pki public key infrastructure
play

PKI: Public Key Infrastructure What is it, and why should I care? - PowerPoint PPT Presentation

PKI: Public Key Infrastructure What is it, and why should I care? Conference on Higher Education Wes Hubert Computing in Kansas Information Services June 3, 2004 The University of Kansas Why? PKI adoption will continue growing to support


  1. PKI: Public Key Infrastructure What is it, and why should I care? Conference on Higher Education Wes Hubert Computing in Kansas Information Services June 3, 2004 The University of Kansas

  2. Why?

  3. PKI adoption will continue growing to support highly sensitive or regulated business processes. However, the dream of using it for general-purpose authentication and ubiquitous digital signatures is still several years in the future and not a certainty. Public Key Infrastructure: Making Progress, But Many Challenges Remain Dan Blum and Gerry Gebel, Burton Group March 2003 ECAR report

  4. PKI adoption hurdles are lower than ever, and the benefits are greater than ever. The time has come to stop studying and testing and take the plunge. PKI: A Technology Whose Time Has Come in Higher Education Mark Franklin, Larry Levine, Denise Anthony, and Robert Brentrup Dartmouth College EDUCAUSE Review March/April 2004

  5. You should know enough about PKI to determine which view applies to your current situation.

  6. Benefits Strong authentication HIPAA, FERPA, etc. Protection from “sniffing” attacks S/MIME secure email Signing, encryption Work with other PKI developments Inter-university use of PKI Kansas government PKI use Grant signing requirements

  7. Hurdles Certification Authority Issues Outsource, Buy, or Build? Key/Certificate Management Policy Development Registration of users (vetting) Finding compatible applications User key management

  8. Common PKI Use Establishing SSL Connections Authenticates web server to browser Uses CA root built into browser University buys certificates from CA Protection is only for data transfer Does not authenticate user Does not authenticate a specific service User-level: Individual CA Certs/Keys

  9. Non-PKI Keys/Certificates Argus Server Authentication Certificates for server-to-server authentication Locally generated keys and certs No direct user involvement Argus User Authentication NOT certificate-based User-level: PGP, GPG, SSH

  10. Higher Education Organizations for PKI NMI-EDIT NSF Middleware Initiative Enterprise and Desktop Integration Technologies Members EDUCAUSE Internet 2 SURA (SE Univ Research Assoc) HEPKI-TAG Coordinates many PKI developments

  11. Higher Education Initiatives USHER US Higher Education Root Follow-on to CREN as CA InCommon Shibboleth Federation CA Signs Institutional Shib Certs HEBCA Higher Education Bridge Certification Authority

  12. USHER Certificates Low Few constraints on campus operations Suitable for many campus needs Good for learning Basic CP places more constraints on use HEBCA peering Both will issue only institutional certs

  13. HEBCA Trust HEBCA FBCA HECP InCommon Fd Root CA HECA Agency CA Agency CA Campus Campus

  14. Kansas Government PKI Distributed across several agencies Information Technology Executive Council (ITEC) Responsible for Kansas Certificate Policy Office of Secretary of State (SOS) Responsible for CA services contract Information Network of Kansas (INK) Responsible for KS Info Consortium contract KIC manages official state web site www.accesskansas.org

  15. Kansas Government PKI Distributed across several agencies General state PKI information online at: http://da.state.ks.us/itab/PKIMain.htm Agencies using service act as Local Registration Authority Current end-entity certs $40/year

  16. Kansas Government PKI Agencies using PKI State Treasurer’s Office “The Vault” Extranet Department of Revenue E-Lein Department of Transportation

  17. Kansas Government PKI Identity Management Security Levels Level 1 Virtual Vetting (no physical presence) Level 2 Physical Vetting; LRA Level 3, 4 Not yet issuing

  18. Kansas Statutes Chapter 16. Contracts and Promises Article 16. Electronic Transactions Electronic Signature [16-1602(i)] Digital Signature [16-1602(e)] If a law requires a signature, an electronic signature satisfies the law. [16-1607(d)] http://www.kslegislature.org/cgi-bin/ statutes/index.cgi/

  19. Electronic Signature ... an electronic sound, symbol or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record.

  20. Digital Signature ... a type of electronic signature consisting of a transformation of an electronic message using an asymmetric crypto system such that a person having the initial message and the signer's public key can accurately determine whether: � � � (1) � The transformation was created using the private key that corresponds to the signer's public key; and � � � (2) � the initial message has not been altered since the transformation was made.

  21. Given a choice between security and convenience, users will choose convenience.

  22. Public Key Infrastructure A system of CAs (and, optionally, RAs and other supporting servers and agents) that perform some set of certificate management, archive management, key management, and token management functions for a community of users in an application of asymmetric cryptography. (RFC2828 Definition)

  23. Traditional Cryptography Symmetric Same key that encrypts, decrypts Key is always secret Problems Exchanging key with trusted parties Same key gives everyone access Access includes ability to modify

  24. Traditional Cryptography DES (Data Encryption Standard) IBM, NIST, NSA 1970s 56-bit key Triple DES, 112-bit effective key size AES (Advanced Encryption Standard) Rijndael 128/192/256-bit key sizes

  25. Public Key Cryptography Diffie-Hellman 1976 Asymmetric Two keys: one private, one public Each decrypts what other encrypts Problems Much slower than symmetric Key management

  26. Public Keys Provide Confidentiality Protection again unauthorized access Integrity Protection against unauthorized changes Authentication Verification of an identity Nonrepudiation Cannot deny private key was used

  27. Key Management Generating Keys Authenticating Public Keys Distributing Keys

  28. Generating Keys Keys are generated in pairs Private/Public Keeping private keys secret Ideally no one but owner ever has key Problems convenience escrow recovery

  29. Authenticating Public Keys X.509 Certificates Bind public keys to identity information Contents Include Version Number Public Key Owner’s Name Initial / Final Dates Valid ... other information ... Signed by issuing CA

  30. Digital Credentials Private Key For exclusive use of owner MUST be kept secure Public Key Certificate Available to everyone Links key with owner’s identity Trust must be established somehow

  31. Distributing Credentials PKCS#12 Standard for secure transportation of user identity information Wraps data in password-protected object Content can include Keys Certificates Passwords

  32. Credential Package PKCS#12 Package Private Key X.509 Certificate Public Key Identity Info Other Info CA Signature

  33. Certificate Management Distribution User to user (e.g. email) LDAP directories Revoking Certificates Certificate Revocation Lists (CRL) Online Cert Status Protocol (OCSP) Keys and Certificates are not the same Certificates not used for private keys

  34. Credential Generation Key Generation Private Key Public Key ID Information Certificate CA Private Key Signing Request CA Signing PKCS#12 Public Key Generation Certificate PKCS#12 Object Package

  35. Public Key Infrastructure Solves some problems of public keys Establishing owner’s identity Defining validity dates, uses Based on trusted third party Signing may be through multiple levels CA cert may sign other CA certs Must end at trusted root CA

  36. Certification Authority Functions Register Users Directly or through Registration Authority Issue Public Key Certificates Revoke Certificates Publish revocation information Archive Key and Certificate Data Retrieve archives when appropriate May or may not ever have user private key

  37. Policies and Procedures Certificate Policy Statement Broad specification of policy objectives Accepted by CA & relying party Certification Practices Statement Detailed practices for issuing certificates Certificate lifetime, revocation, etc.

  38. KU as Certification Authority Strong authentication for campus services Registration already done via Registrar & Human Resources A natural extension of current I/A/A activity KU Online ID, AMS, Argus, LDAP Policy framework: EDUCAUSE, I2 Build on open source foundation

  39. KU Certificate Hierarchy KU Root CA KU Intermediate CA KU Personal CA KU Institutional CA Other potential uses User Certificates User Certificates

  40. KU Root Certificate Available on web at: https://www.ku.edu/kuca Currently root/anchor certificate Must be installed into client system Plan USHER-based path in future Corresponding private key: Used only to sign Intermediate CA Cert Now stored only on encrypted CD

  41. KU Digital Credential Process Action Initiated by Location Test Request User Web Approval CA Server ID Request User Web Generation CA Offline CA Notification CA Email Retrieval User Web Installation User User’s PC Use User Application

  42. S/Mime Email Normal Email is like a postcard Message encryption seals the envelope Digital signature adds unique “sealing wax” stamp

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend