An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.

Slides:



Advertisements
Similar presentations
An Introduction to Distributed Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
SSL Implementation Guide Onno W. Purbo
An Introduction to Distributed Security Concepts and Public Key Infrastructure (PKI) Mary Thompson, Oleg Kolesnikov Berkeley National Laboratory, 1 Cyclotron.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Cryptography and Network Security
Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
An Introduction to Distributed Security Concepts and Public Key Infrastructure (PKI) Mary Thompson Oleg Kolesnikov.
Cryptography and Network Security Chapter 17
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Laboratory for Reliable Computing Department of Electrical Engineering National Tsing Hua University Hsinchu, Taiwan Security Processor: A Review Chih-Pin.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 8 Web Security.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cryptography 101 Frank Hecker
JSSE API University of Palestine Eng. Wisam Zaqoot April 2010.
CSCI 6962: Server-side Design and Programming
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Secure Socket Layer (SSL)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit 1: Protection and Security for Grid Computing Part 2
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Chapter 21 Distributed System Security Copyright © 2008.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Washington System Center © 2005 IBM Corporation August 25, 2005 RDS Training Secure Socket Layer (SSL) Overview z/Series Security (Mary Sweat, Greg Boyd)
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Cryptography CSS 329 Lecture 13:SSL.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography and Network Security
Secure Sockets Layer (SSL)
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
Cryptography and Network Security
Presentation transcript:

An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson

Security Levels l Confidentiality n Protection from disclosure to unauthorized persons l Integrity n Maintaining data consistency l Authentication n Assurance of identity of person or originator of data l Non-repudiation n Originator of communications can't deny it later l Authorization n Identity combined with an access policy grants the rights to perform some action

Security Building Blocks l Encryption provides n confidentiality, can provide authentication and integrity protection l Checksums/hash algorithms provide n integrity protection, can provide authentication l Digital signatures provide n authentication, integrity protection, and non-repudiation

Keys l Symetric Keys n Both parties share the same secret key n Problem is securely distributing the key n DES - 56 bit key considered unsafe for financial purposes since 1998 n 3 DES uses three DES keys l Public/Private keys n One key is the mathematical inverse of the other n Private keys are known only to the owner n Public key are stored in public servers, usually in a X.509 certificate. n RSA (patent expires Sept 2000), Diffie-Hellman, DSA

Hash Algorithms l Reduce variable-length input to fixed-length (128 or 160bit) output l Requirements n Can't deduce input from output n Can't generate a given output n Can't find two inputs which produce the same output l Used to n Produce fixed-length fingerprint of arbitrary-length data n Produce data checksums to enable detection of modifications n Distill passwords down to fixed-length encryption keys l Also called message digests or fingerprints

Message Authentication Code MAC l Hash algorithm + key to make hash value dependant on the key l Most common form is HMAC (hash MAC) n hash( key, hash( key, data )) l Key affects both start and end of hashing process l Naming: hash + key = HMAC-hash MD5 1 HMAC-MD5 SHA-1 1 HMAC-SHA (recommended)

Digital Signatures l Combines a hash with a digital signature algorithm l To sign n hash the data n encrypt the hash with the sender's private key n send data signer’s name and signature l To verify n hash the data n decrypt the signature with the sender's public key n the result of which should match the hash

Elements of PKI l Certificate Authorities (CA) n OpenSSL, Netscape, Verisign, Entrust, RSA Keon l Public/Private Key Pairs - Key management l x.509 Identity Certificates - Certificate management l LDAP servers

X.509 Identity Certificates l Distinguished Name of user n C=US, O=Lawrence Berkely National Laboratory, OU=DSD, CN=Mary R. Thompson l DN of Issuer n C=US, O=Lawrence Berkely National Laboratory, CN=LBNL-CA l Validity dates: n Not before, Not after l User's public key l V3- extensions l Signed by CA

Certificate Authority l A trusted third party - must be a secure server l Signs and publishes X.509 Identity certificates l Revokes certificates and publishes a Certification Revocation List (CRL) l Many vendors n OpenSSL - open source, very simple n Netscape - free for limited number of certificates n Entrust - Can be run by enterprise or by Entrust n Verisign - Run by Verisign under contract to enterprise n RSA Security - Keon servers

LDAP server l Lightweight Directory Access Protocol n Evolved from DAP and X.500 Identities l Used by CA's to store user's Identity Certificate l Open source implementations l Standard protocol for lookup, entry, etc. l Access control is implemented by user, password.

SSL - OpenSSL l Secure message passing protocol l Developed by Netscape, now an IETF RFC (TLS Jan '99) l Protocol for using one or two public/private keys n to authenticate a sever to a client n and by requiring a client key to authenticates the client to the server n establish a shared symetric key (the session key) n uses the session key to encypt all data over the secure channel l Gives you authentication, message integrity and confidentiality l Everything except authorizaton

SSL Handshake l Negotiate the cipher suite l Establish a shared session key l Authenticate the server (optional) l Authenticate the client (optional) l Authenticate previously exhanged data

SSL handshake details l Client hello: n Client challenge n Available cipher suites (eg RSA + RC4/40 + MD5) l Server hello: n Server certificate n Connection ID n Selected cipher suite l Server adapts to client capabilities l Optional certificate exchange to authenticate server/client n Commercial sites only use server authentication

SSL Handshake - details Client Server Generate Challenge Define Protocols Return Server Certificate Generate connection ID Confirm Protocols Decrypt session key Generate server read/write Key pairs Generates session key Generate Client read/write key pairs Encyrpt session key Verify server certificate Encrypt random challenge phrase Decrypt and verify challenge phrase Challenge Encryption protocols Server Cert Encryption protocols Connection Id (Session Key) Server's public key (Client's Challenge) Server Write Key

SSL Handshake Client Server Decrypt challenge Decrypt Message Digest and Client Certificate Verify Client certificate and recompute message digest Done Calculate message digest on Challenge and Server certificate (Challenge phrase) Server write key [Message Digest & Client Certificate] Client private key (Session Identifier) Server's write key Client Authentication Generate new challenge Requests Client certificate

Status l Single purpose CA’s e.g. Globus (SSLeay) Collaboratory, DOE-Grid (Netscape) l Enterprises slow to run CA’s n Many different Vendors - Verisign, Entrust, Netscape, RSA Security Keon n Incompatible Key and Certificate management between vendors n Certificates are not integrated with existing applications that need authorization n Large amount of corporate overhead in running a CA n Uncertain legal implications of issuing certificates l Lab is currently looking at the RSA Keon server as it has integration with ssh and NIS authorization

Public Key Cryptography Standards - PKCS l PKCS 7 n Cryptographic Message Syntax Standard l PKCS 10 n Certification Request Syntax Standard - used by Netscape browser, IE, and SSL libraries l PKCS 11 n Cryptographic Token Interface Standard - An API for signing and verifying data by a device that holds the key l PKCS 12 n Personal Information Exchange Syntax Standard - file format for storing certificate and private key - used to move private information between browsers

References l Peter Guttman's tutorial n about 500 slides covering cryptography, secure connection protocols, PKI, politics and more. l RSA Laboratories PKCS specifications n l SSL/TLS n TLS v 1.0 RFC - n SSL-v3 n openSSL l Certificates n