Chapter 3 PKI-Overview
Chapter 3 PKI-Overview
(X509 PKI)
Outline
• Basic Problem of Confidence and Trust
• Background: Cryptography, Digital Signature,
Digital Certificates
• (X509) Public Key Infrastructure (PKI)
• (X509) PKI: Trust and Legal Issues
Confidence and Trust
Issues in the Digital
World
Basic Problem
Intranet
Extranet
Internet
Bob Alice
Intranet
Extranet
Internet
Bob Alice
Intranet
Extranet
Internet
Bob Alice
Intranet
Extranet
Internet Moving towards PKI …
Bob Alice
Digital Signature
Digital Signature
A Digital Signature is a data item that vouches the origin
and the integrity of a Message
• The originator of a message uses a signing key (Private Key) to sign the
message and send the message and its digital signature to a recipient
• The recipient uses a verification key (Public Key) to verify the origin of
the message and that it has not been tampered with while in transit
Intranet
Extranet
Internet
Bob Alice
Digital Signature
Message Message
Digest Digest
Hash Function Hash Function
Algorithm Algorithm
Digest
Public Key
Issuer
Subject
“Consumer” Side
• PKI enabled applications
X509 PKI – Simple Model
Certification
CA Entity
Cert. Request
Application Signed
Certificate
RA
Service Internet
Certs, Directory
CRLs
Remote Local
Person Person
X509 PKI
Certificate Authority (CA)
Basic Tasks:
• Key Generation
• Digital Certificate Generation
• Certificate Issuance and Distribution
• Revocation
• Key Backup and Recovery System
• Cross-Certification
X509 PKI
Registration Authority (RA)
Basic Tasks:
• Registration of Certificate Information
• Face-to-Face Registration
• Remote Registration
• Automatic Registration
• Revocation
X509 PKI
Certificate Distribution System
Provide Repository for:
• Digital Certificates
• Certificate Revocation Lists (CRLs)
Typically:
• Special Purposes Databases
• LDAP directories
Certificate Revocation List
Certificate Revocation List
Revoked Certificates
remain in CRL
until they expire
Certificate Revocation List (CRL)
• CRLs are published by CAs at well defined
interval of time
• It is a responsibility of “Users” of certificates to
“download” a CRL and verify if a certificate has
been revoked
• User application must deal with the revocation
processes
Online Certificate Status Protocol
(OCSP)
• An alternative to CRLs
• IETF/PKIX standard for a real-time check if a
certificate has been revoked/suspended
Directory CRL
Certificate IDs
to be checked Download
CRL
User OCSP CRL
CA
Answer about Server
Certificate States
Directory
OCSP
X509 PKI
PKI-enabled Applications
Functionality Required:
• Cryptographic functionality
• Secure storage of Personal Information
• Digital Certificate Handling
• Directory Access
• Communication Facilities
X509 PKI
Trust and Legal Issues
X509 PKI
Trust and Legal Issues
Certificate Hierarchies
and
Cross-Certification
CA Technology Evolution
CA CA CA CA Directory CA
Services
RA CA CA CA
RA RA Internet RA
RA RA Internet
Try to reflect
Real world Trust Models
LRA LRA