By
Bahaa Zaid
bzaid@arxict.com
Agenda
 Introduction to Security
 Java Security
 XML Security
 WS-Security
Introduction to Security
 Cryptography
 Symmetric-Key Cryptography
 Public-Key Cryptography
 Public Key Infrastructure...
Cryptography
 Is the practice and study of hiding information
 Encryption is the process of transforming information
(pl...
Symmetric-Key Cryptography
 Symmetric-key cryptography refers to encryption
methods in which both the sender and receiver...
Symmetric-Key Cryptography
Plaintext CiphertextCipher
PlaintextCiphertext Cipher
Public-Key Cryptography
 Public-Key Cryptography, also known as Asymmetric
Cryptography, is a form of cryptography in whi...
Public-Key Cryptography
 A big random number is
used to create a key pair.
When the keys have
been made the big
random nu...
Public-Key Cryptography
 A message encrypted
with a recipient's public
key cannot be decrypted
by anyone except the
recip...
Public Key Infrastructure
 Public Key Infrastructure (PKI) is an arrangement that
binds public keys with respective user ...
Public Key Infrastructure
 The most common certificate standard is the ITU-T X.509.
 A Public Key Certificate is an elec...
Public Key Infrastructure
 A Certificate Chain is a sequence of certificates, where
each certificate in the chain is sign...
Cryptographic Hash Function
 A Cryptographic Hash Function is an algorithm that takes
an arbitrary block of data and retu...
Cryptographic Hash Function
 The ideal hash function has four main properties:
 It is easy to compute the hash for any g...
Digital Signature
 For messages sent through an insecure channel, a
properly implemented Digital Signature gives the rece...
Digital Signature
Java Security
 Sun’s website says:
“Java security technology includes a large set of APIs,
tools, and implementations of ...
Java Security
 Access Control is a comprehensive policy and permissions
API that allows the developer to create and admin...
Unlimited Strength Policy Files
 By default, JRE is restricted to a particular Encryption
Algorithms and Key Lengths (Str...
Example: Computing The Hash of a
byte[]
MessageDigest msgDigest =
MessageDigest.getInstance("MD5");
msgDigest.update(plain...
Example: Private Key Crypto
KeyGenerator keyGen =
KeyGenerator.getInstance("DES");
keyGen.init(56);
Key key = keyGen.gener...
Example: Public Key Crypto
KeyPairGenerator keyGen =
KeyPairGenerator.getInstance("RSA");
keyGen.initialize(1024);
KeyPair...
Example: Digital Signature
KeyPairGenerator keyGen =
KeyPairGenerator.getInstance("RSA");
keyGen.initialize(1024);
KeyPair...
Example: Accessing Key Stores
// Creating new one
KeyStore keyStore = KeyStore.getInstance("PKCS12");
keyStore.load(null, ...
Example: Accessing Key Stores
// Get entries
X509Certificate cert = (X509Certificate)
keyStore.getCertificate(“alias");
Pr...
Serializing a Key
Key key = …; // PrivateKey or PublicKey
byte[] encodedKey = key.getEncoded();
…
X509EncodedKeySpec keySp...
Serializing a Certificate
X509Certificate cert = …;
byte[] encCert = cert.getEncoded();
…
ByteArrayInputStream inputStream...
Example: Generating a Certificate
 Standard Java does not have an X509Certificate
generation API
 BouncyCastle has a cla...
Example: Generating a Certificate
X509V3CertificateGenerator certGen = new
X509V3CertificateGenerator();
X500Principal myP...
XML Signature
 XML Signature (also called XMLDsig, XML-DSig, XML-Sig)
is a W3C recommendation that defines an XML syntax
...
XML Signature
XML Resource
XML Signature
Signed Data
XML Resource
XML Signature
Signed XML
Element
XML Resource
XML Signat...
XML Signature
 Implementation:
 Apache XML Security (santuario)
 Standard XML Digital Signature API (JDK 6), also
imple...
XML Signature
<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo xmlns="http://www.w3.org/2000/09/xmldsig#...
XML Signature
// Init the factory
String providerName = System.getProperty("jsr105Provider",
"org.jcp.xml.dsig.internal.do...
XML Signature
class SimpleKeySelector extends KeySelector {
private PublicKey publicKey;
public SimpleKeySelector(PublicKe...
References
 http://www.wikipedia.org
 http://java.sun.com/javase/technologies/security/
 http://java.sun.com/security/r...
More Resources
 http://www.ibm.com/developerworks/edu/j-dw-
javasec1-i.html
 http://www.ibm.com/developerworks/edu/j-dw-...
Upcoming SlideShare
Loading in...5
×

Security via Java

3,098

Published on

On Friday 2008-01-16 I made a presentation for my work partners at Arx ICT about Security and its usage in Java.

The presentation starts by giving a very briefed and comprehensive introduction to General Security Concepts (Theory).

The presentation contains many common code snippets. These code snippets are very useful, they will help you in most security aware programs.

Published in: Technology, Education
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,098
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
152
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Security via Java

  1. 1. By Bahaa Zaid bzaid@arxict.com
  2. 2. Agenda  Introduction to Security  Java Security  XML Security  WS-Security
  3. 3. Introduction to Security  Cryptography  Symmetric-Key Cryptography  Public-Key Cryptography  Public Key Infrastructure  Cryptographic Hash Function  Digital Signature
  4. 4. Cryptography  Is the practice and study of hiding information  Encryption is the process of transforming information (plaintext) using an algorithm (cipher) to make it unreadable to anyone (ciphertext) except those possessing special knowledge (key).  Decryption is to make the encrypted information readable again.
  5. 5. Symmetric-Key Cryptography  Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key. This was the only kind of encryption publicly known until June 1976.  Examples are DES, 3DES, Blowfish, RC4…
  6. 6. Symmetric-Key Cryptography Plaintext CiphertextCipher PlaintextCiphertext Cipher
  7. 7. Public-Key Cryptography  Public-Key Cryptography, also known as Asymmetric Cryptography, is a form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it. In public key cryptography, a user has a pair of cryptographic keys—a Public Key and a Private Key.  Examples are RSA and ElGamal.
  8. 8. Public-Key Cryptography  A big random number is used to create a key pair. When the keys have been made the big random number is thrown away. Without knowledge of the random number it should be "impossible" to create the private key from the public key.
  9. 9. Public-Key Cryptography  A message encrypted with a recipient's public key cannot be decrypted by anyone except the recipient possessing the corresponding private key.
  10. 10. Public Key Infrastructure  Public Key Infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a Certificate Authority (CA).  CA is an example of Trusted Third Party (TTP).  A CA is an entity which issues Public Key Certificate for use by other parties.
  11. 11. Public Key Infrastructure  The most common certificate standard is the ITU-T X.509.  A Public Key Certificate is an electronic document which incorporates a Digital Signature to bind together a public key with an identity — information such as the name of a person or an organization, their address, and so forth.  A Public Key Certificate is the Public Key of an individual added to it his/her Identity and signed by a CA.  The certificate can be used to verify that a Public Key belongs to an individual .
  12. 12. Public Key Infrastructure  A Certificate Chain is a sequence of certificates, where each certificate in the chain is signed by the subsequent certificate. The last certificate in the chain is normally a self-signed Certificate - a certificate that signs itself (Root Certificate).  It’s an example of Chain Of Trust. CA Cert (Root Cert) signs Company CA signs App Cert signs
  13. 13. Cryptographic Hash Function  A Cryptographic Hash Function is an algorithm that takes an arbitrary block of data and returns a fixed- size bit string, the Hash Value or Message Digest, such that an accidental or intentional change to the data will almost certainly change the Hash Value.  Examples are MD5, SHA-1 and SHA-256.  Applications are Message Integrity Verification, Digital Signatures, …
  14. 14. Cryptographic Hash Function  The ideal hash function has four main properties:  It is easy to compute the hash for any given data,  It is extremely difficult to construct a text that has a given hash,  It is extremely difficult to modify a given text without changing its hash, and  It is extremely unlikely that two different messages will have the same hash.
  15. 15. Digital Signature  For messages sent through an insecure channel, a properly implemented Digital Signature gives the receiver reason to believe the message was sent by the claimed sender.  Digital Signature gives both Authentication and Integrity.
  16. 16. Digital Signature
  17. 17. Java Security  Sun’s website says: “Java security technology includes a large set of APIs, tools, and implementations of commonly used security algorithms, mechanisms, and protocols. The Java security APIs span a wide range of areas, including cryptography, public key infrastructure, secure communication, authentication, and access control.”  Platform Security is built-in language security features enforced by the Java compiler and virtual machine for example Bytecode verification, Secure class loading .
  18. 18. Java Security  Access Control is a comprehensive policy and permissions API that allows the developer to create and administer applications requiring fine-grained access to security- sensitive resources.  Java includes APIs for Cryptography , Secure Communications (e.g. TLS) and PKI.  Java Security is Extensible i.e. Java provide the interfaces and the implementation is provided by a Security Provider, JRE has a default provider (SUN provider).
  19. 19. Unlimited Strength Policy Files  By default, JRE is restricted to a particular Encryption Algorithms and Key Lengths (Strong Encryption).  This restriction is in place so that the JRE and Java Applications that use Encryption can be freely imported by countries whose government restrict the use of Cryptography.  There are no restrictions in Egypt. So, you can download the Unlimited Strength Policy Files from Sun’s website and install it to enable unlimited encryption.
  20. 20. Example: Computing The Hash of a byte[] MessageDigest msgDigest = MessageDigest.getInstance("MD5"); msgDigest.update(plainText); //byte[] byte[] digest = msgDigest.digest();
  21. 21. Example: Private Key Crypto KeyGenerator keyGen = KeyGenerator.getInstance("DES"); keyGen.init(56); Key key = keyGen.generateKey(); … Cipher cipher = Cipher.getInstance("DES/ECB/PKCS5Padding"); cipher.init(Cipher.ENCRYPT_MODE, key); byte[] cipherText = cipher.doFinal(plainText); … cipher.init(Cipher.DECRYPT_MODE, key); byte[] newPlainText = cipher.doFinal(cipherText);
  22. 22. Example: Public Key Crypto KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA"); keyGen.initialize(1024); KeyPair key = keyGen.generateKeyPair(); … Cipher cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding"); cipher.init(Cipher.ENCRYPT_MODE, key.getPublic()); byte[] cipherText = cipher.doFinal(plainText); … cipher.init(Cipher.DECRYPT_MODE, key.getPrivate()); byte[] newPlainText = cipher.doFinal(cipherText);
  23. 23. Example: Digital Signature KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA"); keyGen.initialize(1024); KeyPair key = keyGen.generateKeyPair(); … Signature sig = Signature.getInstance("MD5WithRSA"); sig.initSign(key.getPrivate()); sig.update(plainText); byte[] signature = sig.sign(); … sig.initVerify(key.getPublic()); sig.update(plainText); if (sig.verify(signature)) {…}
  24. 24. Example: Accessing Key Stores // Creating new one KeyStore keyStore = KeyStore.getInstance("PKCS12"); keyStore.load(null, null); … // Opening Existing one KeyStore keyStore = KeyStore.getInstance("PKCS12"); keyStore.load(new FileInputStream(filename), "password".toCharArray()); … // Adding Entry keyStore.setKeyEntry( "somealias",privateKey, "password".toCharArray(), new Certificate[] {myCert, caCert}); …
  25. 25. Example: Accessing Key Stores // Get entries X509Certificate cert = (X509Certificate) keyStore.getCertificate(“alias"); PrivateKey key = (PrivateKey) keyStore.getKey( “alias", “password".toCharArray()); … // Saving to file keyStore.store(new FileOutputStream(filename), “password”.toCharArray());
  26. 26. Serializing a Key Key key = …; // PrivateKey or PublicKey byte[] encodedKey = key.getEncoded(); … X509EncodedKeySpec keySpec = new X509EncodedKeySpec(encodedKey); KeyFactory keyFactory = KeyFactory.getInstance("RSA"); PublicKey theKey = keyFactory.generatePublic(keySpec); // or PrivateKey theKey = keyFactory.generatePrivate(keySpec);
  27. 27. Serializing a Certificate X509Certificate cert = …; byte[] encCert = cert.getEncoded(); … ByteArrayInputStream inputStream = new ByteArrayInputStream(encCert); CertificateFactory factory = CertificateFactory.getInstance("X.509"); X509Certificate theCert = (X509Certificate) factory.generateCertificate(inputStream);
  28. 28. Example: Generating a Certificate  Standard Java does not have an X509Certificate generation API  BouncyCastle has a class for generating X509Certificate instance org.bouncycastle.x509.X509V3CertificateGenerator
  29. 29. Example: Generating a Certificate X509V3CertificateGenerator certGen = new X509V3CertificateGenerator(); X500Principal myPrincipal = new X500Principal("CN=Duke, OU=ArxICT, O=Arx, C=EG" ); certGen.setSubjectDN(myPrincipal); certGen.setIssuerDN(myPrincipal); // Self signed certGen.setNotBefore(new Date(…)); certGen.setNotAfter(new Date(…)); certGen.setPublicKey(publicKey); // Cert Public Key certGen.setSignatureAlgorithm("SHA1withRSA"); certGen.setSerialNumber(generateMySerialNumber()); X509Certificate cert = certGen.generateX509Certificate(privateKey);
  30. 30. XML Signature  XML Signature (also called XMLDsig, XML-DSig, XML-Sig) is a W3C recommendation that defines an XML syntax for digital signatures.  An XML signature used to sign a resource outside its containing XML document is called a detached signature;  If it is used to sign some part of its containing document, it is called an enveloped signature;  If it contains the signed data within itself it is called an enveloping signature.
  31. 31. XML Signature XML Resource XML Signature Signed Data XML Resource XML Signature Signed XML Element XML Resource XML Signature 1 Signed XML Element XML Signature 2 Detached Enveloping Enveloped
  32. 32. XML Signature  Implementation:  Apache XML Security (santuario)  Standard XML Digital Signature API (JDK 6), also implemented in Apache XML Security for pre-6 JDKs
  33. 33. XML Signature <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo xmlns="http://www.w3.org/2000/09/xmldsig#"> <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC- xml-c14n-20010315"/> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa- sha1"/> <Reference URI="#MsgBody"> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/> <DigestValue>W3aSreOicBECRBLSJnchq448fjU=</DigestValue> </Reference> </SignedInfo> <SignatureValue>hG…=</SignatureValue> <KeyInfo> <SecurityTokenReference xmlns="http://schemas.xmlsoap.org/ws/2002/04/secext"> <Reference URI="X509Token"/> </SecurityTokenReference> </KeyInfo> </Signature>
  34. 34. XML Signature // Init the factory String providerName = System.getProperty("jsr105Provider", "org.jcp.xml.dsig.internal.dom.XMLDSigRI"); XMLSignatureFactory fac = XMLSignatureFactory.getInstance("DOM“, (Provider)Class.forName(providerName).newInstance()); DOMValidateContext valContext = new DOMValidateContext(new SimpleKeySelector(merchantPublicKey), nodeList.item(0)); XMLSignature signature = fac.unmarshalXMLSignature(valContext); boolean coreValidity = signature.validate(valContext);
  35. 35. XML Signature class SimpleKeySelector extends KeySelector { private PublicKey publicKey; public SimpleKeySelector(PublicKey publicKey) { this.publicKey = publicKey; } public KeySelectorResult select(KeyInfo keyInfo, Purpose purpose, AlgorithmMethod method, XMLCryptoContext context) throws KeySelectorException { return new SimpleKeySelectorResult(publicKey); } private static class SimpleKeySelectorResult implements KeySelectorResult { private PublicKey publicKey; SimpleKeySelectorResult(PublicKey pk) { this.publicKey = pk; } public Key getKey() { return publicKey; } } }
  36. 36. References  http://www.wikipedia.org  http://java.sun.com/javase/technologies/security/  http://java.sun.com/security/reference/docs/index.html
  37. 37. More Resources  http://www.ibm.com/developerworks/edu/j-dw- javasec1-i.html  http://www.ibm.com/developerworks/edu/j-dw- javasec2-i.html
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×