Lec ectur ure 12 e 12
1
Public Key Certification and Revocation
[lecture slides are adapted from previous slides by Prof. Gene Tsudik]
Lec ectur ure 12 e 12 Public Key Certification and Revocation - - PowerPoint PPT Presentation
Lec ectur ure 12 e 12 Public Key Certification and Revocation [lecture slides are adapted from previous slides by Prof. Gene Tsudik] 1 CertificationTree / Hierarchy Logical tree of CA-s PK root root [PK CA1 ]SK root CA1 CA3 [PK CA2 ]SK
1
[lecture slides are adapted from previous slides by Prof. Gene Tsudik]
Logical tree of CA-s
2
root CA1 CA2 CA3 PKroot [PKCA1]SKroot [PKCA2]SKCA1 [PKCA3]SKroot CA4[PKCA4]SKCA3
3
UCI UCSB UCSD UCR
4
UCOP CSOP UCI CSULB UCLA CSUN
5
UCOP CSOC UCI CSULB UCLA CSUN Governor
Alfred Chen
6
7
UCI UMass UTexas
Derived from PKI
8
9
by the verifier
10
11
database about certificates
algorithms
12
13
14
15
16
17
10000000000000001
MIIDTzCCAvmgAwIBAgIBATANBgkqhkiG9w0BAQQFADBcMSEwHwYDVQQKExhFdXJv cGVhbiBJQ0UtVEVMIHByb2plY3QxIzAhBgNVBAsTGlYzLUNlcnRpZmljYXRpb24g QXV0aG9yaXR5MRIwEAYDVQQHEwlEYXJtc3RhZHQwHhcNOTcwNDAyMTczNTU5WhcN OTgwNDAyMTczNTU5WjBrMSEwHwYDVQQKExhFdXJvcGVhbiBJQ0UtVEVMIHByb2pl Y3QxIzAhBgNVBAsTGlYzLUNlcnRpZmljYXRpb24gQXV0aG9yaXR5MRIwEAYDVQQH EwlEYXJtc3RhZHQxDTALBgNVBAMTBFVTRVIwWTAKBgRVCAEBAgICAANLADBIAkEA qKhTY0kbk8PDC2yIEVXefmri+VKg3GklxMi/VeExqM7kqSmFmYoVmt72L+G0UF9e BHWm9HbcPA453Dq+PqRhiwIDAQABo4IBmDCCAZQwHwYDVR0jBBgwFoAUfnLy+DqG nEKINDRmdcPU/NGiETMwHQYDVR0OBBYEFJfc4B8gjSoRmLUx4Sq/ucIYiMrPMA4G A1UdDwEB/wQEAwIB8DAcBgNVHSABAf8EEjAQMAYGBCoDBAUwBgYECQgHBjBDBgNV HREEPDA6gRV1c2VyQGRhcm1zdGFkdC5nbWQuZGWGIWh0dHA6Ly93d3cuZGFybXN0 YWR0LmdtZC5kZS9+dXNlcjCBsQYDVR0SBIGpMIGmgQxnbWRjYUBnbWQuZGWGEWh0 dHA6Ly93d3cuZ21kLmRlghdzYXR1cm4uZGFybXN0YWR0LmdtZC5kZaRcMSEwHwYD VQQKExhFdXJvcGVhbiBJQ0UtVEVMIHByb2plY3QxIzAhBgNVBAsTGlYzLUNlcnRp ZmljYXRpb24gQXV0aG9yaXR5MRIwEAYDVQQHEwlEYXJtc3RhZHSHDDE0MS4xMi42 Mi4yNjAMBgNVHRMBAf8EAjAAMB0GA1UdHwQWMBQwEqAQoA6BDGdtZGNhQGdtZC5k ZTANBgkqhkiG9w0BAQQFAANBAGkM4ben8tj76GnAE803rSEGIk3oxtvxBAu34LPW DIEDzsNqPsfnJCSkkmTCg4MGQlMObwkehJr3b2OblJmD1qQ=
18
Notation 1 (ASN.1)
Rules (DER)
get an ASCII representation (previous slide)
19
What if:
Bob, Alice first checks if Bob’s certificate is still valid!
realized his key is lost?
20
yet naturally expired but revoked
revocation activity! WHY?
21
status
22
23
Explicit:
Structures
Implicit:
24
revocation authority (RA)
25
26
27
(one-time signatures)
28
5 and less than 12 are okay
necessary hash values along the path to the root, the signed root
distributes to untrusted servers called Confirmation Issuers
31
32
Signed root (N 3,0) N2,0 N1,1 N1,0
HASH
N0,1 N0,0
HASH
N0,3 N0,2
HASH
N0,5 N0,4
HASH
N0,7 N0,6
HASH
N2,1 N1,3 N1,2
HASH
(-∞ to 7)
HASH
(7 to 23)
HASH
(23 to 27)
HASH
(27 to 37)
HASH
(37 to 49)
HASH
(49 to 54)
HASH
(54 to 88)
HASH
(88 to +∞)
HASH
query: Is 67 revoked?
HASH
root
33
(RFC 2560) - June 1999
checking CRLs
e.g., stock trades, electronic funds transfer, military
34
35
Alice OCSP responder CA Bob
2.
request
Bob Bob
the CA) saying that it can issue OCSP responses on CA’s behalf
36
requested
37
indicated is known to be correct
information will be available
signed this response. Useful for response pre- production
38
DoS, but…
(since no nonce included)
39
different statuses.
40