0% found this document useful (0 votes)
90 views27 pages

Introduction To PKI

Public key infrastructure (PKI) uses public key cryptography and digital certificates to provide security services like authentication, confidentiality, data integrity, and non-repudiation. PKI supports these services through components like certificate authorities (CAs), registration authorities (RAs), and repositories. Different PKI architectures include single CA, hierarchical, mesh, trust lists, and bridge CAs. Path validation is needed to verify the chain of trust from a user's certificate back to a trusted CA.

Uploaded by

Mathias Mbizvo
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views27 pages

Introduction To PKI

Public key infrastructure (PKI) uses public key cryptography and digital certificates to provide security services like authentication, confidentiality, data integrity, and non-repudiation. PKI supports these services through components like certificate authorities (CAs), registration authorities (RAs), and repositories. Different PKI architectures include single CA, hierarchical, mesh, trust lists, and bridge CAs. Path validation is needed to verify the chain of trust from a user's certificate back to a trusted CA.

Uploaded by

Mathias Mbizvo
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Introduction to Public Key Infrastructure

Tim Polk January 13, 2005

Overview
Why PKI? PKI Components PKI Architectures Path Validation

Why PKI?
PKI is not the goal Scalable security services are the goal PKI supports scalable security services using public key cryptography

Security Services That Can Be Supported By PKI


Authentication - Ability to verify the identity of an entity Confidentiality - Protection of information from unauthorized disclosure Data Integrity - Protection of information from undetected modification Technical Nonrepudiation - Prevention of an entity from denying previous actions

Secret Key Cryptography


Classical form of cryptography Caesar Cipher Single key used to encrypt and decrypt data Strengths
Very fast relative to public key cryptography Relatively short keys

Weakness: Key must be shared among interested parties

Public Key Cryptography


Each entity has a PAIR of mathematically related keys Private Key - known by ONE Public Key - known by Many Not feasible to determine Private Key from Public Key Strength no shared private keys Weakness
Relatively slow Requires longer keys for same level of security

Choosing Cryptographic Tools


Secret key is best
Bulk encryption

Public key is best suited to


Digital signatures (e.g., RSA and DSA) Key Management
Key transfer (e.g., RSA) Key agreement (e.g., Diffie-Hellman)

Why Do We Need Certificates?


Whose public key is this, anyway? What is this key good for?
Signatures or encryption? < $100 or up to $10,000,000 ? Secure mail, secure web, or document signing? How much can I trust it?

Credit Card
Features
Magnetic Stripe Issued by trusted 3rd party (TTP)
issuer verifies user info Issuer knows if information is current Pleasantville National Bank
9999
04/97

Fixed expiration

9999

9999
11/30/99

9999

Drawbacks
Easy to forge Partial identification
MEMBER SINCE

VALID FROM

EXPIRATION DATE

Bob Smith 95

Trusty Cards

Digital Public Key Certificates


Features
Digital object (no typing!) Tamper-evident Issued by a TTP Complete user identification Fixed expiration
Serial Number: Certificate for: Company: Issued By: Email Address: Activation: Expiration: Public Key: 206 Bob Smith Fox Consulting Awfully Big Certificate Co. [email protected] Jan. 10, 2000 Jan. 10, 2002
24219743597430832a2187b6219a 75430d843e432f21e09bc080da43 509843

ABCs digital signature


0a213fe67de49ac8e9602046fa7de2239316ab233dec 70095762121aef4fg66854392ab02c4

Drawbacks
Must trust issuer

Using Public Key certificates

Serial Number: Certificate for: Company: Issued By: Email Address:


Alices copy of ABCs public key 0a213fe67de49ac8e9602 046fa7de2239316ab233d ec70095762121aef4fg66 854392ab02c4

206 Bob Smith Fox Consulting Awfully Big Certificate Co. [email protected] Jan. 10, 2000 Jan. 10, 2002
24219743597430832a2187b6219a 75430d843e432f21e09bc080da43 509843

Activation: Expiration: Public Key:

Alice - please ship 100 widgets to Joes Warehouse 100 Industrial Park Dr. Pleasantville, CA Thanks, Bob!

ABCs digital signature


0a213fe67de49ac8e9602046fa7de2239316ab233dec 70095762121aef4fg66854392ab02c4

Bobs digital signature


12fa45cde67ab890034ab6739912acc4 587362600ff1e27849300ba6cdf0034

Why Do We Need CRLs or Status Checking?


Credit cards are revoked if the card holder
Dies Loses the card Cancels the card Doesnt pay

Certificates may be revoked if the subject


Dies Loses their crypto module Leaves the company

Credit Card Verification


Two mechanisms for handling credit card revocation
The hot list
Paper booklet listing hot cards

Calling the issuer


Providing the card number AND the $ amount Received an authorization number OR a denial

CRLs & Status Checking


CRLs are analogous to the hot list Status checking is analogous to calling the issuer to obtain information on a credit card

Issued By: Activation: Expiration:

Awfully Big Certificate Co. June 10, 2001 July 10, 2001

Revoked Certificate List: 84, 103, 111, 132, 159, 160, 206, 228, 232, 245, 287, 311, 312, 313

ABCs digital signature


ab45c677899223134089076ab7d7eff2336a7569316a f1288399a7445abc4dd67980121234726389ac

Certification Authority (CA)


An entity that is trusted by PKI users to issue and revoke public key certificates A CA is a collection of personnel and computer systems
Highly secured (e.g., a guarded facility, with firewalls on the network) against external threats Strong management controls (separation of duties, n of m control) to protect against internal threats

Registration Authority (RA)


An entity that is trusted by the CA to vouch for the identity of users to a CA
This entity is only trusted by the CA Generally relies on operational controls and cryptographic security rather than physical security

Repository
An electronic site that holds certificates and certificate status information
Need not be a trusted system since all information is tamper-evident Most commonly accessed via LDAP Theoretically could be accessed using HTTP, FTP, or even electronic mail

PKI Architectures
Single CA Hierarchical PKI Mesh PKI Trust lists (Browser model) Bridge CAs

Single CA
A CA that issues certificates to users and systems, but not other CAs
Easy to build Easy to maintain All users trust this CA Paths have one certificate and one CRL Doesnt scale particularly well

Hierarchical PKI
CAs have superiorsubordinate relationships
CA-1 CA

CA-2

CA-3

Users trust the root CA


Alice Bob Carol David

Mesh PKI
CAs have peerto-peer relationships Users trust the CA that issued their certificates
Bob David
CA-3 CA-1

CA-2

Alice Carol

Trust lists (Browser model)


User trusts more than one CA Each CA could be a single CA or part of a PKI
For hierarchies, should be the root For mesh PKIs, could be any CA

Trust List Example


CA-1 CA-3

Alices Trust List CA-1 CA-2 CA-3


Alice Bob
CA-4 CA-5

CA-2 CA-6

CA-7

Carol

David

Bridge CAs
Designed to unify many PKIs into a single PKI Designed to translate trust information into a single entity

Bridge CA Example
There may be dead-ends and cycles
CA

Frank

Harry
CA CA

Bridge CA
CA

CA CA CA

Ellen Gwen Alice Bob Carol David

Mesh PKI Architecture

Hierarchical PKI Architecture

The Path Development Problem


Frank Harry
CA CA

CA

Bridge CA
CA

CA CA CA

Ellen Gwen Alice Bob Carol David

Path Validation
CA-2s Certificate Issued by CA-1 Alices Trusted CA-1 Public Key
Subject: CA2 Public Key:

Bobs Certificate Issued by CA-2


Subject: Bob Public Key:

Document Signed By Bob

Alice, 500 widgets would cost $500000.00 Signature Bob

Signature CA-1

Signature CA-2

Also need to check the status of each certificate!

You might also like