Security fundamentals Topic 5 Using a Public Key Infrastructure.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
(n)Code Solutions A division of GNFC
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
COMP3123 Internet Security Richard Henson University of Worcester October 2010.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Chapter 11: Active Directory Certificate Services
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Security+ Guide to Network Security Fundamentals, Fourth Edition
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Configuring Active Directory Certificate Services Lesson 13.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
CSCI 6962: Server-side Design and Programming
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Unit 1: Protection and Security for Grid Computing Part 2
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
06 APPLYING CRYPTOGRAPHY
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Building Security into Your System Bill Major Gregory Ponto.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Public Key Infrastructure (PKI) Chien-Chung Shen
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Digital Signatures and Digital Certificates Monil Adhikari.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key management issues in PGP
Security Outline Encryption Algorithms Authentication Protocols
Message Digest Cryptographic checksum One-way function Relevance
Lecture 4 - Cryptography
Presentation transcript:

Security fundamentals Topic 5 Using a Public Key Infrastructure

Agenda Certificates Key distribution Certificate lifecycle Trust models Applications of PKI

Public Key Infrastructure basics Public key encryption depends on key pairs – public key and private key Public key is available to others to encrypt and decrypt messages When others encrypt messages with your public key only you can decrypt with your private key When you sign a message with your private key, it proves you sent it Public key infrastructure allows users to securely exchange or distribute public keys in a large environment

Trusts PKI uses a third party trust model You trust a third party to perform an identity check and verify that a public key belongs to the entity that presents it The check is performed by a Certificate Authority (CA) A CA can be your organisation or a trusted third party You trust the CA to vouch for the identity of the public key owner

Certificate components Certificate, also called a digital certificate Used for authentication and secure exchange of information over open networks Certificate binds a public key to the entity that holds the associated private key CA certifies the validity of all information in the certificate after it has performed an identify check Defined by ISO standard X.509, the certificate contains: – The subject of the certificate (name of the computer or user who requested the certificate) – The public key – The certificate’s validity period – of owner – Signed hash of the certificate (signed with the private key of the CA) – Uses of the certificate – Details of CA

Enrolment The process of requesting and receiving a certificate The requestor (user or computer) generates a key pair The requestor sends the certificate request to the CA – Includes the public key and requestor information A certificate administrator reviews the request – Verifies information Upon approval, the CA issues the certificate – CA creates and signs the certificate with a hash to prevent modification – CA issues the certificate to the applicant

Certificate uses Authentication, confidentiality, non-repudiation Secure mail – S/MIME Secure web communications – SSL or TLS Secure websites Custom security solutions Smart card logon process Internet Protocol Security (IPSec) 802.1x Encrypting File System (EFS) Software code signing

Components of a PKI Digital Certificate CA: Certification Authority – Commercial: certificates are widely available – Private: for your company’s use only CRL: Certificate Revocation List – Lists certificates that have been revoked before expiry date Certificate publishing points and distribution points – Users can obtain certificates and CRLs – Made available in directories, via X.500 or LDAP protocol and on web servers Certificate and CA management tools – Publish and configure, import and export, recover keys Applications and Services use certificates

The certificate lifecycle User or computer generates key pair and submits certificate request including public key and information to CA – Certificate request file – Web enrolment CA verifies identity and generates a certificate Certificate is distributed or published to requesting users/computers User or computer supplies the certificate when using PKI applications Certificate reaches end of lifetime – Either expires – Is renewed and replaced with a new certificate which may or may not use the same public key

Certificate revocation Certificate can be revoked before it expires – goes onto the CRL Certificate revocation is final and revoked certificates can’t be reinstated. Should occur when: – the certificate’s owner leaves the company they work for – the certificate’s owner changes their name – a private key has been compromised – the certificate owner’s private key is lost – the CA has been compromised – the certificate has been superseded by a new certificate – the CA has ceased operation

Key archival and recovery If the private key is lost it becomes impossible to decrypt the data Key archival and recovery system is used to prevent loss of data When a user generates a key pair, they submit a copy of the private key to the CA along with the certificate request CA stores the private key securely CAs implement stringent security measures for key archival and recovery – Keys can only be recovered by one or more designated key recovery agents (KRAs). Smart cards also required sometimes Key Escrow – A copy of a user’s private key is held by a separate entity. This entity releases the private key to a third party when a prearranged event takes place M of N control – There are a certain number of recovery agents (N), a minimum number of these recovery agents (M) have to approve access to a private key

Storage of certificates and keys Access to the private keys is normally secured by a password or a passphrase that the user must enter to decrypt the private key A more secure storage method for private keys is a smart card. A smart card is a credit card-sized computer that generates and stores key pairs. The private key never leaves the smart card. Access to the private key requires that you enter a personal identification number (PIN) or password Smart cards are considered tamperproof and can be removed from a computer Private keys can also be stored in specialized hardware devices that destroy the public keys when someone tampers with the hardware device

Certificate authority trust models To trust a CA, your computer must contain the certificates of one or more trusted root CAs This certificate, which has been issued by a root CA, allows your computer to determine the authenticity of other certificates that were signed by that root CA A root certificate is a self-signed certificate When a certificate is presented to an application, one of the validation tests that the application performs is to determine whether the certificate was issued by a CA that is chained to a trusted root If the certificate was issued by a trusted root CA or the certificate chains to a trusted root CA, the certificate is trusted by a client Most Web browsers contain a list of trusted root CAs that the browser vendor has designated as trustworthy You can also place additional root CAs, such as your own organization’s root CA, into the certificate store

Trust models For a PKI, a trust is a relationship that allows a CA to trust a certificate issued by another CA A trust path links several CAs together For a CA to form a trust relationship with another CA, one CA must obtain a certificate from the other CA: subordinate CAs There are three common ways to configure trust paths: – Hierarchical architecture – A mesh architecture – A bridge CA

Hierarchical architecture A hierarchical architecture depends on root CAs Root CAs can then issue certificates to other CAs and so on

Mesh architecture Multiple peer CAs issue certificates to each other To certify, they create certificates for each other

Bridge CA architecture A bridge CA connects mesh and hierarchical architectures together Allows different companies to have their own trust architecture and have a single connection using a bridge CA If the trust relationship needs to be broken, there is only a single point to manage

Secure communications using SSL SSL: most commonly used to verify a web server’s identity to a web client and to encrypt data between the client and the server Authentication and encryption are based on certificates Web server must have a certificate that was issued by a CA that chains to a root CA that the web client trusts 1. The client establishes the connection with 2. The web server sends its certificate to the client 3. The client verifies the information in the certificate. Checks that the certificate was issued by a CA that chains to a root CA that the client trusts The certificate has not been tampered with The certificate’s name matches the name of the Web site that the client is connecting to The certificate is valid and has not expired The certificate has been issued for the purpose of server authentication If the client is configured to check for certificate revocation, the client checks any valid cached copies of the CRL or retrieves the CRL

Secure communications using SSL 4.Displays the security alert box if any check fails. The client extracts the Web server’s public key from the certificate 5.The client creates a pre-master secret, which is a randomly generated block of data, encrypts it with the web server’s public key, and then sends it to the web server 6.The web server uses its private key to decrypt the pre-master secret 7.The web server and the client create a secret session key based on the pre-master secret 8.The web server and the client encrypt all data that they exchange by using the session key 9.When the web server or client closes the connection, both sides discard the session key 10.If the client establishes another connection, the process starts from the beginning, creating a new session key

Secure You can use certificates when you sign or encrypt . How certificates are used depends on whether they are used for signing or encryption. When a user wants to send a signed , the following process takes place: 1.The program creates a hash from the message and signs the hash with the user’s private key 2.The user sends the and the sender’s certificate to the recipient 3.The recipient checks the certificate for its validity, checks whether the certificate was issued by a CA that chains to a trusted root CA, and verifies that the certificate was issued to the message’s sender 4.The recipient extracts the sender’s public key from the certificate and decrypts the message hash with it 5.The recipient computes a hash from the message and compares this hash with the hash that the sender created. If both hashes match, the message was signed by the sender and the message has not been altered

Secure When a user encrypts an message to ensure confidentiality, the following process takes place: 1.The sender obtains the recipient’s certificate, checks the certificate for its validity, verifies that the certificate was issued by a CA that chains to a trusted root CA, then verifies that the certificate was issued to the intended recipient of the message 2.The sender encrypts the message with a randomly generated secret key 3.The sender extracts the recipient’s public key from the certificate and encrypts the secret key with this public key 4.The sender sends the message with the encrypted secret key to the recipient 5.The recipient uses her private key to decrypt the secret key. The recipient then uses the secret key to decrypt the message

Summary What digital certificates are How keys are distributed and recovered in a PKI The certificate lifecycle Various PKI trust models How PKI and certificates can be applied