Public Key Infrastructure

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Principles of Information Security, 2nd edition1 Cryptography.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography and Network Security Chapter 17
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Secure Socket Layer (SSL)
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Public-Key Cryptography and Message Authentication.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Web Security.
Executive Director and Endowed Chair
The Secure Sockets Layer (SSL) Protocol
Chapter 5 Network Security Protocols in Practice Part I
Reviews Rocky K. C. Chang 20 April 2007.
Security Outline Encryption Algorithms Authentication Protocols
Symmetric Cryptography
Tutorial on Creating Certificates SSH Kerberos
Cryptography and Network Security
Cryptography and Network Security
Secure Sockets Layer (SSL)
Asymmetric Cryptography
What is network security?
Chapter 8 Network Security.
Tutorial on Creating Certificates SSH Kerberos
Presented by: Dr. Munam Ali Shah
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Information Security message M one-way hash fingerprint f = H(M)
Using SSL – Secure Socket Layer
CompTIA Security+ Study Guide (SY0-501)
Cryptography and Network Security
Cryptography Basics and Symmetric Cryptography
Chapter 8 Network Security.
LXI Security Overview October 2018 Rev 1.8.
Cryptography and Network Security
Introduction to Symmetric-key and Public-key Cryptography
SSL (Secure Socket Layer)
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Protocol ap1.0: Alice says “I am Alice”
Encryption INST 346, Section 0201 April 3, 2018.
CS2911 Week 9, Class 1 Today Discussion on RSA Video Eavesdropping
Lecture 10: Network Security.
Advanced Computer Networks
Cryptography and Network Security
….for authentication and confidentiality PGP
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

Public Key Infrastructure

Content Prerequisites Lab materials Public key infrastructure X509 and Openssl Domain name system Lab materials Issuing and Revoking Certificates Hierarchy of Certificate Authority Threat to Public Key Infrastructure

Public Key Infrastructure

Symmetric Cryptography

Symmetric Cryptography Enck( ) Enck( )

Asymmetric Cryptography

Symmetric Cryptography Encpk_A( ) Encpk_B( )

Confidentiality and Authenticity

Confidentiality and Authenticity

Computational Complexity All key sizes are provided in bits. These are the minimal sizes for security.TDEA (Triple Data Encryption Algorithm) and AES are specified in [10]. Hash (A): Digital signatures and hash-only applications. Hash (B): HMAC, Key Derivation Functions and Random Number Generation. The security strength for key derivation assumes that the shared secret contains sufficient entropy to support the desired security strength. Same remark applies to the security strength for random number generation.It is always acceptable to use a hash function with a higher estimated maximum security strength. When selecting a block cipher cryptographic algorithm (e.g. AES or TDEA), the block size may also be a factor that should be considered. More information on this issue is provided in SP800-38.(*) The assessment of at least 80 bits of security for 2TDEA is based on the assumption that an attacker has no more than 240 matched plaintext and ciphertext blocks.(**) SHA-1 has been demonstrated to provide less than 80 bits of security for digital signatures, which require collision resistance. In 2016, the security strength against digital signature collisions remains a subject of speculation.© 2018 BlueKrypt (http://www.bluekrypt.com) - Version 30.4 - February 23 2017 [1] Recommendation for Key Management, Special Publication 800-57 Part 1 Rev. 4, NIST, 01/2016. [10] Approved algorithms for block ciphers, NIST.

Key Exchange Protocols I will use the key Ok

Key Exchange Protocols EncpkA( )

Man in the Middle attack EncpkC( ) EncpkA( )

Certificate Give me your Public key and certificate is the certificate and public key

Transport Layer Security client hello, crypto info server hello, ciphersuite, certificate EncpkA(pre_master_key) Client finished Server finished Exchange message

Public Key Infrastructure

x509 and Openssl

x509 Standard format of public key certificates Used in TLS/SSL, electronic signature Self-signed or signed by certificate authority Certificate revocation list Path validation algorithm

Openssl CSR Entities Private keys

Openssl CSR Entities Private keys

Openssl CSR Entities Private keys

Sample commands Generate a Private Key and a CSR openssl req \ -newkey rsa:2048 -nodes -keyout domain.key \ -out domain.csr Generate a Self-Signed Certificate openssl req \ -newkey rsa:2048 -nodes -keyout domain.key \ -x509 -days 365 -out domain.crt Sign a certificate openssl x509 -req -days 360 -in <CSR-for-the-new-device> -CA <your-intermediate-CA-certificate> -CAkey <your- intermediate-CA-key> -out <your-new-certificate> - set_serial <a random number>

Domain Name System

Domain names and IP addresses Where www.cs.jhu.edu exactly is? Go ask edu Go ask jhu It is XX..XX root edu jhu

Connect to DNS through DHCP and ARP Got a DHCP offer, the DNS server is …

Lab Materials

Issuing and Revoking Certificates Draw topology and reserve resources Set up LAMP for web application Set up Certificate Authority Generate certificate and configurate it Revoke the certificate

Hierarchy of Certificate Authority Basically the same as the previous one Replace a single CA with a chain of CA

Threat to Public Key Infrastructure Setup DNS server on attacker’s node Setup web server on server’s node Install tool-sslsplit on attacker’s node Connect web server from client Check whether attacker did intercept messages