b4477c4dd01

21
INFS 766 Internet Security Protocols Lecture 6 Digital Certificates Prof. Ravi Sandhu 2 © Ravi Sandh u 2000-2004 PUBLIC-KEY CERTIFICATES reliable distribution of public-keys public-key encryption sender needs public key of receiver public-key digital signatures receiver needs public key of sender public-key key agreement both need each other’s public keys

Upload: manu143k

Post on 10-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 1/21

INFS 766Internet Security Protocols

Lecture 6

Digital Certificates

Prof. Ravi Sandhu

2© Ravi Sandh u 2000-2004

PUBLIC-KEY CERTIFICATES

reliable distribution of public-keys

public-key encryption

sender needs public key of receiver

public-key digital signatures

receiver needs public key of sender

public-key key agreement both need each other’s public keys

Page 2: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 2/21

3© Ravi Sandh u 2000-2004

THE CERTIFICATE

TRIANGLE

user

attribute public-key

X.509

identity

certificate

X.509

attribute

certificate

SPKI

certificate

4© Ravi Sandh u 2000-2004

X.509 CERTIFICATE

VERSION

SERIAL NUMBER

SIGNATURE ALGORITHM

ISSUER

VALIDITY

SUBJECTSUBJECT PUBLIC KEY INFO

SIGNATURE 

Page 3: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 3/21

5© Ravi Sandh u 2000-2004

X.509 CERTIFICATE

0

1234567891011121314

RSA+MD5, 512

C=US, S=VA, O=GMU, OU=ISE

9/9/99-1/1/1

C=US, S=VA, O=GMU, OU=ISSE, CN=Ravi Sandhu

RSA, 1024, xxxxxxxxxxxxxxxxxxxxxxxxx

SIGNATURE 

6© Ravi Sandh u 2000-2004

CERTIFICATE TRUST

how to acquire public key of theissuer to verify signature

whether or not to trust certificatessigned by the issuer for this subject

Page 4: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 4/21

7© Ravi Sandh u 2000-2004

PEM CERTIFICATION GRAPHInternet PolicyRegistration Authority

Policy CertificationAuthorities (PCAs)

HIGHASSURANCE

MID-LEVELASSURANCE

RESIDENTIAL PERSONA

CertificationAuthorities

(CAs)

Abrams

Sandhu

SubjectsSandhu

LEO

IPRA

MITRE GMU

ISSE

Virginia

Fairfax

Anonymous

8© Ravi Sandh u 2000-2004

CRL FORMAT

SIGNATURE ALGORITHM

ISSUER

LAST UPDATE

NEXT UPDATE

REVOKED CERTIFICATES

SIGNATURE 

SERIAL NUMBER

REVOCATION DATE

Page 5: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 5/21

9© Ravi Sandh u 2000-2004

PGP BOTTOM UP

TRUST MODEL

How does Alice get Bob’s public key

directly from Bob through some securechannel (e.g., post, phone, floppy)

from Chuck, who is known to both Aliceand Bob and introduces Bob to Alice

from a trusted certifying authority

PGP has mechanisms to supportthese, and related, alternatives

10© Ravi Sandh u 2000-2004

X.509 CERTIFICATES

X.509v1 very basic

X.509v2 adds unique identifiers to prevent

against reuse of X.500 names

X.509v3 adds many extensions

can be further extended

Page 6: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 6/21

11© Ravi Sandh u 2000-2004

SEPARATE KEYS FOR

SEPARATE PURPOSES

RSA is the only known public-keycryptosystem in which the samepublic-private key pair can be used for

digital signatures

encryption

perceived as a major advantage

12© Ravi Sandh u 2000-2004

SIGNATURE KEYS

private key: must be private for entire life,may never leave smart card

needs to be securely destroyed after lifetime

no need for backup or archiving (wouldconflict with above)

no need to weaken or escrow due to law

public key: must be archive possibly for along time

Page 7: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 7/21

13© Ravi Sandh u 2000-2004

ENCRYPTION KEY

private key: backup or archive required forrecovery

should not be destroyed after lifetime

may be weakened/escrowed due to law

public key:

no need to backup RSA or other encryptionkeys

need to backup Diffie-Hellman key agreementkeys

14© Ravi Sandh u 2000-2004

X.509 INNOVATIONS

distinguish various certificates

signature, encryption, key-agreement

identification info in addition to X.500 name

name other than X.500 name

email address

issuer can state policy and usage

good enough for casual email but not good enough for

signing checks

limits on use of signature keys for furthercertification

Page 8: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 8/21

15© Ravi Sandh u 2000-2004

X.509v3 EXTENSIONS

X.509v3 same as X.509v2 but addsextensions

provides a general extensionmechanism

extension type: registered just like analgorithm is registered

standard extension types: needed forinteroperability

16© Ravi Sandh u 2000-2004

X.509v3 EXTENSIONS

CRITICALITY

non-critical: extension can beignored by certificate user

alternate name can be non-critical

critical : extension should not beignored by certificate user

limit on use of signatures for furthercertification

Page 9: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 9/21

17© Ravi Sandh u 2000-2004

X.509v3 EXTENSIONS

CRITICALITY

criticality is flagged by certificate issuer

certificate user may consider non-criticalextensions more important than critical ones

certificate user may refuse to use certificate ifsome extensions are missing

critical extensions should be few andshould be standard

18© Ravi Sandh u 2000-2004

X.509v3 NAMES

internet email address

internet domain name

web uri (url's are subset of uri)

IP address

X.400 email address

X.500 directory name registered identifier

other name

Page 10: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 10/21

19© Ravi Sandh u 2000-2004

X.509v3 STANDARD

EXTENSIONS

Key and policy information

Subject and issuer attributes

Certification path constraints

Extensions related to CRLs

will be discussed with CRLs

20© Ravi Sandh u 2000-2004

KEY AND POLICY

INFORMATION

key usage

critical: intended only for that purpose, limits liability of CA

non-critical: advisory to help find the correct key, no liabilityimplication

private-key usage period

certificate valid for 2 years for verifying signature

key valid only for one year for signing

certificate policies for CAs

Page 11: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 11/21

21© Ravi Sandh u 2000-2004

SUBJECT AND ISSUER

ATTRIBUTES

Subject alternative names

Issuer alternative names

Subject directory attributes

whatever you like

position, phone, address etc.

22© Ravi Sandh u 2000-2004

CERTIFICATION PATH

CONSTRAINTS

Basic Constraints

can or cannot act as CA

if can act as CA limit on certification path

limit=1 means cannot certify other CAs

Name Constraints

limits names of subjects that this CA can issue

certificates for Policy Constraints

concerned with CA policies

Page 12: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 12/21

23© Ravi Sandh u 2000-2004

CRLs issued periodically as per CApolicy

off-cycle CRLs may also be needed

blank CRLs can be issued

CERTIFICATE REVOCATION

LISTS

24© Ravi Sandh u 2000-2004

CRL distribution

pull method

push method

DMS example

pull method with push for compromised

key list (CKL) which is broadcast viasecure email, single CKL for entiresystem

CERTIFICATE REVOCATION

LISTS

Page 13: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 13/21

25© Ravi Sandh u 2000-2004

immediate or real-time revocation

needs query to CA on every certificateuse

maybe ok for small closed communities

CERTIFICATE REVOCATION

LISTS

26© Ravi Sandh u 2000-2004

REVOCATION TIME-LINE

Issue Of 

CRL 1

Compromise

Event

Revocation

Request

Revocation

Time

Issue Of 

CRL 2

Page 14: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 14/21

27© Ravi Sandh u 2000-2004

OCSP

ON-LINE CERTIFICATE STATUS PROTOCOL

consult authoritative server

the server in turn can look up CRLs

28© Ravi Sandh u 2000-2004

SHORT-LIVED

CERTIFICATES

Authorization certificates can beshort lived

minutes, hours, days instead of

months, years

Page 15: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 15/21

29© Ravi Sandh u 2000-2004

X.509 CRL EXTENSIONS

General Extensions

CRL distribution points

Delta-CRLs

Indirect-CRLs

Certificate Suspension

30© Ravi Sandh u 2000-2004

GENERAL EXTENSIONS

Reason Code

Key Compromise

CA Compromise

Affiliation changed

Superseded

Cessation of operation

Remove from CRL: defer till Delta-CRL Certificate hold: defer

Invalidity Date

Page 16: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 16/21

31© Ravi Sandh u 2000-2004

CRL DISTRIBUTION POINTS

CRLs can get very big

version 1 CRL (1988, 1993)

• each CA has two CRLs: one for end users, one for CAs

• end user CRL can still be very big

version 2 CRL

• can partition certificates, each partition associatedwith one CRL

• distribution point

• also can have different distribution points for differentrevocation reasons

32© Ravi Sandh u 2000-2004

CRL DISTRIBUTION POINTS

certificate extension field, sayswhere to look

CRL extension field

distribution point for this CRL and limitson scope and reason of revocation

protects against substitution of a CRLfrom one distribution point to another

Page 17: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 17/21

33© Ravi Sandh u 2000-2004

DELTA-CRLs

Delta CRL indicator

only carries changes from previous CRL

Remove from CRL reason codecauses purge from base CRL (storedat certificate user)

removal due to expiry of validityperiod or restoration of suspension

34© Ravi Sandh u 2000-2004

INDIRECT-CRL

CRL can be issued by different CAthan issuer of certificate

allows all compromise revocations to beone list

allows all CA revocations to be on onelist (simplify certificate chasing)

Page 18: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 18/21

35© Ravi Sandh u 2000-2004

CERTIFICATE SUSPENSION

Certificate hold reason code in CRL

Supporting CRL entry extension

Instruction code: instructions on whatto do with held certificate

• call CA, repossess token

36© Ravi Sandh u 2000-2004

GENERAL HIERARCHICAL

STRUCTUREZ

X

Q

A

Y

R S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 19: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 19/21

37© Ravi Sandh u 2000-2004

GENERAL HIERARCHICAL

STRUCTURE WITH ADDED LINKSZ

X

Q

A

Y

R S T

C E G I K M O

a b c d e f g h i j k l m n o p

38© Ravi Sandh u 2000-2004

TOP-DOWN HIERARCHICAL

STRUCTUREZ

X

Q

A

Y

R S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 20: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 20/21

39© Ravi Sandh u 2000-2004

PEM CERTIFICATION GRAPHInternet PolicyRegistration Authority

Policy CertificationAuthorities (PCAs)

HIGHASSURANCE

MID-LEVELASSURANCE

RESIDENTIAL PERSONA

CertificationAuthorities

(CAs)

Abrams

Sandhu

SubjectsSandhu

LEO

IPRA

MITRE GMU

ISSE

Virginia

Fairfax

Anonymous

40© Ravi Sandh u 2000-2004

SET CA HIERARCHY

Root

Brand BrandBrand

Geo-Political

Bank Acquirer

Customer Merchant

Page 21: B4477C4Dd01

8/8/2019 B4477C4Dd01

http://slidepdf.com/reader/full/b4477c4dd01 21/21

41© Ravi Sandh u 2000-2004

FOREST OF HIERARCHIES