1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Access Management in Critical Information Infrastructures May 15, 2003 Presented to: 15th annual Canadian Information Technology Security Symposium May.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Key Management in Cryptography
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
DIGITAL SIGNATURE.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Using Public Key Cryptography Key management and public key infrastructures.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Key management issues in PGP
Computer Communication & Networks
Presentation transcript:

1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In line with original goal, X.509 certificates provide: – Confidentiality of data in transit (through encryption) – User authentication (ensures messages are encrypted under right public key & prevents man-in-the-middle attack) – Data integrity (prevent tampering with data in transit) – Non-repudiation (proof of sender’s identity) Access control was never a design requirement (irrelevant for message encryption infrastructure!)

2 Applying PKI to access control PKI vendors currently distorting their technology to do access control (encryption is not big market need …) Their approach: – Individual to provide digital identity certificate to gain access – Certificate serves as strongly authenticated pointer to on- line databases entries – Access provider to retrieve all data for authorization decision = Credit card infrastructure on steroids … Authentication for message encryption very different from access control to sensitive data (unique needs for privacy, security, scalability & performance)

3 The irony; a historical perspective Diffie-Hellman invention of asymmetric crypto (1976): – Setting: Encrypted communication over open network – Sender to encrypt message with public key of recipient – To prevent man-in-the-middle attack, on-line & secure (read-only) database lists “name”– “public key” bindings Kohnfelder’s bachelor’s thesis (1978): – Database problems: bottleneck & vulnerable to attacks – Identity certificates proposed to address both problems Irony of digital identity certificates for access control: – Both problems are back with a vengeance – New problems that were irrelevant in original setting

4 Verifiers must look up all authorization data themselves … … but all these databases may be in different trust / administrative domains … … not to mention the revocation database, common to everyone

5 PKI & access control: problems (1) Non-scalable beyond pre-established trust domains: – Access provider relies on the availability, correctness, and timeliness of authorization data Poor security: – Access right cloning and lending: no cryptographic protection – Misuse of online databases by hackers and insiders – Vulnerable to denial-of-service attacks: Strong reliance on real-time availability of online databases Online certificate status validation – Increases risk of identity theft: Inescapable system-wide identification Strong reliance on central databases

6 PKI & access control: problems (2) Not suitable for use with smartcards: – Cannot use low-cost smartcards: Storage problem Need crypto co-processor for exponentiations Elliptic-Curve cryptography is only partial solution – Application provider must place very strong trust in parties involved in smartcard manufacturing, masking, initialization, application loading, and personalization. Attacks: Overt or covert leakage of secrets and other confidential data Uniqueness, randomness, and secrecy of secret keys?? Fake-terminal attacks Selective “failure” attacks based on dynamic inputs – Problems worsen for multi-application smartcards

7 PKI & access control: problems (3) Managed services are intrusive: – Online Certificate Status Providers able to learn competitive/sensitive data in real time: Identities of access requestors (and access providers) Peak hours Typically: nature of the transaction Possibly: transaction details – Certificate Authorities must know the identity and any other attributes that go into the certificates they issue – Online Certificate Status Providers & Certificate Authorities & on-line database maintainers can disrupt operations on the basis of transaction-specific knowledge in real time

8 PKI & access control: problems (4) Privacy-invasive (roots inescapable systemic identification deep into information infrastructure): – Public keys = strongly authenticated “super-SSNs”: Globally unique identification numbers Inescapably travel along with each and every action taken Obtained by access provider & third parties (providers of authorization databases & online certificate status verifiers) – Always leave behind undeniable digital evidence of the requestor’s identity (due to digital signing of nonces) – Problems with data protection legislation, unbridled use of PKI may be unconstitutional – Access providers & third parties cannot prevent receiving identifiable data

9 Bad “solutions” (quick fixes) Identity certificates that specify a “pseudonym” or a “role” instead of a real name: – Does not address privacy problems (remember: tracing can be done on the basis of the public keys in certificates) – May weaken security (accountability, fraud containment, …) Issue different identity certificates for different uses: – False sense of privacy: like using SSNs, credit card numbers, and health insurance numbers for all actions! – Damages functionality: creates separate “islands” that cannot communicate (bridge-CAs undo purpose & create new scalability and trust problems) – Scalability & smartcard inefficiency even worse

10 Another bad “solution” Privilege Management infrastructure (PMI): – X.509 attribute certificates specify relevant attribute data – Addresses availability problem, but exacerbates all other problems: Attribute certificates must be linked to (and sent along with) base identity certificate to prevent pooling of privileges Even more devastating for privacy (all the attributes within a certificate must be known to the CA & must be disclosed when showing the certificate) No mechanisms to prevent discarding, updating-prevention, lending, and cloning Smartcard inefficiency even worse Must manage and revoke an abundance of certificates