Haidong Xue.  Part One: Review of the Knowledge in Textbook goals, issues, solutions  Part Two: Current Application X509.V3  Part Three: Future Work.

Slides:



Advertisements
Similar presentations
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
Advertisements

AUTHENTICATION AND KEY DISTRIBUTION
Chapter 14 – Authentication Applications
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
CP3397 ECommerce.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Digital Signatures. Anononymity and the Internet.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Chapter 31 Network Security
Public Key Cryptography July Topics  Symmetric and Asymmetric Cryptography  Public Key Cryptography  Digital Signatures  Digital Certificates.
Strong Cryptographic Infrastructure and its Applications Dr Lucas Hui Center for Information Security & Cryptography Department of Computer Science & Information.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Secure Socket Layer (SSL)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Security Chapter 8.
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
IM NTU Distributed Information Systems 2004 Security -- 1 Security Yih-Kuen Tsay Dept. of Information Management National Taiwan University.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Security CNS 4650 Fall 2004 Rev. 2 SSL, SASL, PKI.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Elliptic Curve Cryptography
CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
GRID-FR French CA Alice de Bignicourt.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Cryptography Why Cryptography Symmetric Encryption
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Public-Key Certificates
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Haidong Xue

 Part One: Review of the Knowledge in Textbook goals, issues, solutions  Part Two: Current Application X509.V3  Part Three: Future Work

goals Issues solutions

Goals:  Secrecy  Integrity  Availability  Reliability  Safety

Issues:  Access authorization discretionary access control mandatory access control  Message Security cryptography  Mutual Authentication cryptography

Cryptography: private key system public key system protocol: Kerberos, X.509

DES RSA MD5

X.509 V3

 Certificate ◦ Version ◦ Serial Number ◦ Signature Algorithm ◦ Issuer ◦ Validity Subject ◦ Subject Public Key Info  Public Key Algorithm  Subject Public Key ◦ Issuer Unique Identifier (Optional) ◦ Subject Unique Identifier (Optional) ◦ Extensions (Optional)  Certificate Signature Algorithm  Certificate Signature (

Customer Kc-private Kb-public Bank Kb-private Kc-public 1. A = RSA(Information, Kb-public) 2. B = RSA(A, Kc-private) 3. Send A,B

Customer Kc-private Kb-public Bank Kb-private Kc-public 1.Signature: (1). A = MD5(information) (2). B = RSA(A, Kc-private) 2. Encrypt: (1). Generate 128bits DES Key (2). C = DES(information, K-des) (3). D = RSA(K-des, Kb-public) 3. Send B, C, D

Customer Kc-private Kb-public Kca-public Bank Kb-private Kc-public Certificate Authority: Kca-private Kb-public RSA( MD5(Kb-public), Kca-private)

A new kind of private key

 Randy Chow, Theodore Johnson. Distributed Operating Systems& Algorithms. Addison Wesley, 1997  X  Public key certificate.  Introduction to the digital certificates. d862d986ca.html d862d986ca.html  Principles of digital certificates aspx