36
1 ISA 562 Information Systems Theory and Practice 10. Digital 10. Digital Certificates Certificates

ISA 562 Information Systems Theory and Practice

  • Upload
    tanika

  • View
    32

  • Download
    1

Embed Size (px)

DESCRIPTION

ISA 562 Information Systems Theory and Practice. 10. Digital Certificates. PUBLIC-KEY CERTIFICATES-1. What is a certificate?: A statement claiming some binding of attribute values Why do we need them? Identifying entities outside of domain Distributed access control What do they do? - PowerPoint PPT Presentation

Citation preview

Page 1: ISA 562 Information Systems Theory and Practice

1

ISA 562Information Systems Theory and Practice

ISA 562Information Systems Theory and Practice

10. Digital Certificates10. Digital Certificates

Page 2: ISA 562 Information Systems Theory and Practice

2

PUBLIC-KEY CERTIFICATES-1

• What is a certificate?: – A statement claiming some binding of attribute values

• Why do we need them?– Identifying entities outside of domain– Distributed access control

• What do they do?– Propagates claims:

• Certifier makes a claim that can be checked for authenticity and accepted if the recipient believe the claimant to be truthful

– Manages trust – distributed trust management

Page 3: ISA 562 Information Systems Theory and Practice

3

X.509v1 CERTIFICATE

VERSION

SERIAL NUMBER

SIGNATURE ALGORIT

ISSUER

VALIDITY

SUBJECT

SUBJECT PUB KEY INFO

SIGNATURE

1

1234567891011121314

RSA+MD5, 512

C=US, S=VA, O=GMU, OU=ISE

9/9/99-1/1/1C=US, S=VA, O=GMU, OU=ISE, CN=Alice

RSA, 1024, xxxxxx

SIGNATURE

Page 4: ISA 562 Information Systems Theory and Practice

4

PUBLIC-KEY CERTIFICATES

• For public-key based encryption

– sender needs public key of receiver

• For public-key digital signatures

– receiver needs public key of sender

• To establish an agreement

– both need each other’s public keys

Page 5: ISA 562 Information Systems Theory and Practice

5

CERTIFICATE TRUST

• Acquisition of public key of the issuer to verify the signature– Go to through a certificate chain

• Whether or not to trust certificates signed by the issuer for this subject

Page 6: ISA 562 Information Systems Theory and Practice

6

PEM CERTIFICATION GRAPHInternet Policy Registration Authority

Policy Certification Authorities (PCAs)

HIGHASSURANCE

MID-LEVELASSURANCE

RESIDENTIAL PERSONA

CertificationAuthorities

(CAs)

Abrams

Grover

SubjectsGrover

LEO

IPRA

MITRE GMU

CS

Virginia

Fairfax

Anonymous

Page 7: ISA 562 Information Systems Theory and Practice

7

PUBLIC-KEY CERTIFICATES• What is a certificate?:

– A statement claiming some binding of attribute values

• Why do we need them?– Identifying entities outside of domain

– Distributed access control

• What do they do?– Propagate claims:

• Certifier makes a claim that can be checked for authenticity and accepted if the recipient believe the claimant to be truthful

– Manages trust – distributed trust management

Page 8: ISA 562 Information Systems Theory and Practice

8

SECURE ELECTRONIC TRANSACTIONS (SET) CA HIERARCHY

Root

Brand BrandBrand

Geo-Political

Bank Acquirer

Customer Merchant

Page 9: ISA 562 Information Systems Theory and Practice

9

Certificate Revocation

• Sometimes, the issuer need to recant certificate– The subject’s attributes have changed– The subject misused the certificate– There are forged certificates

• Published in a certificate revocation list

Page 10: ISA 562 Information Systems Theory and Practice

10

CRL FORMAT

SIGNATURE ALGORITHM

ISSUER

LAST UPDATE

NEXT UPDATE

REVOKED CERTIFICATES

SIGNATURE

SERIAL NUMBER

REVOCATION DATE

Page 11: ISA 562 Information Systems Theory and Practice

11

X.509 CERTIFICATES

• X.509v1– basic

• X.509v2– adds unique identifiers to prevent against reuse of

X.500 names

• X.509v3– adds many extensions– can be further extended

Page 12: ISA 562 Information Systems Theory and Practice

12

X.509v3 CERTIFICATE INNOVATIONS

• distinguish various certificates– signature, encryption, key-agreement

• identification info in addition to X.500 name– internet names: email addresses, host names, URLs

• issuer can state policy and usage– good enough for casual email but not for signing checks

• limits on use of signature keys for further certification• extensible

– proprietary extensions can be defined and registered

• attribute certificates– ongoing work

Page 13: ISA 562 Information Systems Theory and Practice

13

X.509v2 CRL INNOVATIONS

• CRL distribution points• indirect CRLs• delta CRLs• revocation reason• push CRLs

Page 14: ISA 562 Information Systems Theory and Practice

14

HIERARCHICAL STRUCTURE

Z

X

Q

A

Y

R S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 15: ISA 562 Information Systems Theory and Practice

15

HIERARCHICAL STRUCTURE WITH ADDED LINKS

Z

X

Q

A

Y

R S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 16: ISA 562 Information Systems Theory and Practice

16

TOP-DOWN HIERARCHICAL STRUCTURE

Z

X

Q

A

Y

R S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 17: ISA 562 Information Systems Theory and Practice

17

FORREST OF HIERARCHIES

Page 18: ISA 562 Information Systems Theory and Practice

18

MULTIPLE ROOT CA’s + INTERMEDIATE CA’s MODEL

X

Q

A

R

S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 19: ISA 562 Information Systems Theory and Practice

19

THE CERTIFICATE TRIANGLE

user

attribute public-key

X.509identity

certificate

X.509attribute

certificate

SPKIcertificate

Page 20: ISA 562 Information Systems Theory and Practice

20

2-WAY SSL HANDSHAKE WITH RSA

Client Server ClientHello --------> ServerHello Certificate CertificateRequest <-------- ServerHelloDone Certificate ClientKeyExchange CertificateVerify [ChangeCipherSpec] Finished --------> [ChangeCipherSpec] <-------- Finished Application Data <-------> Application Data

RecordProtocol

HandshakeProtocol

Page 21: ISA 562 Information Systems Theory and Practice

21

SINGLE ROOT CA MODEL

RootCA

a b c d e f g h i j k l m n o p

RootCA

User

Page 22: ISA 562 Information Systems Theory and Practice

22

SINGLE ROOT CAMULTIPLE RA’s MODEL

RootCA

a b c d e f g h i j k l m n o p

RootCA

User RA

User RA

User RA

Page 23: ISA 562 Information Systems Theory and Practice

23

MULTIPLE ROOT CA’s MODEL

RootCA

a b c d e f g h i j k l m n o p

RootCAUser

RootCA

RootCA

RootCAUser

RootCAUser

Page 24: ISA 562 Information Systems Theory and Practice

24

ROOT CA + INTERMEDIATE CA’s MODEL

Z

X

Q

A

Y

R S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 25: ISA 562 Information Systems Theory and Practice

25

MULTIPLE ROOT CA’s PLUS INTERMEDIATE CA’s MODEL

X

Q

A

R

S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 26: ISA 562 Information Systems Theory and Practice

26

MULTIPLE ROOT CA’s PLUS INTERMEDIATE CA’s MODEL

X

Q

A

R

S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 27: ISA 562 Information Systems Theory and Practice

27

MULTIPLE ROOT CA’s PLUS INTERMEDIATE CA’s MODEL

X

Q

A

R

S T

C E G I K M O

a b c d e f g h i j k l m n o p

Page 28: ISA 562 Information Systems Theory and Practice

28

MULTIPLE ROOT CA’s + INTERMEDIATE CA’s MODEL

• Essentially the model on the web today

• Deployed in server-side SSL mode

• Client-side SSL mode yet to happen

Page 29: ISA 562 Information Systems Theory and Practice

29

SERVER-SIDE MASQUERADING

BobWeb browser

www.host.comWeb serverServer-side SSL

UltratrustSecurityServices

www.host.com

Page 30: ISA 562 Information Systems Theory and Practice

30

SERVER-SIDE MASQUERADING

BobWeb browser

www.host.comWeb server

Server-side SSL UltratrustSecurityServices

www.host.comMallory’sWeb server

BIMMCorporation

www.host.com

Server-side SSL

Page 31: ISA 562 Information Systems Theory and Practice

31

SERVER-SIDE MASQUERADING

BobWeb browser

www.host.comWeb server

Server-side SSL UltratrustSecurityServices

www.host.comMallory’sWeb server

Server-side SSL

BIMMCorporation

UltratrustSecurityServices

www.host.com

Page 32: ISA 562 Information Systems Theory and Practice

32

MAN IN THE MIDDLEMASQUERADING PREVENTED

BobWeb browser

www.host.comWeb server

Client-side SSL

UltratrustSecurityServices

www.host.com

Mallory’sWeb server

BIMMCorporation

Client-side SSL

UltratrustSecurityServices

www.host.com

Client Side SSLend-to-endUltratrust

SecurityServices

Bob

BIMMCorporation

UltratrustSecurityServices

Bob

Page 33: ISA 562 Information Systems Theory and Practice

33

ATTRIBUTE-BASED CLIENT SIDE MASQUERADING

Joe@anywhereWeb browser

BIMM.comWeb serverClient-side SSL

UltratrustSecurityServices

BIMM.com

UltratrustSecurityServices

Joe@anywhere

Page 34: ISA 562 Information Systems Theory and Practice

34

ATTRIBUTE-BASED CLIENT SIDE MASQUERADING

Alice@SRPCWeb browser

BIMM.comWeb serverClient-side SSL

UltratrustSecurityServices

BIMM.com

SRPC

Alice@SRPC

Page 35: ISA 562 Information Systems Theory and Practice

35

ATTRIBUTE-BASED CLIENT SIDE MASQUERADING

Bob@PPCWeb browser

BIMM.comWeb serverClient-side SSL

UltratrustSecurityServices

BIMM.com

PPC

Bob@PPC

Page 36: ISA 562 Information Systems Theory and Practice

36

ATTRIBUTE-BASED CLIENT SIDE MASQUERADING

Alice@SRPCWeb browser

BIMM.comWeb serverClient-side SSL

UltratrustSecurityServices

BIMM.com

SRPC

PPC

Bob@PPC