1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy.

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.4 Public Key Infrastructure (PKI) Acknowledgment: Slides revised from.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
COEN 350 Public Key Infrastructure. PKI Task: Securely distribute public keys. Certificates. Repository for retrieving certificates. Method for revoking.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
COEN 351 Certificates, PKI, X509 Standard. Certificates THE authentication mechanism for E- commerce. Allows customers to authenticate the e-merchant.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
COEN 351 Certificates, PKI, X509 Standard. Certificates Key distribution Crucial for authentication, privacy, signing, … Public Key Technology can use.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
Key management issues in PGP
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Digital Certificates and X.509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
PKI (Public Key Infrastructure)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

1 Lecture 13: Public Key Infrastructure terms PKI trust models –monopoly with registration authorities with delegated certificate authorities –oligarchy –anarchy –name constraints top-down bottom-up certificate revocation certificate storage and lookup certificate constraints and policies standards: X.509, PKIX

2 Introduction Public Key Infrastructure (PKI) – a mechanism of securely distributing public keys important for wide-area trust management (e.g., for e- commerce) usually consists of –a certification authority (CA) – the entity that signs the certificates –certificate repositories –a certificate revocation mechanism

3 Terms principal – any party that has a public (and private) key certificate – a signed message containing a public key of a particular principal –issuer – signer of the certificate –subject – party whose public key is signed if a party has the certificate and trusts the issuer, the party can transitively use the subject as the issuer to obtain certificates from it verifier(relying party) – a party evaluating the chain of certificates target – the intended destination of the verifier in the chain trust anchor – public key that the verifier trusts through external means (obtained securely) example: is Bob has Ted’s public key as a trust anchor, Bob can get Fred’s public key through Carol and Alice [Carol’s public key] Ted [Alice’s public key] Carol [Fred’s public key] Alice

4 Monopoly single organization is the CA for everyone adv: simple to understand and implement problems: –no such universally-trusted organization –requires everyone to authenticate physically with the same CA –compromise recovery is difficult (due to single embedded public key) –once established, CA can abuse its position (excessive pricing, etc.) –requires perfect security at CA

5 Monopoly Variants Monopoly + registration authorities Registration Authority (RA) – an entity that the central CA trusts to do initial processing and authentication before the CA issues the certificate verifiers trust only the CAs –Solves the problem of physically meeting the CA. Other problems remain. Monopoly + delegated CAs central CA establishes trust relationships with delegated CAs verifiers have central CA as the trust anchor but may proceed to delegated CAs in their verification chains –similar to CA+RA but –less efficient than RAs for verifier (chain for certs to verify) –faster than with RA to obtain target certificate both variants can be incorporated to other (non-monopoly) models

6 Oligarchy many root CAs exist and can be used by verifiers as trust anchors model for web security –browsers come configured with 50 or so trusted CA’s public keys Usually, can add or delete from that set Solves the problems of single authority (e.g., potential excessive pricing) problem: less secure –overall security depends on all configured keys –naïve users can be tricked into using platform with bogus keys, or adding bogus ones (easier to do this than install malicious software)

7 Oligarchy Example: Default Trusted Roots in IE

8 Anarchy each user decides whom to trust and how to authenticate their public keys certificates issued by arbitrary parties can be stored in public databases, which can be searched to find a path of trust to a desired party works well for informal, non-sensitive applications (e.g., PGP) problems –does not scale (too many certs, computationally too difficult to find path) –no practical way to tell if path should be trusted –too much work and too many decisions for user

9 Top-Down with Name Constraints assumes hierarchical names each CA only trusted for the part of the namespace rooted at its name can apply to delegated CAs or RAs easier to find appropriate chain more secure in practice – a sensible policy that users don’t have to think about problem – still have to agree on root and other problems of monopoly model

10 Bottom-Up with Name Constraints two organizing principles: intranet and extranet intranet forms a tree –each node is a CA responsible for its subtree –each node has a parent cert (up) and child cert (down) –to navigate: the verifier traverses the tree using parent and child as its trust anchors abc.com nj.abc.comma.abc.com intranet

11 Bottom-Up: Extranets roots of each organization establish peer trust relations (crosslinks) –directly –through designated root service companies (easy to manage trust relationships advantages for bottom-up: –for intranet, no need for outside organization –security within your organization is controlled by your organization –no single compromised key requires massive reconfiguration –easy configuration: public key you start with is your own abc.comxyz.com direct abc.comxyz.com root server-based root server

12 Certificate Revocation certificates have expiration dates (relatively long – one-two years)? if key is compromised, need a fast way to revoke the certificate techniques –Certificate Revocation List (CRL): CA periodically issues a signed and dated list of revoked certs (may be incremental) –On-Line Revocation Server (OLRS): can be queried over the net by verifiers to confirm the status of a cert unlike CA – can be online since compromise damage is minimal (why?) a principal can proactively refresh her certificate at OLRS –good list – instead of storing (or issuing) the list of revoked certs, CA or OLRS can issue the list of certs that are still valid diallows the bad guys to use “undocumented” cert

13 Certificate Storage who should store certificate? subject or issuer or both? subject –easy to implement top-down schemes –unclear if the issuer has the right to store at subjects’s space consider IRS – a lot of people could sign for it, should IRS store those certs? issuer –cross-links and bottom-up links are easier to implement (cert is for the benefit of the issuer) –a problem if a lot of subjects how to handle revocation? – the subject should notify all issuers –how does place of storage affect revocation?

14 Certificate Lookup can be started with –subject sending its certs to the verifier (requires both parties to communicate before message encryption is possible) –directory lookup directory – distributed hierarchical database indexed by hierarchical name –DNS, X.500 (LDAP) it will be desirable that a PKI uses existing directories to store certs –automates the process of cert lookup –currently deployed PKIs don’t use such directories

15 Constraints, Policies and Building Cert Chains certificates may contain policies and constraints constraint – determines the subjects the issuer is trusted to certify –ex: only subjects in the subtree below, no more than two crosslinks away, etc. policy – an arbitrary mechanism to be enforced on certificate propagation –ex: policy=security level, value=confidential to get from anchor to target the verifier needs to build a certificate chain, two ways –forward: from target – does not work well if have constraints and policies –reverse: from trust anchor – okay with constrains&policies how does place of cert storage (subject/issuer) affect the direction of chain building?

16 X.509 dominant certificate standard versions 1 and 2 – allowed only X.500 names fields (v3): –version –serial number –signature algorithm identifier –issuer –validity period –subject –subject public key information –signature –standard extensions (key usage limitation, etc.) –other extensions (application & CA specific)

17 Other Certificate Standards PKIX: Internet standard for X.509-based PKI SPKI: a competing IETF based on syntax alternative to X.509 SDSI: a proposal within SPKI for certificates with relative names only

18 Authorization authorization – allowing or denying a user to access a particular resource ACLs, capabilities –makes a difference whether you can answer “who has access to that” or “what can he do” Reuse of names, or keys as names Groups, roles, nesting