PKI and Identity-Based Encryption Secure IT Conference 2007 Guido Appenzeller Voltage Security.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
PAR for P Title: Standard for Pairing based Cryptographic Techniques June 4, 2005 PAR for IEEE P
` Key Management The Connection Between Policy and Encryption Terence Spies CTO Voltage Security.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
CP3397 ECommerce.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapter 5 Network Security Protocols in Practice Part I
RIKE Using Revocable Identities to Support Key Escrow in PKIs Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao State Key Laboratory of Information Security,
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Technology – Broad View1 Networks  For the most part, not a technology, but political/financial issue Available bandwidth continuously increasing (“√2-rule”
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Chapter 11: Active Directory Certificate Services
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.
Identity-Based Encryption Technology Overview Public Key Cryptography Without Certificates Mark J. Schertler.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Configuring Active Directory Certificate Services Lesson 13.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
James Higdon, Sameer Sherwani
Configuring Directory Certificate Services Lesson 13.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 14: Public Key Infrastructure.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Private key
Key management issues in PGP
Cryptography and Network Security
PKI and Identity-Based Encryption Secure IT Conference 2007
S/MIME T ANANDHAN.
IS3230 Access Security Unit 9 PKI and Encryption
Install AD Certificate Services
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

PKI and Identity-Based Encryption Secure IT Conference 2007 Guido Appenzeller Voltage Security

Secure IT Conference Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm  A number of widely-used encryption algorithms are already available (AES, RSA, ECC etc.)  Why on earth should we care about a new one? 1. IBE results in vastly simplified key management 2. As a result, IBE based solutions have a much lower total cost of ownership and much higher usability 3. It has gained widespread adoption in Industry and has opened up the use of encryption to new use cases

Identity-Based Encryption

Secure IT Conference Identity-Based Encryption Basic Idea: Public-key Encryption where Identities are Public Keys  IBE Public Key:  RSA Public Key: Public exponent=0x10001 Modulus=

Secure IT Conference IBE does not need certificates  Certificates bind Public Keys to Identities  e.g. has key 0x87F6…  Signed by a Certification Authority  In IBE, Identity and Public Key is the same  No certificate needed  No certificate revocation  No certificate servers  No pre-enrollment X

Secure IT Conference Identity-Based Encryption (IBE)  IBE is an old idea  Originally proposed by Adi Shamir, co-inventor of the RSA Algorithm, in 1984  First practical implementation  Boneh-Franklin Algorithm published at Crypto 2001  Based on well-tested building blocks for encryption (elliptic curves and pairings)  IBE is having a major impact already  Over 200 scientific publications on IBE/Pairings  Boneh-Franklin paper cited 450 times so far (Google Scholar)  Dan Boneh awarded 2005 RSA Conference Award for Mathematics for inventing IBE

Secure IT Conference How IBE works in practice Alice sends a Message to Bob Key Server key request + authenticate master secret public params

Secure IT Conference How IBE works in practice Second Message to Bob Key Server public params Fully off-line - no connection to server required

Secure IT Conference The IBE Key Server  Master Secret is used to generate keys  Each organization has a different secret  Thus different security domains  Server does not need to keep state  No storage associated with server  Easy load balancing, disaster recovery Key Server Master Secret s = Request for Private Key for Identity

Secure IT Conference User authentication Authentication needs differs by Application  More sensitive data, requires stronger authentication  Even for one organization, very different needs for different groups of users Key Server Auth. Service External authentication  Leverage existing passwords, directories, portals, etc.  One size doesn’t fit all

Secure IT Conference OMB Level: Level 1 Level 2 Level 4 Level 3 No Authentication answerback (VeriSign Class 1) answerback w/ passwords Directory with pre-enrollment Windows domain controller or SSO RSA SecurID PKI Smart Card, USB Token Three factor auth (Bio+PKI+PIN) Pre-enrollment Self-provisioning OOB password with call center reset The Authentication Gradient

Secure IT Conference Key Revocation, Expiration and Policy  What happens if I lose my private key?  Key validity enables revocation – “key freshness”  Every week public key changes, so every week a new private key is issued  revocation can be done on weekly basis  To revoke someone, simply remove him from the authentication mechanism (e.g. corporate directory) address key validity || week = 252

Secure IT Conference IEEE – Pairing Based IBE Standard  IEEE 1363 Standards Group  Wrote standard on RSA and Elliptic Curve Cryptography  Now taking steps to standardize IBE  IEEE  “Identity-Based Cryptographic methods using Pairings”  Main focus is on IBE, but also related methods (e.g. ID based signatures)  Strong support from Government and Industry  Meetings attended by representatives from NIST, NSA, HP, Microsoft, Gemplus, Motorola and others

Secure IT Conference IETF – IBE based Secure Standard  Internet Engineering Task Force  Sets standards for the Internet  TCP/IP, IPSec, HTTP, TLS, DNS etc.  Effort through the S/MIME Group  S/MIME today implemented in all major clients  IBE as an additional key transport for S/MIME  Standard includes IBE Key Request Protocol, IBE Parameter Lookup Protocol and selected IBE Algorithms  Final RFC expected in 2007

Secure IT Conference Standard Textbooks incorporating Identity-Based Encryption Elliptic Curves by Lawrence C. Washington Handbook of Elliptic and Hyperelliptic Curve Cryptography by Henri Cohen, Gerhard Frey Elliptic Curves in Cryptography Edited by Ian Blake, Gadiel Seroussi and Nigel Smart Cryptography: Theory and Practice (3 rd Ed.) by Douglas R. Stinson

Secure IT Conference Awards for IBE Products  IAPP Privacy Innovation Technology Award  AlwaysOn Top 100 Companies - July 2005  Red Herring 100 Top Private Companies 2005  Gartner Group – Cool Security Vendor 2005  eWeek Finalist 2005 – Management and Security  RSA 2005 Prize for Mathematics – Dr. Dan Boneh  SC Magazine Finalist 2005 – Best Security Solution and Best Encryption Solution  AlwaysOn “Top new innovator company” – July 2004  InfoWorld Innovators Award - May 2004 Bank  Network World “Tops in Innovation” - February, 2004  Technology News “Top Ten Technology Companies” - August, 2003 RSA Mathematics Prize 2005

Key Management

Secure IT Conference Encryption today is a solved problem Example: Encrypting an message Alice Bob Encryption Key Decryption Key How do we make sure Alice and Bob have the right keys?

Secure IT Conference What is hard about managing keys?  Enrollment  Key creation, duplicate keys  Distribution  Lookup, Storage and Access  Finding the encryption key of a recipient  Recovery of decryption keys Virus scanning, spam filtering Archiving s for compliance  Synchronizing distributed key stores  Key life cycle  Revoking keys, expiring keys  Backup of keys, disaster recovery

Secure IT Conference Key Management for Symmetric Keys Example: Organization with 8 people Key Store 28 keys How many keys total for 8 people? Key Server

Secure IT Conference Key Management with Symmetric Keys  One key per pair of users  Network of 8 parties requires managing 28 keys  Network of 1000 users requires 500,000 keys  Network of N parties requires N(N+1)/2 keys  Alternative: One key per  Network of 1000 users  Assume 50 s per user per day  18,250,000 keys per year  Key management with symmetric keys doesn’t scale!

Secure IT Conference Public Key Infrastructure (PKI)  Public Key Encryption  Users have a Public Key and a Private Key  Only need one key per party, total of N keys for N parties  Keys are bound to users with Certificates  Examples: RSA, Elliptic Curve etc.  Managing PKI has issues of its own  How do I create certificates for everyone?  How do I revoke a certificate?  How do I find the certificate of a recipient?  How do I manage certificate distribution  What do I do if private keys are lost  …

Secure IT Conference Key Management - Public Key Infrastructure Certificate Server binds Identity to Public Key Send Public Key, Authenticate Receive Certificate CA Signing Key Certification Authority CA Public Key Certificate Server Store Certificate Look up Bob’s Certificate, Check revocation CA Public Key Bob’s Private Key Bob’s Public Key Recovery Server Store Bob’s Private Key

Secure IT Conference Key Management - IBE Binding is done by mathematics IBE Key Server Master Secret Send Identity, Authenticate Receive Private Key Public Parameters Bob’s Private Key Certificate Server Store Certificate Look up Bob’s Certificate, Check revocation X Recovery Server Store Bob’s Private Key X

Deploying IBE Systems Example: Security

Secure IT Conference Secure – Deployment Options Today It’s not just Alice and Bob Virus Audit Archive Internet Normal Client Gateway Client with plug-in Blackberry BES Server System Generated Web Mail (via ZDM) Mobile Devices Client (via ZDM) Client (via plug-in) Client with plug-in IntranetDMZInternetRecipient’s Network

Secure IT Conference Gateways Internal NetworkINTERNET User receives decrypted 3 Encrypted arrives 1 Gateway decrypts 2 Key Server IBE Gateway

Secure IT Conference Inspecting Secured Data IBE allows content inspection for end-to-end encrypted data DMZLANINTERNET IBE Server Exchange, Domino, etc. User receives encrypted 3 GW Virus Audit Archive is scanned 2 Encrypted arrives 1 GW

Secure IT Conference  IBE Key Servers are “stateless”  No certificates to store  No private keys to store  No revocation lists  Easy to load-balance  Just put two of them next to each other  Easy backup and disaster recovery  Only master secret and policy needs to be backed up  Size: < 100 kByte, fits on floppy disk  Master secret is long lived, only need to back up once  Same for 100 or 100,000 users IBE Systems are extremely Scalable

Secure IT Conference  IBE Systems have a substantially lower TCO  Case Study: For encryption, IBE costs 30% of PKI  Less infrastructure needed, less additional FTE to manage solution  Fewer components to be concerned with Disaster Recovery  Easier user experience – less training and help desk support [Source: Ferris Research Case Study on Voltage Secur ] Total Cost of Ownership

Secure IT Conference Summary  IBE is a major breakthrough in Key Management  Much lower total cost of ownership than PKI  Better usability and deployment characteristics  Highly Scalable  Where to learn more  IEEE , IETF S/Mime Standards 