Trust calculus for PKI Roman Novotný, Milan Vereščák.

Slides:



Advertisements
Similar presentations
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Chapter 14
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
Public Key Management and X.509 Certificates
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up protocol.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 5 Network Security Protocols in Practice Part I
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Public Key Infrastructure (PKI) Chien-Chung Shen
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Chord Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber Google,
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Computer and Network Security - Message Digests, Kerberos, PKI –
Creating and Managing Digital Certificates Chapter Eleven.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Integrating Identity based Cryptosystem (IBC) with CGA in Mobile IPv6 draft-cao-mipshop-ibc-cga-00.txt Zhen Cao Hui Deng IETF #67.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
1 Distributed Hash tables. 2 Overview r Objective  A distributed lookup service  Data items are distributed among n parties  Anyone in the network.
The Chord P2P Network Some slides taken from the original presentation by the authors.
Key Management and Distribution
Key management issues in PGP
Computer and Network Security
Chapter 5 Network Security Protocols in Practice Part I
Information Security message M one-way hash fingerprint f = H(M)
The Chord P2P Network Some slides have been borrowed from the original presentation by the authors.
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Message Security, User Authentication, and Key Management
Security in ebXML Messaging
Public Key Infrastructure
DHT Routing Geometries and Chord
Information Security message M one-way hash fingerprint f = H(M)
Digital Certificates and X.509
Certificates An increasingly popular form of authentication
PKI (Public Key Infrastructure)
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Trust calculus for PKI Roman Novotný, Milan Vereščák

Outline PKI Maurer deterministic model Maurer probabilistic model Maurer PKI on P2P Roman continues with modeling in real world

Public key infrastructure (PKI) PKI – complex distributed systems of the end entities, CA, certificates, RA Public key cryptography Certificate issuance Certificate validation Certificate revocation CA – trusted third party

Public key certification Alice knows the public key of X (for verifying the certificate) and is convinced of its authenticity. Alice trusts X to be honest and to correctly authenticate the owner of a public key before signing it. Alice X (CA) Bob

Simple example If Alice does not know an authentic copy of X's public key, the first condition can be satisfied by using a certificate for X's public key issued by another entity Y. Alice Y (CA) Bob X (CA)

Maurer PKI deterministic model Requirements: Generality and expressive power. Precise Semantics. Evaluation order independence. Efficient implementation. Scalability. Easy usability.

Maurer model Special type of logic syntax: 4 formulas (statements) Semantics: 2 inference rules

Example 1

Example 2

Probablistic Maurer model True/false (trust/distrust) This model measures validity on continuos scale from 0 to 1 Every statement has assigned confidence parameter

Example

PKI based on P2P network Based on Chord: scalable p2p lookup protocol Chord p2p network consists of nodes maps given key onto a node Node identifier (e.g. IP address of node) Key (e.g. filename) Hash function maps both the key and the node identifier into m-bit identifier

Algorithm for lookup The mapping principle: each key is assigned to the first existing node whose identifier is greater than or equal to the identifier of the key. Each node has finger table with m entries pointing to m nodes Finger table of node 8Finger table of node 42 istart-idN8.finger[i]istart-idN8.finger[i] 18+1=9N =43N =10N =43N =12N =46N =16N =50N =24N =58N =40N =10N14

Searching Requires maximum LogN steps, where N is a number of nodes

Views Nodes are used for storing statements privateView: a set of private statements that are not accessible from other nodes, only local node can access them. publicView: a set of message tokens that are accessible to other nodes. Message tokens consist of encrypted message and index key associated to that particular message.

Public messages Certificate messages Cert(X, PX, Y, PY) Recommendation messages Rec(X, PX, Y, i) Private messages Authenticity statements Aut(X, PX) Trust statements Trust(X, i) Distributing is done according to p2p lookup protocol and retrieving also using a Maurer inference rules

Advantages of P2P model load distribution: Hash function distributes message tokens (public messages) uniformly among the nodes. scalability: We need Log(N) steps to retrieve or publicate a message token of the total number of N nodes. fault resistance: This is because of decentralized character of this model.

Improvement of model Binding between public keys and certification informations Time – aware model Validity template

Statements Authenticity of binding - Aut(A,X,P,I) Trust – Trust(A,X,D,I) Certificates – Cert(X,Y,P,I) Trust Transfers – Tran(X,Y,P,I) Certification Validity Templates – Val(A,C,t) Transfer Validity Templates – Val(A,T,t)

Derivation of new statements

X.509 and model Set of property – subject’s name, issuer, signature algorithm Time interval – validity – not before, not after Certification revocation list – Cert(X,0,L,I), where 0 – empty set

Thanks for your attention