1 / 19

Public Key Cryptography: Concepts and Applications

Raval • Fichadia John Wiley & Sons, Inc. 2007. Public Key Cryptography: Concepts and Applications . Chapter Six Prepared by: Raval, Fichadia. Chapter Six Objectives. Infer various uses of public key cryptography and explain the meaning, characteristics, and uses of digital signature.

eobryant
Download Presentation

Public Key Cryptography: Concepts and Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Raval • Fichadia John Wiley & Sons, Inc. 2007 Public Key Cryptography: Concepts and Applications Chapter Six Prepared by: Raval, Fichadia

  2. Chapter Six Objectives • Infer various uses of public key cryptography and explain the meaning, characteristics, and uses of digital signature. • Understandthe role of trust in the Internet business environment. • Describethe nature and characteristics of public key infrastructure. • Interpretthe role of public key cryptography in achieving security objectives. • Describevarious applications of the public key infrastructure.

  3. How do you get the secret key in the hands of the receiver of the message? • Key distribution: Distributing secret key in a secured manner. • Key agreement: Using a key agreement protocol, key value is determined by sender and receiver of a message. • Diffie-Hallman protocol is a widely-used protocol for this purpose.

  4. Digital Signature • Role of signature: A signature testifies/acknowledges some content. The signor links/binds himself/herself to the content. • Digital signature: A way of electronically binding oneself to the content of a message or a document. • The way to do this is by encrypting message digest (or the message) using one’s private key.

  5. Trust in Public Keys • Need for trust • Anywhere, anytime, anyone models of doing business have surfaced. • Transactions (orders) may come from a person you may never meet. • It is therefore necessary to authenticate the person requesting goods or services.

  6. Trust Compared to Security • Trust means to rely on. • Trust has to do with the expectation that the person or an entity relied on will behave in a predictable manner (e.g., pay dues). • Trusting is an act of the receiver; security is in the hands of those accountable for information assets. • Trust is viewed in the context of use (e.g., value of transaction); security is a constant, regardless of who makes the determination. • Therefore, levels of trust can be determined and used depending on the context of use; security has two states, either an information asset is secured, or is unsecured.

  7. Sources and Levels of Trust • Since context of use will vary, different levels of trust can be identified. • Trust level to be established for a $10 transaction would be different than for a $50 million electronic fund transfer. • This way of looking at establishing trust also provides cost effectiveness to systems that help determine whether to trust a user (customer, for example). • Different organizations or people may trust the same entity to different degrees.

  8. Meeting Requirements of Trust • Digital (public key) certificate • Certification authority • Trust levels in digital certificate • Web trust models

  9. Digital (Public Key) Certificate • A certificate provided by a certification authority, certifying owner’s public key. • The certificate has a plaintext part and an encrypted part. • The plaintext discloses the certificate holder’s name, the issuer (CA), expiration date, etc. • The encrypted part is where the CA has stored the subject’s public key, encrypted using the CA’s private key.

  10. Certification Authority (CA) • An organization that issues digital certificates. • The CA performs many tasks: • Receive application for keys. • Verify applicant’s identity, conduct due diligence appropriate to the trust level, and issue key pairs. • Store public keys and protect them from unauthorized modification. • Keep a register of valid keys. • Revoke and delete keys that are invalid or expired. Maintain a certificate revocation list (CRL). • In doing its work, the CA may appoint agents, called registration authorities (RAs). • A primary responsibility of RAs is to facilitate the certificate application process.

  11. Trust Levels in Digital Certificate • Trust levels are implied in digital certificates. • If anticipated risk is higher in transactions with a subject, one might seek a higher level of trust in the certificate. • The higher the trust level to be assigned to a subject, the greater the depth of due diligence. • And greater the cost of issuing the certificate.

  12. Web Trust Models • The process of establishing trust involves a trust model. • A trust model allows users to imply trust based on what they already know. • In a hierarchical trust model (upside down tree), the top node (root CA) certifies the next level, which in turn certifies the level below, and so forth until we reach end entities at the lower most level. • In a distributed trust model, several independent hierarchies, each with its own root CA, are formed. Root CAs (also called peer CAs) coordinate communication across hierarchies. • A Web model is a specific case of the distributed model implemented by storing public keys of root CAs in widely used browsers. • A user-centric trust model (web of trust model) relies on the user to act as a de facto CA. Example: Pretty Good Privacy (PGP).

  13. Figure 6.5. An overview of PKI CA PKI Encryption Digital Signatures Public Key Infrastructure (PKI) • An infrastructure is a network that runs behind the scene serving a variety of users having different needs. • Public key cryptography permits technical authentication of the sender, and allows for assurance of nonrepudiation. • Certification infrastructure, designed using a trust model, provides for trust in public key necessary in the authentication process.

  14. X.509 • Is a standard for PKI. • Specifies formats for and attributes of public key certificates and trust models. • The standard promotes interoperability and consistency, allowing for different software vendors and users to work with the same object. • The binding of the public key with the end entity (subject) is usually done using various sources (e.g., email address of the entity for basic level of trust).

  15. Structure of a X.509 v3 digital certificate: • Certificate • Version (to identify the version of certificate structure) • Serial Number • Algorithm ID (to identify the specific encryption algorithm used in digitally signing (certifying) the public key of the subject (often called an end-entity) • Issuer (Name of the certification authority) • Validity (period for which the certificate is valid) • Subject (also called end-entity) • Subject Public Key Info • Public Key Algorithm used in issuing public-private key pair • Subject Public Key (A string of characters that defines the value of the subject’s public key) • Issuer Unique Identifier (The identifying number of the certification authority that issued the certificate, e.g., Verisign, RSAsecurity) • Subject Unique Identifier (The identifying number of the subject) • Extensions (Additional information, if any, about the subject) • Certificate Signature Algorithm (Algorithm that the certification authority used to append its digital signature, e.g., MD5) • Certificate Signature

  16. Assurance Considerations • Specific issues as related to the certification infrastructure include the following: • Is the private key secure? Are the risks of private key compromises known to the owner? • How was the CA authorized to become a CA? Can you trust the CA? • How was trust in implied in the certificate? What level of trust is implied? What data were used to establish trust? • How well does the CA protect public keys and the certificates?

More Related