public key infrastruture n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
PUBLIC KEY INFRASTRUTURE PowerPoint Presentation
Download Presentation
PUBLIC KEY INFRASTRUTURE

Loading in 2 Seconds...

play fullscreen
1 / 30

PUBLIC KEY INFRASTRUTURE - PowerPoint PPT Presentation


  • 62 Views
  • Uploaded on

PUBLIC KEY INFRASTRUTURE. Don Sheehy ( dsheehy@grantthornton.ca ). WHO HAS HEARD ABOUT. Verisign EnTrust Baltimore. First – The Basics. PKI A public-key infrastructure is a set of services for managing public keys. Keys

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'PUBLIC KEY INFRASTRUTURE' - yitta


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
public key infrastruture

PUBLIC KEY INFRASTRUTURE

Don Sheehy (dsheehy@grantthornton.ca)

who has heard about
WHO HAS HEARD ABOUT
  • Verisign
  • EnTrust
  • Baltimore
first the basics
First – The Basics
  • PKI
    • A public-key infrastructure is a set of services for managing public keys.
  • Keys
    • A key is a string of bits used to encrypt and/or decrypt data. Encryption makes data unintelligible. Decryption restores the data to its pre-encrypted form, making it intelligible again.
  • Cryptography
    • Cryptography is the science and practice of encrypting and decrypting. There are two kinds of cryptography in common use: secret key and public key.
basics encryption
Basics - Encryption
  • Secret Key Encryption
    • Same key is used to encrypt and decrypt. Problem of secure key distribution. - if you want to send me an encrypted message, you have to securely send me the secret key first. This creates a chicken-and-egg dilemma: To set up a secure communication system, you need a secure communication system.
  • Public Key Encryption
    • Uses key pairs – each having one public and one private key. Data encrypted with one key in the pair is decrypted using the other key. To send encrypted message, you encrypt it with my public key – not a secret. Decryp. requires private key, only I possess.
certificates
Certificates
  • Certificates
    • Public keys are usually combined with other information in a certificate, a digital document (i.e. a formatted file) attesting to the binding of a public key to an individual, computer, program, or other entity. A certificate verifies that a specific public key does in fact belong to a specific entity.
contents
Contents
  • Certificate Contents
    • At a minimum, a certificate contains a public key and a name. Typically, a certificate also contains a serial number, an expiration date, and the name of the Certification Authority (CA) that issued the certificate. Also included in the certificate is the digital signature of the CA, proving the certificate really did originate from that CA.
digital certificates
Digital Certificates
  • Digital Signatures
    • A digital signature is a block of data that has been encrypted with the sender's private key. The recipient decrypts the data with the sender's public key, verifying the sender's identity in a fashion that cannot be repudiated.
what is a ca
What is a CA?
  • The Certification Authority is an org that provides a level of assurance that the public key contained in the dig certificate does indeed belong to the entity named in the certificate.
  • This document is digitally signed by a trusted organization referred to as a Certification Authority (CA). The basic premise is that the CA is vouching for the link between an individual’s identity and his or her public key.
what is an ra
What is an RA?
  • A Registration Authority (RA) is an entity that is responsible for the identification and authentication of subscribers, but does not sign or issue certificates.
  • In some cases, the CA performs the subscriber registration function internally. In other cases, the CA might delegate the RA function to external registration authorities that may or may not be part of the same legal entity as the CA.
pki functions
PKI Functions
  • Key registration: The Registration Authority (RA) issues a new certificate for a public key. The CA signs the certificate, stamps it with an expiration date, and either returns it to the requester or stores it in a repository.
  • Certificate revocation: Through an administrative console, the security manager cancels a previously issued certificate by placing it on a Certificate Revocation List (CRL).
pki functions1
PKI Functions
  • Storing and retrieving certificates and Certificate Revocation Lists (CRL): Upon request, typically via a directory, the CA provides a CRL and/or a particular entity's certificate.
  • Trust evaluation: The CA determines whether a certificate is valid and what operations it authorizes.
pki standards
PKI Standards
  • The main group developing standards for PKI interoperability is the PKI working group of the Internet Engineering Task Force (IETF), known as the PKIX group (which stands for PKI for X.509 certificates).
  • PKIX standards permit multiple PKIs to interoperate, or multiple applications to interface with a single PKI. There are also a number of standards that assume PKI. Among the most important are Secure Sockets Layer (SSL) and Internet Protocol Security Protocol (IPSEC).
slide14
SSL
  • Secure Sockets Layer (SSL)
    • One common use of PKI today is within the Secure Sockets Layer (SSL) protocol. SSL can negotiate encryption keys and authenticate the server before data is exchanged by the higher-level application. The SSL protocol maintains the security and integrity of the transmission channel by using encryption, authentication and message authentication codes.
    • Optimized for HTTP
ipsec
IPSEC
  • The IETF Internet Protocol Security Protocol (IPSEC) standard, which defines protocols for IP encryption, is one of the main protocols used for Virtual Private Networks (VPNs). IPSEC uses keys for encryption and authentication.
  • Ideally, PKI would provide end-to-end security from client to client, including authentication of the individuals using those client machines.
what is pki used for
What is PKI Used For
  • Most computers unable to secure private keys properly
  • Main use is for identifying non-client computers: Web servers, messaging servers, routers, and VPN gateways.
  • Online banking, the bank's Web server may give your browser a certificate proving that you have accessed the correct server. However, you probably use a username and password, not a certificate, to prove your identity to the Web server.
secure e mail and messaging
Secure E-Mail and Messaging
  • Secure e-mail, messaging and groupware applications may encrypt messages and files and use digital signatures, to ensure authentication, privacy, and data integrity. EDI systems use PKI for financial transactions.
  • The IETF standard secure e-mail/messaging protocol is Secure Multipurpose Internet Mail Extensions (S/MIME), which extends the Multipurpose Internet Mail Extensions (MIME) standard. S/MIME typically uses a PKI to digitally sign messages and to encrypt messages and attachments.
high value web transactions
High-Value Web Transactions
  • Increasingly, Web applications such as e-business and online stock trading, must support high-value transactions. For such applications, browsers, Webservers, and commerce servers can use PKI for authentication and confidentiality. As with messaging, servers authenticate themselves to clients using SSL, while clients are not typically authenticated. Web servers also use SSL to encrypt traffic.
virtual private networks vpns
Virtual Private Networks (VPNs)
  • Encryption and authentication convert public Internet links into Virtual Private Networks (VPNs), for site-to-site (router-to-router) or client-to-server links. VPNs also use tunneling protocols that wrap, or encapsulate, one protocol in another. IPSEC is the emerging standard for site-to-site tunneling.
digitally signed code and files
Digitally Signed Code And Files
  • Digital signatures can be used to verify the source and the integrity of downloaded content, preventing the spread of viruses. Technologies like Microsoft's Authenticode support PKI to make it possible to use this approach on a mass scale.
implementation issues
Implementation Issues
  • PKI-enabling applications and training personnel. Planning must encompass both new technology and existing security infrastructure and business practices. Extensive staff may be needed for PKI tasks
  • Interoperability and cross-validation of certs
  • Legal Issues – who is liable for misuse
what are the risks with cas
What are the Risks with CAs
  • Unless they are subject to governmental licensing and regulation, CAs may use different standards or procedures to verify the identity of persons to whom they issue certificates.
  • Thus a digital signature is only as reliable as the CA is trustworthy in performing its functions. Consequently, a relying party needs some way to gauge how much reliance it should place on a digital signature supported by a certificate issued by a particular CA.
risks
Risks
  • CA topology (for example, a hierarchical, cross-certified, or a hybrid model) is a developing issue. Which model is most appropriate depends on the particular business circumstances.
  • Although it is important that public keys be certified, the issuance of nonstandard certificates can be a concern. For example, if X.509 data format standard is not used, subscribers and relying parties may be unable to process such certificates.
  • Implementing the cross-certified CA model (discussed above) would also be very difficult.
what we can do
What We Can Do
  • WebTrust for Certification Authorities
  • Key Witnessing and Other
webtrust for certification auth
WebTrust for Certification Auth.
  • Developed 2000
  • Provides a new framework for reporting activities of certification authorities
  • Requires reporting on compliance with the AICPA/CICA WebTrust Principles and Criteria for Certification Authorities.
  • Differs from SAS 70/ Handbook 5900
the principles
The Principles
  • CA Business Practices Disclosure
  • Service Integrity
  • CA Environmental Controls
ca business practices disclosure
CA Business Practices Disclosure
  • The Certification Authority discloses its key and certificate life cycle management business and information privacy practices and provides its services in accordance with its disclosed practices
  • The criteria were derived primarily from X.509 Public Key Infrastructure Certificate Policy and Certification Practices FrameworkRequest For Comments Draft (RFC 2527)
service integrity
Service Integrity
  • The Certification Authority maintains effective controls to provide reasonable assurance that
    • - Subscriber information was properly authenticated (for the registration activities performed by ABC-CA).
    • The integrity of keys and certificates it manages is established and protected throughout their life cycles.
ca environmental controls
CA Environmental Controls
  • -Subscriber and relying party information is restricted to authorized individuals and protected from uses not specified in the CA’s business practices disclosure.
  • -The continuity of key and certificate life cycle management operations is maintained.
  • -CA systems development, maintenance, and operation are properly authorized and performed to maintain CA systems integrity.
microsoft
Microsoft
  • The public keys of many common Root CAs are pre-loaded into standard Web browser software (for example, Netscape Navigator or Microsoft Internet Explorer).
  • This allows the relying party to verify the issuing CA’s signature using the CA’s public key to determine whether the certificate was issued by a trusted CA.