Jimmy C. Tseng Assistant Professor of Electronic Commerce

Slides:



Advertisements
Similar presentations
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1 © Cooley Godward 2001 PKI A SSESSMENT The process of evaluating, verifying, and certifying your PKI Presented by: Randy V. Sabett Vanguard Enterprise.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Network Security Essentials Chapter 4
SAFE BioPharma Association CONFIDENTIAL1 SAFE Public Key Infrastructure (PKI) 2005 EDUCAUSE/Dartmouth PKI Deployment Summit.
David L. Wasley Office of the President University of California A PKI Certificate Policy for Higher Education A Work in Progress Draft David L.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Lecture 23 Internet Authentication Applications
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
MPKI Interoperability I-D ChangeLog from -01 to -02 Jan 16, 2004 Masaki SHIMAOKA SECOM Trust.net.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Public Key Superstructure It’s PKI Jim, but not as we know it! 7 th Annual “IDtrust” Symposium 5 March 2008, Gaithersburg MD, USA Stephen Wilson Lockstep.
1 Memorandum for multi-domain PKI interoperability multidomain-pki-00.txt
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
David L. Wasley Office of the President University of California Higher Ed PKI – Draft Certificate Policy David L. Wasley University of California Common.
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
PKI Robin Burke ECT 582. Outline Discussion Review The need for PKI PKI hierarchical PKI networked PKI bridging Certificate policies rationale examples.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Update on PKI Activities in the Spanish Academic Network PKI-COORD November 26, Amsterdam.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
Evolving Issues in Electronic Data Collection Workshop Interoperability Russ Savage Electronic Transactions Liaison Arizona Secretary of State Office.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Higher Ed Bridge CA Extending Trust Across Higher Education - And Beyond David L. Wasley University of California.
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Some Technical Issues in PKI Deployment David Chadwick
PKI Policy Determination Process Input from PKI Decision Process PKI Policy Determination Process Application(s) Workflows Players.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Higher Education Bridge Certification Authority Scaleable Linking of PKI trust domains Scaleable Linking of PKI trust domains David L. Wasley Fall 2006.
TAG Presentation 18th May 2004 Paul Butler
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
PKI (Public Key Infrastructure)
Australian PKI experience
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Determining Equivalence between Certificate Policies for Purposes of Cross-Certification Jimmy C. Tseng Assistant Professor of Electronic Commerce Rotterdam School of Management Erasmus University Rotterdam Tel: +31-10-408-2854 Fax: +31-10-408-9010 Email: jtseng@fbk.eur.nl Thank you Chair and Good morning Ladies and Gentlemen. I am very glad to be here today, and listen to the National Education and Research Networks report on their PKI initiatives. The reason we are here today is presumably to discuss how to coordinate our PKI initiatives so that this community could at some point cross-certify our respective PKIs, and allow interoperation across PKI domains for specific applications. I have been investigating the issue of PKI interoperation since March 1999, and in my short presentation today, I would like to say a little about the research approach we are taking in the LSE Fiducia project, and I hope to show you some of the tools we have developed along that way, that could be useful for the TERENA community.

I. Cross-certification The certification of one CA by another in order for a verifier to construct and verify certification paths across PKI domains Construction of certification paths Level of directory support Scalability across organisations Harmonise certificate policies Trust models based on X.509v3 relies on construction and verification of certification paths. Cross-certification is almost always assumed when more than one PKI hierarchy is involved. I will quickly re-cap the various trust models in use today, taken from John Linn’s paper using the following criteria: Construction of certification paths Level of directory support (cross-certs held in LDAP server) Scalability across organisational boundaries TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

Sub-ordinated Hierarchies Top-down from Root CA Simple path construction Low directory dependency Weak scalability across organisations TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

Cross-certified meshes Pair-wise between CAs Difficult path construction High directory dependency Medium scalability across organisations TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 Hybrid model Top-down or pair-wise Multiple paths may exist, but simple path known Moderate directory dependency Medium scalability across organisations TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 Bridge CA Pairwise with Bridge CA Simple, all non-local paths traverse bridge Medium directory dependency Scaleable across organisations TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 Trust list Recognition by verifiers Simple but limited to paths that begin within the trust list Low directory dependency Fair scalability, requires intensive management TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 II. Certificate Policy CP defines “applicability of a certificate to a particular community and/or class of application with common security requirements” CP used by “certificate users to decide whether or not to trust a certificate for a particular purpose” “Any one certificate will typically declare a single certificate policy or, possibly, be issued consistent with a small number of different policies.” – RFC2527 Most PKI discussions assume single domain, or single certificate policy (policy authority) Can relying parties be expected to construct and validate certification paths? Automation through common CP and OIDs TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 Object Identifiers “A certificate policy, which needs to be recognized by both the issuer and user of a certificate, is represented in a certificate by a unique, registered Object Identifier. The registration process follows the procedures specified in ISO/IEC and ITU standards.” – RFC2527 No formal procedures, no accepted OID identifiers TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

Looking up a Certificate Policy Currently no standard means of looking up an OID How to use OIDs to represent different policy dimensions? “The party that registers the Object Identifier also publishes a textual specification of the certificate policy, for examination by certificate users.” Is the certificate user forced to revert back to the CPS? Prof. Chadwick understands How can OIDs be used if there are no common mechanisms for lookup? TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

III. PKI Interoperation Component-level Interoperation (standards) Application-level Interoperation (cross platform compatibility) Inter-domain Interoperation (harmonise certificate policies) CA A Domain A Entity A Application A CA B Domain B Entity B Application B Trust (1) (2) (3) But cross-certification is not just a matter of certificate path validation, within each cross-certified community, there is still the assumption of common certification standards and practices, hence the notion of certificate policy, and policy authority For cross-certification to work, we also need to establish ways of determining the equivalence between CP/CPS across PKI domains, hence the focus on Inter-domain interoperation. Component-level - conformance to technical standards on one platform Application-level - compatibility across platforms Inter-domain level - common security requirements and harmonised certificate policies --- We can distinguish between Technical -Platforms and formats compatible between vendor products Institutional - Policy and procedures of individual TTPs - National legal and regulatory frameworks On the one hand we have the Technical issue. Roughly speaking the issue is can my computer system accept and read your digital token? This is quintessentially a matter of technology and touches upon debates about proprietary and open systems. Fortunately a lot of work is under way on this aspect. On the other hand there is what I refer to as the Institutional aspect. This is to do with agreement about what the meaning of the certificate is . In legal, commercial and even organisational terms. More precisely it refers to those matters that allow the relying parties to assess the degree of riskiness before accepting the certificate. And the factors hinge on internal running of the TTP/CA the regulatory framework and context of the TTP/CA. TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

PKI Interdomain Interoperation Interworking of CAs across different administrative and trust domains Requires common or equivalent certificate policies (CP) and certification practices (CPS) Harmonising CP and CPS are fraught with difficulties (e.g. cross-certification, policy constraints, certificate path validation) CAs operate from different jurisdictions Technical PKI Forum - Consortium PKI Challenge (EEMA) Open Group (APKI) Institutional PAG (ABA) APEC (Asia-Pacific Economic Cooperation) Subject of the this conference TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

IV. The Fiducia Project Modelling the risks in interoperable public key infrastructures Working Together Spreading Trust Securing Value Started working on Fiducia in March 1999/ April 2000 at LSE, I joined the faculty of RSM in Sept 2000 LSE CSRC lead party, about social science approach to information security Erasmus research on EDI, e-commerce, e-auctions, collaborative commerce Academic partners funded by ESRC Commercial partners funded by DTI DLR Interclear Presideo BT Labs

Modelling Contractual Risk in PKI Relationships Modelling Business Risk in Electronic Transacting Modelling Contractual Obligations and Liability in PKI Non-legislative standards governing provision and use of PKI Subject A Subject B RP A Good and services Payment CA B CPS B CA A CPS A Goverance Structure Contractual arrangements Subscriber Agreement A Relying Party Agreement B Interoperability Agreement TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 CA Database Database of 110 public facing CAs from 33 countries in 16 languages TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 CPS Database Full-text collection of CPs and CPSs TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 Legal Analysis Legal and Semantic Analysis Clarifying Roles, Obligations and Liabilities of all parties in PKI Model Framework Legislation CPS1 CPS2 Semantic Schema - entities and rules Semantic elements Substantive rules Procedural rules Coding scheme Specification language Support for retrieval, query, and modelling CPS3 TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001 Semantic Analysis Ontology of affordances (possible behaviours) Norms (that trigger actual behaviours) State# Subject# TTP # Digital Certificate # Person# Corporate# Server# CA# RA# IA# (certificate holder) Issued to (public key) assigned pair# vets cryptographic key# (private key) (verified subject) (subscriber certificate) contains Ontology chart- which encompasses all the PKI actors and behaviour. Using our CPS database and our industrial partner (De La Rue) as resources Norms- deriving from analysis of CA regulation/electronic signature act TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001

Tools for Determining Equivalence between Certificate Policies From certificate path validation to determining certificate policy equivalence Textual database of certificate policy dimensions Specification of similarities and differences across certificate policy dimensions Basis for policy mapping and cross-certification TERENA PKI-COORD Meeting, Amsterdam, 26 Nov, 2001