Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.

Slides:



Advertisements
Similar presentations
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Security Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Digital Signatures A Brief Overview by Tim Sigmon August, 2000.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Authentication Applications
S/MIME T ANANDHAN.
Technical Approach Chris Louden Enspier
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000

Outline u PKI refresher (e.g., public key cryptography, digital signatures, certificates) u Bridge certification architecture motivation –trust models –cross-certification u BCA pilot project –BCA itself –application issues and demo

PKI refresher u infrastructure that enables and supports a range of security services –confidentiality, authentication, integrity, non- repudiation u Symmetric key cryptography –same key used to encrypt and decrypt –problem: key sharing u Public key cryptography –public-private keys that are mathematically linked –~500 times slower than symmetric key cryptography –used for symmetric key exchange and digital signatures

Digital Signature example

Signed example u (show example of sending/receiving digitally signed using Netscape Messenger) u (uses S/MIME)

Problem: relying party needs to verify a digital signature u To do this, needs to have an assured copy of the signer’s public key –signer’s identity must be assured –integrity of public key must be assured u Potential options for obtaining public keys –signer personally gives their public key to relying party –relying party obtains the desired public key by other “out of band” means that they trust, e.g., transitive relationships, signing parties, etc. u But, what about strangers? what about integrity of the public key?

Public Key (or Digital) Certificates u Purpose: validate both the integrity of a public key and the identity of the owner u How: bind identifying attributes to a public key (and therefore to the keyholder of the corresponding private key) u Binding is done (i.e., digitally signed) by a trusted third party (Certification Authority) u It is this third party's credibility that provides "trust"

X.509 v3 Certificates u Subject’s/owner’s identifying info (e.g., name) u Subject’s/owner’s public key u Validity dates (not before, not after) u Serial number u Level of assurance u Issuer’s (CA’s) name and signature u Extensions

Distribution of Certificates u since certs carry public info and are integrity- protected, they can be distributed and shared by any and all means, e.g., –distribute via floppies or other removable media –publish on web sites –distribute via (e.g., S/MIME) –directory lookups (e.g., LDAP, X.500) u distribution via directories is the ultimate solution u however, many important applications and uses of digital signatures can be implemented without the implementation or use of sophisticated directories

Trust Domain u Relying party needs to determine whether to trust the certificate before using the public key it contains to verify the original signature –validity dates, revocation lists, policy constraints –verify the cert’s signature, trust the CA? u Trust domain is defined by the root (or self- signed) certificates that the relying party knows and trusts (for reasons outside of PKI) u Very Important: Root certificates are not integrity-protected since they are self-signed

CA 1  EE A CA 1  CA 1 Simple Hierarchical Trust Relying Party Signed doc and CA 1  EE A e.g., or web form application Trust Domain 1) path construction CA 1  EE A CA 1  CA 1 2) path validation 3) signature verification

Trust Domain Expansion u Hierarchical CA’s CA 1  CA 1 CA 1  CA 2 CA 1  CA 3 CA 2  CA 4 CA 2  CA 5 CA 5  CA 6 CA 5  EE 1 CA 2  CA 5 CA 1  CA 2 Note: relying party follows issuer chain to verify cert of EE 2 CA 5  EE 1 CA 1  CA 1  trusted ( Governor ) (UVa) (SoED) (tms) (Darden) (DGIF)

Trust Domain Expansion u Hierarchical CA’s CA 1  CA 1 CA 1  CA 2 CA 1  CA 3 CA 2  CA 4 CA 2  CA 5 CA 5  CA 6 CA 5  EE 1 Note: if CA 1 ’s private key is compromised, the entire hierarchy collapses CA A  CA A CA Z  CA Z CA C  CA C CA B  CA B... u Multiple root certificates –disservice of Microsoft and Netscape

Trust Domain Expansion (cont’d) u Cross certification –two CA’s issue certificates to each other (a cross- certificate pair), i.e., sign each other’s public keys CA A  CA A... CA B  CA B... CA A  CA B CA B  CA A CA B  EE 1 –N 2 problem if N CA’s want to cross-certify with each other

Bridge Certification Architecture u addresses the N 2 problem by providing a central cross-certification hub for a group of CA’s who wish to interoperate u each CA does one cross-certification with the bridge CA CA bridge  CA 5 CA 1  CA bridge u Certificate path processing (construction & validation) CA 5  EE 2 CA 1  CA 1  trusted

BCA Pilot Implementation u OpenSSL ( and OpenCA ( open source software running on Red Hat Linux u Bridge is booted only to create cross certificates; remains turned off in secure location most of the time u Cross certificates stored in LDAP directories (using crossCertificatePair attribute) and/or stored with relying parties

Example application u Yuji Shinozaki is developing an example application (digitally signed web forms) to illustrate use of BCA u chose server-based app instead of –current relying party software can only verify hierarchical trust relationships u as part of federal bridge project, Cygnacom developed Certificate Path Library (CPL) that handles general trust relationships u use CPL to help verify digitally-signed web forms in a cross-certification environment

Example application u