L6 (KeyDistribution)
L6 (KeyDistribution)
MIS 1201
(Key Distribution)
Kasun De Zoysa
1
Asymmetric Key / Public Key
Cryptosystem
• Uses a Key Pair (Public / Private Keys) *
• Public Key shared between users
– Strengths
– Weaknesses
– Algorithms
3
Storage and Handling Public Keys
Keys
Server
A B
A B
A B 4
Key Management
• Using a public key system, A wants to talk
to B
• C is the Key Distribution Center(Key
Server), has A and B’s public key
• A calls B, and the calling protocol contacts
C
• C encrypts a session key, “k”, with the
public keys and sends the encrypted “k” to
A and B
• A and B can then communicate
5
Secure Sending of secret key
A B
A
B
Key
A B
(“Digital Envelope”)
6
Recovery of Secret Key
A B
B A
Key
B
A B 7
Authenticity of Sender
A B
B
Key
A B
A (“Digital Signature”)
8
Verification of Signature
A B
B A
Key
B
A B 9
Authenticity of Sender and Receiver
A B
B
Key
A B
A
10
Full Verification
A B
(Sender’s/Receiver’s
Authenticity, Message
Protection and Integrity )
A
Key
A B
A B
11
Certificate Authority
Keys
A Certificates B
Server
CA
MAC MAC
A B 12
Certificates Infrastructure
Infrastructure
– Certificates need some infrastructure in place to
allow users to verify a given certificate.
– This can be done centrally or via a distributed
system.
– So how are certificates, and their certificate
chains, verified and disseminated?
(1) Trusted Third Party (TTP)
(2) Certificate Authority (CA)
(3) Simple Public Key Infrastructure (SPKI)
Certificates Infrastructure
Certificate Authority
• Trusted, 3rd party organization
• CA (Certificate Authority) guarantees that the
individual granted a certificate is who he/she
claims to be
• CA usually has arrangement with financial
institution to confirm identity
• Critical to data security and electronic commerce
• Well known organisation establish themselves to
act as certificate authorities. Verisign, CREN,
etc.
• One can then obtain X.509 public key
certificates from them by submitting satisfactory
evidence of their identity. 15
Certificate Infrastructure
Simple Public Key Infrastructure (SPKI)
– X.509 relies on global uniqueness, which can cause long
chains of certification that must be validated to someone
who is trusted.
– SPKI is a scheme for the creation and management of
sets of public certificates.
– Chains of certificates can be process using logical
inference to produce derived certificates.
– E.g. Bob believed Alice’s key is KApub
– Carol trusts Bob on Alice’s public key
– Therefore, Carol believes that Alice’s public
key is KApub.
Certificate Standards
X.509
• Most widely used standard for certificates.
• Part of the X.500 standard for the construction of global directories
of names and attributes.
• X.509 is used in cryptography as a format definition for free
standing certificates.
• Public key is bound to a named entity called a subject.
• Binding is in the signature, which is issued by an Issuer.
•Version
•Serial Number
•Signature Algorithm
•Issuer
•Subject MAC
•Validity
•Subject Public Key Information
•Extensions
•Signature
18
Structure of Distinguish Name
•Country Name
•State and Province Name
•Locality Name
•Organization Name
•Organization Unit Name
•Common Name
•Email Address
•URL
19
Certificate Types
•Digital Signature
•Key Encipherment
•Data Encipherment
•Key Certificate Signature
•CRL Signature
•Object Signing
MAC
20
Root Certificate
21
Public key infrastructure (PKI)
• Public key infrastructure (PKI) - provides
the foundation necessary for secure e-
business through the use of
cryptographic keys and certificates
– Enables secure electronic transactions
– Enables the exchange of sensitive
information
PKI 22
Public Key Infrastructure (PKI)
• PKI is an ISO authentication “framework” that uses public key
cryptography and X.509 standard protocols.
CA
CA CA
A B
25
CA Hierarchy in Practice
26
Alternative Trust Hierarchies
27
Cross Certification
RCA
RCA
BCA
BCA
GCA
CCA GCA
CCA
A B
28
Bridge CA BCA (L1) CRL
CML Validates
Certificate Path
CRL:
Justice User 6
Justice User 88
Justice Armed Forces CRL
Root
Army CA Navy CA AF CA
CPDL Builds
Certificate Path
30
Certificate Revocation
•Revocation is managed with a Certificate Revocation List
(CRL), a form of anti-certificate which cancels a certificate
• Equivalent to 1970s-era credit card blacklist booklets
• Relying parties are expected to check CRLs before using
a certificate
– “This certificate is valid unless you hear somewhere that it
isn’t”
31
CRL Distribution Problems
32
Online Status Checking
•Online Certificate Status Protocol, OCSP
• Inquires of the issuing CA whether a given certificate is still
valid
– Acts as a simple responder for querying CRL’s
– Still requires the use of a CRL to check validity
• OCSP acts as a selective CRL protocol
– Standard CRL process: “Send me a CRL for everything you’ve
got”
– OCSP process: “Send me a pseudo-CRL/OCSP response for
only these certs”
– Lightweight pseudo-CRL avoids CRL size problems
– Reply is created on the spot in response to the request 33
– Ephemeral pseudo-CRL avoids CRL validity period problems
34
Online Certificate Status Protocol (OCSP)
35
OCSP Problems
36
Other Online Validation Protocols
37
Discussion
Discussion
38