Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.
The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The U.S. Federal PKI Richard Guida, P.E. Chair, Federal PKI Steering Committee Chief Information Officers Council
Stanley J. Choffrey (202) The Federal Bridge Certification Authority Evolving Issues in Electronic Data Collection January.
Copyright Judith Spencer This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
Uncle Sam, Meet The PKI! Richard Guida Chair, Federal PKI Steering Committee Michèle Rubenstein Department of the Treasury,
Federal Approach to Electronic Credentials For services to citizens, businesses, other governments, and employees Mary J. Mitchell Office of Electronic.
The U.S. Federal PKI and the Federal Bridge Certification Authority
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
The 4BF The Four Bridges Forum Higher Education Bridge Certificate Authority.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
NIH-EDUCAUSE Interoperability Project, Phase 3: Fulfilling the Promise Dartmouth PKI Implementation Workshop Peter Alterman, Ph.D. Assistant CIO for E-Authentication.
Federal Bridge Certification Authority n Background n Overview n EMA Challenge Test structure n Participants n Results n Conclusions and lessons learned.
Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
The Federal Bridge Certification Authority – Description and Current Status Peter Alterman, Ph.D. Senior Advisor to the Chair, Federal PKI Steering Committee.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Access America-- Fulfilling the Vision of Electronic Service Delivery Peter N. Weiss Information Policy and Technology Office of Management and Budget.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Transforming Education Through Information Technologies Common Solutions Group, January, 2002 (Sanibel Island) HEBCA: Higher Education.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
Digital Signatures A Brief Overview by Tim Sigmon August, 2000.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
The Evolving U.S. Federal PKI Richard Guida Chair, Federal PKI Steering Committee Federal Chief Information Officers Council
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
1 June Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
The NIH PKI Pilots Peter Alterman, Ph.D. … again.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Federal and State PKI Bridge Evolution: Cutting Across Stovepipes EDUCAUSE 2000 October 12th, 2000.
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
The Federal PKI Or, How to Herd Worms Peter Alterman Senior Advisor, Federal PKI Steering Committee.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
DIGITAL SIGNATURE.
The Evolving Federal PKI Gary Moore Entrust Technologies Richard Guida Chair, Federal PKI Steering Committee.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Interoperability and the Evolving Federal PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
TAG Presentation 18th May 2004 Paul Butler
Presentation transcript:

Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee

E-Transaction Landscape Intra-agency –personnel matters, agency management Interagency –payments, account reconciliation, litigation Agency to trading partner –procurement, regulation Agency to the public

E-Transactions Drivers Long-term cost savings Trading partner practices (e.g., banks) Public expectations Federal/State Statutes (e.g., GPEA) and policies International competition

Challenges All Applications Face Authentication of Users Non-repudiation for transactions Confidentiality (privacy) Interoperability Liability Scalability/extensibility

Public Key Technology Authentication Technical non-repudiation Data integrity Confidentiality Interoperability Scalability/extensibility

6 How PK Technology Works Two keys, mathematically linked One is kept private, other is made public Private not deducible from public For digital signature: One key signs, the other validates For confidentiality: One key encrypts, the other decrypts

Digital Signature (example Digital Signature (example) Sender hashes document, signs hash with private key and sends with document Recipient hashes document he or she received, creating “raw hash” Recipient applies public key of sender to signed hash to get sender’s raw hash If raw hashes are same, transaction validates

Confidentiality (example) Sender generates symmetric encryption key and encrypts document with it Sender encrypts symmetric key with public key of recipient, sends that and encrypted document to recipient Recipient decrypts symmetric key with his or her private key Recipient decrypts document with symmetric key

The Critical Questions How can the recipient know with certainty the sender’s public key? (to validate a digital signature) How can the sender know with certainty the recipient’s public key? (to send an encrypted message)

A document which - is digitally signed by a trusted third party (called Certification Authority) is based on identity-proofing done by a Registration Authority contains the individual’s public key and some form of the individual’s identity has a finite validity period Public Key Certificate

11 X.509 v3 Certificate

Public Key Infrastructure Registration Authorities to identity proof users Certification Authorities to issue certificates and CRLs Repositories (publicly available data bases) to hold certificates and CRLs Some mechanism to recover data when encryption keys are lost/compromised Certificate Policy and related paper

Intra-Agency PKI Examples DOD (~50K+ certs => >>4M certs by 2002; high assurance with smartcards) FAA (~1K certs => 20K+ certs in 2000; software now, migrating to smartcards) FDIC (~1K certs => 7K+ certs in 2000) NASA (~1K certs => 25K+ certs in 2000)

Potential Interagency Uses VA and SSA on medical evidence Dept of Education, SSA, VA on student loan applications, disbursements, etc. USDA/NFC for on-line payroll matters DOD/Treasury re: payments FDIC/other financial regulators re: sharing information

Federal PKI Approach Establish Federal PKI Policy Authority Develop/deploy Bridge CA using COTS –Four levels of assurance (emulate Canada) –Prototype early 2000, production mid 2000 Deal with directory issues in parallel –Border directory concept; “White Pages” Use ACES for public transactions

FPKIPA and Bridge CA Topics Federal PKI Policy Authority Overlay FBCA Overview Technical Boundary Conditions Policy/Political Boundary Conditions Potential Architectures Current Status Schedule

Federal Policy Authority Overlay Federal PKI Policy Authority facilitates interoperability through FBCA (e.g., determines cert policy mappings) All agencies that interoperate through FBCA are voting members FPKIPA members = FPKISC members Interoperability through the FBCA is NOT required (but hopefully attractive)

FBCA Overview Non-hierarchical hub for interagency interoperability Ability to map levels of assurance in disparate certificate policies Ultimate “bridge” to CAs external to Federal government Directory contains only FBCA-issued certificates and ARLs

FBCA PKI Architecture US Federal

Technical Boundary Conditions Comply with FIPS (140-1, 186) –Level 3 Crypto Module for FBCA Meet MISPC to maximum extent practical Interoperate with as many COTS as possible Comply with X509V3 (certs, policy processing)

Policy/Political Boundary Conditions Desire to use COTS if possible Desire solution which is as fully “inclusive” for vendors as possible Support four levels of assurance –Rudimentary, Basic, Medium, High –Analogous to Canadian PKI FBCA use not mandatory Requirements focus on agencies as certificate issuers, not relying parties

Potential Architectures Multiple CAs within membrane, with single signing key Single CA Multiple CAs within membrane, cross- certified among themselves

Multiple CAs, One Key Avoids cross-certification within membrane, so: –minimizes certificate path length –reduces overall path processing complexity May require porting key to other tokens (allowed under if encrypted) Creates complications in directory postings for ARLs and cross-certs to external CAs

Single CA Most straightforward technical solution Pushes interoperability issues to Bridge membrane Is worst political solution – one winner, many losers – non-inclusionary

Multiple CAs, Cross-certified In essence, the “quark” model Certificate path length may be +1 Adding CAs within membrane should be straightforward albeit not necessarily easy Requires solving inter-product interoperability issues within membrane rather than outside - which is good

Current Status Decision: cross-certified CAs within membrane Initial vendor products: Entrust and GTE for “prototype” FBCA Migration from prototype to production FBCA will entail adding other CAs inside the membrane GSA/FTS has responsibility to execute

Schedule Draft Bridge Certificate Policy: late 1999 Draft FPKIPA Charter/CONOPS: late 1999 Prototype Bridge: early 2000 Operational Bridge: mid to late 2000

28 Initial Border Directory Concept Each agency would have Border Directory for certificates and CRLs –may shadow all or part of local directory system (allows for agency discretion) –CAs may publish directly in border directory –unrestricted read access Directory resides outside agency firewall –chain (X.500 DSP) to FBCA DSA

Initial Border Directory Concept Internal Directory Infrastructure PCA 2 FBCA DSA Internal Directory Infrastructure Border DSA 2 X.500 DSA Border DSA 1 X.500 DSA PCA 1 Agency 1 Agency 2 FBCA DSP chaining DSP chaining

30 Concerns with Initial Concept Agencies must stand up X.500 DSA But: –Some agencies have no X.500 directories; instead use LDAP servers (and may be tied to OS or major applications), proprietary, or nothing –X.500 DSAs seen as expensive; initial cost, plus care and feeding (X.500 DSAs complex, and chaining can be challenging)

31 Expanding the Concept Approach must provide for more than just agency X.500 directories FBCA directory can be directory nexus –Link to X.500 border DSAs via DSP chaining –Link to LDAP oriented agencies via referrals There are other possibilities –CIO Council “White Pages” –GSA –Commercial services

Expanded FBCA Directory Concept Internal Directory Infrastructure PCA 2 FBCA DSA Internal Directory Infrastructure Border DSA 2 X.500 DSA Border DSA 1 LDAP Server Internal Directory Infrastructure PCA 1 PCA 3 Agency 1 Agency 2 Agency 3 FBCA LDAP Query-Response X DSP chaining

Access Certs for Electronic Services “No-cost” certificates for the public For business with Federal agencies only (but agencies may allow other uses on case basis) On-line registration, vetting with legacy data; information protected under Privacy Act Regular mail one-time PIN to get certificate Agencies billed per-use and/or per-certificate

Access Certs for Electronic Services RFP 1/99; bids received 4/99; first award 9/99 (DST), second award 10/99 (ORC) Contract has provisions for ACES-enabling applications Agency’s do interagency agreement with GSA Certificates available within three to six months

Electronic Signatures under GPEA Government Paperwork Elimination Act (October 1998) Technology neutral - agencies select based on specifics of applications (e.g., risk) Gives electronic signature full legal effect Focus: transactions with Federal agencies Draft OMB Guidance 3/99; final 4/00

Organization

Federal PKI Steering Committee Over 50 members from two dozen agencies Three Working Groups –Business –Technical –Legal and Policy Minutes/activities on the web

PKI Use and Implementation Issues Misunderstanding what it can and can’t do Requiring legacy fixes to implement Waiting for standards to stabilize High cost - a yellow herring Interoperability woes - a red herring Legal trepidation - the brightest red herring

Misunderstanding what it can and can’t do Technical vs. legal non-repudiation –Probably to the former, possibly to the latter Establishing a PKI <> making clients PKI-aware –Building the highway is not the same as building the cars that ride on the highway

Requiring legacy fixes to implement Fixing directory anarchy –Don’t expect directory problems to abate - they will be exacerbated Mapping to legacy data bases –Back end applications remain

Waiting for standards to stabilize Far too much to expect –Evolution is constant process, it does not stop for anyone And, not necessary –Internet standards are not stable but it still works (fitfully at times…) –PKI standards are good enough for enterprise deployment, getting there for interoperability

High cost - a yellow herring Cost of ownership is not low –Registration, certificates, CRLs, PKI-aware clients, repositories, directories, and so on But, compared to what? –Multiple stove-piped PIN applications with poor security?

Interoperability woes - a red herring Interoperability often not needed in enterprise applications (single product) Even where needed, interproduct interoperability getting much better (Federal Bridge CA will help drive) No reason to delay use of this technology

Legal trepidation - the brightest red herring PK technology is NOT the most complex subject presented in a courtroom Case law only develops when you use something Technology and commerce marches on regardless of legal uncertainties Unreasonable to demand standard of proof higher than in paper world