SlideShare a Scribd company logo
1 of 111
Download to read offline
PKI:

John Iliadis, © 2005

O

A journey in the world of PKI

v

r p r o m i si n g
e
and

un

de

r d e li v e

ng
ri

Still a long way to go...

John Iliadis, jiliadATpanafonet.gr
TEIRESIAS Banking Information Systems
&
De Facto Joint Research Group on
Information and Communication Systems Security
University of the Aegean 1
Contents
■

Prologue

■

Quick Overview

■

Security

■

Cryptography

■

PKI

■

PKI Outside Wonderland and into the Real World

■

Summing it up

John Iliadis, © 2005

2
John Iliadis, © 2005

Prologue, Part 1
PKI! Great security solution!

✔

Let's do it!

3
John Iliadis, © 2005

Prologue, Part 2

PKI Implementation

4
Prologue, Part 3
Now, let me see....

■

...what were the problems we wanted PKI to solve?

■

...and what about the problems introduced by PKI?

John Iliadis, © 2005

5
Quick Overview
■

Information Security: back to the basics

■

What makes (or makes not) asymmetric crypto so
special?

■

Digital Signatures
✔

Technical Framework

✔

Legal Framework

...then how come they are still not there?
■

PKI (outside Wonderland)

John Iliadis, © 2005

6
John Iliadis, © 2005

Section 1: Information Security

■

What isn't Information Security?

■

What is Information Security?

■

What is Risk Analysis?

■

What is Security Policy?

■

Information Security Lifecycle

■

Approaches to Information Security

7
InfoSec != Secret Crypto Algorithms
■

The crypto algorithm secrecy issue, by example
1.Algorithm known only to the 2 communicating entities
➔

Alice and Bob use a secret algorithm they developed to
exchange confidential information.

2.Algorithm known only to a few communicating entities
➔

Telecom operator uses in-house developed secret
algorithm, to encrypt intra-company wireless traffic of its
clients .

3.Different crypto algorithm for each communicating pair

John Iliadis, © 2005

➔

Telecom operator uses a different in-house developed
secret algorithm to encrypt the traffic of each of his clients

Which one is the more secure? Why ?

8
InfoSec != Secret Crypto Algorithms
■Super-secure

secret algorithm #1

Ciphertext = “DLROWOLLEH”



Plaintext = ? Decryption time = ?



■Super-secure

secret algorithm #2

Ciphertext = “LHOORZRUOG”



Plaintext = ? Decryption time = ?



■Super-secure

secret algorithm #3

Ciphertext = “HELLOWORLD”



Plaintext = ? Decryption time = ?



John Iliadis, © 2005

9
InfoSec != Secret Crypto Algorithms
■Quality


of secret encryption algorithms

Range from “Potentially very good” to “No encryption used
whatsoever” (e.g. XOR)

■Cryptanalysis


attempts

The more people try to “break” (find deficiencies in the
design of) a crypto algorithm, the sooner they may reach
their goal

■Good


encryption algorithms can only be public

They are meant to be public, so they can be reviewed and
amended by as many cryptographers as possible.

■What
John Iliadis, © 2005

about DES, SHA-0?
10
InfoSec != Obscurity
■

Internet


Obscurity: Running a Web Server at port 37649, so that
only your associates, whom you 've told the port number,
can connect to it



■

No security: A port scan would reveal the port in seconds

Software


Obscurity: Keeping secret an exploitable vulnerability you
discovered in your software



John Iliadis, © 2005

No security: Once the bad guys find out about it, the good
guys will be unprotected, running unpatched and
vulnerable software
11
Security is about... (1)
■

“The only good locks are open, public and accessible
ones”, W. Diffie



Vulnerabilities discovered and disclosed



■

Can be studied by many people at the same time
Corrective actions or patches researched and disclosed

Security is an enabler for business


John Iliadis, © 2005

It enables businesses to do things they couldn't do before,
because they were too risky

12
Security is about... (2)
■

How many kilograms of Security would you like?


Organisations' cost for implementing countermeasure <=
organisations' cost of suffering breach



Hacker's cost for breaching security >= hacker's profit of
breaching security
➔

Threat: Blank 3.5'' disks disappear from your office, every once
in a while...

➔

Countermeasure: Buy a safe and store your blank 3.5'' disks
there

■

Security does not solve problems, it changes the problem's
domain, e.g.


Confidentiality of information -> Confidentiality of key

John Iliadis, © 2005

13
Security is about... (3)
■

Risk Analysis


What is at risk (assets)
➔
➔



Qualitative analysis
Quantitative analysis

What vulnerabilities can be exploited
➔

Technical

➔

Process

➔

People



What threats exist



Risk management
➔

Eliminate/reduce risk

➔

Accept risk

➔

Transfer risk

John Iliadis, © 2005

CRAMM-based Risk Analysis

14
Security is about... (4)
■

CIA



Integrity



■

Confidentiality
Availability

More Information Security objectives


Entity authentication



Data authentication



Non-repudiation

John Iliadis, © 2005

15
Security is about... (5)
■

Information Security Policy


The basis for all information security efforts



Directs how issues should be addressed and technologies
should be used



The least expensive control to execute, but the most
difficult to implement



Shaping policy is difficult because policies must:

John Iliadis, © 2005

➔

Never conflict with laws

➔

Stand up in court, if challenged

➔

Be properly administered
16
Security is about... (6)
■

Information Security Lifecycle


Risk analysis



Security policy



Overall system re-engineering (even better: security builtin, from the start)



Security management of deployed system



Incident Response



Business Continuity Planning

John Iliadis, © 2005

17
Bottom-Up Approach to Security
■

System administrators trying to improve the security of
their systems


Technical expertise of the persons involved



Seldom works since it lacks critical features:

John Iliadis, © 2005

➔

Management support

➔

Employees’ support

18
Top-Down Approach to Security
■

Initiated by higher-level management:



Dictate the expected outcomes



■

Issue policy and procedures
Determine who is accountable for each action

Advantages:


Strong management support



Dedicated IT personnel



Dedicated funding



Clear planning



Support from employees

John Iliadis, © 2005

19
Section 2: Cryptography
■

Symmetric & asymmetric crypto: A simplified scenario

■

Key Distribution


Symmetric cryptography



Asymmetric cryptography

■

Differences between symmetric and asymmetric

■

Typical algorithms used in PKI

■

Applications of cryptography

John Iliadis, © 2005

20
John Iliadis, © 2005

Cryptography

Symmetric & asymmetric cryptography:
A simplified scenario

21
A simple scenario: Symmetric Crypto (1)

Alice

John Iliadis, © 2005

Symmetric key
“pass21”

Document
En
cry
pt

Bob

Symmetric key
“pass21”
Encrypted
document D
ecr
ypt

Document

22
A simple scenario: Symmetric Crypto (2)
■

Both Alice and Bob must have the same key (“pass21”)

■

Encryption/decryption:


Step 1: Alice encrypts the document with key “pass21”
and sends to Bob the encrypted document



Step2: Bob receives the encrypted document and uses
key “pass21” to decrypt it and retrieve the original
document

■

Alice has got to communicate to Bob the key (“pass21”)
in a secure manner, i.e. ensure the key's confidentiality.

John Iliadis, © 2005

23
A simple scenario: Asymmetric Crypto (1)

Alice

John Iliadis, © 2005

Bob's public key
“dfgsd34”

Document
En
cry
pt

Bob

Bob's private key
“3trer4”
Encrypted
document D
ecr
ypt

Document

24
A simple scenario: Asymmetric Crypto (2)

■

Bob has a keypair (a public key and a private key)

■

Encryption/decryption:


Step 1: Alice encrypts the document with Bob’s public key
“dfgsd34” and sends to Bob the encrypted document



Step2: Bob receives the encrypted document and uses his
private key “3trer4” to decrypt it and retrieve the original
document

■

Bob has got to communicate to Alice his public key (“dfgsd34”)
in a secure manner, i.e. ensurethe integrity of his public key.

John Iliadis, © 2005

25
Cryptography

■

Basic services of Key Management (ISO 11770)

■

Key Distribution in symmetric cryptosystems

■

Key Distribution in asymmetric cryptosystems

John Iliadis, © 2005

26
Basic services of Key Management

■

Generate-Key

■

Derive-Key

■

Register-Key

■

Archive-Key

■

Create-Key-Certificate

■

Revoke-Key

■

Distribute-Key

■

Deregister-Key

■

Install-Key

■

Destroy-Key

■

Store-Key

John Iliadis, © 2005

27
Key Distribution in Symmetric Crypto
■

Direct

■

Key Translation Center

■

Key Distribution Center

■

more...

John Iliadis, © 2005

28
Key Translation Center
1
3

Alice
Translation Methods
•Steps 1,2, OR
•Steps 1,3,4

John Iliadis, © 2005

KTC
4

2

Bob

1.Alice->KTC: Enciphered key
2.KTC->Bob: Re-enciphered key, OR
3.KTC->Alice: Re-enciphered key AND
4.Alice->Bob: Re-enciphered key
29
John Iliadis, © 2005

Key Distribution Center
1
2a

KTC

2b

Alice

Bob

1. Alice->KDC: Request for shared key
2a. KDC->Alice: Enciphered shared key
2b. KDC->Bob: Enciphered shared key
If KDC cannot communicate securely with Bob (2b),
then Alice assumes responsibility for distribution of
enciphered shared key to Bob
30
Key Distribution in Symmetric Crypto - A Note

John Iliadis, © 2005

■

All mechanisms (except the Direct one) require
1.Shared symmetric or asymmetric key
2.Inline Key Center

31
Key Distribution in Asymmetric Crypto

John Iliadis, © 2005

■

Protected channels


Data origin authentication



Data integrity protection (e.g. courier and
registered mail)

■

TTP-assisted (i.e. certificates)

32
Certificate Service Provider
1 (out of band)

2
3

CSP

4

5
Alice
Distribution Methods
•Steps 1,2,3,4 OR
•Steps 1,2,3,5

John Iliadis, © 2005

Anyone

1.Alice receives CSP public key (out of band)
2.Alice->CSP: KeyAlice
3.CSP->Alice: CertificateAlice
4.CSP->Bob: CertificateAlice OR
5.Alice->Bob: CertificateAlice (by itself or in
S/MIME)

33
Key Distribution in Asymmetric Crypto - A Note

■

Key Distribution requires



■

Integrity protected channel, or
An offline TTP

Other TTP operational requirements, like revocation,
necessitate online operation of TTPs

John Iliadis, © 2005

34
Symmetric/Asymmetric Crypto: Differences
■

Symmetric cryptosystems



■

Use of one key, shared between A(lice) and B(ob),
Ensure the confidentiality of the shared key
.

Asymmetric cryptosystems


Use of a keypair (public+private) for each communicating
party



John Iliadis, © 2005

Ensure the integrity of the public keys
.

35
Typical algorithms used in PKI
■

Symmetric ciphers


■

DES, 3-DES, AES, RC4

Hash functions


MD5 (vulnerable) , SHA-1, RIPEMD (RSA 2004-2005
conferences, collisions)

■

John Iliadis, © 2005

Asymmetric ciphers


RSA, DSS, El-Gamal
36
Cryptography
■

Applications of Cryptography


Exhanging secure e-mails (e.g. S/MIME, PGP)



Secure access to Web resources (e.g. HTTP over SSL)

John Iliadis, © 2005

37
Exchanging Secure E-mails (1)
1a

1b

3

CSP

2

4. Secure Email Exchange

Bob

Alice

1.Steps 1a,1b :

Out of band transport of CSP certificate

2.Step 2

:

Certificate request and distribution

3.Step 3

:

Download Bob's certificate

4.Step 4

:

Send encrypted e-mail; enveloping

a) Alice sends A=Ebob's_Cert(random_symmetric_key), B=E
random_symmetric_key
(email message)
b)Bob decrypts email: C=D
(A), DC(B)
bob's_Private_Key
John Iliadis, © 2005

38
Exchanging Secure E-mails (2)
1a

2

1b

CSP
3. Send Bob signed email
4. Send Alice encrypted email

Bob

Alice
1.Steps 1a,1b :
2.Step 2
:
3.Step 3
:

Out of band transport of CSP certificate
Certificate request and distribution
Send Bob signed email

4.Step 4

Send Alice encrypted e-mail; enveloping

1.Alice sends A=EAlice's_Private_Key(Hash(email message)), b=email message
2.Bob verifies signature: H=hash(email message), D=D
(A),
Alice's_Cert
check if H=D

:

a) Bob sends A=Ebob's_Cert(random_symmetric_key), B=E
random_symmetric_key
(email message)
b)Alice decrypts email: C=D
(A), DC(B)
bob's_Private_Key

John Iliadis, © 2005

39
Exchanging Secure E-mails (3)
1a

1b

cross
cert

CSP 1

CSP 2

2

3
4. Secure Email Exchange

Alice

Bob

1.Steps 1a,1b :

Out of band transport of CSP certificate

2.Step 2

:

Certificate request and distribution

3.Step 3

:

Download Bob's certificate

4.Step 4

:

Send encrypted email; enveloping

a) Alice sends A=Ebob's_Cert(random_symmetric_key), B=E
random_symmetric_key
(email message)
b)Bob decrypts email: C=D
(A), DC(B)
bob's_Private_Key
John Iliadis, © 2005

40
Secure Web Access: HTTP over SSL
1b

1a

CSP
3. Visit secure site (https)

2

Web Server

Alice

1.Steps 1a,1b :
2.Step 2
:
3.Step 3
:

Out of band transport of CSP certificate
Certificate request and distribution
Visit secure site (https)

a) Alice receives Web Server's certificate (W )
cert
b)Alice verifies Wcert using the CSP certificate
c)Alice sends EWebServerCert(random_symmetric_key) to W
d)Alice and the Web Server start encrypting the information they
exchange, using the random symmetric key

John Iliadis, © 2005

41
Numbers used Once (Nonces)
■

Communication can be replayed or hijacked, e.g.


Encrypted emails:
➔

Mallory manages to cryptanalyse a specific encrypted email
sent by Alice to Bob

➔

Mallory produces a fake email to Bob (Alice is supposedly
sending this one)

➔

Mallory encrypts the email with the same symmetric key

➔

Mallory attaches to the email the captured
Ebob's_Cert(random_symmetric_key)



John Iliadis, © 2005

Solutions
➔

Numbers used Once

➔

Timestamps (trusted time source?)
42
John Iliadis, © 2005

Section 3: PKI

Public Key Infrastructure

43
Section 3: Public Key Infrastructure
■

Certificates – what are they?

■

Digital Signatures



■

What are they ?
Comparison to handwritten signatures

Trusted Third Parties



Trust Models



■

Certification Service Providers
Certificate Status Information

EU Directive 1999/93/EC and its implications


John Iliadis, © 2005

Qualified certificates and advanced electronic signatures
44
John Iliadis, © 2005

PKI

Certificates: What are they ?

45
Certificates - What are they ?
■

Offline authentication

Identification info of holder
●Identification info of CSP
●Public key of holder
■ X.509v1-3
●Expiration date
■ Proprietary extensions
●Extensions (e.g. Key Usage,
CSI location)
■ Criticality of extensions
●Digitally signed by CSP

token

John Iliadis, © 2005

●

X.509v3 Certificate

46
Issuing Certificates (1)
1

2

3
5

Alice

4
CSP

1.Alice receives CSP certificate (out of band)
2.Alice produces her own keypair (public+private key)
3.Alice securely (e.g. SSL) uploads her public key to CSP, for
certification
4.CSP binds Alice's public key to Alice's identification
information and signs
5.CSP sends the certificate to Alice
John Iliadis, © 2005

47
Issuing Certificates (2)
3

1

2

2
5

Alice

4
CSP

1.Alice receives CSP certificate (out of band)
2.Alice communicates securely with CSP (e.g. SSL) and
requests a certificate
3.CSP produces new keypair for Alice
4.CSP binds Alice's public key to Alice's identification
information and signs
5.CSP sends the certificate and the private key to Alice
John Iliadis, © 2005

*note: CSP does not keep a record of Alices private key (?)

48
Main stages in certificate lifecycle

John Iliadis, © 2005

■

Key Generation

■

Entity Registration

■

Certificate Distribution

■

Certificate Archiving

■

Certificate Expiration

■

Certificate Revocation

49
John Iliadis, © 2005

PKI

Digital Signatures

50
Digitally Signing and Verifying

Alice's private key

Alice

John Iliadis, © 2005

Document

Sig
nin
g

Alice's certificate

Bob

Ve
rify

Signed
Document

Sig
nat
ure

3
Signed Document,
Verified signature

51
Digitally Signing: A generic scenario
Signed Document

1
Original
Message

Alice

Synopsis
(hash)

=

2

Private
Synopsis
key
(hash)

Signed
Document

Original
Message

+

Encrypted
Synopsis
(encrypted hash)

Encrypted
Synopsis
(encrypted hash)
●

Step 1: Produce synopsis (hash, e.g. MD5, SHA-1) of original
message: H=Hash(Original_Message)

●

Step 2: Encrypt H with private key: EH=E
(H)
Alice's_Private_Key

●

The signed message is composed of:
●

The original message

●

The encrypted hash (EH)

John Iliadis, © 2005

52
Digital Signatures: What are they ?
■

Based on digital certificates

■

Data authentication

■

Non-repudiation


Timestamping



Non-repudiation mechanisms



Underlying legal framework

John Iliadis, © 2005

53
Signatures: Comparing digital to handwritten

Data authentication
Data integrity

Non repudiation

Does not alter the
original message

John Iliadis, © 2005

Digital
3
3
3
(pending
other
factors)

3

Handwritten
7
7
3 (forging
signatures?
forging own
signature?)
7 (e.g. Legal
document
already signed
cannot be
signed by
other party)

54
John Iliadis, © 2005

PKI

Trusted Third Parties

55
Trusted Third Parties
■

Trusted Third Party (TTP)


“an impartial organisation delivering business confidence,
through commercial and technical security features, to an
electronic transaction”

■Certificate


John Iliadis, © 2005

Service Providers (CSPs)

Trusted Third Parties that control the life cycle of
certificates

56
Certification Service Providers

■

Main CSP services


Registration



Key generation, personalisation, archiving



Certificate generation, renewal, distribution, archiving



Certificate revocation



Certificate Status Information generation, archiving (e.g.
CRL)



John Iliadis, © 2005

Key recovery

57
TTP Services
■

Timestamping

■

Notarisation

■

Data archive

■

Non-repudiation




John Iliadis, © 2005

Inline TTP



■

Online TTP

Offline TTP

...
58
TTPs: Main Actors
■

Certificate Authority, providing certificates.

■

Registration Authority, registering users and binding their
identities to certificates.

■

Repositories, storage and dissemination entities containing
TTP-related public material such as certificates and CRLs.

■

Certificate holders, holding certificates from CAs which they
use in order to sign or authenticate themselves.

■

Dependent entities (US Eng.: relying parties), entities which
use the certificates presented by other entities in order to
authenticate the latter or verify their signature.

John Iliadis, © 2005

59
PKI Main Components
■

Set of TTPs


Certificate Service Providers



Timestamping Authorities



...

■

Interoperability and collaboration

■

Legal framework

■

Value-Added services


Non-repudiation service



...

John Iliadis, © 2005

60
Trust Model
■

Why ?


Entities holding certificates from non-cooperating CSPs



Entities trusting only CSPs belonging in their domain (e.g.
country, enterprise, etc)



■

Different trust models to accommodate for different needs

Trust Models


Hierarchical



Flat



Mixed



Web of Trust

John Iliadis, © 2005

61
Hierarchical Trust Model (1)
TRUST

TRUST
Cert

Cert

cert

Root CSPce

CSP 1

cert

CSP 2

rt

cert

CSP 3

CSP 4

CERT AND TRUST

John Iliadis, © 2005

CSP 5

CSP 6 CERT AND TRUST

62
Hierarchical Trust Model (2)

■

Everyone has to trust the Root CA

■

Quite the case in environments with strict hierarchy
already defined (military, large corporations etc)

■

If two entities, belonging to distant leafs, wish to
communicate, they have to validate a long cert chain

John Iliadis, © 2005

63
Flat Trust Model (1)
TRUST

cross
cert

CSP 1

CSP 2

CERT AND TRUST

John Iliadis, © 2005

CSP 3

CSP 4

CERT AND TRUST

TRUST
TRUST
64
John Iliadis, © 2005

Flat Trust Model (2)

■

Small validation paths

■

Lists of leaf CAs the user trusts

65
Mixed Trust Model (1)

Cert
cert

cert

Root CSP
cross
cert

CSP 1

cert

CSP 2

CSP 3

TRUST

CSP 4

TRUST
CERT AND TRUST
cross
cert

CERT AND
TRUST

John Iliadis, © 2005

CSP 5

CSP 6

66
Mixed Trust Model (2)

■

Cross-certifications

■

Is it easy to cross-certify?

John Iliadis, © 2005



Security Policy



Certificate Practice Statements



Other issues...

67
John Iliadis, © 2005

Web of Trust Model (1)
CERT AND TRUST

CERT
AND
TRUST

CERT AND TRUST
CERT AND TRUST
CERT AND TRUST

68
Web of Trust Model (2)

■

Not x.509

■

Users sign other users' public keys

■

PGP

John Iliadis, © 2005

69
What about certificat revocation?
e
■

EU Directive 1999/93/EC calls for a “secure and prompt
revocation service”. Is there one?

■

The need for a revocation evaluation framework;
research is ongoing

■

The need for security awareness programmes


Users need to be aware of the PKI potential



Dependent entities need to be aware of the risk

John Iliadis, © 2005

70
Certificate Status Information Mechanisms (1)

■

Certificate Revocation Lists

■

Compare to Black lists: Banks, Cell phone Operators.
Dependent entities: merchants (online POS), Banks,
other Cell phone operators

■

CRL: Signed list containing serial numbers of revoked or
suspended certificates, revocation dates and (optional)
revocation reasons

John Iliadis, © 2005

71
Certificate Status Information Mechanisms (2)
Authority Key Identifier
●Issuer Alternative Names
●CRL Number
●Delta CRL Indicator
●Issuing Distribution Point
●This update, next update
●CRL Entries
● Serial numbers of certificates
● Invalidity date
● Reason Codes
●

Reason Codes

●

keyCompromise

●

cACompromise

●

affiliationChanged

●

CessationOfOperation

●

certificateHold

●

...Digitally signed by CSP

●

removefromCRL

Certificate Revocation List

John Iliadis, © 2005

72
Certificate Status Information Mechanisms (3)

■

Delta-Certificate Revocation Lists

■

Distribution Points

■

Fresh Revocation Information (DeltaCRLs on top of
Distribution Point CRLs)

■

Redirect CRL (dynamic re-partitioning of large
Distribution Point CRLs)

John Iliadis, © 2005

73
Certificate Status Information Mechanisms (4)

■

Enhanced CRL Distribution Options


■

Separate location and validation functions.

Positive CSI


John Iliadis, © 2005

CRLs are all wrong… CSI should contain positive info.
Dependent entity should set ad hoc freshness
requirements and certificate holder should provide ad hoc
CSI.

74
Certificate Status Information Mechanisms (5)

■

Online Certificate Status Protocol


John Iliadis, © 2005

Server returning signed CSI, corresponding to
requests by dependent entities. Possible OCSP
Responses:
1.“Good”, meaning certificate has not been revoked,
2.“Revoked”, meaning certificate has been revoked
or suspended,
3.“Unknown”, OCSP is not aware of that certificate

75
PKI – EU Directive

Directive 1999/93/EC of the European Parliament
and of the Council of 13 December 1999

John Iliadis, © 2005

on a Community framework
for electronic signatures

76
EU Directive – The Basics
■

“This Directive contributes to the use and legal
recognition of electronic signatures within the
Community;”

■

“Advanced electronic signatures” (legal recognition, no
doubt margin) must be based on


“qualified certificates which are created by a
”,
➔

■

“secure signature creation device”

Requirements for a CSP to be able to issue “qualified
certificates”


Meet specific requirements



Accreditation by a national authority

John Iliadis, © 2005

77
EU Directive – Signatures (1)
■

“Electronic signature”


John Iliadis, © 2005

data in electronic form which are attached to or logically
associated with other electronic data and which serve as a
method of authentication

78
EU Directive – Signatures (2)
■

“Advanced electronic signature” means an electronic
signature which meets the following requirements:

(a) it is uniquely linked to the signatory;
(b) it is capable of identifying the signatory;
(c) it is created using means that the signatory can maintain
under his sole control
(d) it is linked to the data to which it relates in such a manner
that any subsequent change of the data is detectable

John Iliadis, © 2005

79
EU Directive – Certificates (1)
■

“Qualified certificates” must contain:
(a) an indication that the certificate is issued as a qualified
certificate
(b) the identification of the certification service provider and
the State in which it is established
(c) the name of the signatory or a pseudonym, which shall
be identified as such
(d) provision for a specific attribute of the signatory to be

John Iliadis, © 2005

included if relevant, depending on the purpose for which
the certificate is intended
80
EU Directive – Certificates (2)
■

“Qualified certificates” must contain (cont.):
(e) signature-verification data which correspond to
signature-creation data under the control of the signatory
(f) an indication of the beginning and end of the period of
validity of the certificate
(g) the identity code of the certificate
(h) the advanced electronic signature of the certificationservice-provider issuing it
(i) limitations on the scope of use of the certificate, if
applicable
(j) limits on the value of transactions for which the certificate

can be used, if applicable
John Iliadis, © 2005

81
EU Directive – Secure Devices (1)
■

Secure signature-creation devices must, by appropriate
technical and procedural means, ensure at the least that:
(a) the signature-creation-data used for signature generation can

practically occur only once, and that their secrecy is reasonably
assured
(b) the signature-creation-data used for signature generation

cannot, with reasonable assurance, be derived and the signature
is protected against forgery using currently available technology
(c) the signature-creation-data used for signature generation can

be reliably protected by the legitimate signatory against the use
of others

John Iliadis, © 2005

82
EU Directive – Secure Devices (2)
■

Secure signature-creation devices must not alter the
data to be signed or prevent such data from being
presented to the signatory prior to the signature process.

John Iliadis, © 2005

83
EU Directive - Some thoughts (1)
■

Directive aims at technology independence


Problem: Directive identifies requirements that fall under
the scope of technology (e.g. secure signature creation
devices, Annex III)



John Iliadis, © 2005

Solution: Define sets of components that comply with the
Directive. Caution needed when defining these sets; they
must not conflict with other, underlying regulatory
frameworks
84
EU Directive - Some thoughts (2)
■

Secure signature creation devices


Hardware tokens
➔
➔

John Iliadis, © 2005

wide acceptance by public as a «secure» method

➔



easier to deploy
degree of security awareness required: low

Security requirements and evaluation standards
➔

harder to deploy; compliance certification (end-user
systems?)

➔

degree of public confidence: low

➔

degree of security awareness required: high
85
EU Directive - Some thoughts (3)
■

Secure signature creation devices – factors to consider:


Ease of use,



confidence/acceptance by public,



cost of implementation, operation and maintenance,



security level and assurance,



others...

John Iliadis, © 2005

86
EU Directive - Some thoughts (4)


Need for «Qualified Value-added Services»

■

Should there be a limit on the kind of services CSPs may
develop and offer to the public?

■

Should we ensure that the new services they will be
providing in the future will not damage their impartiality?

John Iliadis, © 2005

87
Section 4: PKI Outside Wonderland

John Iliadis, © 2005

PKI Outside Wonderland:
Interacting with the Real World

88
Section 4: PKI Outside Wonderland
■

Where can I use my certificate?

■

How come they don't use certificates in... ?

■

Food for thought


Which CA do you trust?



Why is Bob claiming he received a different signed
document than the one you 've sent him?



Are you sure others cannot masquerade as yourself?



Who is that Alice sending you digitally signed emails?



Can someone fool Certification Service Providers?



Is PKI a cure-all for enterprise-level security?

John Iliadis, © 2005

89
Where can I use my certificate? (1)
■

How come they don't use it for e-banking?

John Iliadis, © 2005

➔

EU Directive 1999/93/EC and the national-level laws are just
showing their results (qualified certificates)

➔

Some Banks had already implemented their own PKI, for ebanking use, before the EU Directive

➔

In general, it is probably still too immature to be adopted by
the vast majority of Banks
-

Technology issues to be improved yet, e.g. Revocation

-

Banks didn't have a chance yet to try it internally and feel
comfortable with it

-

It is not widespread among end users, yet; user education and
training might be needed

-

ROI ?

-

Some banks are beginning to consider it; pilot projects underway 90
Where can I use my certificate? (2)
■

How come web sites don't use it for authentication?


Privacy issues may be a hindering factor
➔

Username/password and a simple registration process provide
privacy (one can always refrain from giving up too much personal
data during registration)

➔

Certificates / qualified certificates cannot provide privacy

➔

Attribute certificates could do the job, but then again most of the
times you need to identify a specific individual

➔

If certs were used, Web site operators would probably have to handle
more carefully the stored identification data (Data Protection)

➔

Research is being performed, for cert-based mechanisms (e.g.
PyTHIA)



ROI?

John Iliadis, © 2005

91
Are they used anywhere at all? (1)
■

S/MIME


■

Sign your emails, have others encrypt the ones they send you

Public sector



■

Could (will?) be the driving force for PKI
Pilots (Greece) have already been deployed; soon to be used

Company-wide


John Iliadis, © 2005

Some companies use it internally, to encrypt sensitive emails,
sign emails or documents (electronic workflows), or encrypt
private users' data. According to the 2004 CSI/FBI Computer
Crime and Security Survey, 30% of U.S. Corporations use PKI
to enhance their security
92
Are they used anywhere at all? (2)
■

...let's not forget, before introducing a new technology,
one should


Identify the need for it



Identify the operational risks



Estimate and allocate in the budget the operational cost
(e.g. PKI key management and administration)



Educate the users



Await for user acceptance (critical mass), and



Estimate the ROI...

John Iliadis, © 2005

93
John Iliadis, © 2005

PKI Outside Wonderland

Some interesting Problems

94
John Iliadis, © 2005

Which CA do you trust ?
■

How do you pick the CAs
to trust?


Security Policy



CPS



Word of mouth



Cost of certificate



Other criteria?



Random

95
Food for thought (1)
■

Where do you store your private key? (EU Directive)

■

What is it exactly you are signing?



Simple PCs (private key outside smart card) and TCB ?



■

What You Sign is What You See – not there yet
Are the Directive's (and national laws') requirements met ?

The need for information security awareness


“Revocation info not available. Proceed?” message - user
authentication fatigue



John Iliadis, © 2005

“Always check revocation info” option in your browser?
96
Food for thought (2)
■

Identification and naming



■

Global naming?
Translation versus transliteration?

Certificate path validation


Who is validating?



Do dependent entities understand the implications of the
trust model they use?

■

Signature policy (underlying legal framework?)

■

Revocations


John Iliadis, © 2005

Scalability, Transparency, Freshness, Timeliness, ...
97
Food for thought (3)
■

Role of notarisation and timestamping authorities




■

Underlying legal framework?
Timely submission?

Trusted archival services




■

How long should an archive hold info?
Who should it be revealed to?

Use of biometrics in relation to electronic signatures


John Iliadis, © 2005

The case of “panic password” versus finger cut-off...
98
Food for thought (4)
John Doe
●org: X
●Country: GR
●Public key: 9FA

John Doe
●org: X
●Country: GR
●Public key: 9FA

●

●

Certificate id 2C7
CA 1

Certificate id 5D3
CA2

John asked CA1 to revoke his certificate because his
key (smart card) was stolen
●John then uses certificate from CA2 (same public key)
to perform transactions and then repudiate
●In the court, John may claim that he didn't know that he
had to notify CA2, since only the smart card of CA1
was stolen...
●

John Iliadis, © 2005

99
Food for thought (5)
■

Enterprise-wide implementations


PKI is a solution; identify the problem first



Identify and ensure necessary resources are available
➔
➔

PKI Administration procedures

➔



PKI Administration person-hours
Upper management support

Procedures for key management, procedures for key
management and procedures for key management



John Iliadis, © 2005

Archiving/Notarisation
➔

What if archive file format becomes obsolete (not supported
by newer software versions)?

➔

What if specific smart cards / smart card readers become
obsolete?

100
Food for thought (6)
■

A typical scenario of solution first, problem identification
afterwards
“We 've got PKI, so we can use the server cert to sign official letters
on behalf of the company and e-mail them! What's more, it can be
done unattended (bulk signing)!”

■

Let's see...


Technical problems: are server certs supposed to sign
(keyUsage certificate attribute)?



Legal problems: Can the server be held legally liable? If not,
how can he sign?



John Iliadis, © 2005

Yes, please: with unattended signing you 've got to have the
private key unencrypted somehow/somewhere, so every
employee gets a chance to become a CEO, in turns...
101
John Iliadis, © 2005

Concluding Remarks

Summing it up

102
Information Security
■

Not about...



■

Secret cryptographic algorithms
Obscurity

About...


Risk Analysis



Security Policy



Changing business problems to security problems (when
it comes to crypto, key management problems mostly)



Information Security lifecycle



User awareness (especially those who need to take

John Iliadis, © 2005

decisions; see Top-down approach to security)
103
Symmetric/Asymmetric crypto: Differences
■

A multiple choice test


Choice A:
➔

Symmetric is cumbersome; asymmetric is new tech and has
many useful features and advantages



Choice B:
➔

The difference is in key management; confidentiality of
shared key vs integrity (authenticity) of public one



John Iliadis, © 2005

Consequences of failing the test
➔

Bad key management ï solutions that increase operational
risk

➔

False sense of security

104
PKI hype
■

PKI has still got issues to be resolved


Technical (e.g. revocation)



Managerial (e.g. enterprise-wide: identify the problem,
allocate the resources and then proceed)



User awareness (e.g. when you see “no revocation
information available currently” there might be stg fishy)

■

...however,


End-users seem to be unaware of those
➔

Because we have to start selling PKI/investments have to
start paying back?



John Iliadis, © 2005

Digital signature laws clearing the path for faster user
adoption (and protection) have recently appeared

105
Taking up an orphan
■

PKI is an orphan


Science gave birth to a child and gave it up for adoption



Few foster parents around, to take up the child before it
passes childhood diseases

■

PKI is a good solution


...now all we have to do is track down the problem



Be careful: easing ulcer pains with aspirin is a bad idea

John Iliadis, © 2005

106
Do it or dump it ?
■

Do it!


Childhood diseases are currently being treated



Regulatory frameworks in place, allowing for PKI adoption
and protecting dependent entities



Governments a major driving force (EU)



Just remember

John Iliadis, © 2005

➔

Problem first, solution afterwards

➔

PKI or non-PKI, it's about key management, key
management and key management
107
John Iliadis, © 2005

Q&A

108
References (1)
■

Castell S., User's Requirements for Trusted Third Party Services, INFOSEC
Project Report S2101/01, CEC/DG XIII/B6, September 1993.

■

W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Transactions,
vol IT-22, pages 644-654, 1976.

■

Directive 1999/93/EC of the European Parliament and of the Council on a
Community framework for electronic signatures, 13 December 1999, published
in the Official Journal of the European Communities, 19 January 2000.

■

Gritzalis, S., Spinellis, D. Addressing Threats and Security Issues in World
Wide Web Technology, In Proceedings of the 3rd IFIP International Conference
on Communications and Multimedia Security, Chapman & Hall, 1997

■

Housley R., Ford W., Polk W., Solo D., Internet X.509 Public Key Infrastructure
Certificate and CRL Profile, , IETF Network Working Group, Request for
Comments 2459 (Category: Standards Track), January 1999, available at
http://www.ietf.org/rfc/rfc2459.txt

John Iliadis, © 2005

109
References (2)
■

ISO Standard 11770 (1996), Information Technology - Security Techniques Key Management - Part 1: Framework.

■

ITU-T Recommendation X.509 (1997) and ISO/IEC 9594-8:1997, Information
technology - Open Systems Interconnection, "The Directory: Authentication
framework".

■

J. Iliadis, D. Spinellis, S. Katsikas, D. Gritzalis, B. Preneel. "Evaluating
Certificate Status Information Mechanisms". In Proceedinds of the 7th ACM
Conference on Computer and Communication Security: CCS '2000, pages 1-8.
ACM Press, November 2000

■

Kohnfelder L., Towards a practical public-key cryptosystem, BSc Thesis, M.I.T.,
Cambridge MA, September 1978.

■

PKITS, CEC-DGXIII-ETS-II project 23192, Deliverable D3 “Public Key
Infrastructure with Timestamping Authority”, April 1998.

■
John Iliadis, © 2005

110
References (3)
■

Ronald L. Rivest, Adi Shamir, Leonard M. Adleman, A Method for Obtaining
Digital Signatures and Public-Key Cryptosystems, Communications of the ACM,
vol21, No2, pp.120-126, 1978.

■

Rivest R., Can We Eliminate Revocation Lists?, In Proceedings of Financial
Cryptography 1998, available at http://theory.lcs.mit.edu/~rivest/revocation.ps

■

Schneier B., Applied Cryptography, 2nd ed, John Wiley & Sons, 1996.

■

Zhou J., Gollmann D., A Fair Non-repudiation protocol, Proceedings of the
1996 IEEE Symposium on Security and Privacy, pp.55-61, IEEE Computer
Society Press, May 1996.

■

Zhou J., Gollmann D., An Efficient Non-repudiation protocol, Proceedings of the
10th IEEE Computer Security Foundations Workshop, pp.126-132, IEEE
Computer Society Press, June 1997.

John Iliadis, © 2005

111

More Related Content

What's hot

Anonymous Attacks On Tunisian Government
Anonymous Attacks On Tunisian GovernmentAnonymous Attacks On Tunisian Government
Anonymous Attacks On Tunisian GovernmentPositive Hack Days
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutDavid Busby, CISSP
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2FRSecure
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session TwoFRSecure
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
 
Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Greg Foss
 
SecureSet WarGames - Logging and Packet Capture Training
SecureSet WarGames - Logging and Packet Capture TrainingSecureSet WarGames - Logging and Packet Capture Training
SecureSet WarGames - Logging and Packet Capture TrainingGreg Foss
 
ITW Security Division General
ITW Security Division GeneralITW Security Division General
ITW Security Division GeneralJoanne Ogden
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous CommunicationFabio Pietrosanti
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...PROIDEA
 
Risk-based Security Technical Debt Reduction: When everything’s important, n...
Risk-based Security Technical Debt Reduction:  When everything’s important, n...Risk-based Security Technical Debt Reduction:  When everything’s important, n...
Risk-based Security Technical Debt Reduction: When everything’s important, n...laurieannwilliams
 

What's hot (11)

Anonymous Attacks On Tunisian Government
Anonymous Attacks On Tunisian GovernmentAnonymous Attacks On Tunisian Government
Anonymous Attacks On Tunisian Government
 
Security its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-aboutSecurity its-more-than-just-your-database-you-should-worry-about
Security its-more-than-just-your-database-you-should-worry-about
 
2018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 22018 CISSP Mentor Program Session 2
2018 CISSP Mentor Program Session 2
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016Deception Driven Defense - Infragard 2016
Deception Driven Defense - Infragard 2016
 
SecureSet WarGames - Logging and Packet Capture Training
SecureSet WarGames - Logging and Packet Capture TrainingSecureSet WarGames - Logging and Packet Capture Training
SecureSet WarGames - Logging and Packet Capture Training
 
ITW Security Division General
ITW Security Division GeneralITW Security Division General
ITW Security Division General
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
CONFidence 2017: Cryptography used for jihadism, from Internet to software (J...
 
Risk-based Security Technical Debt Reduction: When everything’s important, n...
Risk-based Security Technical Debt Reduction:  When everything’s important, n...Risk-based Security Technical Debt Reduction:  When everything’s important, n...
Risk-based Security Technical Debt Reduction: When everything’s important, n...
 

Viewers also liked

Viewers also liked (7)

Makalah lembaga negara pasca amandemen uud 1945
Makalah lembaga negara pasca amandemen uud 1945Makalah lembaga negara pasca amandemen uud 1945
Makalah lembaga negara pasca amandemen uud 1945
 
Jurnal konstitusi
Jurnal konstitusiJurnal konstitusi
Jurnal konstitusi
 
Amandemen negara_dan_konstitusi
Amandemen  negara_dan_konstitusiAmandemen  negara_dan_konstitusi
Amandemen negara_dan_konstitusi
 
G 30 s pki
G 30 s pkiG 30 s pki
G 30 s pki
 
UUD 1945 Sebagai Konstitusi Negara
UUD 1945 Sebagai Konstitusi NegaraUUD 1945 Sebagai Konstitusi Negara
UUD 1945 Sebagai Konstitusi Negara
 
Power point konstitusi
Power point  konstitusiPower point  konstitusi
Power point konstitusi
 
Prolog basics
Prolog basicsProlog basics
Prolog basics
 

Similar to A Journey into PKI: Promising Yet Underdelivering

Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!Justin Black
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Bemorisson
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFIDDevnology
 
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Codero
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World SessionYasserElsnbary
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017FRSecure
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsThreatConnect
 

Similar to A Journey into PKI: Promising Yet Underdelivering (20)

Encryption 2021
Encryption 2021Encryption 2021
Encryption 2021
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
The Thing That Should Not Be
The Thing That Should Not BeThe Thing That Should Not Be
The Thing That Should Not Be
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
 
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
Cybersecurity: Do Your Have a Plan to Address Threats and Prevent Liability?
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
cyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Sessioncyber security | What Is Cyber Security | Hello World Session
cyber security | What Is Cyber Security | Hello World Session
 
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 

More from John ILIADIS

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsJohn ILIADIS
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's PlaygroundJohn ILIADIS
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.John ILIADIS
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsJohn ILIADIS
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesJohn ILIADIS
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?John ILIADIS
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeJohn ILIADIS
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security SoftwareJohn ILIADIS
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...John ILIADIS
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A PrimerJohn ILIADIS
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network SecurityJohn ILIADIS
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayJohn ILIADIS
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...John ILIADIS
 

More from John ILIADIS (13)

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's Playground
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two Decades
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It Be
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network Security
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

A Journey into PKI: Promising Yet Underdelivering

  • 1. PKI: John Iliadis, © 2005 O A journey in the world of PKI v r p r o m i si n g e and un de r d e li v e ng ri Still a long way to go... John Iliadis, jiliadATpanafonet.gr TEIRESIAS Banking Information Systems & De Facto Joint Research Group on Information and Communication Systems Security University of the Aegean 1
  • 2. Contents ■ Prologue ■ Quick Overview ■ Security ■ Cryptography ■ PKI ■ PKI Outside Wonderland and into the Real World ■ Summing it up John Iliadis, © 2005 2
  • 3. John Iliadis, © 2005 Prologue, Part 1 PKI! Great security solution! ✔ Let's do it! 3
  • 4. John Iliadis, © 2005 Prologue, Part 2 PKI Implementation 4
  • 5. Prologue, Part 3 Now, let me see.... ■ ...what were the problems we wanted PKI to solve? ■ ...and what about the problems introduced by PKI? John Iliadis, © 2005 5
  • 6. Quick Overview ■ Information Security: back to the basics ■ What makes (or makes not) asymmetric crypto so special? ■ Digital Signatures ✔ Technical Framework ✔ Legal Framework ...then how come they are still not there? ■ PKI (outside Wonderland) John Iliadis, © 2005 6
  • 7. John Iliadis, © 2005 Section 1: Information Security ■ What isn't Information Security? ■ What is Information Security? ■ What is Risk Analysis? ■ What is Security Policy? ■ Information Security Lifecycle ■ Approaches to Information Security 7
  • 8. InfoSec != Secret Crypto Algorithms ■ The crypto algorithm secrecy issue, by example 1.Algorithm known only to the 2 communicating entities ➔ Alice and Bob use a secret algorithm they developed to exchange confidential information. 2.Algorithm known only to a few communicating entities ➔ Telecom operator uses in-house developed secret algorithm, to encrypt intra-company wireless traffic of its clients . 3.Different crypto algorithm for each communicating pair John Iliadis, © 2005 ➔ Telecom operator uses a different in-house developed secret algorithm to encrypt the traffic of each of his clients Which one is the more secure? Why ? 8
  • 9. InfoSec != Secret Crypto Algorithms ■Super-secure secret algorithm #1 Ciphertext = “DLROWOLLEH”  Plaintext = ? Decryption time = ?  ■Super-secure secret algorithm #2 Ciphertext = “LHOORZRUOG”  Plaintext = ? Decryption time = ?  ■Super-secure secret algorithm #3 Ciphertext = “HELLOWORLD”  Plaintext = ? Decryption time = ?  John Iliadis, © 2005 9
  • 10. InfoSec != Secret Crypto Algorithms ■Quality  of secret encryption algorithms Range from “Potentially very good” to “No encryption used whatsoever” (e.g. XOR) ■Cryptanalysis  attempts The more people try to “break” (find deficiencies in the design of) a crypto algorithm, the sooner they may reach their goal ■Good  encryption algorithms can only be public They are meant to be public, so they can be reviewed and amended by as many cryptographers as possible. ■What John Iliadis, © 2005 about DES, SHA-0? 10
  • 11. InfoSec != Obscurity ■ Internet  Obscurity: Running a Web Server at port 37649, so that only your associates, whom you 've told the port number, can connect to it  ■ No security: A port scan would reveal the port in seconds Software  Obscurity: Keeping secret an exploitable vulnerability you discovered in your software  John Iliadis, © 2005 No security: Once the bad guys find out about it, the good guys will be unprotected, running unpatched and vulnerable software 11
  • 12. Security is about... (1) ■ “The only good locks are open, public and accessible ones”, W. Diffie   Vulnerabilities discovered and disclosed  ■ Can be studied by many people at the same time Corrective actions or patches researched and disclosed Security is an enabler for business  John Iliadis, © 2005 It enables businesses to do things they couldn't do before, because they were too risky 12
  • 13. Security is about... (2) ■ How many kilograms of Security would you like?  Organisations' cost for implementing countermeasure <= organisations' cost of suffering breach  Hacker's cost for breaching security >= hacker's profit of breaching security ➔ Threat: Blank 3.5'' disks disappear from your office, every once in a while... ➔ Countermeasure: Buy a safe and store your blank 3.5'' disks there ■ Security does not solve problems, it changes the problem's domain, e.g.  Confidentiality of information -> Confidentiality of key John Iliadis, © 2005 13
  • 14. Security is about... (3) ■ Risk Analysis  What is at risk (assets) ➔ ➔  Qualitative analysis Quantitative analysis What vulnerabilities can be exploited ➔ Technical ➔ Process ➔ People  What threats exist  Risk management ➔ Eliminate/reduce risk ➔ Accept risk ➔ Transfer risk John Iliadis, © 2005 CRAMM-based Risk Analysis 14
  • 15. Security is about... (4) ■ CIA   Integrity  ■ Confidentiality Availability More Information Security objectives  Entity authentication  Data authentication  Non-repudiation John Iliadis, © 2005 15
  • 16. Security is about... (5) ■ Information Security Policy  The basis for all information security efforts  Directs how issues should be addressed and technologies should be used  The least expensive control to execute, but the most difficult to implement  Shaping policy is difficult because policies must: John Iliadis, © 2005 ➔ Never conflict with laws ➔ Stand up in court, if challenged ➔ Be properly administered 16
  • 17. Security is about... (6) ■ Information Security Lifecycle  Risk analysis  Security policy  Overall system re-engineering (even better: security builtin, from the start)  Security management of deployed system  Incident Response  Business Continuity Planning John Iliadis, © 2005 17
  • 18. Bottom-Up Approach to Security ■ System administrators trying to improve the security of their systems  Technical expertise of the persons involved  Seldom works since it lacks critical features: John Iliadis, © 2005 ➔ Management support ➔ Employees’ support 18
  • 19. Top-Down Approach to Security ■ Initiated by higher-level management:   Dictate the expected outcomes  ■ Issue policy and procedures Determine who is accountable for each action Advantages:  Strong management support  Dedicated IT personnel  Dedicated funding  Clear planning  Support from employees John Iliadis, © 2005 19
  • 20. Section 2: Cryptography ■ Symmetric & asymmetric crypto: A simplified scenario ■ Key Distribution  Symmetric cryptography  Asymmetric cryptography ■ Differences between symmetric and asymmetric ■ Typical algorithms used in PKI ■ Applications of cryptography John Iliadis, © 2005 20
  • 21. John Iliadis, © 2005 Cryptography Symmetric & asymmetric cryptography: A simplified scenario 21
  • 22. A simple scenario: Symmetric Crypto (1) Alice John Iliadis, © 2005 Symmetric key “pass21” Document En cry pt Bob Symmetric key “pass21” Encrypted document D ecr ypt Document 22
  • 23. A simple scenario: Symmetric Crypto (2) ■ Both Alice and Bob must have the same key (“pass21”) ■ Encryption/decryption:  Step 1: Alice encrypts the document with key “pass21” and sends to Bob the encrypted document  Step2: Bob receives the encrypted document and uses key “pass21” to decrypt it and retrieve the original document ■ Alice has got to communicate to Bob the key (“pass21”) in a secure manner, i.e. ensure the key's confidentiality. John Iliadis, © 2005 23
  • 24. A simple scenario: Asymmetric Crypto (1) Alice John Iliadis, © 2005 Bob's public key “dfgsd34” Document En cry pt Bob Bob's private key “3trer4” Encrypted document D ecr ypt Document 24
  • 25. A simple scenario: Asymmetric Crypto (2) ■ Bob has a keypair (a public key and a private key) ■ Encryption/decryption:  Step 1: Alice encrypts the document with Bob’s public key “dfgsd34” and sends to Bob the encrypted document  Step2: Bob receives the encrypted document and uses his private key “3trer4” to decrypt it and retrieve the original document ■ Bob has got to communicate to Alice his public key (“dfgsd34”) in a secure manner, i.e. ensurethe integrity of his public key. John Iliadis, © 2005 25
  • 26. Cryptography ■ Basic services of Key Management (ISO 11770) ■ Key Distribution in symmetric cryptosystems ■ Key Distribution in asymmetric cryptosystems John Iliadis, © 2005 26
  • 27. Basic services of Key Management ■ Generate-Key ■ Derive-Key ■ Register-Key ■ Archive-Key ■ Create-Key-Certificate ■ Revoke-Key ■ Distribute-Key ■ Deregister-Key ■ Install-Key ■ Destroy-Key ■ Store-Key John Iliadis, © 2005 27
  • 28. Key Distribution in Symmetric Crypto ■ Direct ■ Key Translation Center ■ Key Distribution Center ■ more... John Iliadis, © 2005 28
  • 29. Key Translation Center 1 3 Alice Translation Methods •Steps 1,2, OR •Steps 1,3,4 John Iliadis, © 2005 KTC 4 2 Bob 1.Alice->KTC: Enciphered key 2.KTC->Bob: Re-enciphered key, OR 3.KTC->Alice: Re-enciphered key AND 4.Alice->Bob: Re-enciphered key 29
  • 30. John Iliadis, © 2005 Key Distribution Center 1 2a KTC 2b Alice Bob 1. Alice->KDC: Request for shared key 2a. KDC->Alice: Enciphered shared key 2b. KDC->Bob: Enciphered shared key If KDC cannot communicate securely with Bob (2b), then Alice assumes responsibility for distribution of enciphered shared key to Bob 30
  • 31. Key Distribution in Symmetric Crypto - A Note John Iliadis, © 2005 ■ All mechanisms (except the Direct one) require 1.Shared symmetric or asymmetric key 2.Inline Key Center 31
  • 32. Key Distribution in Asymmetric Crypto John Iliadis, © 2005 ■ Protected channels  Data origin authentication  Data integrity protection (e.g. courier and registered mail) ■ TTP-assisted (i.e. certificates) 32
  • 33. Certificate Service Provider 1 (out of band) 2 3 CSP 4 5 Alice Distribution Methods •Steps 1,2,3,4 OR •Steps 1,2,3,5 John Iliadis, © 2005 Anyone 1.Alice receives CSP public key (out of band) 2.Alice->CSP: KeyAlice 3.CSP->Alice: CertificateAlice 4.CSP->Bob: CertificateAlice OR 5.Alice->Bob: CertificateAlice (by itself or in S/MIME) 33
  • 34. Key Distribution in Asymmetric Crypto - A Note ■ Key Distribution requires   ■ Integrity protected channel, or An offline TTP Other TTP operational requirements, like revocation, necessitate online operation of TTPs John Iliadis, © 2005 34
  • 35. Symmetric/Asymmetric Crypto: Differences ■ Symmetric cryptosystems   ■ Use of one key, shared between A(lice) and B(ob), Ensure the confidentiality of the shared key . Asymmetric cryptosystems  Use of a keypair (public+private) for each communicating party  John Iliadis, © 2005 Ensure the integrity of the public keys . 35
  • 36. Typical algorithms used in PKI ■ Symmetric ciphers  ■ DES, 3-DES, AES, RC4 Hash functions  MD5 (vulnerable) , SHA-1, RIPEMD (RSA 2004-2005 conferences, collisions) ■ John Iliadis, © 2005 Asymmetric ciphers  RSA, DSS, El-Gamal 36
  • 37. Cryptography ■ Applications of Cryptography  Exhanging secure e-mails (e.g. S/MIME, PGP)  Secure access to Web resources (e.g. HTTP over SSL) John Iliadis, © 2005 37
  • 38. Exchanging Secure E-mails (1) 1a 1b 3 CSP 2 4. Secure Email Exchange Bob Alice 1.Steps 1a,1b : Out of band transport of CSP certificate 2.Step 2 : Certificate request and distribution 3.Step 3 : Download Bob's certificate 4.Step 4 : Send encrypted e-mail; enveloping a) Alice sends A=Ebob's_Cert(random_symmetric_key), B=E random_symmetric_key (email message) b)Bob decrypts email: C=D (A), DC(B) bob's_Private_Key John Iliadis, © 2005 38
  • 39. Exchanging Secure E-mails (2) 1a 2 1b CSP 3. Send Bob signed email 4. Send Alice encrypted email Bob Alice 1.Steps 1a,1b : 2.Step 2 : 3.Step 3 : Out of band transport of CSP certificate Certificate request and distribution Send Bob signed email 4.Step 4 Send Alice encrypted e-mail; enveloping 1.Alice sends A=EAlice's_Private_Key(Hash(email message)), b=email message 2.Bob verifies signature: H=hash(email message), D=D (A), Alice's_Cert check if H=D : a) Bob sends A=Ebob's_Cert(random_symmetric_key), B=E random_symmetric_key (email message) b)Alice decrypts email: C=D (A), DC(B) bob's_Private_Key John Iliadis, © 2005 39
  • 40. Exchanging Secure E-mails (3) 1a 1b cross cert CSP 1 CSP 2 2 3 4. Secure Email Exchange Alice Bob 1.Steps 1a,1b : Out of band transport of CSP certificate 2.Step 2 : Certificate request and distribution 3.Step 3 : Download Bob's certificate 4.Step 4 : Send encrypted email; enveloping a) Alice sends A=Ebob's_Cert(random_symmetric_key), B=E random_symmetric_key (email message) b)Bob decrypts email: C=D (A), DC(B) bob's_Private_Key John Iliadis, © 2005 40
  • 41. Secure Web Access: HTTP over SSL 1b 1a CSP 3. Visit secure site (https) 2 Web Server Alice 1.Steps 1a,1b : 2.Step 2 : 3.Step 3 : Out of band transport of CSP certificate Certificate request and distribution Visit secure site (https) a) Alice receives Web Server's certificate (W ) cert b)Alice verifies Wcert using the CSP certificate c)Alice sends EWebServerCert(random_symmetric_key) to W d)Alice and the Web Server start encrypting the information they exchange, using the random symmetric key John Iliadis, © 2005 41
  • 42. Numbers used Once (Nonces) ■ Communication can be replayed or hijacked, e.g.  Encrypted emails: ➔ Mallory manages to cryptanalyse a specific encrypted email sent by Alice to Bob ➔ Mallory produces a fake email to Bob (Alice is supposedly sending this one) ➔ Mallory encrypts the email with the same symmetric key ➔ Mallory attaches to the email the captured Ebob's_Cert(random_symmetric_key)  John Iliadis, © 2005 Solutions ➔ Numbers used Once ➔ Timestamps (trusted time source?) 42
  • 43. John Iliadis, © 2005 Section 3: PKI Public Key Infrastructure 43
  • 44. Section 3: Public Key Infrastructure ■ Certificates – what are they? ■ Digital Signatures   ■ What are they ? Comparison to handwritten signatures Trusted Third Parties   Trust Models  ■ Certification Service Providers Certificate Status Information EU Directive 1999/93/EC and its implications  John Iliadis, © 2005 Qualified certificates and advanced electronic signatures 44
  • 45. John Iliadis, © 2005 PKI Certificates: What are they ? 45
  • 46. Certificates - What are they ? ■ Offline authentication Identification info of holder ●Identification info of CSP ●Public key of holder ■ X.509v1-3 ●Expiration date ■ Proprietary extensions ●Extensions (e.g. Key Usage, CSI location) ■ Criticality of extensions ●Digitally signed by CSP token John Iliadis, © 2005 ● X.509v3 Certificate 46
  • 47. Issuing Certificates (1) 1 2 3 5 Alice 4 CSP 1.Alice receives CSP certificate (out of band) 2.Alice produces her own keypair (public+private key) 3.Alice securely (e.g. SSL) uploads her public key to CSP, for certification 4.CSP binds Alice's public key to Alice's identification information and signs 5.CSP sends the certificate to Alice John Iliadis, © 2005 47
  • 48. Issuing Certificates (2) 3 1 2 2 5 Alice 4 CSP 1.Alice receives CSP certificate (out of band) 2.Alice communicates securely with CSP (e.g. SSL) and requests a certificate 3.CSP produces new keypair for Alice 4.CSP binds Alice's public key to Alice's identification information and signs 5.CSP sends the certificate and the private key to Alice John Iliadis, © 2005 *note: CSP does not keep a record of Alices private key (?) 48
  • 49. Main stages in certificate lifecycle John Iliadis, © 2005 ■ Key Generation ■ Entity Registration ■ Certificate Distribution ■ Certificate Archiving ■ Certificate Expiration ■ Certificate Revocation 49
  • 50. John Iliadis, © 2005 PKI Digital Signatures 50
  • 51. Digitally Signing and Verifying Alice's private key Alice John Iliadis, © 2005 Document Sig nin g Alice's certificate Bob Ve rify Signed Document Sig nat ure 3 Signed Document, Verified signature 51
  • 52. Digitally Signing: A generic scenario Signed Document 1 Original Message Alice Synopsis (hash) = 2 Private Synopsis key (hash) Signed Document Original Message + Encrypted Synopsis (encrypted hash) Encrypted Synopsis (encrypted hash) ● Step 1: Produce synopsis (hash, e.g. MD5, SHA-1) of original message: H=Hash(Original_Message) ● Step 2: Encrypt H with private key: EH=E (H) Alice's_Private_Key ● The signed message is composed of: ● The original message ● The encrypted hash (EH) John Iliadis, © 2005 52
  • 53. Digital Signatures: What are they ? ■ Based on digital certificates ■ Data authentication ■ Non-repudiation  Timestamping  Non-repudiation mechanisms  Underlying legal framework John Iliadis, © 2005 53
  • 54. Signatures: Comparing digital to handwritten Data authentication Data integrity Non repudiation Does not alter the original message John Iliadis, © 2005 Digital 3 3 3 (pending other factors) 3 Handwritten 7 7 3 (forging signatures? forging own signature?) 7 (e.g. Legal document already signed cannot be signed by other party) 54
  • 55. John Iliadis, © 2005 PKI Trusted Third Parties 55
  • 56. Trusted Third Parties ■ Trusted Third Party (TTP)  “an impartial organisation delivering business confidence, through commercial and technical security features, to an electronic transaction” ■Certificate  John Iliadis, © 2005 Service Providers (CSPs) Trusted Third Parties that control the life cycle of certificates 56
  • 57. Certification Service Providers ■ Main CSP services  Registration  Key generation, personalisation, archiving  Certificate generation, renewal, distribution, archiving  Certificate revocation  Certificate Status Information generation, archiving (e.g. CRL)  John Iliadis, © 2005 Key recovery 57
  • 58. TTP Services ■ Timestamping ■ Notarisation ■ Data archive ■ Non-repudiation   John Iliadis, © 2005 Inline TTP  ■ Online TTP Offline TTP ... 58
  • 59. TTPs: Main Actors ■ Certificate Authority, providing certificates. ■ Registration Authority, registering users and binding their identities to certificates. ■ Repositories, storage and dissemination entities containing TTP-related public material such as certificates and CRLs. ■ Certificate holders, holding certificates from CAs which they use in order to sign or authenticate themselves. ■ Dependent entities (US Eng.: relying parties), entities which use the certificates presented by other entities in order to authenticate the latter or verify their signature. John Iliadis, © 2005 59
  • 60. PKI Main Components ■ Set of TTPs  Certificate Service Providers  Timestamping Authorities  ... ■ Interoperability and collaboration ■ Legal framework ■ Value-Added services  Non-repudiation service  ... John Iliadis, © 2005 60
  • 61. Trust Model ■ Why ?  Entities holding certificates from non-cooperating CSPs  Entities trusting only CSPs belonging in their domain (e.g. country, enterprise, etc)  ■ Different trust models to accommodate for different needs Trust Models  Hierarchical  Flat  Mixed  Web of Trust John Iliadis, © 2005 61
  • 62. Hierarchical Trust Model (1) TRUST TRUST Cert Cert cert Root CSPce CSP 1 cert CSP 2 rt cert CSP 3 CSP 4 CERT AND TRUST John Iliadis, © 2005 CSP 5 CSP 6 CERT AND TRUST 62
  • 63. Hierarchical Trust Model (2) ■ Everyone has to trust the Root CA ■ Quite the case in environments with strict hierarchy already defined (military, large corporations etc) ■ If two entities, belonging to distant leafs, wish to communicate, they have to validate a long cert chain John Iliadis, © 2005 63
  • 64. Flat Trust Model (1) TRUST cross cert CSP 1 CSP 2 CERT AND TRUST John Iliadis, © 2005 CSP 3 CSP 4 CERT AND TRUST TRUST TRUST 64
  • 65. John Iliadis, © 2005 Flat Trust Model (2) ■ Small validation paths ■ Lists of leaf CAs the user trusts 65
  • 66. Mixed Trust Model (1) Cert cert cert Root CSP cross cert CSP 1 cert CSP 2 CSP 3 TRUST CSP 4 TRUST CERT AND TRUST cross cert CERT AND TRUST John Iliadis, © 2005 CSP 5 CSP 6 66
  • 67. Mixed Trust Model (2) ■ Cross-certifications ■ Is it easy to cross-certify? John Iliadis, © 2005  Security Policy  Certificate Practice Statements  Other issues... 67
  • 68. John Iliadis, © 2005 Web of Trust Model (1) CERT AND TRUST CERT AND TRUST CERT AND TRUST CERT AND TRUST CERT AND TRUST 68
  • 69. Web of Trust Model (2) ■ Not x.509 ■ Users sign other users' public keys ■ PGP John Iliadis, © 2005 69
  • 70. What about certificat revocation? e ■ EU Directive 1999/93/EC calls for a “secure and prompt revocation service”. Is there one? ■ The need for a revocation evaluation framework; research is ongoing ■ The need for security awareness programmes  Users need to be aware of the PKI potential  Dependent entities need to be aware of the risk John Iliadis, © 2005 70
  • 71. Certificate Status Information Mechanisms (1) ■ Certificate Revocation Lists ■ Compare to Black lists: Banks, Cell phone Operators. Dependent entities: merchants (online POS), Banks, other Cell phone operators ■ CRL: Signed list containing serial numbers of revoked or suspended certificates, revocation dates and (optional) revocation reasons John Iliadis, © 2005 71
  • 72. Certificate Status Information Mechanisms (2) Authority Key Identifier ●Issuer Alternative Names ●CRL Number ●Delta CRL Indicator ●Issuing Distribution Point ●This update, next update ●CRL Entries ● Serial numbers of certificates ● Invalidity date ● Reason Codes ● Reason Codes ● keyCompromise ● cACompromise ● affiliationChanged ● CessationOfOperation ● certificateHold ● ...Digitally signed by CSP ● removefromCRL Certificate Revocation List John Iliadis, © 2005 72
  • 73. Certificate Status Information Mechanisms (3) ■ Delta-Certificate Revocation Lists ■ Distribution Points ■ Fresh Revocation Information (DeltaCRLs on top of Distribution Point CRLs) ■ Redirect CRL (dynamic re-partitioning of large Distribution Point CRLs) John Iliadis, © 2005 73
  • 74. Certificate Status Information Mechanisms (4) ■ Enhanced CRL Distribution Options  ■ Separate location and validation functions. Positive CSI  John Iliadis, © 2005 CRLs are all wrong… CSI should contain positive info. Dependent entity should set ad hoc freshness requirements and certificate holder should provide ad hoc CSI. 74
  • 75. Certificate Status Information Mechanisms (5) ■ Online Certificate Status Protocol  John Iliadis, © 2005 Server returning signed CSI, corresponding to requests by dependent entities. Possible OCSP Responses: 1.“Good”, meaning certificate has not been revoked, 2.“Revoked”, meaning certificate has been revoked or suspended, 3.“Unknown”, OCSP is not aware of that certificate 75
  • 76. PKI – EU Directive Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 John Iliadis, © 2005 on a Community framework for electronic signatures 76
  • 77. EU Directive – The Basics ■ “This Directive contributes to the use and legal recognition of electronic signatures within the Community;” ■ “Advanced electronic signatures” (legal recognition, no doubt margin) must be based on  “qualified certificates which are created by a ”, ➔ ■ “secure signature creation device” Requirements for a CSP to be able to issue “qualified certificates”  Meet specific requirements  Accreditation by a national authority John Iliadis, © 2005 77
  • 78. EU Directive – Signatures (1) ■ “Electronic signature”  John Iliadis, © 2005 data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication 78
  • 79. EU Directive – Signatures (2) ■ “Advanced electronic signature” means an electronic signature which meets the following requirements: (a) it is uniquely linked to the signatory; (b) it is capable of identifying the signatory; (c) it is created using means that the signatory can maintain under his sole control (d) it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable John Iliadis, © 2005 79
  • 80. EU Directive – Certificates (1) ■ “Qualified certificates” must contain: (a) an indication that the certificate is issued as a qualified certificate (b) the identification of the certification service provider and the State in which it is established (c) the name of the signatory or a pseudonym, which shall be identified as such (d) provision for a specific attribute of the signatory to be John Iliadis, © 2005 included if relevant, depending on the purpose for which the certificate is intended 80
  • 81. EU Directive – Certificates (2) ■ “Qualified certificates” must contain (cont.): (e) signature-verification data which correspond to signature-creation data under the control of the signatory (f) an indication of the beginning and end of the period of validity of the certificate (g) the identity code of the certificate (h) the advanced electronic signature of the certificationservice-provider issuing it (i) limitations on the scope of use of the certificate, if applicable (j) limits on the value of transactions for which the certificate can be used, if applicable John Iliadis, © 2005 81
  • 82. EU Directive – Secure Devices (1) ■ Secure signature-creation devices must, by appropriate technical and procedural means, ensure at the least that: (a) the signature-creation-data used for signature generation can practically occur only once, and that their secrecy is reasonably assured (b) the signature-creation-data used for signature generation cannot, with reasonable assurance, be derived and the signature is protected against forgery using currently available technology (c) the signature-creation-data used for signature generation can be reliably protected by the legitimate signatory against the use of others John Iliadis, © 2005 82
  • 83. EU Directive – Secure Devices (2) ■ Secure signature-creation devices must not alter the data to be signed or prevent such data from being presented to the signatory prior to the signature process. John Iliadis, © 2005 83
  • 84. EU Directive - Some thoughts (1) ■ Directive aims at technology independence  Problem: Directive identifies requirements that fall under the scope of technology (e.g. secure signature creation devices, Annex III)  John Iliadis, © 2005 Solution: Define sets of components that comply with the Directive. Caution needed when defining these sets; they must not conflict with other, underlying regulatory frameworks 84
  • 85. EU Directive - Some thoughts (2) ■ Secure signature creation devices  Hardware tokens ➔ ➔ John Iliadis, © 2005 wide acceptance by public as a «secure» method ➔  easier to deploy degree of security awareness required: low Security requirements and evaluation standards ➔ harder to deploy; compliance certification (end-user systems?) ➔ degree of public confidence: low ➔ degree of security awareness required: high 85
  • 86. EU Directive - Some thoughts (3) ■ Secure signature creation devices – factors to consider:  Ease of use,  confidence/acceptance by public,  cost of implementation, operation and maintenance,  security level and assurance,  others... John Iliadis, © 2005 86
  • 87. EU Directive - Some thoughts (4)  Need for «Qualified Value-added Services» ■ Should there be a limit on the kind of services CSPs may develop and offer to the public? ■ Should we ensure that the new services they will be providing in the future will not damage their impartiality? John Iliadis, © 2005 87
  • 88. Section 4: PKI Outside Wonderland John Iliadis, © 2005 PKI Outside Wonderland: Interacting with the Real World 88
  • 89. Section 4: PKI Outside Wonderland ■ Where can I use my certificate? ■ How come they don't use certificates in... ? ■ Food for thought  Which CA do you trust?  Why is Bob claiming he received a different signed document than the one you 've sent him?  Are you sure others cannot masquerade as yourself?  Who is that Alice sending you digitally signed emails?  Can someone fool Certification Service Providers?  Is PKI a cure-all for enterprise-level security? John Iliadis, © 2005 89
  • 90. Where can I use my certificate? (1) ■ How come they don't use it for e-banking? John Iliadis, © 2005 ➔ EU Directive 1999/93/EC and the national-level laws are just showing their results (qualified certificates) ➔ Some Banks had already implemented their own PKI, for ebanking use, before the EU Directive ➔ In general, it is probably still too immature to be adopted by the vast majority of Banks - Technology issues to be improved yet, e.g. Revocation - Banks didn't have a chance yet to try it internally and feel comfortable with it - It is not widespread among end users, yet; user education and training might be needed - ROI ? - Some banks are beginning to consider it; pilot projects underway 90
  • 91. Where can I use my certificate? (2) ■ How come web sites don't use it for authentication?  Privacy issues may be a hindering factor ➔ Username/password and a simple registration process provide privacy (one can always refrain from giving up too much personal data during registration) ➔ Certificates / qualified certificates cannot provide privacy ➔ Attribute certificates could do the job, but then again most of the times you need to identify a specific individual ➔ If certs were used, Web site operators would probably have to handle more carefully the stored identification data (Data Protection) ➔ Research is being performed, for cert-based mechanisms (e.g. PyTHIA)  ROI? John Iliadis, © 2005 91
  • 92. Are they used anywhere at all? (1) ■ S/MIME  ■ Sign your emails, have others encrypt the ones they send you Public sector   ■ Could (will?) be the driving force for PKI Pilots (Greece) have already been deployed; soon to be used Company-wide  John Iliadis, © 2005 Some companies use it internally, to encrypt sensitive emails, sign emails or documents (electronic workflows), or encrypt private users' data. According to the 2004 CSI/FBI Computer Crime and Security Survey, 30% of U.S. Corporations use PKI to enhance their security 92
  • 93. Are they used anywhere at all? (2) ■ ...let's not forget, before introducing a new technology, one should  Identify the need for it  Identify the operational risks  Estimate and allocate in the budget the operational cost (e.g. PKI key management and administration)  Educate the users  Await for user acceptance (critical mass), and  Estimate the ROI... John Iliadis, © 2005 93
  • 94. John Iliadis, © 2005 PKI Outside Wonderland Some interesting Problems 94
  • 95. John Iliadis, © 2005 Which CA do you trust ? ■ How do you pick the CAs to trust?  Security Policy  CPS  Word of mouth  Cost of certificate  Other criteria?  Random 95
  • 96. Food for thought (1) ■ Where do you store your private key? (EU Directive) ■ What is it exactly you are signing?   Simple PCs (private key outside smart card) and TCB ?  ■ What You Sign is What You See – not there yet Are the Directive's (and national laws') requirements met ? The need for information security awareness  “Revocation info not available. Proceed?” message - user authentication fatigue  John Iliadis, © 2005 “Always check revocation info” option in your browser? 96
  • 97. Food for thought (2) ■ Identification and naming   ■ Global naming? Translation versus transliteration? Certificate path validation  Who is validating?  Do dependent entities understand the implications of the trust model they use? ■ Signature policy (underlying legal framework?) ■ Revocations  John Iliadis, © 2005 Scalability, Transparency, Freshness, Timeliness, ... 97
  • 98. Food for thought (3) ■ Role of notarisation and timestamping authorities   ■ Underlying legal framework? Timely submission? Trusted archival services   ■ How long should an archive hold info? Who should it be revealed to? Use of biometrics in relation to electronic signatures  John Iliadis, © 2005 The case of “panic password” versus finger cut-off... 98
  • 99. Food for thought (4) John Doe ●org: X ●Country: GR ●Public key: 9FA John Doe ●org: X ●Country: GR ●Public key: 9FA ● ● Certificate id 2C7 CA 1 Certificate id 5D3 CA2 John asked CA1 to revoke his certificate because his key (smart card) was stolen ●John then uses certificate from CA2 (same public key) to perform transactions and then repudiate ●In the court, John may claim that he didn't know that he had to notify CA2, since only the smart card of CA1 was stolen... ● John Iliadis, © 2005 99
  • 100. Food for thought (5) ■ Enterprise-wide implementations  PKI is a solution; identify the problem first  Identify and ensure necessary resources are available ➔ ➔ PKI Administration procedures ➔  PKI Administration person-hours Upper management support Procedures for key management, procedures for key management and procedures for key management  John Iliadis, © 2005 Archiving/Notarisation ➔ What if archive file format becomes obsolete (not supported by newer software versions)? ➔ What if specific smart cards / smart card readers become obsolete? 100
  • 101. Food for thought (6) ■ A typical scenario of solution first, problem identification afterwards “We 've got PKI, so we can use the server cert to sign official letters on behalf of the company and e-mail them! What's more, it can be done unattended (bulk signing)!” ■ Let's see...  Technical problems: are server certs supposed to sign (keyUsage certificate attribute)?  Legal problems: Can the server be held legally liable? If not, how can he sign?  John Iliadis, © 2005 Yes, please: with unattended signing you 've got to have the private key unencrypted somehow/somewhere, so every employee gets a chance to become a CEO, in turns... 101
  • 102. John Iliadis, © 2005 Concluding Remarks Summing it up 102
  • 103. Information Security ■ Not about...   ■ Secret cryptographic algorithms Obscurity About...  Risk Analysis  Security Policy  Changing business problems to security problems (when it comes to crypto, key management problems mostly)  Information Security lifecycle  User awareness (especially those who need to take John Iliadis, © 2005 decisions; see Top-down approach to security) 103
  • 104. Symmetric/Asymmetric crypto: Differences ■ A multiple choice test  Choice A: ➔ Symmetric is cumbersome; asymmetric is new tech and has many useful features and advantages  Choice B: ➔ The difference is in key management; confidentiality of shared key vs integrity (authenticity) of public one  John Iliadis, © 2005 Consequences of failing the test ➔ Bad key management ï solutions that increase operational risk ➔ False sense of security 104
  • 105. PKI hype ■ PKI has still got issues to be resolved  Technical (e.g. revocation)  Managerial (e.g. enterprise-wide: identify the problem, allocate the resources and then proceed)  User awareness (e.g. when you see “no revocation information available currently” there might be stg fishy) ■ ...however,  End-users seem to be unaware of those ➔ Because we have to start selling PKI/investments have to start paying back?  John Iliadis, © 2005 Digital signature laws clearing the path for faster user adoption (and protection) have recently appeared 105
  • 106. Taking up an orphan ■ PKI is an orphan  Science gave birth to a child and gave it up for adoption  Few foster parents around, to take up the child before it passes childhood diseases ■ PKI is a good solution  ...now all we have to do is track down the problem  Be careful: easing ulcer pains with aspirin is a bad idea John Iliadis, © 2005 106
  • 107. Do it or dump it ? ■ Do it!  Childhood diseases are currently being treated  Regulatory frameworks in place, allowing for PKI adoption and protecting dependent entities  Governments a major driving force (EU)  Just remember John Iliadis, © 2005 ➔ Problem first, solution afterwards ➔ PKI or non-PKI, it's about key management, key management and key management 107
  • 108. John Iliadis, © 2005 Q&A 108
  • 109. References (1) ■ Castell S., User's Requirements for Trusted Third Party Services, INFOSEC Project Report S2101/01, CEC/DG XIII/B6, September 1993. ■ W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Transactions, vol IT-22, pages 644-654, 1976. ■ Directive 1999/93/EC of the European Parliament and of the Council on a Community framework for electronic signatures, 13 December 1999, published in the Official Journal of the European Communities, 19 January 2000. ■ Gritzalis, S., Spinellis, D. Addressing Threats and Security Issues in World Wide Web Technology, In Proceedings of the 3rd IFIP International Conference on Communications and Multimedia Security, Chapman & Hall, 1997 ■ Housley R., Ford W., Polk W., Solo D., Internet X.509 Public Key Infrastructure Certificate and CRL Profile, , IETF Network Working Group, Request for Comments 2459 (Category: Standards Track), January 1999, available at http://www.ietf.org/rfc/rfc2459.txt John Iliadis, © 2005 109
  • 110. References (2) ■ ISO Standard 11770 (1996), Information Technology - Security Techniques Key Management - Part 1: Framework. ■ ITU-T Recommendation X.509 (1997) and ISO/IEC 9594-8:1997, Information technology - Open Systems Interconnection, "The Directory: Authentication framework". ■ J. Iliadis, D. Spinellis, S. Katsikas, D. Gritzalis, B. Preneel. "Evaluating Certificate Status Information Mechanisms". In Proceedinds of the 7th ACM Conference on Computer and Communication Security: CCS '2000, pages 1-8. ACM Press, November 2000 ■ Kohnfelder L., Towards a practical public-key cryptosystem, BSc Thesis, M.I.T., Cambridge MA, September 1978. ■ PKITS, CEC-DGXIII-ETS-II project 23192, Deliverable D3 “Public Key Infrastructure with Timestamping Authority”, April 1998. ■ John Iliadis, © 2005 110
  • 111. References (3) ■ Ronald L. Rivest, Adi Shamir, Leonard M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol21, No2, pp.120-126, 1978. ■ Rivest R., Can We Eliminate Revocation Lists?, In Proceedings of Financial Cryptography 1998, available at http://theory.lcs.mit.edu/~rivest/revocation.ps ■ Schneier B., Applied Cryptography, 2nd ed, John Wiley & Sons, 1996. ■ Zhou J., Gollmann D., A Fair Non-repudiation protocol, Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp.55-61, IEEE Computer Society Press, May 1996. ■ Zhou J., Gollmann D., An Efficient Non-repudiation protocol, Proceedings of the 10th IEEE Computer Security Foundations Workshop, pp.126-132, IEEE Computer Society Press, June 1997. John Iliadis, © 2005 111