eec 688/788 secure and dependable computing lecture 6 wenbing zhao department of electrical and...

9
EEC 688/788 EEC 688/788 Secure and Dependable Secure and Dependable Computing Computing Lecture 6 Lecture 6 Wenbing Zhao Wenbing Zhao Department of Electrical and Computer Department of Electrical and Computer Engineering Engineering Cleveland State University Cleveland State University [email protected] [email protected]

Post on 21-Dec-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

EEC 688/788EEC 688/788Secure and Dependable ComputingSecure and Dependable Computing

Lecture 6Lecture 6

Wenbing ZhaoWenbing ZhaoDepartment of Electrical and Computer EngineeringDepartment of Electrical and Computer Engineering

Cleveland State UniversityCleveland State University

[email protected]@ieee.org

22

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

OutlineOutline

• Reminder:– Midterm#1: 9/21 Monday

• Public key management

• Mock quiz & Q/A

33

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

Management of Public KeysManagement of Public Keys

• Problem statement

• Certificates

• X.509

• Public key infrastructure

44

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

Problems with Problems with Public-Key ManagementPublic-Key Management

• If Alice and Bob do not know each other, how do they get each other’s public keys to start the communication process ?– It is essential Alice gets Bob’s public key, not someone

else’s

• A way for Trudy to subvert public-key encryption

55

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

CertificatesCertificates• Certification Authority (CA): an organization that

certifies public keys– It certifies the public keys belonging to people, companies, or

even attributes– CA does not need to be on-line all the time (in ideal scenarios)

• A possible certificate and its signed hash

66

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

X.509X.509• Devised and approved by ITU• The basic fields of an X.509 certificate

77

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

Public-Key InfrastructuresPublic-Key Infrastructures

• A Public-Key Infrastructure (PKI) is needed for reasons of– Availability, Scalability, Ease of management

• A PKI has multiple components– Users, CAs, Certificates, Directories

• A PKI provides a way of structuring these components and define standards for the various documents and protocols– A simple form of PKI is hierarchical CAs

88

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

Public-Key InfrastructuresPublic-Key Infrastructures• Hierarchical PKI• A chain of trust/certification path:

A chain of certificates going back to the root

99

04/18/2304/18/23EEC688/788: Secure & Dependable EEC688/788: Secure & Dependable

ComputingComputing Wenbing ZhaoWenbing Zhao

Public-Key InfrastructuresPublic-Key Infrastructures• Revocation: sometimes certificates can be revoked, due

to a number of reasons• Reinstatement: a revoked certificate could conceivably be

reinstated• Each CA periodically issues a CRL (Certificate

Revocation List) giving the serial numbers of all certificates that it has revoked– A user who is about to use a certificate must now acquire the CRL

to see if the certificate has been revoked

• Having to deal with revocation (and possibly reinstatement) eliminates one of the best properties of certificates, namely, that they can be used without having to contact a CA