Public Key Infrastructure (PKI) Chien-Chung Shen

Slides:



Advertisements
Similar presentations
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Advertisements

CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Digital.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Security Management.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Chapter 5 Digital Signatures MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Computer and Network Security - Message Digests, Kerberos, PKI –
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Private key
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Key management issues in PGP
Security Outline Encryption Algorithms Authentication Protocols
Computer Communication & Networks
Information Security message M one-way hash fingerprint f = H(M)
Digital Signatures A digital signature is a protocol that produces the same effect as a real signature: It is a mark that only the sender can make but.
Basic Network Encryption
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Message Digest Cryptographic checksum One-way function Relevance
Pooja programmer,cse department
Information Security message M one-way hash fingerprint f = H(M)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Basic Network Encryption
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Public Key Infrastructure (PKI) Chien-Chung Shen

Distribution of Public Keys The algorithms to generate a matched pair of public and private keys are publicly known, and software that does it is widely available So if Alice wanted to use a public key cipher, she could generate her own pair of public and private keys, keep the private key hidden, and publicize the public key But how can she publicize her public key—assert that the key belongs to her—in such a way that other participants can be sure the key really belongs to her?

Public Key Instrastructure (PKI) A complete scheme for certifying bindings between public keys and identities— what key belongs to who—is called a Public Key Infrastructure (PKI) A PKI starts with the ability to (1) verify identities and (2) bind identities to keys out of band By “out of band,” we mean something outside the network and the computers that comprise it, such as in the following scenarios –If Alice and Bob are individuals who know each other, then they could get together in the same room and Alice could give her public key to Bob directly, perhaps on a business card –If Bob is an organization, Alice the individual could present conventional identification, perhaps involving a photograph or fingerprints –If Alice and Bob are computers owned by the same company, then a system administrator could configure Bob with Alice’s public key

Public Key Instrastructure (PKI) Establish keys out of band does not scale, but it suffices to bootstrap a PKI Bob’s knowledge that Alice’s (public) key is k can be widely, scalably disseminated using a combination of digital signature and concept of trust –suppose you receive Bob’s public key out of band and you trust Bob on matters of keys and identities –then Bob could send you a message asserting Alice’s key is x –since you know Bob’s public key, you could authenticate this message as having come from Bob –since you trust Bob, you now know that Alice’s key is x, even you had never met her or exchange message with her –with digital signature, Bob wouldn’t even have to send you a message; he could simply create and publish a digitally signed statement that Alice’s public key is x

Bob sends digitally signed message: Alice verifies signature, integrity of digitally signed message: large message m H: Hash function H(m) digital signature (encrypt) Bob’s private key K B - + K B (H(m)) - encrypted msg digest K B (H(m)) - encrypted msg digest large message m H: Hash function H(m) digital signature (decrypt) H(m) Bob’s public key K B + equal ? Digital Signature = Signed Message Digest

Public Key Instrastructure (PKI) A digitally signed statement of a public key binding (to an identity) is called a public key certificate, or simply a certificate Bob could send Alice a copy of th certificate, or post it on website If an when someone needs to verify Alice’s public key, the could do so by getting a copy of the certificate, perhaps directly from Alice, as long as they trust Bob abd know his public key Starting from just Bob’s public key, we could build up a large set of trusted keys over time Bob plays the role of Certificate Authority (CA) VeriSign® is one well-known commercial CA

Public Key Instrastructure (PKI) X.509 is one major standard for certificate ( A certificate clearly must include –the identity of the entity being certified –the public key of the entity being certified –the identity of the signer –the digital signature –a digital signature algorithm identifier (which cryptographic hash and which cipher) Certificate creates a binding between an identity and a public key; certificate must use well-defined name space for the identities being certified, such as address or DNS domains

Certificate Authorities Trust is binary; you either trust soneone completely or not at all Together with certificates, this allows the building of chains of trust –If X certifies that a certain public key belongs to Y, and the Y goes on to certify that another pubic ket belobgs to Z, then there exists a chain of certificates from X to Z, even though X and Z may have never met –If you know X’s public key, and you trust X and Y, then you can believe the certificate that gives Z’s key –All you need is a chain of certificates, all signed by entities you trust, as long as it leads back to an entity whose key you already know.

Certificate Authorities A certification authority or certificate authority (CA) is an entity claimed (by someone) to be trustworthy for verifying identities and issuing public key certificates There are commercial CAs, governmental CAs, and even free CAs To use a CA, you must know its own key. You can learn that CA’s key, however, if you can obtain a chain of CA-signed certificates that starts with a CA whose key you already know Then you can believe any certificate signed by that new CA

View Certificates Firefox and IE come pre-equipped with certificates for a set of CAs; in effect, the brower’s producer has decided these CAs and their keys can be trustedWhen you have browsed to a website whose web address starts with https, there will be a lock icon at the beginning of the address bar. Single-click on the lock icon to get a pop-up that says who verified the certificate, then click on More Information In that window, click on Security then View Certificate