SlideShare une entreprise Scribd logo
1  sur  60
Public Key Infrastructures
Gene Itkis
itkis@bu.edu
Based on “Understanding PKI” by Adams & Lloyd
What and How?
Services
♦ Secure communication
♦ Notarization
♦ Time-Stamping
♦ Non-Repudiation
♦ Privilege Management
– Authorization & Authentication
– Authorization & Policy Authorities
– Delegation
• Blind vs. Auditable
PKI and the Services
♦ CLAIM: PKI can help in all
♦ Question (subjective – GI)
– Where is the source of trust in all these?
– Suggestion (subjective – GI)
• Try to do the same without PKI, using only
symmetric techniques (usually possible!);
find the problem;
see how this problem is manifested and addressed in
the PKI solution.
• Easier to “cheat” (including yourself!) with PKI.
Symmetric techniques are more explicit.

♦ Make all the security & trust assumptions explicit!
Mechanisms
♦ Crypto
– Signatures, hash, MAC, ciphers
♦ Infrastructure
– Tickets
– Certificates
– Authorities (Trusted Third Parties)
• Ticket Granting, Key Distribution
• Certificate, Policy, Authorization,Time, Notary, etc.
• Archives
Pitfalls
♦ Security breaches
– Key compromises
♦ Inherent difficulties
– Revocation
♦ Negligence
– Certificates are routinely not checked or some of the
attributes ignored
– Alarms and warnings ignored
(“certificate not valid. Press OK to proceed.”)

♦ Inconsistencies & human factors
(“that’s not what I meant by this policy!”)
Certificates
Certificates
♦ Introduced in 1978

[Kohnfelder’s Bachelor’s thesis]
♦ X.509 – “the standard standard” today
– v.1 (1988) – not extendable
– v.2 – not much better
– v.3 (1997) is much better – optional extensions
Today, X.509=v.3
– Many other standards extend X.509

♦ Others
– PGP, SPKI, etc.
Certificates
♦ Certificates ≠ Signature
– Certificates are implemented using Signatures
♦ Certificates ≠ Authentication
– Authentication can be implemented using
Certificates
– Same for Authorization, etc.
♦ Certificates are static
– Change => Re-Issue
• *This could be challenged, but not in standard x509
X.509 Certificate Format
♦ See [AL] pg.76
Certificate Validation
♦ Integrity: signature is valid
♦ Signed by a trusted CA
– or certification path is rooted in a trusted CA
♦ Certificate is valid now:
– We are between Not Valid Before and Not Valid
After time points in the certificate
♦ Not Revoked
♦ Use is consistent with the policy
Alternatives to X.509
Brief detour
SPKI – A Simple PKI
♦ Authorization certificates
♦ Delegation
♦ SDSI – a Simple Distributed Security

Infrastructure
♦ Question #1:
it may be very nice, but will it ever be used
by anyone?
PGP – Pretty Good Privacy
♦ Tendencies
– Email
• Incompatibilities between PGP and S/MIME
• OpenPGP v6.5 supports x509 certs, but still…

– Personal (rather than corporate)
SET – Secure Electronic Transaction
♦ Credit card payment protocol
♦ Adopts and extends X.509
– See [AL] pg.84
Back to X.509
End detour
Infrastructure:
Policies and Authorities
Certificate Policies
♦ Certificate Policy
– “high level what is supported” document
♦ CPS – Certification Practice Statement
– “detailed, comprehensive, technical how policy
is supported” document
♦ No agreement on the roles and meanings of

the above
♦ Might be not public; hard to enforce
Certificate Policies
♦ Distinguished by OIDs (Object ID)
– “form letters”
♦ Equivalences
– Policy Mapping ext. declare policies equivalent
♦ Established & registered by

Policy [Management] Authorities
– Internal – e.g. corporate
– External – community
CA – Certification Authority
♦ Issuer/Signer of the certificate
– Binds public key w/ identity+attributes
♦ Enterprise CA
♦ Individual as CA (PGP)
– Web of trust
♦ “Global” or “Universal” CAs
– VeriSign, Equifax, Entrust, CyberTrust, Identrus, …
♦ Trust is the key word
RA – Registration Authority
♦ Also called LRA – Local RA
♦ Goal: Off-load some work of CA to LRAs
♦ Support all or some of:
– Identification
– User key generation/distribution
• passwords/shared secrets and/or public/private keys

– Interface to CA
– Key/certificate management
• Revocation initiation
• Key recovery
PKI management
Key & Certificate Management
Key/Certificate Life Cycle Management
– Identity ≠ Key. Focus on Key!

Stages
♦ Initialization
♦ Issued (active)
♦ Cancellation

• Generation
• Issuance
• [Usage]
• Cancellation
Initialization
♦ Registration
– Via RA
– Identity verification
• According to CP/CPS docs

– If on-line, should be protected+authenticated (?)
– Secret shared by user and CA
• New or pre-existing relationship

♦ Key pair generation
♦ Certificate creation & delivery
♦ [Key backup]
Key pair generation
♦ Where? (by who?)
– CA
– RA
– Owner (e.g. within browser)
– Other Trusted 3rd Party
♦ What for?
– Non-repudiation ⇒ owner generation
♦ Dual key pair model
– Separate key pairs for authentication,
confidentiality, etc.
Key pair generation
♦ Performance
– Laptop, smart cards – used to be too slow
• Today – many smart cards can generate own keys

– Centralized generation
• Scalability: bottleneck for performance & security

♦ Assurance
– “Is the smart card’s random number generator
good enough?”
– Minimal security requirements guarantees
♦ Legal/Liabilities
– Who to sue? Who backs up above assurances?
Certificate Creation+Distribution
♦ Creation – CA only
♦ Distribution (to the owner)
– Certificate only
– Certificate + private key
• Deliver key securely!
– X509 rfc2510

– Direct to owner
– To depository
– Both
Certificate dissemination
♦ Out-of-band
♦ Public repositories
– LDAP-like directories
– Used mostly for confidentiality
♦ In-band
– E.g. signed e-mail usually carries certificate

Issues:
– Privacy, scalability, etc.
Key backup
♦ Backup ≠ Escrow
– Backup= only owner can retrieve the (lost) key
– Escrow= organization/government can retrieve
the key even against owner’s wish
♦ Non-repudiation conflicts with Backup
♦ Where & how to backup securely???
Issued Phase
♦ Certificate retrieval
– To encrypt msg or verify signature
♦ Certificate validation
– Verify certificate integrity+validity
♦ Key recovery
– Key backup – automate as much as possible
♦ Key update
– When keys expire: new certificate [+new keys]
Certificate Cancellation
♦ Certificate Expiration
– Natural “peaceful” end of life
♦ Certificate Revocation
– Untimely death, possibly dangerous causes
♦ Key history
– For owner: eg to read old encrypted msgs
♦ Key archive
– “For public”: audit, old sigs, disputes, etc.
Certificate Expiration
♦ No action
♦ Certificate renewal
– Same keys, same cert, but new dates
– Preferably automatic
– but watch for attributes change!
♦ Certificate update
– New keys, new certificate
Certificate Revocation
Certificate Revocation
♦ Requested by
– Owner, employer, arbiter, TTP, ???, …
♦ Request sent to
– RA/CA
♦ Mechanisms for Revocation checks
– Certificate Revocation Lists (CRLs)
– On-line Certificate Status Protocol (OCSP)
• Will it live? (SCVP)

♦ Revocation delay
– According to Certificate Policy
Publication Mechanisms
♦ Complete CRLs
♦ Authority Revocation Lists (ARLs)
♦ CRL distribution points (partition CRLs)
♦ Delta CRLs
♦ Indirect CRLs
♦ Enhanced CRL distribution points &

Redirect CRLs
♦ Certificate Revocation Trees (CRTs)
White lists vs Black lists
CRL versions
♦ Version 1 (from x509 v1)
– Flaws:
• Scalability
• Not extendable
• Can replace one CRL with another

♦ Version 2 (similar to x509 v3)
– Extensions
• critical and non-critical
• Per-CRL and per-entry

– Format: see [AL] pg.112
Complete CRLs
♦ Advantage:
– Self-contained, simple, complete
♦ Problems:
– Scalability
• CRL may grow too big

– Timeliness
• Also results from CRL size

♦ Conclusion: appropriate for some domains
Authority Revocation Lists
♦ ARL = CRL for Cas
– Revokes certificates of Cas
– Rarely needed/used
• Decommissioned
• Compromised
CRL Distribution Points
♦ Partition CRL into smaller chunks
♦ Static partitions:
– Certificate points to its CRL distribution point
♦ Dynamic partitions
– Enhanced/Redirect CRL DPs
• Certificate points to a Redirect CRL
• Redirect CRL directs to the proper CRL partition
Delta CRL
♦ Incremental change
– From Complete or Partition CRL
– CRLnew=BaseCompleteCRLold + DeltaCRL
– Possibly many DeltaCRLs from same BaseCRL
• E.g. complete CRL issued once a week, and a new
DeltaCRL (containing the previous DeltaCRLs)
issued every day
Indirect CRL
♦ Combines CRLs of many CAs
– Potentially a “for fee” service by T3rdP
Certificate Revocation Trees
– Valicert [Kocher]
– Based on Merkle’s hash trees
– Similar/Relevant work: [Micali; Naor&Nissim]

♦ Construct hash-tree; leaves – certificates
♦ Sign root
♦ To verify a certificate in the tree: path from

the certificate to root + the siblings
♦ Certificate Owner can offer proof of not
being revoked as of the current CRT date!
Trust models
Trust model issues
♦ Who to trust?
– Which certificates can be trusted
♦ Source of Trust
– How it is established?
♦ Limiting/controlling trust in a given

environment
Common Trust Models
♦ CA Hierarchy
♦ Distributed
♦ Web
♦ User-centric

Tool
♦ Cross-certification
Trust – definition(??)
♦ “A trusts B = A assumes B will behave

exactly as A expects”

– Problem 1: A expects B to try every way of
cheating A that B can find, and A assumes B
will do exactly that == A trusts B?
– Problem 2: Is it a tautology? What’s the
difference between “assumes” and “expects”?

♦ X trusts a CA = X assumes CA will

establish and maintain accurate binding of
attributes and PK’s
– Maintain? Includes secure the binding, CA’s
keys binding, security, etc…
Trusted Public Key
♦ PK is trusted by X when X is convinced the

PK corresponds to SK which legitimately
and validly belongs only to a specific
named entity
CA Hierarchy
♦ Tree architecture
♦ Single Root CA
– Number of subordinate CA’s
• Etc…

– Parent certifies children
– Leaves are non-CA (end-) entities

♦ Typically CA either certifies other CA’s or

end-entities, but not both
♦ Everyone has Root CA PK
Context is important
♦ Privacy Enhanced Mail (PEM) adopted

strict hierarchy of CAs approach and failed
♦ DoD could use hierarchy fine
Distributed Trust Architecture
♦ A set of independent hierarchies
– May evolve as independent historically
♦ Cross-certification or PKI networking
– Connect the hierarchies
♦ Fully-meshed – all CAs are cross-certified
♦ Hub & spokes or bridge CA
– Not= Hierarchy
• No root CA: every end-entity holds its CA PK
Web Model
♦ A bunch of root CAs pre-installed in

browsers
♦ The set of root CAs can be modified
– But will it be?

♦ Root CAs are unrelated (no cross-

certification)

– Except by “CA powers” of browser
manufacturer
– Browser manufacturer = (implicit) Root CA
User-Centric
♦ PGP
♦ User = her own Root CA
– Webs of trust
♦ Good
– User fully responsible for trust
♦ Bad
– User fully responsible for trust
– Corporate/gov/etc. like to have central control
• User-centric not friendly to centralized trust policies
Cross-Certification
♦ Mechanism:
– Certificates for CAs (not end-entities)
♦ Intra- vs. Inter- domain
♦ One or two directions
– CA1 certifies CA2 and/or CA2 certifies CA1
♦ Control
– Cross-certificate limits trust
• Name, policy, path length, etc. constraints
Entity Naming
♦ What’s the identity?
(the one bound by certificate to the PK [+sk])
– If a certificate is issued to “GeoTrust ”, rather
than “Geotrust”, you may be talking to a
different entity than what you think
Name Uniqueness
♦ X.500 Distinguished Name (DN)
– Tree of naming authorities
– X.509 Subject is a DN;
– IP addresses, email, etc. are similar
♦ Problems
– Not too user-friendly
– Central naming authority not always there
• => lots of cooperation required from participating
entities
Names (continued)
♦ So, how useful are names?
– SDSI, SPKI, etc – not very
– X.509 allows alternative names
• Extensions subjectAltName
• If this extension is used Subject name (DN) is not
required

– Global uniqueness – not always crucial
– Piggy-back on existing naming/identity
infrastructures
Certificate Path
♦ Alice “trusts” CA1
– Alice has CA1’s PK in its browser
• CA1’s PK = “trust anchor”
– “trust anchor” depends on the model

♦ CA1 certifies CA2; CA2 certifies CA3
♦ CA3 certifies Bob
♦ => Alice “trusts” Bob
– Alice associates PK in Bob’s certificate with Bob
Certificate Path Processing
♦ Path construction
– Aggregation of necessary certificates
♦ Path validation
– Checking the certificates and the keys
• Includes all steps of certificate validation
Path Construction
♦ “Just a [Shortest] Path graph algorithm”
♦ Not so simple – graph is not known
– Edges (certificates) need to be queeried
♦ Once Path Construction is done Path

Validation is straight-forward
Multiple Certificates per
Entity

Contenu connexe

Tendances

Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeDigiCert, Inc.
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Serviceskieranjacobsen
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overviewRishi Pathak
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificateKumkum Sharma
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Ismail Rachdaoui
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 

Tendances (20)

Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Pki and OpenSSL
Pki and OpenSSLPki and OpenSSL
Pki and OpenSSL
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificate
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 

Similaire à PKI by Gene Itkis

Public Key Infrastructures
Public Key InfrastructuresPublic Key Infrastructures
Public Key InfrastructuresZefren Edior
 
RIPE 84: Revocation
RIPE 84: RevocationRIPE 84: Revocation
RIPE 84: RevocationAPNIC
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureTiago Mendo
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureLuis Grangeia
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
[4developers2016] - Security in the era of modern applications and services (...
[4developers2016] - Security in the era of modern applications and services (...[4developers2016] - Security in the era of modern applications and services (...
[4developers2016] - Security in the era of modern applications and services (...PROIDEA
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Crypto Analysis slides presentation slides
Crypto Analysis slides presentation slidesCrypto Analysis slides presentation slides
Crypto Analysis slides presentation slidestahirsaleem54
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxRAMESHMRA21130030110
 
Trust elevation-abbie-v1
Trust elevation-abbie-v1Trust elevation-abbie-v1
Trust elevation-abbie-v1Abbie Barbir
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsDavid Ochel
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, WorteksParis Open Source Summit
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for DummiesWorteks
 
Blockchain technology for the grid
Blockchain technology for the gridBlockchain technology for the grid
Blockchain technology for the gridmalikmayank
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...PECB
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationDavid Hoen
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationYoung Alista
 

Similaire à PKI by Gene Itkis (20)

Public Key Infrastructures
Public Key InfrastructuresPublic Key Infrastructures
Public Key Infrastructures
 
RIPE 84: Revocation
RIPE 84: RevocationRIPE 84: Revocation
RIPE 84: Revocation
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
[4developers2016] - Security in the era of modern applications and services (...
[4developers2016] - Security in the era of modern applications and services (...[4developers2016] - Security in the era of modern applications and services (...
[4developers2016] - Security in the era of modern applications and services (...
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Crypto Analysis slides presentation slides
Crypto Analysis slides presentation slidesCrypto Analysis slides presentation slides
Crypto Analysis slides presentation slides
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptx
 
Trust elevation-abbie-v1
Trust elevation-abbie-v1Trust elevation-abbie-v1
Trust elevation-abbie-v1
 
Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies
 
Blockchain technology for the grid
Blockchain technology for the gridBlockchain technology for the grid
Blockchain technology for the grid
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 

Plus de Information Security Awareness Group

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Information Security Awareness Group
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Information Security Awareness Group
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...Information Security Awareness Group
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Information Security Awareness Group
 

Plus de Information Security Awareness Group (20)

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Big data analysis concepts and references
Big data analysis concepts and referencesBig data analysis concepts and references
Big data analysis concepts and references
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
THE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth PordesTHE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth Pordes
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Security Open Science Grid Doug Olson
Security Open Science Grid Doug OlsonSecurity Open Science Grid Doug Olson
Security Open Science Grid Doug Olson
 
Open Science Group Security Kevin Hill
Open Science Group Security Kevin HillOpen Science Group Security Kevin Hill
Open Science Group Security Kevin Hill
 
Xrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew HanushevskyXrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew Hanushevsky
 
Privilege Project Vikram Andem
Privilege Project Vikram AndemPrivilege Project Vikram Andem
Privilege Project Vikram Andem
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
Cache based side_channel_attacks Anestis Bechtsoudis
Cache based side_channel_attacks Anestis BechtsoudisCache based side_channel_attacks Anestis Bechtsoudis
Cache based side_channel_attacks Anestis Bechtsoudis
 

Dernier

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Dernier (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

PKI by Gene Itkis

  • 1. Public Key Infrastructures Gene Itkis itkis@bu.edu Based on “Understanding PKI” by Adams & Lloyd
  • 3. Services ♦ Secure communication ♦ Notarization ♦ Time-Stamping ♦ Non-Repudiation ♦ Privilege Management – Authorization & Authentication – Authorization & Policy Authorities – Delegation • Blind vs. Auditable
  • 4. PKI and the Services ♦ CLAIM: PKI can help in all ♦ Question (subjective – GI) – Where is the source of trust in all these? – Suggestion (subjective – GI) • Try to do the same without PKI, using only symmetric techniques (usually possible!); find the problem; see how this problem is manifested and addressed in the PKI solution. • Easier to “cheat” (including yourself!) with PKI. Symmetric techniques are more explicit. ♦ Make all the security & trust assumptions explicit!
  • 5. Mechanisms ♦ Crypto – Signatures, hash, MAC, ciphers ♦ Infrastructure – Tickets – Certificates – Authorities (Trusted Third Parties) • Ticket Granting, Key Distribution • Certificate, Policy, Authorization,Time, Notary, etc. • Archives
  • 6. Pitfalls ♦ Security breaches – Key compromises ♦ Inherent difficulties – Revocation ♦ Negligence – Certificates are routinely not checked or some of the attributes ignored – Alarms and warnings ignored (“certificate not valid. Press OK to proceed.”) ♦ Inconsistencies & human factors (“that’s not what I meant by this policy!”)
  • 8. Certificates ♦ Introduced in 1978 [Kohnfelder’s Bachelor’s thesis] ♦ X.509 – “the standard standard” today – v.1 (1988) – not extendable – v.2 – not much better – v.3 (1997) is much better – optional extensions Today, X.509=v.3 – Many other standards extend X.509 ♦ Others – PGP, SPKI, etc.
  • 9. Certificates ♦ Certificates ≠ Signature – Certificates are implemented using Signatures ♦ Certificates ≠ Authentication – Authentication can be implemented using Certificates – Same for Authorization, etc. ♦ Certificates are static – Change => Re-Issue • *This could be challenged, but not in standard x509
  • 11. Certificate Validation ♦ Integrity: signature is valid ♦ Signed by a trusted CA – or certification path is rooted in a trusted CA ♦ Certificate is valid now: – We are between Not Valid Before and Not Valid After time points in the certificate ♦ Not Revoked ♦ Use is consistent with the policy
  • 13. SPKI – A Simple PKI ♦ Authorization certificates ♦ Delegation ♦ SDSI – a Simple Distributed Security Infrastructure ♦ Question #1: it may be very nice, but will it ever be used by anyone?
  • 14. PGP – Pretty Good Privacy ♦ Tendencies – Email • Incompatibilities between PGP and S/MIME • OpenPGP v6.5 supports x509 certs, but still… – Personal (rather than corporate)
  • 15. SET – Secure Electronic Transaction ♦ Credit card payment protocol ♦ Adopts and extends X.509 – See [AL] pg.84
  • 18. Certificate Policies ♦ Certificate Policy – “high level what is supported” document ♦ CPS – Certification Practice Statement – “detailed, comprehensive, technical how policy is supported” document ♦ No agreement on the roles and meanings of the above ♦ Might be not public; hard to enforce
  • 19. Certificate Policies ♦ Distinguished by OIDs (Object ID) – “form letters” ♦ Equivalences – Policy Mapping ext. declare policies equivalent ♦ Established & registered by Policy [Management] Authorities – Internal – e.g. corporate – External – community
  • 20. CA – Certification Authority ♦ Issuer/Signer of the certificate – Binds public key w/ identity+attributes ♦ Enterprise CA ♦ Individual as CA (PGP) – Web of trust ♦ “Global” or “Universal” CAs – VeriSign, Equifax, Entrust, CyberTrust, Identrus, … ♦ Trust is the key word
  • 21. RA – Registration Authority ♦ Also called LRA – Local RA ♦ Goal: Off-load some work of CA to LRAs ♦ Support all or some of: – Identification – User key generation/distribution • passwords/shared secrets and/or public/private keys – Interface to CA – Key/certificate management • Revocation initiation • Key recovery
  • 23. Key & Certificate Management Key/Certificate Life Cycle Management – Identity ≠ Key. Focus on Key! Stages ♦ Initialization ♦ Issued (active) ♦ Cancellation • Generation • Issuance • [Usage] • Cancellation
  • 24. Initialization ♦ Registration – Via RA – Identity verification • According to CP/CPS docs – If on-line, should be protected+authenticated (?) – Secret shared by user and CA • New or pre-existing relationship ♦ Key pair generation ♦ Certificate creation & delivery ♦ [Key backup]
  • 25. Key pair generation ♦ Where? (by who?) – CA – RA – Owner (e.g. within browser) – Other Trusted 3rd Party ♦ What for? – Non-repudiation ⇒ owner generation ♦ Dual key pair model – Separate key pairs for authentication, confidentiality, etc.
  • 26. Key pair generation ♦ Performance – Laptop, smart cards – used to be too slow • Today – many smart cards can generate own keys – Centralized generation • Scalability: bottleneck for performance & security ♦ Assurance – “Is the smart card’s random number generator good enough?” – Minimal security requirements guarantees ♦ Legal/Liabilities – Who to sue? Who backs up above assurances?
  • 27. Certificate Creation+Distribution ♦ Creation – CA only ♦ Distribution (to the owner) – Certificate only – Certificate + private key • Deliver key securely! – X509 rfc2510 – Direct to owner – To depository – Both
  • 28. Certificate dissemination ♦ Out-of-band ♦ Public repositories – LDAP-like directories – Used mostly for confidentiality ♦ In-band – E.g. signed e-mail usually carries certificate Issues: – Privacy, scalability, etc.
  • 29. Key backup ♦ Backup ≠ Escrow – Backup= only owner can retrieve the (lost) key – Escrow= organization/government can retrieve the key even against owner’s wish ♦ Non-repudiation conflicts with Backup ♦ Where & how to backup securely???
  • 30. Issued Phase ♦ Certificate retrieval – To encrypt msg or verify signature ♦ Certificate validation – Verify certificate integrity+validity ♦ Key recovery – Key backup – automate as much as possible ♦ Key update – When keys expire: new certificate [+new keys]
  • 31. Certificate Cancellation ♦ Certificate Expiration – Natural “peaceful” end of life ♦ Certificate Revocation – Untimely death, possibly dangerous causes ♦ Key history – For owner: eg to read old encrypted msgs ♦ Key archive – “For public”: audit, old sigs, disputes, etc.
  • 32. Certificate Expiration ♦ No action ♦ Certificate renewal – Same keys, same cert, but new dates – Preferably automatic – but watch for attributes change! ♦ Certificate update – New keys, new certificate
  • 34. Certificate Revocation ♦ Requested by – Owner, employer, arbiter, TTP, ???, … ♦ Request sent to – RA/CA ♦ Mechanisms for Revocation checks – Certificate Revocation Lists (CRLs) – On-line Certificate Status Protocol (OCSP) • Will it live? (SCVP) ♦ Revocation delay – According to Certificate Policy
  • 35. Publication Mechanisms ♦ Complete CRLs ♦ Authority Revocation Lists (ARLs) ♦ CRL distribution points (partition CRLs) ♦ Delta CRLs ♦ Indirect CRLs ♦ Enhanced CRL distribution points & Redirect CRLs ♦ Certificate Revocation Trees (CRTs) White lists vs Black lists
  • 36. CRL versions ♦ Version 1 (from x509 v1) – Flaws: • Scalability • Not extendable • Can replace one CRL with another ♦ Version 2 (similar to x509 v3) – Extensions • critical and non-critical • Per-CRL and per-entry – Format: see [AL] pg.112
  • 37. Complete CRLs ♦ Advantage: – Self-contained, simple, complete ♦ Problems: – Scalability • CRL may grow too big – Timeliness • Also results from CRL size ♦ Conclusion: appropriate for some domains
  • 38. Authority Revocation Lists ♦ ARL = CRL for Cas – Revokes certificates of Cas – Rarely needed/used • Decommissioned • Compromised
  • 39. CRL Distribution Points ♦ Partition CRL into smaller chunks ♦ Static partitions: – Certificate points to its CRL distribution point ♦ Dynamic partitions – Enhanced/Redirect CRL DPs • Certificate points to a Redirect CRL • Redirect CRL directs to the proper CRL partition
  • 40. Delta CRL ♦ Incremental change – From Complete or Partition CRL – CRLnew=BaseCompleteCRLold + DeltaCRL – Possibly many DeltaCRLs from same BaseCRL • E.g. complete CRL issued once a week, and a new DeltaCRL (containing the previous DeltaCRLs) issued every day
  • 41. Indirect CRL ♦ Combines CRLs of many CAs – Potentially a “for fee” service by T3rdP
  • 42. Certificate Revocation Trees – Valicert [Kocher] – Based on Merkle’s hash trees – Similar/Relevant work: [Micali; Naor&Nissim] ♦ Construct hash-tree; leaves – certificates ♦ Sign root ♦ To verify a certificate in the tree: path from the certificate to root + the siblings ♦ Certificate Owner can offer proof of not being revoked as of the current CRT date!
  • 44. Trust model issues ♦ Who to trust? – Which certificates can be trusted ♦ Source of Trust – How it is established? ♦ Limiting/controlling trust in a given environment
  • 45. Common Trust Models ♦ CA Hierarchy ♦ Distributed ♦ Web ♦ User-centric Tool ♦ Cross-certification
  • 46. Trust – definition(??) ♦ “A trusts B = A assumes B will behave exactly as A expects” – Problem 1: A expects B to try every way of cheating A that B can find, and A assumes B will do exactly that == A trusts B? – Problem 2: Is it a tautology? What’s the difference between “assumes” and “expects”? ♦ X trusts a CA = X assumes CA will establish and maintain accurate binding of attributes and PK’s – Maintain? Includes secure the binding, CA’s keys binding, security, etc…
  • 47. Trusted Public Key ♦ PK is trusted by X when X is convinced the PK corresponds to SK which legitimately and validly belongs only to a specific named entity
  • 48. CA Hierarchy ♦ Tree architecture ♦ Single Root CA – Number of subordinate CA’s • Etc… – Parent certifies children – Leaves are non-CA (end-) entities ♦ Typically CA either certifies other CA’s or end-entities, but not both ♦ Everyone has Root CA PK
  • 49. Context is important ♦ Privacy Enhanced Mail (PEM) adopted strict hierarchy of CAs approach and failed ♦ DoD could use hierarchy fine
  • 50. Distributed Trust Architecture ♦ A set of independent hierarchies – May evolve as independent historically ♦ Cross-certification or PKI networking – Connect the hierarchies ♦ Fully-meshed – all CAs are cross-certified ♦ Hub & spokes or bridge CA – Not= Hierarchy • No root CA: every end-entity holds its CA PK
  • 51. Web Model ♦ A bunch of root CAs pre-installed in browsers ♦ The set of root CAs can be modified – But will it be? ♦ Root CAs are unrelated (no cross- certification) – Except by “CA powers” of browser manufacturer – Browser manufacturer = (implicit) Root CA
  • 52. User-Centric ♦ PGP ♦ User = her own Root CA – Webs of trust ♦ Good – User fully responsible for trust ♦ Bad – User fully responsible for trust – Corporate/gov/etc. like to have central control • User-centric not friendly to centralized trust policies
  • 53. Cross-Certification ♦ Mechanism: – Certificates for CAs (not end-entities) ♦ Intra- vs. Inter- domain ♦ One or two directions – CA1 certifies CA2 and/or CA2 certifies CA1 ♦ Control – Cross-certificate limits trust • Name, policy, path length, etc. constraints
  • 54. Entity Naming ♦ What’s the identity? (the one bound by certificate to the PK [+sk]) – If a certificate is issued to “GeoTrust ”, rather than “Geotrust”, you may be talking to a different entity than what you think
  • 55. Name Uniqueness ♦ X.500 Distinguished Name (DN) – Tree of naming authorities – X.509 Subject is a DN; – IP addresses, email, etc. are similar ♦ Problems – Not too user-friendly – Central naming authority not always there • => lots of cooperation required from participating entities
  • 56. Names (continued) ♦ So, how useful are names? – SDSI, SPKI, etc – not very – X.509 allows alternative names • Extensions subjectAltName • If this extension is used Subject name (DN) is not required – Global uniqueness – not always crucial – Piggy-back on existing naming/identity infrastructures
  • 57. Certificate Path ♦ Alice “trusts” CA1 – Alice has CA1’s PK in its browser • CA1’s PK = “trust anchor” – “trust anchor” depends on the model ♦ CA1 certifies CA2; CA2 certifies CA3 ♦ CA3 certifies Bob ♦ => Alice “trusts” Bob – Alice associates PK in Bob’s certificate with Bob
  • 58. Certificate Path Processing ♦ Path construction – Aggregation of necessary certificates ♦ Path validation – Checking the certificates and the keys • Includes all steps of certificate validation
  • 59. Path Construction ♦ “Just a [Shortest] Path graph algorithm” ♦ Not so simple – graph is not known – Edges (certificates) need to be queeried ♦ Once Path Construction is done Path Validation is straight-forward

Notes de l'éditeur

  1. One way of adding change without re-issue: Say, certificates are short lived and a new date or new period/generation are required periodically – this is a change. The generation mechanism can be implemented as a hash chain (xi=hash(xi-1)). Some, xn is included in the certificate and every generation the previous x is released. A more sophisticated change: adding an private attribute. Generate a hash tree on the attributes (with some key bits). Certify root. To add a privilege/attribute send to the owner the attribute leaf value the siblings of the path from the attribute to the root. Can add any subset of attributes. Taking the attributes away is harder. Also, the attributes must be privileges (something the owner wants) – otherwise the owner pretends not to receive the above values.