RSA Laboratories’ PKCS Series - a Tutorial

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
ASYMMETRIC CIPHERS.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
XML Encryption, XML Signature, and Derived Keys: Suggestion For a Minor Addition Magnus Nyström RSA.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
Elliptic Curve Cryptography
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Public-Key encryption structure First publicly proposed by Diffie and Hellman in 1976First publicly proposed by Diffie and Hellman in 1976 Based on mathematical.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
RSA Laboratories’ PKCS Series - a Tutorial
Web Applications Security Cryptography 1
Electronic mail security
Reviews Rocky K. C. Chang 20 April 2007.
Public Key Infrastructure (PKI)
Basics of Cryptography
RSA Laboratories’ PKCS Series - a Tutorial
Symmetric and Asymmetric Encryption
RSA Laboratories’ PKCS Series - a Tutorial
Public-Key Cryptography and Message Authentication
Dan Brown, Certicom Research November 10, 2004
Cryptography Why Cryptography Symmetric Encryption
Network Security Unit-III
Public Key Encryption Systems
e-Health Platform End 2 End encryption
Network Security Unit-IV
B. R. Chandavarkar CSE Dept., NITK Surathkal
Public Key Encryption and Digital Signatures
Security.
Public-Key Cryptography and RSA
Chapter 8 Network Security.
SSL Implementation Guide
S/MIME T ANANDHAN.
Digital Signatures Last Updated: Oct 14, 2017.
ICS 454 Principles of Cryptography
Cryptography and Network Security
SSL (Secure Socket Layer)
Security.
Security at the Transport Layer: SSL and TLS
The Secure Sockets Layer (SSL) Protocol
ICS 454 Principles of Cryptography
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
DISSERTATION ON CRYPTOGRAPHY.
Chapter 3 - Public-Key Cryptography & Authentication
Hashing Hash are the auxiliary values that are used in cryptography.
Public Key Encryption Systems
Cryptography Fundamentals
Digital Signature Standard (DSS)
….for authentication and confidentiality PGP
The devil is in the details
Presentation transcript:

RSA Laboratories’ PKCS Series - a Tutorial Magnus Nyström, RSA Laboratories October, 1999

Agenda Part I: Background Part II: An ASN.1 Primer (if needed) Some history Cryptographic background information Things that needs to be standardized Part II: An ASN.1 Primer (if needed) Part III: Review of Active Documents: PKCS #1 PKCS #5 PKCS #7 PKCS #8 PKCS #9 PKCS #10 PKCS #11 PKCS #12 PKCS #13 PKCS #14 PKCS #15

…should make for a full half-day!

PKCS “Distinctive” Purpose: Scope: Process: catalyst for formal and de facto standards “missing pieces” Scope: public-key infrastructure, as well as cryptography Process: “informal,” “intervendor”

Background PKCS series created in the early 1990’s to promote public-key cryptography Initial documents defined RSA Encryption/Decryption RSA Signatures/Verification Diffie-Hellman key exchanges Password-based encryption Extended certificates (remember, only X.509v1 available at the time) Enveloping of messages

Background, Continued RSA Laboratories’ role in the standards-making process Publish the documents Solicit opinions and request for changes from developers Publish revised versions whenever appropriate Provide implementation guidelines RSA Laboratories’ retain the sole decision-making authority Different from “normal” standards-committee work

Background, Continued This gives a quick process - normally less than one year for a new specification Goal is not to retain ownership of these documents, but to facilitate “early adoption”, e.g.: PKCS #6 -> X.509 v3 PKCS #7 -> IETF CM PKCS #15 -> ISO (perhaps)

Some Cryptographic Background We’ll look at Public-key cryptography Secret-key cryptography Message-digest algorithms

Public-Key Cryptography “Invented” by Diffie and Hellman in 1976 Each party has one private key and one public Applications Signatures Key agreements (Key exchanges) Authentication Examples: RSA Elliptic Curves Diffie-Hellman

Secret-Key Cryptography Each pair of parties must share a secret key Applications Message encryption Authentication Signatures Examples DES RSA’s RC2, RC4, RC5 and RC6 IDEA (J. Massey)

Message Digests Transform a message of any length to a fixed length Cryptographic hash functions are used for this purpose: Collision-resistant One-way Examples: RSA’s MD2, MD4 and MD5 SHA-1, SHA-2

The Need for Standardization Digital Signatures: Message-Digest algorithms (PKCS #1) Public-Key algorithms (PKCS #1, PKCS #3, PKCS #13) Syntax for signed messages (PKCS #7) Storage of private keys Syntax for private keys (PKCS #1, PKCS #8) Syntax for encrypted private keys (PKCS #8) Methods for deriving secret keys from passwords (PKCS #5)

The Need for Standardization, II Digitally-Enveloped messages Message syntax (PKCS #7) Secret-Key algorithms (PKCS #7) Public-Key algorithms (for wrapping) (PKCS #1) Digital Certificates Syntax (PKCS #6; now historic) Certificate requests (PKCS #10) Signature algorithms (PKCS #1)

The Need for Standardization, III Key agreement Message syntax Key-Agreement algorithms (PKCS #3) Storage, access and exchange of cryptographic credentials Exchange, Storage (PKCS #12, PKCS #15) Access (PKCS #11) Generation of pseudorandom numbers Crucial for security; needs good guidelines (PKCS #14)