Presentation is loading. Please wait.

Presentation is loading. Please wait.

A short guide for using encryption keys and certificates in PEPPOL

Similar presentations


Presentation on theme: "A short guide for using encryption keys and certificates in PEPPOL"— Presentation transcript:

1 A short guide for using encryption keys and certificates in PEPPOL
PKI and Certificates A short guide for using encryption keys and certificates in PEPPOL

2 Agency for Public Management and eGovernment
Concepts covered Encryption keys Symmetric Asymmetric Certificate Message digests Digital signatures Agency for Public Management and eGovernment

3 Direktoratet for forvaltning og IKT
Symmetric key Usually a long integer, i.e bits Sender and receiver agree: The key The algorithm Nobody can decrypt? 13 November 2018 Direktoratet for forvaltning og IKT

4 Direktoratet for forvaltning og IKT
The problem 700 BC Spartan Scytale Exchanging the encryption key is the major problem! 13 November 2018 Direktoratet for forvaltning og IKT

5 Direktoratet for forvaltning og IKT
Asymmetric keys Two integers belonging together: Encrypt with one of the keys Decrypt with the other key 13 November 2018 Direktoratet for forvaltning og IKT

6 Direktoratet for forvaltning og IKT
Which key to use? Encrypt with receivers public key Decrypt with receivers privat key 13 November 2018 Direktoratet for forvaltning og IKT

7 Direktoratet for forvaltning og IKT
X.509 Certificate Data structure Certifies the owner of the public key The public key is included Signed with the private key of the certificate issuing authority (CA) Belongs to Difi 13 November 2018 Direktoratet for forvaltning og IKT

8 Chain of trust Certificates are signed With private key of issuer
Owner’s Public Key Owner’s Public Distinguished Name Issuer’s (CA) Distinguished Name Issuer’s Signature Certificates are signed With private key of issuer Owner’s Public Key Owner’s (CA) Distinguished Name Issuer’s (Root CA’s) Issuer’s Signature Root CA’s Public Key Root CA’s Distinguished Name Root CA’s Signature Verification Verification 13 November 2018 Direktoratet for forvaltning og IKT

9 Direktoratet for forvaltning og IKT
PEPPOL Chain of trust PEPPOL Root CA PEPPOL intermediate AP PEPPOL intermediate SMP Access Point “ELMA” Access Point Access Point 13 November 2018 Direktoratet for forvaltning og IKT

10 Direktoratet for forvaltning og IKT
X.509 certificates Several formats of storage PEM – ASCII (base64) with “---- BEGIN” DER/CER/CRT – binary formats JKS – Java Keystore Hint: use openssl tool and Java’s keytool 13 November 2018 Direktoratet for forvaltning og IKT

11 Direktoratet for forvaltning og IKT
Sample X.509 certificate 13 November 2018 Direktoratet for forvaltning og IKT

12 Renewal vs recplacement
Renewal caused problems PEPPOL replaces certificates Choose “enrolment” on the web pages! Follow the instructions on github.com/oxalis Create a pair of keys Create a Certificate Signing Request (CSR) Upload the CSR Download the certificate Create Java keystore Intermediate certificates are supplied in Oxalis 13 November 2018 Direktoratet for forvaltning og IKT

13 Certificates provided in Oxalis
DEMO 13 November 2018 Direktoratet for forvaltning og IKT

14 A stich in time saves nine!
Check the expiration date! Distinguished Name (DN) 13 November 2018 Direktoratet for forvaltning og IKT

15


Download ppt "A short guide for using encryption keys and certificates in PEPPOL"

Similar presentations


Ads by Google