Public Key Distribution (and Certifications)

2y ago
38 Views
2 Downloads
1.65 MB
39 Pages
Last View : 2d ago
Last Download : 3m ago
Upload by : Laura Ramon
Transcription

Lecture 12Public Key Distribution(and Certifications)(Chapter 15 in KPS)1

A Typical KDC-based Key Distribution ScenarioKDC Key Distribution CenterKDC(1) Request B N1EK[X] Encryption of X with key K(2) EKa[Ks Request N1 EKb(Ks,A)](3) EKb[Ks,A]A(4) EKs[A,N2](5) EKs[f(N2)]Notes: Msg2 is tied to Msg1 Msg2 is fresh/new Msg3 is possibly old * Msg1 is possibly old (KDC doesn’t authenticate Alice) Bob authenticates Alice Bob authenticates KDC Alice DOES NOT authenticate BobB2

Public Key Distribution General Schemes: Public announcement (e.g., in a newsgroup oremail message) Can be forged Publicly available directory Can be tampered with Public-key certificates (PKCs) issued bytrusted off-line Certification Authorities (CAs)3

Certification Authorities Certification Authority (CA): binds public key to a specific entity Each entity (user, host, etc.) registers its public key with CA. Bob provides “proof of identity” to CA. CA creates certificate binding Bob to this public key. Certificate containing Bob’s public key digitally signed by CA:CA says: “this is Bob’s public sidentifyinginformationCAprivatekeySK CAcertificate for Bob’spublic key, signed byCA4

Certification Authority When Alice wants to get Bob’s public key: Get Bob’s certificate (from Bob or elsewhere)Using CA’s public key verify the signature on Bob’s certificateCheck for expirationCheck for revocation (we’ll talk about this later)Extract Bob’s public eyPKCA5

A Certificate Contains Serial number (unique to issuer) Info about certificate owner, including algorithm andkey value itself (not shown) info aboutcertificateissuer valid dates digitalsignature byissuer6

Reflection Attack and a Fix Original Protocol1.2.3.A B:B A:A B:Attack1.2.3.4.5.A E:E A:A E:E A:A E:rA{ rA , rB } KrBrArA : Starting a new session{ rA, rA’ } K : Reply to (2){ rA, rA’ } K : Reply to (1)rA’Solutions? Use 2 different uni-directional keys k” (AàB) and k’ (BàA)Remove symmetry (direction, msg identifiers)7

Interleaving Attacks Protocol for Mutual Authentication1.2.3. A, rA,rB, { rB, rA, A } SKBrA’, { rA’, rB, B } SKAAttack1.2.3.4.5. A B:B A:A B:E B:B E:E A:A E:E B:A, rArB, { rB, rA, A } SKBB, rBrA’, { rA’, rB, B } SKArA’, { rA’, rB, B } SKAAttack due to symmetric messages (2), (3)8

One-wayAàBx.509 Authentication & Key DistributionProtocols{1, t a , ra , B, othera , [ K ab ]PK }SK ABTwo-wayAàB{2, t a , ra , B, othera , [ K ab ]PK }SK AB{2, tb , rb , A, ra , otherb , [ K ba ]PK }SK BATree-wayAßàB{3, t a , ra , B, othera , [ K ab ]PK }SK AB{3, tb , rb , A, ra , otherb , [ K ba ]PK }SK BA{3, rb }SK A9

Lessons Learned? Designing secure protocols is hard. There are manydocumented failures in the literature. Good protocols are already standardized (e.g., ISO9798, X.509, ) – use them! The problem of verifying security gets much harderas protocols get more complex (more parties,messages, rounds).10

Merkle’s Puzzles (1974)0 i 2n NX i ,Yi random secret keysindex i random (secret) valuePuzzle Pi {index i , X i ,S}YiS fixed string, e.g., " Alice to Bob"{Pi 0 i 2 n }index jBreak Y j by brute forceLook up index jObtain X jPick random j, 0 j 2 nSelect PjObtain {index j , X j ,S}Encrypted communication with Xj? Is security computational orinformation theoretic?11

PK-based Needham-SchroederTTP1. A, B4. B, A5. {PK , A}a SKT2. {PK , B}b SKTA3. [N , A]a PKbB6. [N , N ]a b PKa7. [N ]b PKbHere, TTP acts as an “on-line” certification authority (CA) and takes care ofrevocation12

What If? Alice and Bob have: No common mutually trusted TTP(s) and/orNo on-line TTP(s)13

Public Key Infrastructure(Distribution) Problem: How to determine the correct public key of agiven entity Binding between IDENTITY and PUBLIC KEY Possible Attacks Name spoofing: Eve associates Alice’s name with Eve’s public key Key spoofing: Eve associates Alice’s key with Eve’s name DoS: Eve associates Alice’s name with a nonsensical (bogus) key What happens in each case?14

Public Key Distribution Diffie - Hellman (1976) proposed the“public file” concept universally accessible no unauthorized modification not scalable!15

Public Key Distribution Popek - Kline (1979) proposed “trusted thirdparties” (TTPs) as a means of PK distribution: Each org-n has a TTP that knows public keys of all ofits constituent entities and distributes them ondemand On-line protocol like the one we already saw TTP single point of failure Denial-of-Service (DoS) attacks16

Certificates Kohnfelder (BS Thesis, MIT, 1978) proposed“certificates” as yet another public-key distributionmethodCertificate explicit binding between a public key andits owner’s (unique!) nameMust be issued (and signed) by a recognized trustedCertificate Authority (CA)Issuance done off-line17

Authenticated Public-Key-based Key Exchange(Station-to-Station or STS Protocol)Choose random vya a v mod pComputeCERTbob , yb , SIGbobK ab ( yb )v mod pSIGalice { ya , yb }aliceCERTalice , SIGaliceChooserandom w,ComputeK ba ( ya ) w mod pyb a w mod pSIGbob { yb , ya }Bob18

Certificates Procedure Bob registers at local CA Bob receives his certificate:{ PKB, IDB, issuance time, expiration time, etc.,.}SKCA Bob sends certificate to Alice Alice verifies CA’s signature PKCA hard-coded in software Alice uses PKB for encryption and/or verifyingsignatures19

Who Issues Certificates? CA: Certification Authority e.g., GlobalSign, VeriSign, Thawte, etc. look into your browser . Trustworthy (at least to its users/clients)Off-line operation (usually)Has its own well-known long-term certificateMay store (as backup) issued certificatesVery secure: physically and electronically 20

How does it work? A public/private key-pair is generated by user User requests certificate via a local application (e.g., webbrowser) Good idea to prove knowledge of private key as part of thecertificate request. Why? Public key and owner’s name are usually part of acertificate Private keys only used for small amount of data (signing,encryption of session keys) Symmetric keys (e.g., RC5, AES) used for bulk dataencryption21

Certification Authority (CA) CA must verify/authenticate the entity requesting anew certificate. CA’s own certificate is signed by a higher-level CA.Root CA’s certificate is self-signed and its name is“well-known.” CA is a critical part of the system and must operate ina secure and predictable way according to somepolicy.22

Who needs them? Alice’s certificate is checked by whomever wants to:1) verify her signatures, and/or 2) encrypt data for her. A signature verifier (or encryptor) must: know the public key of the CA(s) trust all CAs involved Certificate checking is: verification of the signature andvalidity Validity: expiration revocation checking23

Verifying a Certificate(assuming Common CA)To becoveredlater24

BTW: Certificate Types PK (Identity) certificates Bind PK to some identity string Attribute certificates Bind PK to arbitrary attribute information, e.g.,authorization, group membershipWe concentrate on former25

What are PK Certificates Good For? Secure channels in TLS / SSL for web servers Signed and/or encrypted email (PGP,S/MIME) Authentication (e.g., SSH with RSA) Code signing! Encrypting files (EFS in Windows) IPSec: encryption/authentication at the networklayer26

Components of a Certification System Request and issue certificates (different categories) withverification of identityStorage of certificatesPublishing/distribution of certificates (LDAP, HTTP)Pre-installation of root certificates in a trusted environmentSupport by OS platforms, applications and servicesMaintenance of database of issued certificates (no privatekeys!)Helpdesk (information, lost compromised private keys)Advertising revoked certificates (and support for applicationsto perform revocation checking)Storage “guidelines” for private keys27

CA Security Must minimize risk of CA private key beingcompromised Best to have an off-line CA Requests may come in electronically but not processedin real time In addition, using tamper-resistant hardware forthe CA would help (should be impossible toextract private key)28

Mapping Personal Certificates intoAccounts/Names Certificate must map “one-to-one” into anaccount/name for the sake of authentication In some systems, mapping are based upon X.509naming attributes from the Subject field Example: Verisign issues certificate as CN Full Name(account) Account/name is local to the issuing domain29

Storage of Private Key The problem of having the user to manage the private key(user support, key loss or compromise) Modern OS's offers Protected Storage which saves private keys(encrypted). Applications take advantage of this; Browsers sometimes saveprivate keys encrypted in its configuration directory Users who mix applications or platforms must manually import/ export private keys via PFX files.30

Key Lengths Strong encryption has been adopted since the relaxation ofUS export laws E.g., 512- and 1024-bit RSA is not safe anymore Root CA should have an (RSA) key length of 2048 bits givenits importance and typical lifetime of 3-5 years A personal (RSA) certificate should have key length of at least1536 bits31

Key LengthsJanuary 2016 Recommendation from National Security Agency uantum-Computing-FAQ.pdf32

Naming Comes First! Cannot have certificates without a comprehensive naming scheme Cannot have PKI without a comprehensive distribution/accessmethod X.509 uses X.500 naming X.500 Distinguished Names (DNs) contain a subset of: CCountry SPState/Province LLocality OOrganization OUOrganizational Unit CNCommon Name33

X.500 ISO standard for directory services Global, distributed First solid version in 1988. (second in 1993.) Documentation - several Internet StandardRequest for Comments (RFC)34

X.500 Data Model: Based on hierarchical namespaceDirectory Information Tree (DIT)Geographically organizedEntry is defined with its dn (Distinguished Name)Searching: You must select a location in DIT to base your search A one-level search or a subtree search Subtree search can be slow35

X.500 - DITWorldc AFo AL QAEDAcn Osama bin Laden (deceased)dn:.c USAo Army.cn Osama bin Laden, o Al Qaeda, c AF36

X.500 Accessible through: Telnet (client programs known as dua, dish, .) WWW interface For example: http://www.dante.net:8888/ Hard to use and very heavy thus LDAP was developed37

LDAP LDAP - Lightweight Directory Access ProtocolLDAP v2 - RFC 1777, RFC 1778LDAP v3 - RFC 1779developed to make X.500 easier to useprovides basic X.500 functionsreferral model instead original chaining server informs client to ask another server(without asking question on the behalf of client) LDAP URL format: ldap://server address/dn (ldap://ldap.uci.edu/cn Kasper Rasmussen,o UCI,c US)38

Some Relevant Standards The IETF Reference Site http://ietf.org/html.charters/wg-dir.html#Security Area Public-Key Infrastructure (X.509, PKIX) RFC 2459 (X.509 v3 v2 CRL) LDAP v2 for Certificate and CRL Storage RFC 2587 Guidelines & Practices RFC 2527 S/MIME v3 RFC 2632 & 2633 TLS 1.0 / SSL v3 RFC 224639

27 Components of a Certification System Request and issue certificates (different categories) with verification of identity Storage of certificates Publishing/distribution of certificates (LDAP, HTTP) Pre-installation of root certificates in a trusted environment Support by OS platforms, applications and services Maintenance of database of issued certificates (no private

Related Documents:

Spartan Tool product. 2 1. Escape Key 2. Help Key 3. Standard Survey Key 4. WinCan Survey Key 5. Overlay Key 6. Overlay Style Key 7. Overlay Size Key 8. Footage Counter Key 9. Report Manager Key 10. Settings Key 11. Spa r e Function Key 1 12. Spa r e Function Key 2 13. Power Button 14. Lamp O 15. Lamp - Key 16. Lamp Key 17. V

1. 10,000 Reasons (Bless The Lord): key of E 2. Alive In Us: key of G 3. All Because Of Jesus: key of B 4. All Who Are Thirsty: key of D 5. Always: key of B 6. Arms Open Wide: key of D 7. At The Cross: key of E 8. Blessed Be Your Name: key of B 9. Break Free: key of A 10. Broken Vessels (Amazing Grace): key of G 11. Come As You Are: key of A 12 .

11/13/14 2 Public key concept Sender, receiver do not share secret key Each uses a pair of related keys (private, public) Private decryption key known only to receiver Public encryption key known to all �s(public(key( Confidentiality without a shared secret " Two parties must share a secret before they can exchange secret messages

Chris Nitchie, Oberon Technologies chris.nitchie@oberontech.com book.ditamap key-1 key-2 . key-3 . key-1 key-2 key-3 book.ditamap key-1 scope-1 key-1 key-2 . key-3 . scope-2 . key-1 key-2 . key-3 . DITA 1.2 -

PHOENIX CONTACT 3 Contents Ready-to-connect distribution blocks System overview 4 Configure and order distribution block solutions online 6 Product overview 1.5 mm2 distribution blocks 8 1.5 mm2 distribution blocks with 4 mm2 feed-in 12 2.5 mm2 distribution blocks 14 2.5 mm2 distribution blocks with 6 mm2 feed-in 18 4 mm2 distribution blocks 20

Documentation To learn more about M400 device, refer to the following set of documents: M400 Certifications and Regulations VPN - DOC445-001-EN M400 Series Quick Installation Guide VPN - DOC445-002-EN M4xx Accessory Certifications and Regulations VPN - DOC445-005-EN M4 PoE Dongle Certifications and Regulations VPN - DOC000-001-EN

Acquisition Certifications as well as certification programs developed for the DOE workforce involved in federal financial assistance, property management, real estate leasing and technology . guidance for certifications issued through APM's Professional Development Division and provides guidance for attaining, issuing and maintaining .

toward Cisco certifications. First, let's simply look at how value judgments on technical certifications compare between technology managers working in organizations that employ technology workers certified by Cisco and those that work in organizations where no workers have Cisco certification. There are differences—and some are dramatic!