The document provides an overview of the current status of PKI (Public Key Infrastructure) in Korea. It notes that there are 5 accredited CAs that have issued around 25 million accredited certificates to subscribers. Major PKI applications in Korea include internet banking, online stock trading, internet shopping, and e-government services. It also outlines the PKI models in Korea, including the roles of the national root CA (KISA) and government root CA (GCMA). The scope of PKI benchmarking in Korea includes laws, policies, standards, PKI technology, models (national PKI and government PKI), user promotion and convenience, interoperability between CAs, and major PKI applications.
5. 4Copyright 2013@KICA Inc. All rights reserved
PKI History – RSA, DH
Ron Rivest, Adi Shamir and Len Adleman, the R, S and A in RSA Security
“A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”(1977)
R, S and A win Lifetime Achievement AwardAdi Shamir Ron Rivest Len Adleman
Whitfield Diffie Martin Hellman
6. 5Copyright 2013@KICA Inc. All rights reserved
PKI History
1994: Smart card
1997: Smart card + PKI
2011: Cloud + PKI?
1995: PKI and US Postal Services
1996: Windows 95
7. 6Copyright 2013@KICA Inc. All rights reserved
PKI History
“PKI Integration – It’s Not All or Nothing”
Year of the PKI
The Second Coming of PKI
“I have PKI – Now What?”
“Reinventing PKI”
8. 7Copyright 2013@KICA Inc. All rights reserved
PKI (Public Key Infrastructure)?
Personnel, policy, procedures, components and facilities to bind user
names to electronic keys so that applications can provide the desired
security services.
Client
Cert
Server
Cert
certificate
Directory
Server
repository PKI Server
Server-side software
Client-side softwareCertificate
Authority
Registration
Authority
(PC/Phone/PDA)
PKI Client
Digital
Signature
9. 8Copyright 2013@KICA Inc. All rights reserved
PKI Center System Configuration
PKI Center
Internet
TS
Admin PC
DB
DS
OCSP
User
Firewall
RA
TSA
KRS/
Etc.
Admin: Administrator Program
User: User S/W
CA: Certificate Authority Server
RA: Registration Authority Server
DS: Directory Server
OCSP: Online Certificate
Status Protocol Server
VA: Validation Authority Server
HSM: Hardware Security Module
(Accelerator)
TS: Time Stamp Module
GPS: Time Accuracy Maintainer
TSA: Time Stamp Authority
Server
DVCS: Data Validation
Certification Server
KRS: Key Roaming Server
Etc.: Other Service Server
※All networks and servers are
double connected (Fault Tolerant)
L4 Switch
HSM
GPS Receiver
CA
10. 9Copyright 2013@KICA Inc. All rights reserved
Difference between NPKI and PKI system
National PKI = Law/Standards + PKI system + Operation
Category National PKI PKI system
Customer Accredited CA, Root CA PKI products
Base
Law (Electronic transaction
Act and decrees)
Domestic/International
Standards
Scope of
Evaluation
Wide
(System, Policy, Operation)
Narrow
(Only System)
Compensation Easy to get compensated N/A
Interoperability Guaranteed by Law Impossible
Application
All for public (E-
Government, E-Procurement,
E-Commerce, E-Banking, E-
Tax, etc)
Only for the limited area
(Private Service)
Level of technology
and security
Very secure
(proved technology + law)
Secure
(proved technology)
Burden of Proof Accredited CA User
Usage Infrastructure System (Software)
11. 10Copyright 2013@KICA Inc. All rights reserved
Why need a NPKI?
It will result to duplication of resources and confusion in
policy-making because of absence of unified infrastructure.
It will not grow its national competitive edge in the same
region because a country doesn’t accumulate and retain its
own technologies related to security and certification.
The interoperability issue among CA’s must happen due to
absence of united technical standards.
It is difficult to build e-government framework because
PKI is the mandatory infrastructure in e-government.
It is hard to cooperate with other nations about
international interoperability because of the absence of
accredited CA.
User or entities have to use a lot of certificate for each
application.
12. 11Copyright 2013@KICA Inc. All rights reserved
Need for Digital Signature
Risk of deceiving
identity of sender Authentication Digital Signature
Risk of changing information
on transmission Integrity Digital Signature
Risk of denying a fact
information transmit Non-repudiation Digital Signature
Risk of exposing information
on transmission Confidentiality Encryption
SolutionsProblems
onlineOffline (face-to-face)
Industrial Society Informational Society
13. 12Copyright 2013@KICA Inc. All rights reserved
Digital Signature Technology
Authentication, Integrity, Non-Repudiation
Signer Verifer
Hash
Algorithm
Hash Code Sign
Digital
Signature
Client Certificate
Hash Code
Hash Code
Compare
Private Key
Verify
Public Key
Hash
Algorithm
Certificate
Verification
Digital Signature Signing Digital Signature verificationSending
Encrypted
Private Key
AES
Decryption
Password
Message
14. 13Copyright 2013@KICA Inc. All rights reserved
Identification and Signature
For Authentication
Name
SSN
Address
Issued Date
Finger Print
: Jaejung Kim
: XX0921-152XXXX
: KICA, Seoul, Kr
: 2002/6/1
:
National ID Card
Reusable
Real World
Name
Serial No
Address
Validity
Public Key
: Jaejung Kim
: 883XXX8377
: KICA, Seoul, Kr
: 2010/6/1~
2011/5/31
:
Accredited Certificate
CA’s
Signature
Impossible to reuse
Digital signature using
asymmetric encryption
/ decryption method
Encrypted
Private Key
+
Digital Signature
Cyberspace (Internet)
Signature or
Signature-seal
15. 14Copyright 2013@KICA Inc. All rights reserved
Electronic Signature
• What ensures that a signature is valid?
Signed Paper
Document
Digitally Signed
Document
Generate
Signature
Process of
Verification
National ID
Private Key Public Key
Certification
Authority
Process of
Verification
Generate
Signature
16. 15Copyright 2013@KICA Inc. All rights reserved
Types of Certificates
Certificate Without Accreditation (or Private Certificate)
A certificate is issued by a certification organization that is not accredited
by the government. It is used for a limited number of e-transactions
Accredited Certificate
The accredited certificate is issued by a CA, which in turn is designated by
the government pursuant to the laws after thorough screening, to be used
for various e-transactions.
Category Accredited Certificate
Certificate Without
Accreditation
Level of technology
and security
Passage of thorough screening
pursuant to the law
Impossible to verify
Legal effect Valid as provided by the laws Valid only by agreement
Compensation Easy to get compensated Hard to get compensated
Scope of applicable
services
Wide Narrow
17. 16Copyright 2013@KICA Inc. All rights reserved
Comparison of Certificates
• When endorsement is mandated by the law, use of the
accredited certificate grants the same legal effect and, thus, can
be used as evidence in the court of law.
• Use of a certificate without accreditation, however, does not
generate any binding authority; it takes effect only upon
agreement by both parties.
Legal
Effect
• Upon occurrence of any damage arising out of use of an
accredited certificate, the CA in charge has to compensate the
user unless it proves its innocence.
• On the other hand, the burden of proof shifts to a user when a
harm is done to the user during use of a certificate. Therefore, it
becomes hard to get compensated for the harm.
Compensation
• Only a single accredited certificate suffices to use various
services such as Internet banking AND online stock trading.
• The certificate without accreditation, however, is limited in
usage. Thus, a person can use for a certain field such as Internet
shopping OR e-transaction.
Scope of
applicable
services
18. 17Copyright 2013@KICA Inc. All rights reserved
Framework of National PKI
NPKI (National Public Key Infrastructure)
Preparation
PKI Scheme
Requirements for
PKI System
Operation
Requirements
PKI Standards
Education
Promotion Pilot Project
Law &
Regulations
PKI Decree
Recommendation
Accreditation
Generals
Organization of
PKI TFT
Implementation
Planning
Facilities and
Equipment
CPS
Framework
long-term
Security plan
RA
Construction
PKI Center
Education &
Promotion
PKI
Applications
Implementation steps
19. 18Copyright 2013@KICA Inc. All rights reserved
E-Government Framework
Economic Development (G2B)
e-Customs
e-Support for Foreign Firms
e-Intellectual Property
e-Procurement
Public Service(G2C)
Public Admin.
Reform(G2G)
e-Agriculture e-Land Registry
e-National ID
Shared Services National ID DB
Land Resources DB
Infrastructure
Public Key Infrastructure
Public Access Point
Government Information Network
Database
Management
Organization
Budget
HRD
Standards
Security
IT Management
Privacy
e-Government for National Development
20. 19Copyright 2013@KICA Inc. All rights reserved
National PKI Establishment
Application service authorities or companies using certificates
E-government seal/
Accredited e-signature
Citizen
Certificate Authority Certificate
Certificate
The Government
PKI Certification
System
PKI Application
Services
E-signature
Pilot services
E-signature pilot site
construction
(PKI application
service development)
Certification Services
PKI System Construction
(Root CA, Government
CA Construction)
E-Signature law
CPS
Standards and
technical guidelines
Establishment Law
(Electronic Signature),
PKI Standards
Accredited CA
Safe and reliable
Information society Establishment
Root CA
Company
21. 20Copyright 2013@KICA Inc. All rights reserved
PKI Scheme
RA Management
Subscribers Subscribers
RA Management
RA
Accreditation Annual Auditing
…
General/Special Purpose certificates
Accreditation Unit
Root CA Unit
Auditing Unit
Accredited
CA
Issuing certificates
RA 1 RA 2 RA N
Operation on Root CA
ACA ACA…
RA RA
(ACA: Accredited CA)
RA
22. 21Copyright 2013@KICA Inc. All rights reserved
Effectiveness of Expectations
PKI is making up the safe and trustful environment using electronic
signature.
Law, Policies
Standards &
Technology
PKI enabled
Applications
Accredited CA
• Reduce the time and cost.
• Convenience of application
like Online Civil Service,
Internet Banking etc.
• Convert offline business to
online.
• Provide more secure and safe
of service.
• Increase the trust of company.
• Increase the confidence and
trust.
• Ensure interoperability of PKI
infrastructure with other
Government.
• Establishment of National
Security Plan.
USER Corporation
Background
Government
National PKI Establishment
Win (User) – Win (Government) – Win (Company)
23. 22Copyright 2013@KICA Inc. All rights reserved
Application Layers
Internet mall
International
Law
E-network
Law
Intellectual
Property Law
Basic e-trade Law
E-Signature
Law
Reserve Agent
E-pay
security
E-Auth
High-speed
Internet
e-edu
E-govern
Cyber S1
Virtual-bank
Sales NW
E-procurementResearch NW
Virtual CoProduct NW
Supply NW
Netizen
E-park
entertainment
E-missionary
E-health
Cyber insure
E-trade
Society
rules
Basic
Infra
B-to-G
B-to-B
B-to-C
Institutions
Commercial Law
Civil
Law
Criminal
Law
City Cost..Law Building Law
road
energy
water
Communication
Law
system
Basic
Infra
Public
Infra
Industry
Infra
Environment
Establish
-ment
policePublic office
Bank schoolland
Public site
Sales Co
Physical Co
institute
Major Cofactory
Small Co
Trade Co
The stores
House
theater
church
court
restaurant
gym
Real World Cyberspace (Internet)
24. 23Copyright 2013@KICA Inc. All rights reserved
Types of PKI Model
Network Trust Model
Hierarchical Trust Model
Hybrid Trust Model
26. 25Copyright 2013@KICA Inc. All rights reserved
Overview (1/3)
5 Accredited CAs issued accredited certificates to subscriber around
25 million in total
Major PKI Applications
* Internet Banking, Online Stock, Internet Shopping, Procurement, e-Government
Services
Numbers of annual issuance of certificates (2011.09, published by KISA)
0
500
1,000
1,500
2,000
2,500
3,000
2003 2004 2005 2006 2007 2008 2009 20102011.9
782
950
1,100
1,437
1,716
1,856
2,192
2,366
2,593
27. 26Copyright 2013@KICA Inc. All rights reserved
Overview (2/3)
Statistics on Accredited CA’s
No.
Accredited CA/
Web site
Accredited
Date
Characteristics
Main Business
Area
1
KICA (CA: SignGATE)
http://www.signgate.com
2000. 02. 10 Corporation
All industry,
government
2
KOSCOM (CA: SignKorea)
http://www.signkorea.com
2000. 02. 10
Special purpose
Corporation
Cyber trading
3
KFTC (CA: yessign)
http://www.yessign.com
2000. 04. 12
Non-commercial
Organization
Internet banking
4
CrossCert (CA: CrossCert)
http://gca.crosscert.com
2001. 11. 24 Corporation -
5
KTNET (CA: TradeSign)
http://www.tradesign.net
2002. 03. 11
State-run
Corporation with
special mission
Trading
(As of 2011; published by MOPAS)
28. 27Copyright 2013@KICA Inc. All rights reserved
Overview (3/3)
PKI Model in Korea
Types Entity Certificate Usage Field Fee
General
Individual All electronic transactions US$ 4/year
Corporation All electronic transactions US$ 100/year
Specific
- G2C, Bank, Insurance Free
- G2C, Stock, Insurance Free
- G4C, Credit Card Free
GPKI NPKI
Act
Established in 2001 pursuant to
E-Government Act
Established in 1999 under Electronic
Signature Act
Ministry
in Charge
MOPAS (Ministry of Public Administration and Security)
Root CA GCMA (http://www.gpki.go.kr) KISA (http://www.rootca.or.kr)
Main
Customer
Public Servants Individual, Company
Algorithm NEET (not open) SEED, AES
Types of Accredited Certificate and Fees
29. 28Copyright 2013@KICA Inc. All rights reserved
PKI Scheme in Korea
Foreign
Government
Ministry of Public Administration and Security
Accredited
CA
Accredited
CA
Certification issuance /
Management
Accredited
CA
Accredited
CA
Certification issuance /
Management
Subscriber Subscriber
E-Government
Service
Provider
E-Government
Service
Provider
Certification issuance /
Management
Certification issuance /
Management
Mutual
Recognition
…
…
…
…
National Root CA
(KISA)
Government Root
CA
(GCMA)
30. 29Copyright 2013@KICA Inc. All rights reserved
Role of Root CA
Accredited
CA
Legal &
Policy Issue
Technical
Specification
Environment
of Usage of
Electronic
Signature
International
Cooperation
Root CA
Root CA
(KISA)
31. 30Copyright 2013@KICA Inc. All rights reserved
Scope of Benchmarking
Subject contents
Law, Policy,
Standards
Electronic Signature Act, Decree and Ordinance
Certification Practices Statement
Electronic Signature Certification Technology
PKI Model
Government PKI
National PKI
User
Electronic Signature Promotion
Provide User’s Convenience
End of Certificate Free Trial Period
Accredited
CA
Interoperability among Accredited CA’s
Upgrading of PKI technologies
Division of PKI Markets
Root CA
Cross certification for NPKI and GPKI
Addition of Root CA Certificate to MS IE
Applications Mandating Accredited Certificate (bank, stock)
PKI
Applications
E-Procurement, Internet Banking, Payment Gateway, G4C etc
32. 31Copyright 2013@KICA Inc. All rights reserved
Framework of Registration
Electronic
Signature
Act
-Ensure the security and reliability of electronic documents and
to promote their use
-Promoting nationwide informationalization and improving
convenience in people's living standard
Electronic Signature Act, Decree and Ordinance
Guideline on
Electronic Signature
Certification
Practices
Technical
Specification
CSP
Rules on Accredited
CA’s Facilities and
Equipment
Rules on
Accredited CA’s
Protective Measures
Methods
and Procedures
for I & A through
Representatives
* I & A: Identification and Authentication
* CPS: Certification Practices Statement
CA
accreditation
Accredited
CA’s
operation
Accredited CA’s
protection
measure
Subscriber’s
I & A
33. 32Copyright 2013@KICA Inc. All rights reserved
CPS (Certification Practices Statement)
Contents Detail
Management
of Certificates
- Transmission of Registered Information
- Request for Issuance of Certificate
- Generation of Certificates
- Request for Suspension, Restoration and Revocation of Certificates
- Generation of Certificate Suspension and Revocation List
- Public Announcement and Validation of Certificates
Management
of Key Pairs
- Generation of Private Pairs
- Backup of Private Pairs
- Loss, Destruction, Theft or Leakage of
Private Keys
- Protection of Private Pairs
- Revocation of Private Pairs
Other
Certification
Services
- Provision of Time Stamping
- Storage of Time Stamping Records
- Backup of Time Stamping Records
- Time Reception and Correction
- Storage of Electronic Documents
- Other Supplementary Services
Others
- Conformity with Technical Specifications
- Scope and Intended Use of Certificates
- Conformity to Certification Procedure
- Matters concerning Facilities and Equipment
- Management of Certification Service Records
- Management of Certification Service Records through the representative
- Management of Audit Records
- Management of Registration Authorities
- Test Run of Certification Practice
- Correct Provision of Information and Public Notification
34. 33Copyright 2013@KICA Inc. All rights reserved
History of NPKI in Korea
‘00 ‘01 ‘02 ‘03 ‘04 ‘05 ‘06 ‘07 ‘08 ‘09 ‘10 ‘11
Electronic Signature Promotion
Interoperability among Accredited CA’s
Provide User’s Convenience
Cross certification for NPKI and GPKI
Mandating Accredited Certificate (bank,
stock, E-malls)
End of Certificate Free Trial Period
Upgrading of PKI technologies
Division of PKI Markets
Addition of Root CA Certificate to MS IE
Adapt HSM (Hardware Security Module)
Asia PKI Consortium
YearActivity
35. 34Copyright 2013@KICA Inc. All rights reserved
Interoperability among Accredited CA’s
Goals
- Subscriber who has an general-purpose accredited certificate can do
all kinds of electronic transaction at Internet
- To provide technologies that recognize and process accredited
certificates regardless of who issue them
- To provide data to policy-makers on how to determine the scope and
conditions of each accredited certificate
Lesson to
learn
The interoperability issue should be considered which
arises during early stages of the NPKI construction.
CA A
CA B
User A
User B
App 1
App 2
x
general-purpose
certificate Company 1
E-service Provider S/W development
Company
Company 2
Accredited CA
36. 35Copyright 2013@KICA Inc. All rights reserved
Cross-Certification for NPKI and GPKI
Background
- Two years after establishment of the NPKI in 1999, the GPKI was
brought to birth. The two got to have overlapped service areas.
- To smooth out simultaneous operation of both, realization of cross-
certification is vital, which was obtained by means of a simplified CTL
(i.e. Certificate Trust List).
Lesson to
learn
To avoid duplication of resources and confusion in
policy-making, services should be provided through a
single root CA.
A PKI CTL issuance
A
Root CA
Hash
A_USER
B_USE
R
A_CA
A_RootCA B_RootCA
B_CA
CTL
CTL
B
Root CA
Hash
B_User Cert
B_CA Cert
A_RootCA Cert
CTL issued by A_RootCA
B_RootCA Cert
Certificate
Path
B PKI
generate
signatur
e
verify
signature
37. 36Copyright 2013@KICA Inc. All rights reserved
Mandatory Use of Accredited Certificates
Background
- To promote use of accredited certificates, services were provided free of charge.
- Accredited certificates were provided without any charge to relieve the initial
burden of customers, to secure adjustment period, and to build up the Internet
services.
- The deteriorating financial status of CA’s led to efforts to improve security and
quality of certification services.
◊ Only corporate certificates began to be charged for (Approximately, 100
$ /year).
◊ It was unable to impose any liabilities on CA’s since they did not generate any
profits.
◊ CA’s were unable to make additional investments, for example, in equipment.
Lesson to
learn
For CA’s to serve the public with stability in operation
and services, free trial periods should not be provided.
Progresses
-Individuals began to pay fees. (June, 2004)
◊ Individual accredited certificate of general purpose: $4/year
◊ Individual accredited certificate of limited purpose: Implementation
thereof was in the sole discretion of a CA. (CA’s were able to charge
only after September, 2004.)
38. 37Copyright 2013@KICA Inc. All rights reserved
Division of PKI Markets
Lesson to
learn
Different natures of CA’s may lead to conflicts and
harm to the market. Thus, it is necessary, in some case,
to set boundary between certificate markets.
Progresses
-KESA (Korea Electronic Signature Act) amended to set “borders”
between different markets (December, 2005)
◊ The amended KESA demands tougher requirements for a government agency
or a non-profit organization to get designated as CA.
-Implementation of PKI with divided roles (July, 2006)
◊ The KCFC, under the new KESA, is not allowed to issue certificates of general
purpose; it can only issue certificates required for banking.
CA Characteristics
Individual
Corporation TotalGeneral
Purpose
Specific Purpose
(Bank)
KCFC
non-profit
organization
63% 76% 29% 67%
4$/year Free 100$/year or Free
39. 38Copyright 2013@KICA Inc. All rights reserved
Upgrading of PKI technologies
Background
-The term “upgrading (or its verb form “to upgrade”) refers to any
effort made to increase system security and compatibility of
technologies such as renewal of private keys, adjustment of length of
private keys, application of RFC3280, etc.
Lesson to
learn
Advance of technologies does not always guarantee
stability of certification technologies. Thus, counter-
measures should be considered in advance.
Major
missions
-Renewal of Root CA certificate and Accredited CA Certificates
-Upgrading of private-key lengths to RSA 2048 bit
- Application of RFC 3280: International standard changed
- RSA 1024 and SHA-1 algorithm don't guarantee their security in 2013.
- Offline operation of Root CA’s directory
◊ The CRL’s of Root CA are posted on directories of accredited CA’s.
Before Feb., 2006 After Feb., 2006 After Jan., 2011
Valid Key Valid Key Valid Key
Root CA
10
years
2048
bit(SHA1)
20
years
2048 bit(SHA1)
20
years
2048
bit(SHA256)
Accredited
CA
5 years
1024
bit(SHA1)
10 years
2048
bit(SHA1)
10 years
2048
bit(SHA256)
User 1 year
1024
bit(SHA1)
1 year 1024 bit(SHA1) 1 year
2048
bit(SHA256)
40. 39Copyright 2013@KICA Inc. All rights reserved
Addition of Root CA Certificate to MS IE
Lesson to
learn
A country should accumulate and retain its own
technologies related to security and certification to
enhance its national competitive edge.
Problems
and
solutions
- When using services like e-mail and web server with domestic certificates,
security warnings popped up, causing confusion among users.
- Foreign CA’s (i.e., VeriSign) recognized by MS Windows got to monopolize
the Korean PKI markets for SSL, code signing certificates.
- By mounting certificates of Korean Root CA’s on MS Windows, it has
become possible to apply their certificates to Windows-based web services
including web server, secured e-mail and code signing etc.
Thawte
• Microsoft Root Certificate Program Members: 58 CA’s (15 accredited CA’s)
Microsoft
VeriSign
VISA
RSA
Korean Root CA
JCSI
Hongkong Post
★ Inclusion KISA Root CA Certificate in Web Browsers (~'08)
Internet Explorer ('06.02), Safari ('07.03), Opera ('08.05), FireFox ('06~)
41. 40Copyright 2013@KICA Inc. All rights reserved
HSM Token as a secure storage
Lesson to
learn
In order to enhance subscriber’s personal security
environment, HSM Token as a secure storage can use.
Problems
-If subscriber uses hard disk for certificate storage, some malicious
programs can control subscriber’s PC and extract that information.
Storage for Certificate
<Subscriber's S/W> <HSM Token>
Interface between
the Token and the
Subscriber’s S/W
<HSM Access Program>
Backgrou
nd
-A hardware protected secure storage with hardware cryptographic
accelerator to generate and store private keys
① Digital signing and generation of a private key can be done
inside the Token, ② Private keys can not be exported
Progresse
s
-Developing the technical specifications for HSM Token with certificate
('06~'07.8)
-Carrying out the evaluation for the interoperability of HSM Token ('07.9~)
42. 41Copyright 2013@KICA Inc. All rights reserved
Asia PKI Consortium
Lesson to
learn
Thoughts should be given to the issue of international
interoperability. Close cooperation, for example, with
the Asia PKI Consortium will be helpful.
• Non-profit international collaboration body in Asia region, specialized for information security areas
• Objectives : To realize borderless and seamless e-commerce in a secure and
trustworthy way, in Asia regions
• Founded : Nov. 2007
• Member : Korea (KISA), China, Taiwan (As of June, 2008)
Steering Committee (SC)
General Assembly (GA)
PKI WG Other WG
Composed of all Principal member
Approve resolutions by GA
Determine policy, direction, strategy
Composed of all members
Elect Chairperson and Vice chairperson
Decide to Start and Dismiss WG
SecretariatTask-force based
Working Group
SME WG
Privacy
WG
Mobile
WG Candidate
WG
Actual WG
43. 42Copyright 2013@KICA Inc. All rights reserved
Lesson to learn
• It is inevitable for the government to lead the efforts to build up a NPKI.
• To avoid duplication of resources and confusion in policy-making, services
should be provided through a single root CA.
• A country should accumulate and retain its own technologies related to
security and certification to enhance its national competitive edge.
• The interoperability issue should be considered which arises during early
stages of the NPKI construction.
• For CA’s to serve the public with stability in operation and services, free trial
periods should not be provided.
• To boost the certification market, it is recommendable to impose mandatory
use on some industries.
• Different natures of CA’s may lead to conflicts and harm to the market. Thus,
it is necessary, in some case, to set boundary between certificate markets.
• Advance of technologies does not always guarantee stability of certification
technologies. Thus, countermeasures should be considered in advance.
• In order to enhance subscriber’s personal security environment, HSM Token
as a secure storage can use.
• Thoughts should be given to the issue of international interoperability. Close
cooperation, for example, with the Asia PKI Consortium will be helpful.
44. 43Copyright 2013@KICA Inc. All rights reserved
Lesson to learn
• It is inevitable for the government to lead the efforts to build up a NPKI.
• To avoid duplication of resources and confusion in policy-making, services
should be provided through a single root CA.
• A country should accumulate and retain its own technologies related to
security and certification to enhance its national competitive edge.
• The interoperability issue should be considered which arises during early
stages of the NPKI construction.
• For CA’s to serve the public with stability in operation and services, free trial
periods should not be provided.
• To boost the certification market, it is recommendable to impose mandatory
use on some industries.
• Different natures of CA’s may lead to conflicts and harm to the market. Thus,
it is necessary, in some case, to set boundary between certificate markets.
• Advance of technologies does not always guarantee stability of certification
technologies. Thus, countermeasures should be considered in advance.
• In order to enhance subscriber’s personal security environment, HSM Token
as a secure storage can use.
• Thoughts should be given to the issue of international interoperability. Close
cooperation, for example, with the Asia PKI Consortium will be helpful.
45. 44Copyright 2013@KICA Inc. All rights reserved
Development steps of PKI
Past Present Future
Special Purpose Infancy of EC Take off Leap
The Internet
was born
Fundamental
Investigation
For Military
Purpose
Special
Financial
Application
Web sites and
email users are
exploding
PKI
standardization
The birth of CA
Access control by
Certificate
The law of
Electronic
Signature
Mainly “B to B”
Desktop
Commerce
Certificates in
HSM, Smart
Card
Products
confirming PKI
standard will
spread
Data > Voice
“B to C” will
rise(PKI will
enter in every
day life)
Digital contents
will increase
rapidly
Digital
signature >
Handwritten
Signature
46. 45Copyright 2013@KICA Inc. All rights reserved
Upgrade PKI Cryptography(1/2)
• The existing encryption algorithms' security was declined due to
rapid computing technology development
According to NIST key size recommendations, RSA 1024 and SHA-1
algorithm used by Korean digital certificate management system don't
guarantee their security in 2013 ※ (“Recommendation for Transitioning
the Use of Cryptographic Algorithms and Key Lengths", 2011.1.13)
Digital
Signature
Use
Digital
Signature
Generation
RSA: 1024 ≤
|n| < 2048
• Acceptable through 2010
• Deprecated from 2011
through 2013
• Disallowed after 2013
RSA: |n| ≥
2048
• Acceptable
Hash
Function
Use
SHA-1
Digital
signature
generation
• Acceptable through 2010
• Deprecated from 2011
through 2013
• Disallowed after 2013
Non-digital
signature
generation
applications
• Acceptable
SHA-256 Acceptable for all hash function applications
• With hacking prevention through digital certificate itself such as illegal
duplication and forgery, an advanced encryption system of digital
certificates for certificate reliability is needed.
47. 46Copyright 2013@KICA Inc. All rights reserved
Upgrade PKI Cryptography(2/2)
• Raise the key size of digital signature
• Adjust the key size of subscribers’ digital certificates to be higher (1,024
bit to 2,048 bit)
• As hackers try to get an digital certificate key from 21,024 up to 22,048
times, it can guarantee certificate security until the year of 2030
• Exchange a hash algorithm
• Exchange a hash algorithm used for certificate issuance and digitally
signing
• 160bit hash (SHA-1) → 256bit hash (SHA-256)
Change subscriber S/W of e-
transaction companies
(~ complete by October 2011)
Integration
Test
(November
2011 ~ )
Issue new certificates
(January 2012 ~ )
2011 2012
49. 48Copyright 2013@KICA Inc. All rights reserved
Certificate for Smart Phone
iPhone App(iOS)
Android App
4. Select Certificate and
Generate digital signature
1. Request digital
signature
3. Request digital
signature
8. Verify signature
Web
Page
User
Smart
phone
Relay Server
1.Issue Certificate
3. Input auth_code
4. Select certificate
5. Export certificate
(PKCS#12)
2. Send
identification
number
User
PC
Smart
Phone
Relay
Server
CA
1.Import certificate
2. Generate
auth_code
6. Input NID
PC
2. Request digital
signature Generation
7. Digital signature
5. Signature information
6. Digital signature
Certificate Issuance and Export/Import Digital Signature using Smart Phone
50. 49Copyright 2013@KICA Inc. All rights reserved
Open WEB Environment
USER Server
Service Provider Server
PKI
Client
Toolkit
Internet
Microsoft AcitveX JAVA Applet
BIO HSM
Smart Card
HSM
PKI
Server
Toolkit
Any Web Browser
51. 50Copyright 2013@KICA Inc. All rights reserved
U-Authentication System
Establishing a reliable u-Authentication System
• Extending the authentication object to devices
(smart grid, VoIP-phones, CCTV cameras, and etc)
Internet Banking, Log-in
ID/Pass
Human ↔ Human
SSL Server, ETC
Device ↔ Device
RFID/USN Environment BroadcastingTelecommunication
Environment U-City Environment
U-home Environment
Extending the Target of Authentication
i-PIN
Certs.
OTP
BIO
Extending the
Authentication
Method
Human Device
As is
U-health Environment
Traditional Network Environment Ubiquitous Network Environment
To be
Human ↔ Device
52. 51Copyright 2013@KICA Inc. All rights reserved
PKI Roaming Service
The PKI certificate and the private key can be stored at the safe CA
By the user authentication(OTP, two-channel authentication) the PKI
certificate and the private key can be downloaded at the device the user
already registered
After the use, the key and the certificate will be erased safely
4. Internet Banking
CA USER
BANK
Roaming Server
Registered devices
1. issuance 2. Key escrow
3. User authentication
53. 52Copyright 2013@KICA Inc. All rights reserved
USIM as PKI Storage and NFC service
USIM as a secure mobile storage
※ HSM : Hardware Security Module
※ USIM : Universal Subscriber Identification Module
NFC using a PKI certificate
※ adopt the PKI at NFC (Near field Communication)
PKI certificate
54. 53Copyright 2013@KICA Inc. All rights reserved
Strengthening Authentication(1/2)
Two-channel Authentication
For important baking accounts or accessing secured government data,
more safe authentication method is required
If the user PC is hacked and is monitored by the hacker the channel
itself would be in dangerous despite the safety of the PKI ※ registered
PC, mobile phone SMS authentication and etc.
Network Device (PC)
Other channel
1- channel (WEB)
2- channel
55. 54Copyright 2013@KICA Inc. All rights reserved
Strengthening Authentication(2/2)
Internet Banking Authentication
• For 1st-level transaction
• PKI + ACS(Auto-Calling System)
E-Government Authentication
• Registered PC, HSM, mobile phone SMS authentication must be adapted
for important transaction (issuance of resident registration and etc.)
1.Request transaction using PKI
2. Bank calls the user
3. User approves the transaction by ACS
USER
BANK
USER E-Government
System
1) HSM PKI, or
2) PKI + registered PC,
or
PKI + mobile phone SMS authentication