Public Key Infrastructure (PKI)

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Lecture 23 Internet Authentication Applications
Public Key Infrastructure Ben Sangster February 23, 2006.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Public Key Infrastructure Ammar Hasayen ….
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
1 PKI Update September 2002 CSG Meeting Jim Jokl
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
© Software602 a.s. SOFTWARE Zdenek Metodej Zalis Martin Vondrous Ondrej Malek.
The Secure Sockets Layer (SSL) Protocol
Key management issues in PGP
Trust Profiling for Adaptive Trust Negotiation
Trust and Identification
Cryptography and Network Security
Organized by governmental sector (National Institute of information )
THE STEPS TO MANAGE THE GRID
SWIM Common PKI and policies & procedures for establishing a Trust Framework                           Kick-off meeting Patrick MANA Project lead 29 November.
S/MIME T ANANDHAN.
Digital Signature.
CompTIA Security+ Study Guide (SY0-401)
Security in ebXML Messaging
زير ساخت كليد عمومي و گواهي هويت
NAAS 2.0 Features and Enhancements
Secure Electronic Transaction (SET) University of Windsor
جايگاه گواهی ديجيتالی در ايران
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
X-Road as a Platform to Exchange MyData
Chapter 4 Cryptography / Encryption
Install AD Certificate Services
Chinese wall model in the internet Environment
Building Security into Your System
PKI (Public Key Infrastructure)
September 2002 CSG Meeting Jim Jokl
Module 4 System and Application Security
Instructor Materials Chapter 5: Ensuring Integrity
National Trust Platform
OU BATTLECARD: Oracle Identity Management Training
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Public Key Infrastructure (PKI)

What is PKI? “A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred” Wikipedia

SWIM Objectives The Yellow Profile (YP) targets: Support for a wide variety of interactions in a flexible manner and that is affordable for the service consumer The interaction must be able to run over Public Internet and must be sufficiently secured Use of technologies based on standard Web Services The technology must be supported out-of-the-box Keeping as many options open as possible PKI based security solutions supports the above by: Support for message signing to satisfy integrity, identification, authenticity and more PKI is not restricted to yellow profile.

Business drivers Provider and consumer interaction build on trust All involved parties can be trusted (authorized entities only) Exchange mechanism can be trusted (secured, reliable, on-time) Information can be trusted (non-repudiation, accountability) No abuse of information (adequate access control)

Comprehensive PKI Certification Authority Certificate Repository Revocation Key Backup Recovery Automatic Key Update Key History Management Cross Client Software Authentication Integrity Confidentiality Secure Time Stamping Notarization Non-repudiation Support Secure Data Archive Privilege/Policy Creation Privilege/Policy Verification

Aeronautical PKI Architecture USA Root CA / RA EUR USA Bridge Certificates EURRoot FAA Root Policy 1 Policy 2 Policy 3 CA / RA EDxx Airports Example based on discussions with FAA. ICAO’s role have to be further elaborated and coordinated with ICAO.

One bridge-two certificates A bridge between to separate PKI’s consists of two certificates between the PKI’s root certificates USA shows that it trusts EUR by signing EUR’s public key with USA’s private key Thereby issuing a new certificate “USA trusts EUR” EUR shows that it trusts USA by signing USA’s public key with EUR’s private key Thereby issuing a new certificate “EUR trusts USA”

The Bridge Only two certificates to administer to trust across the Atlantic ocean Can easily and automatically be revoked from Europe towards USA and vice versa CPH have validated this scenario with standard tools available today on the internet

Different types of certificates All are issued under the X.509 standard The different types of certificates are issued according to different policies and by different intermediate certificate The format and content of the fields can be different Ideas for types and policies of certificates Different certificates (policies) for different purposes (criticality) Airlines, Airports, ANSP, Suppliers / Ground handler Personnel in the above (ATSEP, Cabin Crew, Pilots)

Policies and Governance Who generates the private key for each certificate? How does the public key (certificate) get signed? How to establish initial trust between CA and certificate users (ANSP, Airport, AO)? Who can obtain a certificate? What can they be used for? What is the format and other content? CA / RA EURRoot Policy 1 Policy 2 Policy 3

Policy 1 – high criticality example Who generates the private key for each certificate? By national security service and kept in the “vault” of the national trust store How does the public key (certificate) get signed? Transported by courier and with senior officials from CA present How to establish initial trust between CA and certificate users (ANSP, Airport, AO)? The same way diplomats become accredited Who can obtain a certificate? Only ANSP’s or Military What can they be used for? Only to be used to secure very critical infrastructure What is the format and other content? To be defined, depends on business context

Policy 2 – low criticality example Who generates the private key for each certificate? The CA generates and keeps the private key How does the public key (certificate) get signed? Automatically by the CA’s servers How to establish initial trust between CA and certificate users (ANSP, Airport, AO)? By an email from the relevant organization (AO, ANSP, Airport) Who can obtain a certificate? Any organization in the industry What can they be used for? Any information that needs to be kept confidential or signed What is the format and other content? To be defined, depends on business context

Additional