4th october 2008cpe meet - k s sesha prakash1 today’s subject - pki is the answer public key...
Post on 19-Dec-2015
216 views
TRANSCRIPT
4th October 2008 CPE Meet - K S Sesha Prakash 1
Today’s subject - PKI is the answer
Public Key Infrastructure
Answer ??
For what
and why
4th October 2008 CPE Meet - K S Sesha Prakash 2
This session is
Functionally orientated than technical.Shows why a PKI is neededWill give a glimpse of PKI structure in India.
My exposure to PKI is from the audits I have conducted on one of the CA’s and several RA’s across India. The subject has fascinated me ever since.
I have borrowed information from the sites of CCA, RCAI, IDRBT, WIKIPEDIA and many other web-sites.
I acknowledge their copyrights to some of the information reproduced here.
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 3
Cryptography is the root cause for the structure of PKI.
PKI’s have their origins to fulfill the need
• how to share a secret between two & MORE so between groups without compromise
• how to believe that the information originates from the very person claiming to have sent it
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 4
The Paper World
• A paper document consists of four componentsthe carrier ( the sheet of paper)text and pictures ( the physical representation of information)information about the originatormeasures to verify the authenticity (handwriting / written signature)
• All the four components are physically connectedSo, paper is the document
• There is only one originalcan be reproduced in innumerable copies
• Signature• Supposed to be unique, difficult to be reproduced, not changeable and not
reusable• Its main functions
identificationdeclarationproof
• The signature is used to identify a person and to associate the person with the content of that document always relates to a physical person
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 5
Electronic World
• Electronic document produced by a computer, is stored in digital form, and cannot be perceived without using a computerIt can be deleted, modified and rewritten without leaving a mark or trailIntegrity of an electronic document is “genetically” impossible to verifyA copy is indistinguishable from the originalIt can’t be sealed in the traditional way, where the author affixes his
signature
• The functions of identification, declaration, proof of electronic documents carried out using a digital signature based on cryptography.
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 6
To Understand, we need to know certain words and their means before proceeding
Plain textCipher textEncryption Decryption
AlgorithmKey
Key exchangeSymmetric Key Asymmetric key
Message digest / HashDigital SignatureElectronic SignatureElectronic Document
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 7
Plain text is just plain textCipher text is garbled text, which prima facie one will not be able to read / understandProcess of converting the plain text to cipher text is ENCRYPTIONThe reverse process is DECRYPTION
If software does the encryption or decryption, the method adopted is algorithm
Key is the actual secret which can unravel the encryption
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 8
A Symmetric Key, the same key (or Secret Key) can encrypt or decrypt the message – Symmetric cryptography
An asymmetric key on the other hand is a pair. One key encrypts and the other decrypts. The same key cannot encrypt and decrypt.
To distinguish the keys the terminology used is the Private Key and Public Key.
The Private Key is held secret by the owner and the Public Key is distributed. – Who distributes?
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 9
A hash or a message digest is a one way hash – it is of fixed length. It is a unique value for a given data. Any difference would result in a different value & give the same value every time it is recomputed for the same data. It cannot be reversed in the sense that you cannot deduce the original content – hence one way.
Public Key Infrastructure
The message length is not the criterion.
Hash algorithms return only a fixed length.
The hash value changes even if there is a small change in the content and returns the same value every time it is recomputed.
This assures message INTEGRITY
4th October 2008 CPE Meet - K S Sesha Prakash 10
Large volume messages or data is normally encrypted by Symmetric Cryptography and DES (Data Encryption Standard) or Triple DES or AES (Advanced Encryption Standard).
You have a key (symmetric key) which works both ways here. This Ensures CONFIDENTIALITY
This Symmetric Key is to be a secret between two person only. If is More it becomes difficult to pin down a message to a single person.Hence each pair should have one key. If the community is large?No. of Keys required is - No. of people N*(N-1) / 2 Keys
2 persons – 1 Key : 3 persons – 3*(3-1) / 2 ie., 4 Keys10 persons – 10*(10-1) / 2 ie., 45 Keys1000 persons – 1000*(1000-1) / 2 ie., 4,99,500 Keys
How to distribute these key? & How will you remember whose key is to be applied to which messageMore so, if the parties are geographically far apart and instantly (internet)Possibility of interchange and therefore key compromise
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 11
Large volumes of either data or text messages cannot be viably done by asymmetric cryptography due to requirement of large computing resources.
Hence, it is commercially used for small amount of data or text. Now you have a pair of keys, one a private key & the other a public key.
Public Key Infrastructure
-----BEGIN RSA PRIVATE KEY----- MIIBOwIBAAJBAL2wXgtEGWTa/AwoSd9sdMULcaTBDxXvQbZPedno8AbpcaZNIkSU 4aq/rGQZzwM8wnUTwQSvfRrLwTKsS0X7xQkCAwEAAQJAMUkV5k93WaEcQ/xj1U1U ua3ThT80MDrOFBRqUJgZZXHnlCt7/e72eeXmVZD6Brm9HRLCcMNbwdWXM5omNvsX EQIhAOc/xbqqByFgmFIKfl7MiZ5iJTu+XXDYvSTN+8v4et2rAiEA0f3Yhqw/3lhH s+ajFO5rZpo9fJ9Li5vR+l5LcOnHLBsCIQC5I2h1kqzUvxYUEMytrwm64Q64Lyd2 Mj/0GGmwGoabswIgP6NTPDT1Qhe02yM5Jv2+FKEHoz3PMibtspdi+3wNfSMCIQDP LH8G7XRMAthvEGPfO9ojqj84/FuHkpMs4OOi32Jwtg== -----END RSA PRIVATE KEY----- -----BEGIN PUBLIC KEY----- MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAL2wXgtEGWTa/AwoSd9sdMULcaTBDxXv QbZPedno8AbpcaZNIkSU4aq/rGQZzwM8wnUTwQSvfRrLwTKsS0X7xQkCAwEAAQ== -----END PUBLIC KEY-----
The Private Key is held secret by the owner and the Public Key is distributedThis ensures NON REPUDIATION. The private key should always be a secret.
So now it is possible to send the public key with encrypted message over unsecured channels also.
4th October 2008 CPE Meet - K S Sesha Prakash 12
Digital signature is the message hash and Symmetric key of the message – both are encrypted and signed by the private key.
A digital signature is not unique to an individual. It is unique to a messageEx. Of digital signatures of same person on different documents is as under
Public Key Infrastructure
As against the digital signature an Electronic or digitized signature described by many court rulings is the actual signature which can be scanned and reproduced
I agreeefcc61c1c03db8d8ea8569545c073c814a0ed755My place of birth is at Gwalior.fe1188eecd44ee23e13c4b6655edc8cd5cdb6f25I am 62 years old.0e6d7d56c4520756f59235b6ae981cdb5f9820a0I am an Engineer.ea0ae29b3b2c20fc018aaca45c3746a057b893e7I am a Engineer.01f1d8abd9c2e6130870842055d97d315dff1ea3
4th October 2008 CPE Meet - K S Sesha Prakash 13
Public Key Infrastructure
To summarize : When a message is sent or received, we need to ensure the following:
Data integrity – is about data not changed since the time it was sent by the originator and received by the recipient - Hash / Message hash addresses this.
Confidentiality – Encryption (preferably Symmetric Cryptography) addresses this as only the recipient can decrypt the message/data. We assume that the key is available only with both the originator and the recipient.
Non-repudiation – The key pair (Public and Private ie., Asymmetric Cryptography) addresses this. Only the originator can encrypt the message / data with his private key
4th October 2008 CPE Meet - K S Sesha Prakash 14
Public Key Infrastructure
Identification and authentication – In a small community this is easily addressed through out of band channels. However, within the global community, this becomes difficult.
Key Transport / Key distribution – as above, possible in a small community and not in a global community.
In global communities, how to ensure the originator is genuine ie., whom to trust?
PKI will address these issues.
4th October 2008 CPE Meet - K S Sesha Prakash 15
Information Technology Act• IT Act 2000 : Basic legal framework for E-Commerce - promotes trust
in electronic environment – gazetted on 9th June 2000 • IT Act creates a conducive environment for promoting E-Commerce
in the country.
Acceptance of electronic documents as evidence in a court of law.
Acceptance of electronic signatures at par with handwritten signatures
Acceptance of electronic documents by the government.
Defines digital signatures based on asymmetric public key cryptography
Provides for the creation of Certifying Authorities to issue public key certificates – digital certificates for electronic authentication of users in electronic commerce.
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 16
The Controller of Certifying Authorities (CCA)
• Appointed by the Central Government under section 17 of the IT Act.
• Came into existence on November 1, 2000.• Aims at promoting the growth of E-Commerce and E-Governance
through the wide use of digital signatures.
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 17
Trust in Electronic Environment in India• Controller of Certification Authorities in position : Root of trust,
National Repository• Licensed CAs• Digital signatures for signing documents• Certificates, CRLs for access by relying parties• PKI operational• Other provisions of the IT Act – Cybercrimes not to go unpunished
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 18
PKI Hierarchy in India
CCA
CA CACA
RelyingParty
SubscriberSubscriber
Directory ofCertificates
CRLsDirectory ofCertificates
Subscriber
RA
4th October 2008 CPE Meet - K S Sesha Prakash 19
Public Key Infrastructure
Seven CA’s has been licensed
• Safescrypt - A subsidiary of Satyam Infoway• National Informatics Center (NIC) - Govt. of India• Institute for Development & Research in Banking Technology (IDRBT) – A society of RBI• Tata Consultancy Services (TCS)• M T N L• Customs & Central Excise• (n) Code Solutions - (A div. of Gujarat Narmada Valley Fertilizers Co. Ltd.)
4th October 2008 CPE Meet - K S Sesha Prakash 20
PKI Standards
Public Key Cryptography RSA - Asymmetric Cryptosystem Diffie-Hellman - Asymmetric Cryptosystem Elliptic Curve Discrete Logarithm Cryptosystem
Digital Signature Standards RSA, DSA and EC Signature Algorithms MD5, SHA-1 - Hashing Algorithms
Directory Services (LDAP ver 3) X.500 for publication of Public Key Certificates and Certificate Revocation Lists X.509 version 3 Public Key Certificates X.509 version 2 Certificate Revocation Lists
PKCS family of standards for Public Key Cryptography from RSA PKCS#1 – PKCS#13 (Public Key Cryptography Standard)
Federal Information Processing Standards (FIPS) FIPS 140-1 level 3 and above for Security Requirement of Cryptographic Modules
4th October 2008 CPE Meet - K S Sesha Prakash 21
Controller of Certifying Authorities as the highest authority of the Trust structure in India. All CA’s in India are under the Umbrella of the CCA. The CCA is under the Ministry of Commerce.
CCA to CA is the equivalent of Registrar of companies to Limited companiesRegistrar of firm to partnershipsRegistrar of societies to societies and associations
We need to know the terms CA – Certifying AuthorityRA – Registration AuthorityPKI repositoryCRL – Certificate Revocation List
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 22
• Some Trusted Agency is required which certifies the association of an individual with the key pair.
Certifying Authority (CA)
• This association is done by issuing a certificate to the user by the CA
Public key certificate (PKC)
• All public key certificates are digitally signed by the CA
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 23
Certifying Authority
Public Key Infrastructure
• Must be widely known and trusted• Must have well defined Identification process before issuing the certificate• Provides online access to all the certificates issued• Provides online access to the list of certificates revoked• Displays online the license issued by the Controller• Displays online approved Certification Practice Statement (CPS) • Must adhere to IT Act/Rules/Regulations and Guidelines
4th October 2008 CPE Meet - K S Sesha Prakash 24
IDRBT CertificatePaper Electronic
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 25
Public-Key Certification
Signed by using
CA’sprivate
key
Signed by using
CA’sprivate
key
UserName &
other credentials
UserName &
other credentials
User’s Public
key
User’s Public
key
User Certificate
Certificate Database
Publish
CertificateRequest
User Name
User’s Public Key
CA’s Name
Validity
Digital Signature of CA
Certificate Class
User’s EmailAddress
Serial No.
Key pair Generation
Private
Public
Web site of CA
User 1 certificate
User 2 certificate.
Public
License issued by CCA
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 26
The CA has to ensure the identity of the holder of the key pair to enroll
The CA itself may have the facility to do so
The CA may hive the arm of processing the identity of a Key Pair holder to an Registration Authority or RA
The RA in such an event follows a set of processes to identify the person with the key pair
Only when the RA is convinced, it will request the CA to issue the Digital Certificate for the Public key held by the applicant person.
A pictographic representation of the process
How a Digital Certificate is downloaded from the net.
Public Key Infrastructure
Registration Authority
4th October 2008 CPE Meet - K S Sesha Prakash 27
Classes of Certificates:
Class 1 CertificateClass 2 CertificateClass 3 Certificate – for servers, objects and Code
Types of Certificates:
Signing certificateEncryption certificateWeb Server CertificateClient CertificateObject Signing Certificate
Public Key Infrastructure
4th October 2008 CPE Meet - K S Sesha Prakash 28
PKI ArchitectureEnterprise architecture
Hierarchical Infrastructure (Root CA)Mesh infrastructure (Cross Certificate Pair)Bride PKI architecture
Public Key Infrastructure
Bridge CA --
Principle CA
Peer CA
Subordinate CA
A Bridge CA may not be trusted by himself. You trust because your Principle CA has issued a self signed certificate to the Bridge CA & The Bridge CA to the Principle CA
4th October 2008 CPE Meet - K S Sesha Prakash 29
PLEASE MAKE IT A POINT TO VOTE – It is your only Weapon- It is in your hand to make Democracy survive
Public Key Infrastructure