Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Introduction of Grid Security
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Technical Presentation AIAC Group 11. System Rationale System Architecture Secure Channel Establishment Username/Password Cartão Cidadão Digital.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A responsibility based model EDG CA Managers Meeting June 13, 2003.
 A public-key infrastructure ( PKI ) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store,
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Presentation Two: Grid Security Part Two: Grid Security A: Grid Security Infrastructure (GSI) B: PKI and X.509 certificates C: Proxy certificates D:
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
\ Grid Security and Authentication1. David Groep Physics Data Processing group Nikhef.
Security Awareness: Applying Practical Security in Your World
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Lecture 11 Reliability and Security in IT infrastructure.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Information Security Technological Security Implementation and Privacy Protection.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
On Robots J Jensen STFC Rutherford Appleton Lab OGF 20, Manchester, May 2007.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
Cryptography, Authentication and Digital Signatures
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
OSG PKI Contingency and Recovery Plans Mine Altunay, Von Welch OSG Council August 23, 2012.
Delegation and Proxy Services in Digital Credential Environments Carlisle Adams School of Information Technology and Engineering University of Ottawa.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
DIGITAL SIGNATURE.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Digital Signatures and Digital Certificates Monil Adhikari.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
Encryption Name : Maryam Mohammed Alshami ID:H
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
TAG Presentation 18th May 2004 Paul Butler
Security Issues in Information Technology
Key management issues in PGP
Technical Report PKI for
Technical Report PKI for
PKI (Public Key Infrastructure)
Dr Linda Cornwall STFC/RAL EGI OMB 27th September 2013
National Trust Platform
Presentation transcript:

Private Key Protection

Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private key –Without revealing information about private key Thus it is necessary to protect the private key

Use of Certificates Personal certificates –Private key activated by person at time of use –Private key activated once, then held open Host certificates –Private key unprotected (use when booted) –Or protected (passphrase when starting) CA certificates –Private key activated when signing

Protection of Private Key Software vs Hardware Passphrase, no passphrase Subject certificates can be revoked and reissued But what if they cant? E.g., VOMS. Or the CA itself?

Protection from what? Compromise… –Attacker is able to use key –Normal confidentiality issues Loss… –Legitimate user unable to use key –Normal curation and storage issues

Compromise and Loss Compromise –Stolen key (unencrypted) –Break into machine with unencrypted key –Disgruntled employee vanishing with key material –Key stored on NFS partition with weak passphrase? Loss –Somebody steals all the copies of your keys –(We tell users to create backups, CAs are backed up) –ROBAB –Not just key, also crucial procedures

Consequences of Compromise Attacker can use the private key maliciously Worse, loss of trust in legitimate signatures => key cannot be used Potentially loss of trust in infrastructure and ops

Recovery from Compromise Announce revocation Subject certificates can be revoked and reissued But sometimes they cant –When the trust is in the certificate –Not the DN –Cf VOMS. Or the CA!

Consequences of Loss Entity unable to use private key (duh) Potentially loss of trust in infrastructure and ops Potentially expensive recovery (e.g. from ROBAB)

Recovery from Loss Similar to compromise! New certificate must be created and distributed Means to re-establish trust Re-establish procedures

Preventing Loss AND Compromise Confidential Curation? Keep multiple separate copies –Which is good for curation purposes –But can be bad for confidentiality Documented and tested recovery procedures –Which is good for curation purposes –But can be bad for confidentiality More than one person can access backup –Which is good for curation purposes –But can be bad for confidentiality

Between a rock and a hard place Does it make sense to define these: –Suspected compromise –Potential compromise –Possible compromise And if so, what are they? Tetrapilectomy (Eco) If the CAs private key is compromised or suspected compromised…

Other variations

How to store a key for 10+ years Print on paper… (scannable font) Store in a safe location…how to one? –In a lab where access is guaranteed to: cleaners, health and safety inspectors, electricians, … –Truly safe locations are expensive (hard to argue business case) –Off site? –Accessed by legitimate users (ROBAB)?

n-of-m protection Shamir secret sharing (3-5, 4-7, 5-9, …) –Can re-encode easily 2048 bit key: large numbers –Only need 1024 secret bits, modulus is public! Needs programming! Need HLL native bigint implementation –Lisp, Java, Python, Caml Multiple implementations? (stable languages, not latest fad)

Secret Sharing contd Now, each share is >= 1024 bits (or so, depending on parameter choice) 2**1024 = 10**309 = 16 ** 256 = 36**198 Not rememberable – must be written down Share holder must understand how to use it… Stable member of staff…? Testing? Rekeying? Rekeying regularly?