptions of trust E.g. A trusts B but does not trust C in delegation. Therefore B does not pass any delegation from A to C. The delegation sequence A-B-C will not be allowed under the correct behaviour of A and B because A does not trust C and A trusts B to behave correctly (in that B will not pass any delegation from A to C). In the chained protocol, if C can get hold of tokens T A-B and T B-C from the system using say wiretapping, as these are valid delegation tokens, C can form a chain giving the appearance that the delegation chain A-B-C is in force, even when B has not actually such a delegation.

Matej Bel University Nested certificates Nested certificates are used to guarantee the integrity and correctness of the signature over a subject certificate A nested certificate is considered as a certificate for another certificate The two requirements of a nested certificate are: 1) to certify that the subject certificate content has been signed by the claimed CA and 2) to certify that the subject certificate content has not been maliciously modified

Matej Bel University Nested certificate contains: -the existing signature over the subject certificate content -the hash of its subject certificate content Subject certificate verification: the actual hash and the actual signature over the subject certificate must be compared with the ones stored in the nested certificate. Nested certificates are used to guarantee the integrity and correctness of the signature over a subject certificate. Nested certificates Nested certificateSubject certificate Content Signature of SC Hash of Content Signature Signature of SC

Matej Bel University Nested certificates Subject certificate verification method does not employ public key cryptosystem operations. Subject certificate verification is faster. A large number of nested certificates must be issued in order to have nested certificate paths in the global certificate network. But the certificates are issued only once. Preferred in many systems for which minimization of the time complexity for verifiers is more important.

Matej Bel University Conclusion The principle of cascaded signature itself is the same in all these systems. However, the purpose, for which it was created, differs A cascaded signature was created to: –a) extend and complete the information digital time stamp and confirmation of the correct program –b) confirm validity reconfirmation of signatures of authorization certificates, issuing cascaded proxies, issuing cascaded Dsig signature label, Security Embassy principle, S/MIME signing certificates and nested certificates

Matej Bel University Conclusion Implementing of the cascaded signature into infrastructure improves the efficiency of certificate verification when delegating rights among the entities, as well as when accelerating the verification process. Thank you for your attention