security guide to network security fundamentals third
play

Security+ Guide to Network Security Fundamentals, Third Edition - PDF document

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used Describe the components of


  1. Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives • Define digital certificates • List the various types of digital certificates and how they are used • Describe the components of Public Key Infrastructure (PKI) • List the tasks associated with key management • Describe the different cryptographic transport protocols Digital Certificates • Using digital certificates involves: – Understanding their purpose – Knowing how they are authorized, stored, and revoked – Determining which type of digital certificate is appropriate for different situations – Used to associate (“bind”) the user’s identity to a public key – User must provide proof of their identity to obtain a Public key from a Trusted Agent. – User’s public key is “ digitally signed ” by a reputable source entrusted to sign it (trusted C ertificate A uthority or CA ) – Truste d CA’s are recognized by the operating system and provide a path for the verification (root certificate chain) – This provides a mechanism to validate the certificate is valid and not expired or revoked. – Digital Certificates provide an international standards mechanism to exchange messages that provide proof of integrity and non-repudiation • A digital certificate typically contains the following information: – Owner’s name or alias – Owner’s public key – Name of the Issuer – Digital signature of the issuer – Serial number of the digital certificate – Expiration date of the public key Certificate Authority (CA): – An entity that publishes digital certificates (typically for others) – Houses Root Certificate Server (offline) – Generates certificates for entities who provide verification of identity – Provides validation services for certificates issued – Provided services to notify users of certificates no longer valid (revoked or expired) – CA’s can be external trusted or internal locally issued Storing and Verifying Digital Certificates • Private Key Storage – Stored on the issued individuals system or token – Must be provided tight access controls to only the issued users – Private Key theft allows that user to impersonate the trusted user • Certificate Repository (CR) – A publicly accessible directory that contains the certificates and CRLs published by a CA

  2. – Used to check the validity of the published certificate (e.g. serial # , etc…) – CRs are often available to all users through a Web browser interface – Location is published through the root certificate trust chain • Certificate Trust Overview • Commercial Certificate Authorities – Must pass rigorous auditing – Provide publically accessible Cert Repositories and CRL’s – Are added to OS CA trust lists, allowing anyone who hold a cert instant trust when using. – Fees for certificate issuance and renewal • Private Certificate Authorities – Hosted internal to an organization – Require manual addition to the cert trust chain in each system. – Normally accomplished via GPO – No fee’s associated with issuance or renewal. – Certificate Trust Chains – During Verification • Application attempts to determine if certificate is valid by walking the certificate up the validation chain Revoking Digital Certificates • Certificate Revocation List (CRL) – Required to be published by the CA – Publically available information – Lists Invalidated (revoked) certificates • Reasons can include compromised or expired private keys – Most CRLs can either be viewed or downloaded directly into the user’s Web browser • Size of CRL causes performance issues – Can be used with security enforcement mechanisms to provide protection from questionable content. Digital Certificate Uses and Types • Uses: – Encrypt communications channels – Encrypt email messages – Verify the identity of clients and servers on the Web – Verify the source and integrity of signed executable code • Digital Certificate Categories: – Personal digital certificates – Server digital certificates – Software publisher digital certificates • X.509 Digital Certificates – The most widely accepted format for digital certificates – Web Transaction Overview Types of Digital Certificates • Single-sided certificate – Services of both Digital Signature and Encryption are support via single certificate

  3. • Dual-sided certificates – Certificates in which the functionality is split between two certificates • Signing certificate • Encryption certificate – Advantages: • Reduce need for storing multiple signing certificate copies • Facilitate certificate handling in organizations Public Key Infrastructure (PKI) • Involves public-key cryptography standards, trust models, and key management • Public-Key Cryptography Standards (PKCS) – Based on RSA PKI algorithm – Standards are defined by RSA Corporation • Public key infrastructure (PKI) – Framework and Management mechanism to create, store, distribute, and revoke digital certificates • Includes hardware, software, people, policies and procedures Trust Models • Trust may be defined as confidence in or reliance on another person or entity • Trust Model – Refers to the type of trusting relationship that can exist between individuals or entities • Direct Trust – A relationship exists between two individuals because one person knows the other person • Third party trust (Trust Chain) – Refers to a situation in which two individuals trust each other because each trusts a third party • Trust Models (cont.) • Direct trust is not feasible when dealing with multiple users who each have digital certificates • 3 PKI Trust Models that use a CA – Hierarchical trust model – Distributed trust model – Bridge trust model Public-Key Cryptography Standards (PKCS): Based on a standard and algorithm established by RSA. • Public Key infrastructure (PKI): Framework and Management mechanism to create, store, distribute, and revoke digital certificates. • 15 PKCS standards, some of which have be deprecated and rolled into others. • Trust: Confidence in or reliance of another person or entity • Trust Model: Relationship that exists between individuals or entities • Direct Trust: Relationship that exists between two individuals because one person knows the other person • Third party trust: A situation in which two individuals trust each other because each trusts a third party • Direct trust is not feasible when dealing with multiple users who each have digital certificates • 3 PKI Trust Models: – Hierarchical: Single root, not distributed infrastructure

  4. – Distributed : Used Intermediate CA to distribute and balance workload, lowers risk of a single compromise affecting all issues certificates – Bridge: Hybrid model that combined best of both and allows for trust outside of a single organization. Managing PKI • Certificate Policy (CP) – Published set of rules that govern the operation of a PKI – Provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components • Certificate Practice Statement (CPS) – Detail how issuing CA uses and manages certificates – A more technical document than a CP – Viewable by anyone who can see your public certificate • Certificate Life Cycle – Creation – Suspension – Revocation – Expiration • Key Management • Proper Key Management includes procedures for: – Key Storage – Key Usage – Key Handling Improper key management places the entire Key set at risk of compromise Key Storage • Public keys are stored by embedding within digital certificates and published • Private keys are stored on the user’s local system (software) or Devices (Hardware) • Software-based storage may leave keys open to attacks (e.g. on OS of a system) • Storing keys in hardware is an alternative to software-based storage • Private keys stored in devices such as smart cards or in tokens are harder to compromise • Key Usage • If more security is needed than a single set of public and private keys – Then multiple pairs of dual keys can be created • Pair One : – Encryption Keys » Public Key - Backed up to another location • Pair Two : – Used only for Digital Signatures » Pair would never be backed up Key Handling Procedures • 7 States with Key Handling Procedures process: – Escrow : Managed by 3 rd Party – Expiration : Sets period key is value, reduces time compromised by can be used – Renewal : Provides for renewing key vs. issuing new key; makes key more susceptible to misuse or theft

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend