key protection, csi eric norman university of wisconsin-madison
TRANSCRIPT
![Page 1: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/1.jpg)
Key Protection, CSI
Eric NormanUniversity of Wisconsin-Madison
![Page 2: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/2.jpg)
CSI ?CSI ?
Cheap,
Simple,
Impregnable.
![Page 3: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/3.jpg)
The Two PrinciplesThe Two Principles
• Complete accountability of the private key
• Separation of duty
![Page 4: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/4.jpg)
Complete Accountability of Complete Accountability of the Private Keythe Private Key
At all times during the life cycle of the private key, we know:
how many copies exist,
where each copy is located.
![Page 5: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/5.jpg)
Separation of DutySeparation of Duty
No single person has the capability to use (any copy of) the private key.
![Page 6: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/6.jpg)
Main Protection RuleMain Protection Rule
Never, never, never, never,
never, never, never, never,
never, never, never, never,
never, never, never, never,
![Page 7: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/7.jpg)
Main Protection RuleMain Protection Rule
Never expose the private keyto the Internet!
![Page 8: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/8.jpg)
The MachineThe Machine
• I/O limited to:– CD ROMs– Floppies– Keyboard and display– USB thingies
• Swapping is disabled• Never leave private key on disk
![Page 9: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/9.jpg)
Lifecycle of KeysLifecycle of Keys
Deploy Verify
Idle Sign
Public
Private
Create Use Destroy
![Page 10: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/10.jpg)
Key Generation Key Generation RandomnessRandomness
(create)(create)
How do we get randomness when the machine is rebooted immediately before use?
![Page 11: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/11.jpg)
The Unknown FloppiesThe Unknown Floppies
Pic of floppies
![Page 12: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/12.jpg)
Key StorageKey Storage(idle)(idle)
All confidential material
(media with private keys,
physical keys for padlocks,
passwords,
etc.)
is stored in separate tamper evident bags.
![Page 13: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/13.jpg)
Certificate FingerprintsCertificate Fingerprints(deploy, verify)(deploy, verify)
• Weekly campus newspaper
• Answering machine
• Business cards
• Compare with your neighbor
![Page 14: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/14.jpg)
Key UsageKey Usage(sign)(sign)
Locked door.
![Page 15: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/15.jpg)
Key UsageKey Usage(sign)(sign)
![Page 16: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/16.jpg)
Key UsageKey Usage(sign)(sign)
Another locked door.
![Page 17: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/17.jpg)
Key UsageKey Usage(sign)(sign)
Pic cabinet2 locks
![Page 18: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/18.jpg)
Key UsageKey Usage(sign)(sign)
Pic media box2 locks
![Page 19: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/19.jpg)
Key UsageKey Usage(sign)(sign)
Boot machine.
Read input (private key, to be signed, etc.).
Supply two passwords to unlock key.
Sign stuff.
Write output (certificates, logs).
Erase memory and disk.
Shut down machine.
![Page 20: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/20.jpg)
Off Site BackupOff Site Backup(idle, sign, destroy)(idle, sign, destroy)
Separate safety deposit boxes for: private key media, password half, other password half.Each in its own tamper evident bag. (Should only be necessary for audit or destruction.)
It's also possible to just generate new key.
![Page 21: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/21.jpg)
Key CompromiseKey Compromise
Stop signing with key.
Restore trustworthy service.
Revoke old key.
![Page 22: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/22.jpg)
Key DestructionKey Destruction(destroy)(destroy)
Simple. Round up all copies and destroy them.
Protecting a private key by destroying it is a strategy that might be applicable more often than you think.
![Page 23: Key Protection, CSI Eric Norman University of Wisconsin-Madison](https://reader035.vdocuments.net/reader035/viewer/2022062421/56649ca55503460f94965f58/html5/thumbnails/23.jpg)
CSI !CSI !
Cheap,
Simple,
Impregnable.