Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
Trang 1Chapter 10 Public Key Infrastructure
Trang 2Objectives in this Chapter
vulnerabilities
vulnerabilities
Trang 3Understanding Cryptography
Strengths and Vulnerabilities
it cannot be viewed by unauthorized users,making it secure while being transmitted orstored
another user wants to access storedinformation, it must be decrypted with thecipher and key to produce the original plaintext
it cannot be viewed by unauthorized users,making it secure while being transmitted orstored
another user wants to access storedinformation, it must be decrypted with thecipher and key to produce the original plaintext
Trang 4Symmetric Cryptography
Strengths and Weaknesses
decrypt the message
Data Encryption Standard, Triple DataEncryption Standard, Advanced EncryptionStandard, Rivest Cipher, International DataEncryption Algorithm, and Blowfish
to the difficulties of managing the private key
decrypt the message
Data Encryption Standard, Triple DataEncryption Standard, Advanced EncryptionStandard, Rivest Cipher, International DataEncryption Algorithm, and Blowfish
to the difficulties of managing the private key
Trang 5Asymmetric Cryptography Strengths and Vulnerabilities
instead of one
• The private key decrypts the message
• The public key encrypts the message
Trang 6Asymmetric Cryptography Strengths and Vulnerabilities (continued)
convenience, and flexibility
Public keys can be distributed freely
they have previously encrypted the messagewith their private keys
computing-intensive
convenience, and flexibility
Public keys can be distributed freely
they have previously encrypted the messagewith their private keys
computing-intensive
Trang 7Digital Signatures
the public or private key to encrypt a message;the receiver uses the other key to decrypt themessage
A digital signature helps to prove that:
• The person sending the message with a public key is who they claim to be
• The message was not altered
• It cannot be denied the message was sent
the public or private key to encrypt a message;the receiver uses the other key to decrypt themessage
A digital signature helps to prove that:
• The person sending the message with a public key is who they claim to be
• The message was not altered
• It cannot be denied the message was sent
Trang 8Digital Certificates
with its specific public key
about the key owner, and other optionalinformation that is all digitally signed by atrusted third party
with its specific public key
about the key owner, and other optionalinformation that is all digitally signed by atrusted third party
Trang 9Certification Authority (CA)
The owner of the public key listed in the digitalcertificate can be identified to the CA in
different ways
• By their e-mail address
• By additional information that describes the digital certificate and limits the scope of its use
Revoked digital certificates are listed in a
Certificate Revocation List (CRL), which can beaccessed to check the certificate status of otherusers
The owner of the public key listed in the digitalcertificate can be identified to the CA in
different ways
• By their e-mail address
• By additional information that describes the digital certificate and limits the scope of its use
Revoked digital certificates are listed in a
Certificate Revocation List (CRL), which can beaccessed to check the certificate status of otherusers
Trang 10Certification Authority (CA)
(continued)
to a directory immediately after a certificate isissued or revoked so users can refer to this
directory to see changes
accessible directory, called a CertificateRepository (CR)
Authority (RA) to handle some CA, tasks such
as processing certificate requests andauthenticating users
to a directory immediately after a certificate isissued or revoked so users can refer to this
directory to see changes
accessible directory, called a CertificateRepository (CR)
Authority (RA) to handle some CA, tasks such
as processing certificate requests andauthenticating users
Trang 11Understanding Public Key
Infrastructure (PKI)
cryptography led to the development of PKI
and issue certificates for users
subordinate function, the RA
for users to refer to
cryptography led to the development of PKI
and issue certificates for users
subordinate function, the RA
for users to refer to
Trang 12The Need for PKI
Trang 13Description of PKI
required for asymmetric cryptography,integrating digital certificates, public keycryptography, and CAs
For a typical enterprise:
• Provides end-user enrollment software
• Integrates corporate certificate directories
• Manages, renews, and revokes certificates
• Provides related network services and security
and digital certificates that automate severaltasks
required for asymmetric cryptography,integrating digital certificates, public keycryptography, and CAs
For a typical enterprise:
• Provides end-user enrollment software
• Integrates corporate certificate directories
• Manages, renews, and revokes certificates
• Provides related network services and security
and digital certificates that automate severaltasks
Trang 14PKI Standards and Protocols
PKI
• Public Key Cryptography Standards (PKCS)
• X509 certificate standards
Trang 15Public Key Cryptography
Standards (PKCS)
defined by the RSA Corporation since 1991
318 and 319 of the text
Trang 16X509 Digital Certificates
the International Telecommunication Union(ITU) that defines the format for the digitalcertificate
(SSL)/Transport Layer Security (TLS), IPSecurity (IPSec), and Secure/MultipurposeInternet Mail Extensions (S/MIME)
the International Telecommunication Union(ITU) that defines the format for the digitalcertificate
(SSL)/Transport Layer Security (TLS), IPSecurity (IPSec), and Secure/MultipurposeInternet Mail Extensions (S/MIME)
Trang 17X509 Digital Certificates (continued)
Trang 18based on direct and third-party trust
Refers to the type of relationship that canexist between people or organizations
In the direct trust, a personal relationshipexists between two individuals
Third-party trust refers to a situation inwhich two individuals trust each other onlybecause each individually trusts a third party
based on direct and third-party trust
Trang 19Trust Models (continued)
Trang 20Trust Models (continued)
trust
• A CA directly issues and signs certificates
root certificate authority issues and signs thecertificates for CAs below it
trust
• A CA directly issues and signs certificates
root certificate authority issues and signs thecertificates for CAs below it
Trang 21Managing Digital Certificates
After a user decides to trust a CA, they can
download the digital certificate and public keyfrom the CA and store them on their local
computer
CA certificates are issued by a CA directly toindividuals
through S/MIME and SSL/TLS
After a user decides to trust a CA, they can
download the digital certificate and public keyfrom the CA and store them on their local
computer
CA certificates are issued by a CA directly toindividuals
through S/MIME and SSL/TLS
Trang 22Managing Digital Certificates (continued)
Trang 23Managing Digital Certificates
(continued)
server, FTP server, or mail server to ensure asecure transmission
software publishers to verify their programs aresecure
server, FTP server, or mail server to ensure asecure transmission
software publishers to verify their programs aresecure
Trang 24page 325 of the text
PKI
scope
page 325 of the text
Trang 25Certificate Practice Statement (CPS)
manages certificates
and 326 of the text
manages certificates
and 326 of the text
Trang 26Certificate Life Cycle
Typically divided into four parts:
Trang 27Exploring Key Management
algorithms in asymmetric and PKI systems, it isvital that they be carefully managed
Trang 28Centralized and Decentralized
Management
decentralized
system is the PKI web of trust model
for single-point trust models and hierarchicaltrust models, with keys being distributed by theCA
decentralized
system is the PKI web of trust model
for single-point trust models and hierarchicaltrust models, with keys being distributed by theCA
Trang 29Key Storage
them within digital certificates
doesn’t involve any cryptography hardware
involves storing private keys on the user’s localcomputer
them within digital certificates
doesn’t involve any cryptography hardware
involves storing private keys on the user’s localcomputer
Trang 30Key Storage (continued)
software-based keys
software, it is important that they be adequatelyprotected
software-based keys
software, it is important that they be adequatelyprotected
Trang 31Key Usage
If you desire more security than a single set ofpublic and private (single-dual) keys can offer,you can choose to use multiple pairs of dual
keys
information and the public key could be backed
up to another location
signatures and the public key in that pair wouldnever be backed up
If you desire more security than a single set ofpublic and private (single-dual) keys can offer,you can choose to use multiple pairs of dual
keys
information and the public key could be backed
up to another location
signatures and the public key in that pair wouldnever be backed up
Trang 32Key Handling Procedures
are properly handled:
• Destruction
are properly handled:
• Destruction
Trang 33cryptography is that encryption and decryptionusing a private key is usually fast and easy toimplement
authenticating the sender when usingasymmetric cryptography
asymmetric cryptography, an organization canfind itself implementing piecemeal solutions fordifferent applications
cryptography is that encryption and decryptionusing a private key is usually fast and easy toimplement
authenticating the sender when usingasymmetric cryptography
asymmetric cryptography, an organization canfind itself implementing piecemeal solutions fordifferent applications
Trang 34Summary (continued)
been defined by the RSA Corporation since 1991
and third-party trust
and CPSs
been defined by the RSA Corporation since 1991
and third-party trust
and CPSs