Ten Risks of PKI : What You re not Being Told about Public Key Infrastructure By Carl Ellison and Bruce Schneier

Similar documents
CSC 5930/9010 Modern Cryptography: Public-Key Infrastructure

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Understanding HTTPS CRL and OCSP

Public Key Infrastructure

CSE 565 Computer Security Fall 2018

CS Computer and Network Security: PKI

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

Digital Certificates Demystified

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos

Overview of Authentication Systems

Public-Key Infrastructure NETS E2008

Certificate implementation The good, the bad, and the ugly

Some Lessons Learned from Designing the Resource PKI

Cryptography and Network Security

Server-based Certificate Validation Protocol

Public Key Establishment

AeroMACS Public Key Infrastructure (PKI) Users Overview

CT30A8800 Secured communications

Copyright

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from

ICS 180 May 4th, Guest Lecturer: Einar Mykletun

KEY DISTRIBUTION AND USER AUTHENTICATION

Cryptography and Network Security Chapter 14

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33

Network Security Essentials

Crypto meets Web Security: Certificates and SSL/TLS

Add or remove a digital signature in Office files

Certificates, Certification Authorities and Public-Key Infrastructures

KNOWLEDGE SOLUTIONS. MIC2823 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 5 Day Course

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Key Management and Distribution

Diffie-Hellman. Part 1 Cryptography 136

Overview. SSL Cryptography Overview CHAPTER 1

Key Management and Distribution

Digital signatures: How it s done in PDF

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

Key Agreement Schemes

U.S. E-Authentication Interoperability Lab Engineer

Chapter 9: Key Management

Configuring Certificate Authorities and Digital Certificates

Apple Inc. Certification Authority Certification Practice Statement

Send documentation comments to

Owner of the content within this article is Written by Marc Grote

X.509 CERTIFICATE X.509 CERTIFICATE PUBLIC-KEY CERTIFICATES THE CERTIFICATE TRIANGLE CERTIFICATE TRUST. INFS 766 Internet Security Protocols

How to Set Up External CA VPN Certificates

Securing MQTT. #javaland

Copyright

Getting to Grips with Public Key Infrastructure (PKI)

Apple Inc. Certification Authority Certification Practice Statement

Designing and Managing a Windows Public Key Infrastructure

PUBLIC-KEY CERTIFICATES

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

Certificateless Public Key Cryptography

Topics. Dramatis Personae Cathy, the Computer, trusted 3 rd party. Cryptographic Protocols

Securing Connections with Digital Certificates in Router OS. By Ezugu Magnus PDS Nigeria

Publication date: December 17, 2012, updated Feb. 10, Product version: Windows Server 2003, Windows Server 2008, Windows Server 2012

Lecture Notes 14 : Public-Key Infrastructure

SSL Certificates Certificate Policy (CP)

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Bart Preneel PKI. February Public Key Establishment. PKI Overview. Keys and Lifecycle Management. How to establish public keys?

MU2b Authentication, Authorization and Accounting Questions Set 2

Version 3 X.509 Certificates

by Amy E. Smith, ShiuFun Poon, and John Wray

ECE 646 Lecture 3. Key management. Required Reading. Using the same key for multiple messages

SSH Communications Tectia SSH

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

What is a Digital Certificate? Basic Problem. Digital Certificates, Certification Authorities, and Public Key Infrastructure. Sections

Digital Certificates, Certification Authorities, and Public Key Infrastructure. Sections

A human-readable summary of the X.509 PKI Time-Stamp Protocol (TSP)

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Avira Certification Authority Policy

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

Total points: 71. Total time: 75 minutes. 9 problems over 7 pages. No book, notes, or calculator

Key management. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

ECE 646 Lecture 3. Key management

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Security in the CernVM File System and the Frontier Distributed Database Caching System

Public Key Infrastructures. Using PKC to solve network security problems

PROVING WHO YOU ARE TLS & THE PKI

Public Key Infrastructures

VMware AirWatch On-Premises Certificate Authority Guide

Public Key Infrastructures

Software Development & Education Center Security+ Certification

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Public-key Infrastructure Options and choices

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

KeyOne. Certification Authority

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017

How to Configure SSL Interception in the Firewall

CSC 482/582: Computer Security. Security Protocols

Transcription:

Presented by Joshua Schiffman & Archana Viswanath Ten Risks of PKI : What You re not Being Told about Public Key Infrastructure By Carl Ellison and Bruce Schneier

Trust Models Rooted Trust Model! In a rooted trust model, the root CA is the trust anchor and has a selfsigned certificate.! The root CA issues a certificate to all direct subordinate CAs, if needed, which, in turn issue certificates to their subordinate CAs. A subordinate CA is trusted cryptographically, based on the signature of its parent. Network Trust Model! In a network trust model, all CAs are self-signed and trust relationships between CAs are based on cross-certificates. Cross-certificates establish trust between unrelated CAs. Hybrid Trust Model! It is a combination of the above two models.! Certain CAs are cross certified and certain others are rooted trust models.

Keys Risk Who is using my key?! Safety of Private Key at user end - Is the key encrypted? - Is the user computer protected? - Is the computer virus-free?! Basis of PKI Non Repudiation - The user is held responsible for all transactions executed with his key.

Keys Risk Which John Robinson is he? Certificates associate name with a public key! May end up getting the public key of somebody you don t want to correspond with.! Principal recognition through names is not a good approach.! In cryptography, X.509 is an ITU-T standard for public key Infrastructure (PKI).! X.509 specifies standard formats for public key certificates.

Keys Structure of a certificate "!"#$%&' " ("#%)*+,-./"# " 0*1&#%23.+45+6(%1')2-#"7 " 4$$-"# "!)*%8%29!! " (-/:";2 " (-/:";2+<-/*%;+="9+4'>&!! " 4$$-"#+?'% -"+48"'2%>%"# " (-/:";2+?'% -"+48"'2%>%"# "

Certificate Revocation Lists Certificate Revocation List (CRL) is a list of all the unexpired, revoked certificates.! Revocation Mechanisms - Delta CRLs The latest additions to the revoked CRLs - First Valid Certificate (Issued with Serial numbers) - These have no expiration date. - They have a field called FIRST VALID CERTIFICATE field which differentiates valid from invalid certificates. - Online Revocation Server It is a system that can be queried over the net about the revocation status of individual certificates. - Good Lists vs Bad Lists

Keys Risk How Secure are the certificate practices?! How is key lifetime computed? - Cryptographic lifetime The lifetime during which the key can be used for encryption. - Theft lifetime a function of the system s vulnerability, the rate of physical and network exposure, attractiveness of the key to an attacker, etc.! Are Certificate Revocation Lists supported? - How is compromise of a key detected in order to trigger revocation? - Are the signatures made by the user dated in order to distinguish between good and bad ones in the event of compromise. - User s responsibility To check that he is communicating with the right principal as indicated by the certificate.

Users Risk Is the User part of the security design? - Does the application using the certificates take the user into account or does it concern itself only with cryptography? It is the onus of the user to decide whether to shop on an SSL-protected web page. The certificate that is issued is for the URL and not for the content the URL hosts.

Users Why are we using the CA process anyway? Usability Issues Limitations Single Sign On CA authenticity issues. Mapping principal to public key issues Certificate validity issues CONCLUSION : PKI is a commercial money making venture used for communication between unknown principals.