A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Work Plan 2000 APNIC Annual Member Meeting Seoul, 3 March 2000.
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Open Policy Meeting SIG: Whois Database October 2000 APNIC Certificate Authority.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CP3397 ECommerce.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 5 Network Security Protocols in Practice Part I
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Cryptography in e-Business Guest Lecture, November 13, 2006, Olin College Steven R. Gordon Prof. of Info Tech Management Babson College.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 7 Digital Certificates.
Tiago Rodrigues Antao. RIPE 45, May 2003, Barcelona. 1 Improved Secure Communication System for RIPE NCC Members Tiago Rodrigues Antao.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Public Key Infrastructure Ammar Hasayen ….
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Authentication 3: On The Internet. 2 Readings URL attacks
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Digital Signatures and Digital Certificates Monil Adhikari.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Public Key Infrastructure (PKI)
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Authentication Applications
Using SSL – Secure Socket Layer
APNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Digital Certificates and X.509
Presentation transcript:

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA Project  Cryptography and PKI Overview  APNIC CA project  Benefits and costs  Project plans  Future developments  References  Questions?

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Cryptography - Terms  Public key cryptography  Cryptography technique using different keys for encoding and decoding messages  Keypair  Private key and public key, generated together, used in public key cryptography  Encryption/Decryption  To encode/decode a message using a public or private key

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Decrypt Message Transmit Encrypted Message Public Key Cryptography - Encryption Encrypt Encrypted Message Keypair Retrieve Public Key

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Decrypt Message Transmit “Signed” Message Public Key Cryptography - Encryption Encrypt “Signed” Message Keypair Retrieve Public Key

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Public Key Cryptography - Digital Signature Assemble Signed Message Digest Hash Signature Encrypt Message Keypair

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Public Key Cryptography - Digital Signature Signature Message Digest Valid? Signed Message Digest Decrypt Retrieve Public Key

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E PKI - Terminology  Public Key Infrastructure (PKI)  Administrative structure for support of public key cryptography  Public Key Certificate (Digital Certificate)  Document linking a Public Key to an identity, signed by a CA, defined by X.509  Certificate Authority (CA)  Trusted authority which issues digital certificates

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Digital Certificates  A digital certificate contains:  Identity details  eg Personal ID, address, web site URL  Public key of identity  Issuer (Certification Authority)  Validity period  Attributes  The certificate is signed by the CA

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Digital Certificate - Example Certificate ::= SEQUENCE { tbsCertificate TBSCertificate, tbsCertificate TBSCertificate, signatureAlgorithm AlgorithmIdentifier, signatureAlgorithm AlgorithmIdentifier, signature BIT STRING signature BIT STRING } TBSCertificate ::= SEQUENCE { version [0] EXPLICIT Version DEFAULT v1, version [0] EXPLICIT Version DEFAULT v1, serialNumber CertificateSerialNumber, serialNumber CertificateSerialNumber, signature AlgorithmIdentifier, signature AlgorithmIdentifier, issuer Name, issuer Name, validity Validity, validity Validity, subject Name, subject Name, subjectPublicKeyInfo SubjectPublicKeyInfo, subjectPublicKeyInfo SubjectPublicKeyInfo, issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL, issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL, subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL, subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL, extensions [3] EXPLICIT Extensions OPTIONAL extensions [3] EXPLICIT Extensions OPTIONAL }

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Digital Certificate - Lifecycle Key Pair Generated Certificate Issued Certificate valid and in use Private Key compromised Certificate Expires Recertify Certificate Revoked Keypair Expired

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Why?  In response to  Membership concern for greater security  Confidential info exchange with APNIC  Is my database transaction secure?  Whose prefixes do you accept?  Internet community interest in security, PKI, digital certificates  e.g. rps-auth  IETF working group: PKIX

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Overview  Certificate issued to APNIC member  Corresponds to Membership of APNIC  Provides uniform mechanism for all security needs, such as :  Encryption and signature of with APNIC  Authentication of access to APNIC web site  Secure maintainer mechanism for APNIC database  Future authorisation mechanism for Internet resources  Authentication of resource custodianship

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Benefits/Costs  Benefits  Uniform industry-standard mechanism for “single password” security, authentication and authorisation  Strong public key cryptography, end-to-end  Costs  Server and client software  Change to current procedures  New policies  Establishment: software purchase and/or development

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Roadmap

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Timeline

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA – Phase 1 Timeline

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Scoping Project  October January 2000  Objectives  Analyse impact of introducing PKI  Provide focus for discussions  Raise awareness of PKI in general  Conclusions  Significant benefits for members’ security  Growing standards support for PKI  See:

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA – Phase 1  April – November 2000  Deliverables  Tender and selection of CA software  Policies for use of APNIC Certificates  Procedures for issuance and revocation of Identity certificates to members  Browser and deployment issues analysis  Issue trial certificates at APNIC Meeting October 2000  Risk Analysis

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA – Phase 2  January – June 2001  Deliverables  Certificates used for website access control  Support for X509 certificates in whois database  Strong encryption for member correspondence  Investigation of use of Attribute Certificates with resource allocation

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Future  Generalised CA function  APNIC Certificates may be used for general purposes  Requires tight policy and quality framework for APNIC certificates to be trusted  Hierarchical certification  APNIC Members may use their certificates to certify their own members or customers  May be applicable for ISPs and NIRs

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Future  Public Key Certificates  X.509 certificate linking a Public Key to an identity, issued by CA  Attribute Certificates  X.509 certificate linking Attributes to an identity, issued by CA or other authority  Provides authorisation, rather than authentication, information  Not yet widely deployed or supported  May be extended to carry resource allocation information

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Future  Resource certification  For verification of resource allocations by RIRs  Currently under discussion in IETF PKIX working group draft-clynn-bgp-x509-auth-01.txt “X.509 Extensions for Authorization of IP Addresses AS Numbers, and Routers within an AS”  APNIC watching developments

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Consultation  Mailing list open after Apricot2000    Further developments  See:

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC CA - Documents  IETF PKIX drafts: draft-ietf-pkix-roadmap-04.txt “Internet X.509 Public Key Infrastructure PKIX Roadmap” draft-clynn-bgp-x509-auth-01.txt “X.509 Extensions for Authorization of IP Addresses AS Numbers, and Routers within an AS” draft-ietf-pkix-ac509prof-01.txt “An Internet Attribute Certificate Profile for Authorization” 

A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Questions?