Public-key Infrastructure Options and choices

Similar documents
Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu

Diffie-Hellman. Part 1 Cryptography 136

Public Key Infrastructure

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Government PKI Factors Influencing Architecture for the Equal Employment Opportunity Commission

Overview. SSL Cryptography Overview CHAPTER 1

Key Management and Distribution

Getting to Grips with Public Key Infrastructure (PKI)

SSH PK Authentication and Auto login configuration for Chassis Management Controller

Chapter 8 Information Technology

User Authentication Principles and Methods

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

Crypto meets Web Security: Certificates and SSL/TLS

CSE 565 Computer Security Fall 2018

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Digital Certificates Demystified

Lecture Notes 14 : Public-Key Infrastructure

Lecture 15 Public Key Distribution (certification)

Introducing Hardware Security Modules to Embedded Systems

Certification Authority

Ten Risks of PKI : What You re not Being Told about Public Key Infrastructure By Carl Ellison and Bruce Schneier

What is a Digital Certificate? Basic Problem. Digital Certificates, Certification Authorities, and Public Key Infrastructure. Sections

Digital Certificates, Certification Authorities, and Public Key Infrastructure. Sections

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen

Public Key Infrastructures. Using PKC to solve network security problems

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

FPKIPA CPWG Antecedent, In-Person Task Group

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

CSC 5930/9010 Modern Cryptography: Public-Key Infrastructure

Implementing Secure Socket Layer

Security+ SY0-501 Study Guide Table of Contents

Certificates, Certification Authorities and Public-Key Infrastructures

Public Key Algorithms

Grenzen der Kryptographie

Designing and Managing a Windows Public Key Infrastructure

Internet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:

Version 3 X.509 Certificates

Public-Key Infrastructure NETS E2008

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Managing SSL certificates in the ServerView Suite

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Configuring Certificate Authorities and Digital Certificates

Garantía y Seguridad en Sistemas y Redes

INF3510 Information Security University of Oslo Spring Lecture 3 Key Management and PKI. Audun Jøsang

CT30A8800 Secured communications

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

Send documentation comments to

X.509 CERTIFICATE X.509 CERTIFICATE PUBLIC-KEY CERTIFICATES THE CERTIFICATE TRIANGLE CERTIFICATE TRUST. INFS 766 Internet Security Protocols

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

Internet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Understand the TLS handshake Understand client/server authentication in TLS. Understand session resumption Understand the limitations of TLS

PUBLIC-KEY CERTIFICATES

U.S. E-Authentication Interoperability Lab Engineer

Certificateless Public Key Cryptography

ECE 646 Lecture 3. Key management. Required Reading. Using the same key for multiple messages

Cryptographic Concepts

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release:

Elliptic Curve Cryptography (ECC) based. Public Key Infrastructure (PKI) Kunal Abhishek Society for Electronic Transactions & Security (SETS), Chennai

SSL/TSL EV Certificates

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Key management. Required Reading. Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E

UELMA Exploring Authentication Options Nov 4, 2011

Information Security CS 526

SSL Certificates Certificate Policy (CP)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Issues in Assessing Commercial Certification Service Trust

CERTIFICATE POLICY CIGNA PKI Certificates

Public Key Infrastructure. What can it do for you?

ECE 646 Lecture 3. Key management

Lecture 2 Applied Cryptography (Part 2)

Apple Inc. Certification Authority Certification Practice Statement

PGP Desktop Security 7.0 Checkpoint Firewall1 / VPN1 ver 4.1 / 2000

Cryptography (Overview)

Distributed Access Control. Trust Management Approach. Characteristics. Another Example. An Example

Fall 2010/Lecture 32 1

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Public Key Technology in Windows 2000

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos

ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

IBM Education Assistance for z/os V2R1

Keep your fingers off my keys today & tomorrow

These patterns include: The use of proprietary software

Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation

Network Security Essentials

The Match On Card Technology

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Cryptography and Network Security

Introduction to Cryptography Lecture 10

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited.

How to Configure SSL Interception in the Firewall

To the management of Entrust Datacard Limited (formerly known as Entrust Limited, hereinafter Entrust ) and Trend Micro, Inc.

VIRTUAL PRIVATE NETWORK

IRP - the Identity Registration Protocol L AW R E N C E E. HUGHES CO- F O U N D E R AND C TO S I X S CAPE C O M M U N I C ATIONS, P TE. LTD.

Transcription:

Public-key Infrastructure Options and choices Tim Moses Director, Advanced Security Technology April 98 1997 Entrust Technologies

Overview General-purpose and Dedicated PKIs Trust models Two-key architecture 1997 Entrust Technologies p. 2

General-purpose and Dedicated General-purpose PKI Certificates intended for general use But, a subject name is only meaningful in context Certificates are effectively anonymous Additional context-sensitive information required to disambiguate the subject name However, the subject can be repeatably identified 1997 Entrust Technologies p. 3

Typical use CA certificate{certid} Internet Organization B Web server Browser TLS Web server Look-up table certid - accountno... Look-up table certid - employeeno... Organization A 1997 Entrust Technologies p. 4

General-purpose and dedicated Dedicated PKI Intended for use in context e.g. in a single organization Subject name is meaningful in the context Certificate contains disambiguating information 1997 Entrust Technologies p. 5

Typical use CA certificate{name} Internet Organization A Web server Browser TLS Web server 1997 Entrust Technologies p. 6

Comparison General-purpose Advantage Cost of certificate issuance shared across organizations Disadvantages Identity managed separately by each application Revocation only useful for reasons of key compromise Dedicated Advantages One-time identity management Revocation useful for change of status in the organization, as well as for key compromise Disadvantages A separate certificate is required for use in each separate organization 1997 Entrust Technologies p. 7

Summary General-purpose PKI more costeffective for organizations with a single public-key-enabled application Dedicated PKI more cost-effective for organizations with multiple public-keyenabled applications Interest shifting from the Generalpurpose to the Dedicated PKI concept 1997 Entrust Technologies p. 8

Trust models Options Personal (PGP, SDSI, SPKI, Entrust PAB) Hierarchical (SET, US DoD) Web Distributed 1997 Entrust Technologies p. 9

Hierarchical trust model Root CA Relying party imports Root CA key CA CA Relying party Subscriber Subscriber is issued a certificate chain Subscriber 1997 Entrust Technologies p. 10

Web trust model Relying party imports many CA keys CA CA Relying party Subscriber Subscriber 1997 Entrust Technologies p. 11

Distributed trust model cross-certificate Relying party imports one CA key CA CA Relying party Subscriber Subscriber 1997 Entrust Technologies p. 12

Trust model summary Each model has its own domain of applicability Hierarchical model suitable where there is an accepted and stable source of authority Web model most suited to low-risk, spontaneous relationships Distributed trust model most suitable between peer organizations 1997 Entrust Technologies p. 13

Common criticism of the distributed trust model High cost of establishing interorganizational trust links On the order of $10k per link Not justifiable for low risk relationships This is only true for heavy-weight process 1997 Entrust Technologies p. 14

ABA ISC accreditation process International audience Policy adopting body Accreditation body Certificate policy Evaluator lab Accreditation process Subscriber Certification authority CPS Relying party 1997 Entrust Technologies p. 15

Light-weight process Certification authority Public key Conditions of use Warranties Relying party Certificate Certificate Subscriber 1997 Entrust Technologies p. 16

Summary In low risk relationships... Use a light-weight process Cross-certification can be largely automated Cost of establishing trust links could be on the order of $1 per link Use web-based technology XML Search engines 1997 Entrust Technologies p. 17

Two-key architecture Each subscriber has two key-pairs and two certificates One for confidentiality One for authenticity / integrity Algorithm independent RSA DSA / Diffie-Hellman ECDSA / ECDH 1997 Entrust Technologies p. 18

Two-key architecture Enables... Non-repudiation No back-up of private signature key Automated recovery for persistent confidentiality Back-up of private decryption-key Alternatives... Manual private key back-up and recovery Estimated operating cost of $80 per user per year Encrypt symmetric keys for a key-recovery agent Too early to tell how costs compare 1997 Entrust Technologies p. 19

Summary Interest shifting from General-purpose to Dedicated PKI Each trust model has its own domain of applicability Misconceptions about the operating costs of the distributed trust model Two-key architecture Manual key back-up and recovery of private decryption keys is impractical and costly Too early to tell how it compares with key recovery agent schemes 1997 Entrust Technologies p. 20