210 likes | 532 Views
Public Key Infrastructure. 5 August 2013. What is PKI?. PKI combines the cryptographic mechanisms we talked about during the Encryption session Symmetric Encryption Asymmetric Encryption Hashing Algorithms Digital Signatures Key Distribution
E N D
Public Key Infrastructure 5 August 2013
What is PKI? • PKI combines the cryptographic mechanisms we talked about during the Encryption session • Symmetric Encryption • Asymmetric Encryption • Hashing Algorithms • Digital Signatures • Key Distribution • PKI is an ISO authentication framework that users public key cryptography and the X.509 standard • PKI is used all over the internet
Components of PKI • Certificate Authorities (CA) • Certificates • Registration Authorities (RA) • Key Management
Certificate Authorities • The CA is the organization or server than maintains and issues the digital certificates • When a person requests a certificate, the registration authority (RA) sends the request to the CA after verifying that the requestor is who they say they are • The CA creates the cert, signs it, sends it to the requestor, and maintains it Jaci Registration Authority Verifies Identity Certificate Authority Creates & Maintains Certificate Requests Certificate Forwards Request Sends to Requestor Signs Certificate
Certificate Authorities Provide Trust Certificate Authority Creates & Maintains Certificate Jaci trusts the CA Jason trusts the CA Jaci and Jason trust each other indirectly via the CA Jaci Jason
Internal vs. External CAs • Internal CAs • Issue certificates within an organization • External CAs • Publicly available to take certificate requests from anyone • If you have a website with a certificate, it is issued from a public CA
Cross Certification Company A Company B
Certificate Contents • X.509v4 specifies the contents of a certificate • Serial Number • Version Number • Identity Information • Algorithm Information • Lifetime Dates • Signature of Issuing Authority
Registration Authority • Verifies the identity of certificate requestors • Initiates the certificate request process to the CA • No request is generated until identity is assured
PKI Process • Requestor initiates request for certificate with the RA • RA verifies the requestor is the person they claim to be (Driver’s license, etc.) • RA sends certificate request to CA • CA creates a certificate with Requestor's public key and ID information • The private key can be created by either the user or the CA • Usually, the user generates the key pair and sends the public key to the CA
Using PKI • If you want to use PKI to identify someone you are communicating with: • Request the public key from the directory • The directory, or repository, sends the digital certificate • User extracts the desired public key and encrypts a session key • User sends the session key & his certificate, encrypted with receiver’s public key • Receiver gets the user’s certificate and verifies it, decrypts the session key using her own private key • User & receiver communicate securely via the session key
Key Management • Key must be long enough to prevent brute force attacks • Keys should be stored and transmitted securely • Keys should be extremely random, and algorithm should make use of the entire keyspace • Key’s lifetime should be appropriate for the type of information it is protecting • The more a key is used, the shorter its lifetime should be • Keys should be backed up or held in escrow securely in case of failures • Keys should be properly destroyed when they are no longer in use • All of this should be automated
Certificate Revocation Lists • List of compromised or expired certificates • Browsers should check these and respond appropriately • If your browser’s CRL isn’t up to date, your session IS NOT SECURE