1 certificate systems, public key infrastructures and e-mail security

63
1 Certificate Systems, Public Key Infrastructures and E-mail Security

Post on 22-Dec-2015

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

1

Certificate Systems, Public Key Infrastructures and E-mail Security

Page 2: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 2

Encryption using Public Key Cryptography

Page 3: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 3

Digital Signature using Public Key Cryptography

Page 4: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 4

Public Key Distribution

Finding out correct public key of an entity

Possible attacks name spoofing: a person can identify

himself using a bogus name denial of service: the legitimate user

cannot decrypt messages sent to him

Page 5: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 5

Public Key Distribution

Face to face public key exchange most primitive, but secure method not convenient

Public announcement via newsgroups, web pages, etc. subject to forgeries hard to determine the liar

Page 6: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 6

Public Key Distribution

Diffie - Hellman (1976) proposed the “public file” concept public-key directory commonly accessible

should be online always

no unauthorized modification secure and authenticated communication

between directory and user is a must

Page 7: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 7

Public Key Distribution

Popek - Kline (1979) proposed “trusted Public Key Authorities” Public key authorities know public keys

of the entities and distribute them on-demand basis

on-line protocol (disadvantage)

Page 8: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 8

Public Key Distribution

Page 9: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 9

Certificates

Kohnfelder (1978) proposed “certificates” as yet another public-key distribution method

Binding between the public-key and its owner

Issued (digitally signed) by the Certificate Authority (CA)

Off-line process

Page 10: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 10

Certificates

Certificates are verified by the verifiers to find out correct public key of the target entity

In order to verify a certificate, the verifier must know the public key of the CA must trust the CA

Certificate verification is the verification of the signature on certificate

Page 11: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 11

Certificates

Certified EntityCA

Verifier

Albert Levi

Albert Levi

Albert Levi

Page 12: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 12

Certificates

Page 13: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 13

Issues Related Certificates

CA certification policies (Certificate Practice Statement) how reliable is the CA? certification policies describe the

methodology of certificate issuance ID-control practices

loose control: only email addresstight control: apply in person and submit

picture IDs and/or hard documentation

Page 14: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 14

Issues Related Certificates

TRUST verifiers must trust CAs CAs need not trust the certified entities certified entity need not trust its CA, unless

it is not the verifierWhat is “trust” in certification systems?

Answer to the question: “How correct is the certificate information?”

related to certification policies

Page 15: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 15

Issues Related CertificatesCertificate types

ID certificates (for authentication)discussed here

authorization certificatesno identitybinding between public key and authorization info

Certificate storage and distribution along with a signed message distributed directories centralized databases

Page 16: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 16

Issues Related Certificates

Certificate Revocation certificates have lifetimes, but they may be

revoked before the expiration time Reasons:

certificate holder key compromise/lostCA key compromiseend of contract (e.g. certificates for employees)

Certificate Revocation Lists (CRLs) hold the list of certificates that are not expired but revoked

Page 17: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 17

Real World Analogies

Is a certificate an “electronic identity”?Concerns

a certificate is a binding between an identity and a key, not a binding between an identity and a real person

one must submit its certificate to identify itself, but submission is not sufficient, the key must be used in a protocol

anyone can submit someone else’s certificate

Page 18: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 18

Real World Analogies

Result: Certificates are not picture IDs

So, what is the real world analogy for certificates? Endorsed document/card that serves as

a binding between the identity and signature

for example, “credit-cards”

Page 19: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 19

Public Key Infrastructure (PKI)

PKI is a complete system and defined mechanisms for certificates certificate issuance certificate revocation certificate storage certificate distribution

Page 20: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 20

PKI

Business Practice: Issue certificates and make money several CAs

Several CAs are also necessary due to political, geographical and trust reasons

3 interconnection models hierarchical cross certificates hybrid

Page 21: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 21

Hierarchical PKI Example

CAs

End users

Upper level CAs

Root CA

Page 22: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 22

Cross Certificate Based PKI Example

CAs

End users

Cross certificates

Page 23: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 23

Hybrid PKI example

Page 24: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 24

Certificate Paths

Page 25: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 25

Certificate Paths

Verifier must know public key of the first CA

Other public keys are found out one by one

All CAs on the path must be trusted by the verifier

Page 26: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 26

Certificate Paths with Reverse Certificates

Reverse certificates

Page 27: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 27

Organization-wide PKI

Local PKI for organizations may have global connections, but the

registration facilities remain local easy to operate less managerial difficulties

Page 28: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 28

Organization-wide PKI

CP (CA)

Administration

RA CD

PKI Server

Databases / Directories

PKI Client

Architecture of a typical organization-wide PKI

Certificate Processor/Authority

Registration Authority Certificate Distribution

Page 29: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 29

Hosted vs. Standalone PKI

Hosted PKI PKI vendor acts as CA PKI owner is the RA

Standalone PKI PKI owner is both RA and CA

Page 30: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 30

Hosted vs. Standalone PKI

Advantages of hosted PKI over standalone PKIStandalone PKI Hosted PKIOrganization has to have a secure serverfor certificate issuance and processing.

Organization does not need to run a secureserver for certificate processing.

Organization must issue cross certificatesor has to have some other arrangements foruniversal connection of its PKI. Otherwise,the PKI remains local.

PKI provider (host) already has sucharrangements. Organization does not haveto worry about worldwide visibility of itsPKI.

More administrative work for organization. Less administrative work for organization.

Page 31: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 31

Hosted vs. Standalone PKI

Disadvantages of hosted PKI over standalone PKIStandalone PKI Hosted PKINo continuous dependency on the PKIvendor. Organization does not have to payperiodic fees.

Continuous dependency on the PKI vendor(host). The organization must pay regularfees to the host based on the certificatevolume.

Security of the PKI is in the organization’shands.

Although the organization is responsiblefor the security of its PKI, they aredependent on the host’s security.

Ultimate trust to host is indispensable. Organization does not have to trust the PKIvendor as different than its other softwarevendors.

The only user of the private key is theorganization itself.

Private key is being used by the host forcertificate issuance.

Page 32: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 32

X.509

ITU standardISO 9495-2 is the equivalent ISO

standardDefines certificate structure, not PKIAlso defines authentication protocolsIdentity certificatesSupports both hierarchical model and

cross certificatesEnd users cannot be CAs

Page 33: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 33

X.509 Certificate Format

Page 34: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 34

X.509v3 Extensions

Alternative namesPolicy Identifiers

Trust issueRestrictions based one

path length policy identifiers names

No blind trust to CAs

Page 35: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 35

Some X.509 based PKIs

Privacy Enhanced Mail (PEM) hierarchical, no cross certificates first but discontinued

Secure Electronic Transaction PKI for electronic payment secure but not widely deployed

PKIX general purpose X.509 based PKI

Page 36: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 36

DNSSEC

Security extension to DNSNot X.509 based, but hierarchical

(uses existing DNS topology)DistributedProvides

authentication of domain information storage and distribution of certificates

Good and practical system

Page 37: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 37

SSL (Secure Socket Layer)

Security layer over TCP/IPmostly for HTTP connectionsencrypted and authenticated

sessions between web servers and web browsers (clients)

Not a perfect solution, but a convenient solution

Page 38: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 38

SSL (Secure Socket Layer)

Certificate based systems web servers must have certificate client certificate is optional

CA certificates are embedded in browsers

You trust them (by default), because browser company says so !

The worst, but the most practical !!!

Page 39: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 39

Using SSL for HTTP Connections

By using SSL we can make sure about the server’s name

(assuming the CA of the server is trusted)authentication

make sure that nobody can see the traffic between client and serverconfidentiality

Page 40: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 40

Using SSL for HTTP Connections

By using SSL we can NOT provide perfect privacy

server sees all information that client providesimportant in e-payment: merchant sees the

the card number and name

provide non-repudiationboth parties knows the session keyin e-payment: charge-back cost for

merchant’s

Page 41: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 41

PGP (Pretty Good Privacy)

Effort of Phil ZimmermannStrong cryptography

free of government controlHas not started as a standardization

effortControversial international versionMost widely used security softwareUnique certificate and PKI

Page 42: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 42

PGP (Pretty Good Privacy)

Free personal useSource code available

very important for “paranoids”Multi-platform softwareBasically “file” encryption/signing

softwareNow it has plug-ins for some E-mail

client programs

Page 43: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 43

PGP Cryptographic Functions

H : Hash Function KR: Private Key

EP: Public key Encryption DP: Public key Decryption

Z: Compression using Zip KU: Public Key

Page 44: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 44

PGP Cryptographic Functions

H : Hash Function KR: Private Key Ks: Session Key (Conventional key)

EP: Public key Encryption DP: Public key Decryption

EC: Private key Encryption DC: Private-key decryption

Z: Compression using Zip KU: Public Key

Page 45: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 45

PGP Cryptographic Functions

H : Hash Function KR: Private Key Ks: Session Key (Conventional key)

EP: Public key Encryption DP: Public key Decryption

EC: Private key Encryption DC: Private-key decryption

Z: Compression using Zip KU: Public Key

Page 46: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 46

Encoding in PGP

Binary data must be encoded for e-mail compatibility

Radix-64 conversion binary data is grouped 6-bit by 6-bit each 6-bit group is converted to a printable

ASCII character (table look-up) inflates the data 33% Radix-64 applied to after

encryption/signing

Page 47: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 47

General PGP Message Format

Page 48: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 48

Key Management in PGP

Public keys are not attached to messages

Instead Public key identifiers are put in messages

Recipient should know/find out sender’s public-key personal exchange PGP public key servers

do not trust the authenticity of the keys there

Page 49: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 49

Key Management in PGP

2 local “Key Rings” private key ring

to keep your private keys

public key ringto keep yours and other people’s public

keys

Page 50: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 50

Private Key Ring

Private-key Ring is a table for the private keys

Private keys are stored in encrypted form Encryption key is derived from passphrase

The keys in private-key ring are ultimately trusted

Question: How can we determine whether or not correct passphrase is entered?

Page 51: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 51

Public-key Ring

Table for locally known public keysAlso contains trust information

PGP user specifies his/her trusted CAstwo levels of trusts to CAs

being in public-key ring does not mean its legitimacya public-key signed by a key in private-key ring is

legitotherwise CAs signatures are checked

• complicated scheme

Page 52: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 52

Public-key Ring

Page 53: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 53

PKI of PGP

Global public-key ringPKI from scratchPublic-keys are certificates are

posted in public-key serversThousands of usersNo boss, no governing body

Page 54: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 54

PKI of PGP

Everybody is end user, everybody is CA chaotic

Page 55: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 55

S/MIME

A standard way for email encryption and signing

IETF standardIndustry support

commercial reasonsNot a standalone software, a system

that is to be supported by email clients

Page 56: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 56

History of E-mail

RFC 822 only ASCII messages

MIME (Multipurpose Internet Mail Extensions) content type

Almost any of information can appear in an email message

S/MIME: Secure MIMEnew content types, like signature, encrypted data

Page 57: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 57

S/MIME

General functionality is similar to PGP digital signature

the hash of message is signed

encrypted data (enveloped data)a conventional session key is used to encrypt the

datathat key is encrypted by the recipient’s public key

The difference between S/MIME and PGP is certificate management

Page 58: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 58

Certificate Management in S/MIME

CA-centered system like SSLAn ordinary user is not aware of the

CAs that he/she trustsCA certificates come with the client

softwareCertificates are sent along with the

signed messages in S/MIME (unlike PGP)

Page 59: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 59

Certificate Management in S/MIME

One should get a certificate from a CA in order to send signed messages

Verisign Certificates Class 1 Class 2 Class 3

Increased Security

Harder to issue

Page 60: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 60

What’s Wrong?

Loose control for Class 1 certificates for commercial reasons visibility market share

The system becomes less secure for the name of security

Page 61: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 61

What should be done?

Class 1 certificates must be discontinued

All certificate must be issued with a personal presence requirement or by the approval of trusted registration authorities

Page 62: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 62

Discussion on Personal Certificates (SSL)

Certificates ruin your privacy Do you really need a certificate?

Do you want to get caught when you are at a specific website?

Do you want spammers to get your email address?

Do you want companies to learn your favorites?

Page 63: 1 Certificate Systems, Public Key Infrastructures and E-mail Security

Distributed Systems 63

Discussion on Personal Certificates (S/MIME)

There is no wide use of certificatesOnly few email clients are supporting

S/MIMEInteroperability problems among the

email client programs