1 / 9

PKI in a Context of Internet Evolution

PKI in a Context of Internet Evolution. George Sadowsky george.sadowsky@gmall.com.

lieu
Download Presentation

PKI in a Context of Internet Evolution

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PKI in a Context of Internet Evolution George Sadowsky george.sadowsky@gmall.com

  2. “The views expressed in this presentation are my own personal views, and are not necessarily those of any organization, specifically including the World Wide Web Foundation, ISOC (The Internet Society), and ICANN (Internet Corporation for Assigned Names and Numbers).”

  3. Presentation outline • Overview of PKI in context of Internet evolution • High level view in larger context • “Why is PKI increasingly important?” • Perspectives: historical, present, future • Three issues: • The Internet life cycle: the adolescent phase • The trust model that couldn’t scale • The organized cybercrime industry • Conclusions

  4. The Internet/Arpanet life cycle • Birth – 1969 • Infancy – 1973-1995 • A trusted and protected environment • Adolescence – 1996-2020 • Learn about problems of real world • Contact with real life, complexities and problems • All forms of human behavior have moved to Internet • Maturity – 2020-2060? • Old age and retirement – 2060-?

  5. The trust model that couldn’t scale • Internet created in cooperative research environment • No expectation of extent of scaling • One “down day” - • Network converted to TCP/IP in 1983 • Fundamental architectural change • Since then, addition of features, patchwork • (Story) Can’t start from scratch, have to keep motor running • Ex. IPv4 to IPv6 transition • But several research efforts underway to redefine Internet • Major issue is authentication • Out of band signaling needed? • Authentication of things also essential • DNSSEC (uses PKI) • Authentication of routers becoming an issue

  6. The organized cybercrime industry • Hacking used to be an honorable activity • A hack was a clever thing, a good hacker was respected • No more … • 1988: The Morris worm; father at NSA • Motivations for manipulating network have changed • Fun, cleverness • Theft of passwords at retail level • Theft of credit card data at wholesale level • Organized cybercrime • Increasing evidence of links to terrorism • May be transitioning to national cyber warfare (Google?) • Prevention, detection, prosecution, punishment cycle • Authorities unprepared and overwhelmed

  7. Some cybercrime examples • Phishing and pharming: theft of information, then money • The automated clearing house thefts in the US • Roles of software bugs (Explorer), social engineering • FBI estimates $200++ million per year • Dark Market: 2,000 vetted cybercriminals • The Conficker time bomb: • 7+ million Conficker zombies • Multi-organization task force still unable to eradicate it

  8. Conclusion • I’ve concentrated on three points • The Internet life cycle • The trust model that couldn’t scale • Emergence of organized cybercrime • Conclude that • Can expect continual patching of existing Internet • Trusted authentication increasingly important • But authentication tokens can be stolen • And authentication is necessary but not sufficient • Need a zero base re-implementation of authentication • We are not winning the battle against cybercrime • Implications of this could be very severe

  9. Thank you

More Related