The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
3SKey 3SKey.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
PKI Implementation in the Real World
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
21 mai 2015 Bridges between Certification Authorities.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
6/2/2015Information Technology Standing Committee of the IMO 1 Digital Certificate Initiative Guy Springgay Holiday Inn - Oakville.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
PUBLIC KEY INFRASTRUTURE Don Sheehy
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
PKI interoperability and policy in the wireless world.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Module 9: Fundamentals of Securing Network Communication.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Universidad de Zaragoza LEFIS General Assembly Firenze February 2006 LEFIS - APTICE: Legal Framework for the Information Society II The LEFIS Network:
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
LEFIS Steering Committee Meeting Brussels, 11th November 2005 SOCRATES PROGRAMME ERASMUS - Thematic Network projects LEFIS - APTICE: Legal Framework for.
LEFIS PKI LEFIS General Beja, Portugal October 2006 Leo Catalinas.
DIGITAL SIGNATURE.
The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Computer and Network Security - Message Digests, Kerberos, PKI –
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Digital Signatures and Digital Certificates Monil Adhikari.
The trusted network. Stamp of guarantee. Policies proposals (of European and National character): to the executive, legislative and judicial powers 1.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
The trusted network. Stamp of guarantee. Policies proposals (of European and National character): to the executive, legislative and judicial powers 3.
Key management issues in PGP
Public Key Infrastructure (PKI)
S/MIME T ANANDHAN.
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
Presentation transcript:

The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006

Internet security today  Simplest authentication methods and unprotected data traffic implies: ✗ Poor user's confidentiality ✗ Poorly verified user's identity ✗ Unverified data integrity

What we can do?  well-authenticated access to resources  Digital Signature  private access which prevents non related people to spy member's actions

Tools  Our own PKI ✔ Open Source Software ✔ Interoperability ✔ Cross CA ✔ Secure and identified web access ✔ Signed documents ✔ Signed  Use of Public Key Technologies to increase security.

PKI Design Trust based in APTICE CA APTICE Certification Authority LEFIS Subordinated CA LEFIS Registration Authorities The LEFIS PKI APTICE CA LEFIS PKI ORG1 PKI ORG2 PKI signs delegates manages Lays Trust Base Used Lays Trust Base Trust Hierarchical Capable of recognize other PKIs Permits building multiple PKIs Cross Certification between PKIs  PKI Design…

PKI Enrollment  But, how to get a LEFIS Certificate? ✔ PDF Guide in english ✔ CSR Generation Adv. ✔ Easy Web Interface ✔ Local Keys Generation ✔ Platform independent LEFIS_MAN_EN_ ENROLL_LEFIS_PKI.pdf

LEFIS Web Site Aims  Moodle Is a ‘CMS’ WG Activities Support User’s communication Dynamic contents Workshops Tasks Wiki  Public Side (Informative)  Private Side (for validated members)

LEFIS' Innovative idea  Moodle + PKI = MoodlePKI ✔ An extension designed and developed by ourselves ✔ Makes Moodle able to identify users by their Certificates ✔ Certificates can be easily obtained in our PKI public web page ✔ We plan to recognize Certificates signed by other PKIs or CAs

Accessing The LEFIS Web Page With a Digital Certificate