1. Trang chủ
  2. » Công Nghệ Thông Tin

Using and Managing Keys

34 419 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Using and Managing Keys
Trường học Standard University
Chuyên ngành Network Security
Thể loại Essay
Năm xuất bản 2023
Thành phố City Name
Định dạng
Số trang 34
Dung lượng 473,5 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Using and Managing Keys

Trang 2

Objectives

Explain cryptography strengths and vulnerabilities Define public key infrastructure (PKI)

Manage digital certificates

Explore key management

Trang 3

Understanding Cryptography otrengths and Vulnerabilities

¢ Cryptography is science of “scrambling” data so it

cannot be viewed by unauthorized users, making it secure while being transmitted or stored

¢ When the recipient receives encrypted text or another

user wants to access stored information, it must be

decrypted with the cipher and key to produce the

Original plaintext

Trang 4

Symmetric Cryptography otrengths and Weaknesses

¢ Identical keys are used to both encrypt and decrypt the message

¢ Popular symmetric cipher algorithms include Data Encryption Standard, Triple Data Encryption

Standard, Advanced Encryption Standard, Rivest

Cipher, International Data Encryption Algorithm, and Blowfish

¢ Disadvantages of symmetric encryption relate to the difficulties of managing the private key

Trang 5

Asymmetric Cryptography Strengths

and Vulnerabilities

¢ With asymmetric encryption, two keys are used

instead of one

— The private key encrypts the message

— The public key decrypts the message

Trang 6

Asymmetric Cryptography Strengths

and Vulnerabilities (continued)

Can greatly improve cryptography security,

convenience, and flexibility

Public keys can be distributed freely

Users cannot deny they have sent a message if they have previously encrypted the message with their

private keys

Primary disadvantage Is that it is computing-intensive

Trang 7

Digital Signatures

¢ Asymmetric encryption allows you to use either the public or private key to encrypt a message; the

receiver uses the other key to decrypt the message

¢ A digital signature helps to prove that:

— The person sending the message with a public key Is

who they claim to be

— The message was not altered

— It cannot be denied the message was sent

Trang 9

Certification Authority (CA)

¢ The owner of the public key listed in the digital

certificate can be identified to the CA in different

ways

— By their e-mail address

— By additional information that describes the digital

certificate and limits the scope of its use

¢ Revoked digital certificates are listed in a Certificate Revocation List (CRL), which can be accessed to check the certificate status of other users

Trang 10

Certification Authority (CA)

(continued )

¢ The CA must publish the certificates and CRLs toa directory immediately after a certificate is issued or revoked so users can refer to this directory to see changes

¢ Can provide the information in a publicly accessible directory, called a Certificate Repository (CR)

¢ Some organizations set up a Registration Authority (RA) to handle some CA, tasks such as processing certificate requests and authenticating users

Trang 11

Understanding Public Key

Infrastructure (PKI)

Weaknesses associated with asymmetric

cryptography led to the development of PKI

A CA Is an important trusted party who can sign and issue certificates for users

some of its tasks can also be performed by a

subordinate function, the RA

Updated certificates and CRLs are kept in a CR for users to refer to

Trang 12

The Need for PKI

General public and private keys Registration Authority (RA)

Figure 9-7 Asymmetric cryptography tools

Trang 13

Description of PKI

¢ Manages keys and identity information required for asymmetric cryptography, integrating digital

certificates, public key cryptography, and CAs

¢ For a typical enterprise:

— Provides end-user enrollment software

— Integrates corporate certificate directories

— Manages, renews, and revokes certificates

— Provides related network services and security

¢ Typically consists of one or more CA servers and

digital certificates that automate several tasks

Trang 14

PKI Standards and Protocols

¢ A number of standards have been proposed for PKI

— Public Key Cryptography Standards (PKCS)

— X509 certificate standards

Trang 15

Public Key Cryptography

otandards (PKCS)

¢ Numbered set of standards that have been defined

by the RSA Corporation since 1991

¢ Composed of 15 standards detailed on pages 318 and 319 of the text

Trang 16

X5909 Digital Certificates

¢ X509 is an international standard defined by the International Telecommunication Union (ITU) that defines the format for the digital certificate

¢ Most widely used certificate format for PKI

¢ X509 is used by Secure Socket Layers

(SSL)/Transport Layer Security (TLS), IP Security (IPSec), and Secure/Multipurpose Internet Mail Extensions (S/MIME)

Trang 17

X509 Digital Certificates (continued)

Table 9-2 X.509 certificate

Field Name Explanation

Certificate version number O=Version 1, 1=Version 2, 2=Version 3

Trang 18

individually trusts a third party

The three different PKI trust models are based on

direct and third-party trust

Trang 19

Trust Models (continued)

Trang 20

Trust Models (continued)

The web of trust model is based on direct trust

single-point trust model is based on third-party trust

— ACA directly issues and signs certificates

In an hierarchical trust model, the primary or root certificate authority issues and signs the certificates for CAs below it

Trang 21

Managing Digital Certificates

¢ After a user decides to trust a CA, they can download the digital certificate and public key from the CA and store them on their local computer

¢ CA certificates are issued by a CA directly to

individuals

* Typically used to secure e-mail transmissions through S/MIME and SSL/TLS

Trang 22

Managing Digital Certificates (continued)

Issued To Issued By Expiratia «©

= GlobalSign Root CA Root SGC Authority 1/28/2014 E\GTE CyberTrust Root Root SGC Authority 2/23/2006 s [J microsoft Internet Authority GTE CyberTrust Root 2/25/2005 Ez]Microsoft Internet Authority GTE CyberTrust Root 2/23/2006

Jmicrosoft Secure Server Authority Microsoft Internet Au 2/25/2005

EJ microsoft Secure Server Authority Microsoft Internet Au 2/23/2006

| microsoft Windows Hardware Compatibility Microsoft Root Authority 12/31/2002

EJ microsoft Windows Hardware Compatibility Microsoft Root Authority 12/31/2002 v

Figure 9-13 Default CAs in Web browser

Trang 23

Managing Digital Certificates

(continued)

¢ Server certificates can be issued from a Web server, FTP server, or mail server to ensure a secure

transmission

¢ Software publisher certificates are provided by

software publishers to verify their programs are

secure

Trang 24

Certificate Policy (CP)

¢ Published set of rules that govern operation of a PKI

¢ Begins with an opening statement outlining its scope

¢ Should cover at a minimum the topics listed on

page 325 of the text

Trang 25

Certificate Practice Statement (CPS)

More technical document compared to a CP

Describes in detail how the CA uses and manages certificates

Covers topics such as those listed on pages 325 and

326 of the text

Trang 26

Certificate Life Cycle

¢ Typically divided into four parts:

— Creation

— Revocation

— Expiration

— Suspension

Trang 27

Exploring Key Management

¢ Because keys form the very foundation of the

algorithms in asymmetric and PKI systems, it is vital that they be carefully managed

Trang 28

Centralized and Decentralized

Trang 29

¢ Another form of software-based storage involves

storing private keys on the user’s local computer

Trang 30

Key Storage (continued)

¢ Storing keys in hardware is an alternative to

software-based keys

¢ Whether private keys are stored in hardware or software, it is important that they be adequately protected

Trang 31

Key Usage

¢ If you desire more security than a single set of public and private (single-dual) keys can offer, you can

choose to use multiple pairs of dual keys

¢ One pair of keys may be used to encrypt information and the public key could be backed up to another

location

¢ The second pair would be used only for digital

signatures and the public key in that pair would never

be backed up

Trang 32

Key Handling Procedures

¢ Certain procedures can help ensure that keys are properly handled:

— Destruction

Trang 33

summary

¢ One of the advantages of symmetric cryptography is that encryption and decryption using a private key Is usually fast and easy to implement

¢ Adigital signature solves the problem of

authenticating the sender when using asymmetric cryptography

¢ With the number of different tools required for

asymmetric cryptography, an organization can find itself implementing piecemeal solutions for different applications

Trang 34

summary (continued)

¢ PKCS Is a numbered set of standards that have been

defined by the RSA Corporation since 1991

¢ The three PKI trust models are based on direct and

third-party trust

¢ Digital certificates are managed through CPs and

CPSs

Ngày đăng: 17/09/2012, 10:43

TỪ KHÓA LIÊN QUAN