SlideShare a Scribd company logo
1 of 23
Public Key Infrastructure 101:
A Security Manager’s Survival Guide

             Tim Polk
         November 29, 2001
Why, What, How, and How-not
• What a manager needs to know about PKI:
  –   Why build a PKI?
  –   What is a PKI?
  –   How do I deploy a PKI?
  –   What are some common pitfalls to avoid? (The
      How-Not of PKI)
Symmetric, or Secret Key,
         Cryptography
• Sharing secret keys is
  – Difficult to get started: Alice needs to go see
    Bob before she can send him a secret message.
  – Hard to scale: If Alice wants to send a message
    to Carol, she has to start over with a new secret.
  – An oxymoron: If Alice and Bob both have the
    key is it really secret? Alice has to trust Bob
    completely
Asymmetric, or Public Key,
         Cryptography
• There are no shared secret keys
• There are lots and lots of public keys
  – Each person has their own key pair(s), with a
    private (really!) key and a public key
• Alice has two burning questions
  – “Who’s key is this anyway?”
  – “Is this key still valid?”
Public Key Infrastructure
• A PKI answers Alice’s burning questions so
  she can use public key cryptography to
  achieve security with lots of people
  – Certificates bind an identity to a public key
     • This is Bob’s RSA public key
  – Certificate Revocation Lists (CRLs) are the list
    of certificates Alice shouldn’t trust
Public Key Infrastructure
             Components
• There are four basic infrastructure components
   – Certification Authority (CA) – generates certificates
     and CRLs
   – Registration Authority (RA) – checks users identity to
     ensure binding is correct
   – Directory – database of certificates and CRLs
   – Archive – keeps old certificates and CRLs for use in
     distant future
• If Alice trusts a particular CA, she can use its
  certificates to protect information
X.509 Certificate
• Tamper-evident package                  Bob’s Certificate
  (CA’s digital signature)                Issued by CA-2
                              CA-2’s
• Contents include           Public Key
                                            Serial #: 5
                                            Subject: Bob

  –   Serial number                         Public Key:


  –   Subject (user) name                  From: 02-28-01
                                           To: 02-28-03
  –   Validity period
                                               Signature
  –   Optional information                       CA-2


      (extensions)
X.509 Certificate Revocation List
• Analogous to the credit                 CRL Issued by CA-2
  card “hot list”
                              CA-2’s
• Issuer’s un-expired                      Serial
                             Public Key    Numbers:
                                           7, 17, 29, 47,

  certificates that aren’t                 53, 67

                                          Next update:

  trustworthy (a.k.a.,                    12-01-01



  “revoked”)                                  Signature
                                                CA-2
X.509 Certification Path

                       CA-2’s Certificate   Bob’s Certificate   Document Signed
                        Issued by CA-1      Issued by CA-2          By Bob

Alice’s Trusted CA-1
                        Subject: CA2         Subject: Bob        Alice,
     Public Key
                       Public Key:          Public Key:          500 widgets
                                                                 would cost
                                                                  $500000.00

                            Signature            Signature          Signature
                              CA-1                 CA-2               Bob
Achieving Security with PKI:
     An Encryption Example
• Alice creates a key pair and goes to the RA to
  request a certificate
• The RA checks her ID and requests the certificate
  from the CA
• The CA posts it in the directory
• Bob gets the certificate from the directory
• Bob verifies her certificate, makes sure its not on
  the CRL, and uses her public key to send her a
  secret message
Achieving Security with PKI:
   A Digital Signature Example
• Alice creates a key pair and goes to the RA to
  request a certificate
• The RA checks her ID and requests the certificate
  from the CA
• The CA posts it in the directory
• Alice uses her private key to sign a message
• Bob gets the certificate from the directory
• Bob verifies her certificate, makes sure its not on
  the CRL, and uses the public key to verify her
  signature
Policy and Procedures
• A PKI is only as strong as the policies and
  procedures that govern its operations
   – Certificate Policy (CP)
      • Describes the security policy for issuing certificates and
        maintaining certificate status information
   – Certification Practice Statement (CPS)
      • Describes how a CA implements a particular CP
   – Compliance analysis
      • Verifies that a CPS meets a CP
   – Certification and Accreditation
      • Verifies that a CA is performing the procedures described in
        its CPS.
So, You Want To Deploy A PKI
• Simple Steps:
   –   Categorize the information you’re protecting
   –   Develop an appropriate CP
   –   Select your PKI products
   –   Draft a CPS
   –   Compliance analysis
   –   Begin pre-production operations
   –   Certification & Accreditation
• You’re in business!
Categorize the information and
 applications you’re protecting
• What can go wrong: Requirements Creep
  – Everyone wants a PKI to solve all the security
    problems in an organization
  – A PKI that is appropriate for million dollar
    fund transfers will be overkill for Alice’s
    personal messages to Bob
• Solution: Solve the 80% that’s easy
Develop an Appropriate CP
• What can go wrong:
  – There is a temptation for perfection, resulting in
    complex and expensive PKIs.
• Solution:
  – Examine the level of security afforded this data
    today. Strive for cost-effect improvements.
Select PKI Products
• What can go wrong:
  – Products do not include technical mechanisms
    to implement your CP (e.g., two person control)
  – CA product does not support your applications
• Solutions:
  – Compensate with physical and procedural
    controls in the CPS
  – Factor support for target applications into the
    procurement process
Draft a CPS
• What can go wrong:
  – No one wants to operate/house/support the CA
  – No one wants to be the RA
  – Everyone wants to use your directory for their
    applications
• Solutions:
  – Get upper management buy-in
  – Limit directory responsibility to PKI
Compliance Analysis (1 of 3)
• What can go wrong:
  – The CP was too specific and boxed you in to
    inappropriate procedures
• Solution:
  – Rewrite the CP to describe your goals, then
    write a CPS that meets those goals through
    sensible procedures
Compliance Analysis (2 of 3)
• What can go wrong:
  – The CP was too specific and PKI products just
    don’t work that way
• Solutions:
  – If you wrote the CP first, use it as part of your
    procurement specification
  – If you bought the CA first, understand its
    mechanisms before writing the CP
Compliance Analysis (3 of 3)
• What can go wrong:
  – The CPS doesn’t match the CP
• Solution:
  – Revise either the CP or CPS until you get it
    right
Certification and Accreditation
• What can go wrong:
  – System is not being operated according to the
    CPS
• Solutions:
  – Use the CPS as the basis for your own
    operations manuals
  – Training, Training, Training
Summary
• PKI enables ubiquitous security services through
  public key cryptography.
• The technical mechanisms for PKI are well
  understood and the products work.
• The policies and procedures that make PKI work
  can be complicated, and common mistakes
  compound the problems
• The problems are avoidable, and PKI can work for
  you and your agency
For More Information
Tim Polk 301-975-3348, tim.polk@nist.gov
Draft NIST publication: An Introduction to Public
  Key Technology and the Federal PKI
  http://csrc.nist.gov/publications/drafts/pki-draft.pdf
The NIST PKI website http://csrc.nist.gov/pki
The Federal PKI Technical Working Group
  http://csrc.nist.gov/pki/twg
The Federal PKI Steering Committee
  http://www.cio.gov/fpkisc/

More Related Content

Viewers also liked

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Ismail Rachdaoui
 
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...Gerson Rolim
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKIChin Wan Lim
 
FIDO, PKI & beyond: Where Authentication Meets Identification
 FIDO, PKI & beyond: Where Authentication Meets Identification FIDO, PKI & beyond: Where Authentication Meets Identification
FIDO, PKI & beyond: Where Authentication Meets IdentificationFIDO Alliance
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Tema 3 acabado!.
Tema 3 acabado!.Tema 3 acabado!.
Tema 3 acabado!.pabloteba
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityT.Rob Wyatt
 

Viewers also liked (12)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI) Resource Public Key Infrastructure (RPKI)
Resource Public Key Infrastructure (RPKI)
 
Partnerek vagyunk az úton
Partnerek vagyunk az útonPartnerek vagyunk az úton
Partnerek vagyunk az úton
 
Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)Building basic public key infrastucture (PKI)
Building basic public key infrastucture (PKI)
 
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
eID and e-Signature (PKI) in Mercosul - Tools to support eGovernment and eBus...
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
FIDO, PKI & beyond: Where Authentication Meets Identification
 FIDO, PKI & beyond: Where Authentication Meets Identification FIDO, PKI & beyond: Where Authentication Meets Identification
FIDO, PKI & beyond: Where Authentication Meets Identification
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Tema 3 acabado!.
Tema 3 acabado!.Tema 3 acabado!.
Tema 3 acabado!.
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of Mediocrity
 

Similar to PKI101 polk

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2Alfred Ouyang
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
EC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIEC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIParnashreeSaha
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureTiago Mendo
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureLuis Grangeia
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Chris Gates
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxRAMESHMRA21130030110
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptMehediHasanShaon1
 
Public Key Infrastructures
Public Key InfrastructuresPublic Key Infrastructures
Public Key InfrastructuresZefren Edior
 
Crypto Analysis slides presentation slides
Crypto Analysis slides presentation slidesCrypto Analysis slides presentation slides
Crypto Analysis slides presentation slidestahirsaleem54
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.pptIshaKanwal4
 
Масштабируя TLS
Масштабируя TLSМасштабируя TLS
Масштабируя TLSQrator Labs
 

Similar to PKI101 polk (20)

grid authentication
grid authenticationgrid authentication
grid authentication
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
5 Cryptography Part2
5 Cryptography Part25 Cryptography Part2
5 Cryptography Part2
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.ppt
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Burt Kaliski RSA conference 2007
Burt Kaliski RSA conference 2007Burt Kaliski RSA conference 2007
Burt Kaliski RSA conference 2007
 
EC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIEC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKI
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptx
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
 
Public Key Infrastructures
Public Key InfrastructuresPublic Key Infrastructures
Public Key Infrastructures
 
Crypto Analysis slides presentation slides
Crypto Analysis slides presentation slidesCrypto Analysis slides presentation slides
Crypto Analysis slides presentation slides
 
Lec 10 - Key Management.ppt
Lec 10 - Key Management.pptLec 10 - Key Management.ppt
Lec 10 - Key Management.ppt
 
Масштабируя TLS
Масштабируя TLSМасштабируя TLS
Масштабируя TLS
 

More from Avirot Mitamura

Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Avirot Mitamura
 
Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921Avirot Mitamura
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session HijackingCEH - Module 11 : Session Hijacking
CEH - Module 11 : Session HijackingAvirot Mitamura
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceAvirot Mitamura
 
CEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsCEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsAvirot Mitamura
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System HackingAvirot Mitamura
 
CEH - Module4 : Enumeration
CEH - Module4 : EnumerationCEH - Module4 : Enumeration
CEH - Module4 : EnumerationAvirot Mitamura
 
Kingdom of Thailand - visa
Kingdom of Thailand - visaKingdom of Thailand - visa
Kingdom of Thailand - visaAvirot Mitamura
 
Preparation company limited registration
Preparation company limited registrationPreparation company limited registration
Preparation company limited registrationAvirot Mitamura
 
Elevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic ThinkingElevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic ThinkingAvirot Mitamura
 
Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453Avirot Mitamura
 
Rising to Power of Exceptional Executives
Rising to Power of Exceptional ExecutivesRising to Power of Exceptional Executives
Rising to Power of Exceptional ExecutivesAvirot Mitamura
 
Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3Avirot Mitamura
 
Excise department project_fin
Excise department project_finExcise department project_fin
Excise department project_finAvirot Mitamura
 
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550Avirot Mitamura
 
Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550Avirot Mitamura
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 

More from Avirot Mitamura (20)

Rpa case study 2020 r1
Rpa case study 2020 r1Rpa case study 2020 r1
Rpa case study 2020 r1
 
Ui path rpa_intro_v1
Ui path rpa_intro_v1Ui path rpa_intro_v1
Ui path rpa_intro_v1
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921Mental illness-at-work-race-en-20921
Mental illness-at-work-race-en-20921
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
CEH - Module 11 : Session Hijacking
CEH - Module 11 : Session HijackingCEH - Module 11 : Session Hijacking
CEH - Module 11 : Session Hijacking
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
CEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and BackdoorsCEH - Module 6 : Trojans and Backdoors
CEH - Module 6 : Trojans and Backdoors
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System Hacking
 
CEH - Module4 : Enumeration
CEH - Module4 : EnumerationCEH - Module4 : Enumeration
CEH - Module4 : Enumeration
 
Kingdom of Thailand - visa
Kingdom of Thailand - visaKingdom of Thailand - visa
Kingdom of Thailand - visa
 
Preparation company limited registration
Preparation company limited registrationPreparation company limited registration
Preparation company limited registration
 
Elevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic ThinkingElevate - Three Disciplines of Strategic Thinking
Elevate - Three Disciplines of Strategic Thinking
 
Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453Lead with-humility-krames-en-22453
Lead with-humility-krames-en-22453
 
Rising to Power of Exceptional Executives
Rising to Power of Exceptional ExecutivesRising to Power of Exceptional Executives
Rising to Power of Exceptional Executives
 
Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3Imperial violet by poodle attacks on ss-lv3
Imperial violet by poodle attacks on ss-lv3
 
Excise department project_fin
Excise department project_finExcise department project_fin
Excise department project_fin
 
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
คู่มือจัดทำแผนแม่บทของกระทรวง ICT 2550
 
Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550Executive presentation [4] - NHSO IT Master Plan B.C.2550
Executive presentation [4] - NHSO IT Master Plan B.C.2550
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

PKI101 polk

  • 1. Public Key Infrastructure 101: A Security Manager’s Survival Guide Tim Polk November 29, 2001
  • 2. Why, What, How, and How-not • What a manager needs to know about PKI: – Why build a PKI? – What is a PKI? – How do I deploy a PKI? – What are some common pitfalls to avoid? (The How-Not of PKI)
  • 3. Symmetric, or Secret Key, Cryptography • Sharing secret keys is – Difficult to get started: Alice needs to go see Bob before she can send him a secret message. – Hard to scale: If Alice wants to send a message to Carol, she has to start over with a new secret. – An oxymoron: If Alice and Bob both have the key is it really secret? Alice has to trust Bob completely
  • 4. Asymmetric, or Public Key, Cryptography • There are no shared secret keys • There are lots and lots of public keys – Each person has their own key pair(s), with a private (really!) key and a public key • Alice has two burning questions – “Who’s key is this anyway?” – “Is this key still valid?”
  • 5. Public Key Infrastructure • A PKI answers Alice’s burning questions so she can use public key cryptography to achieve security with lots of people – Certificates bind an identity to a public key • This is Bob’s RSA public key – Certificate Revocation Lists (CRLs) are the list of certificates Alice shouldn’t trust
  • 6. Public Key Infrastructure Components • There are four basic infrastructure components – Certification Authority (CA) – generates certificates and CRLs – Registration Authority (RA) – checks users identity to ensure binding is correct – Directory – database of certificates and CRLs – Archive – keeps old certificates and CRLs for use in distant future • If Alice trusts a particular CA, she can use its certificates to protect information
  • 7. X.509 Certificate • Tamper-evident package Bob’s Certificate (CA’s digital signature) Issued by CA-2 CA-2’s • Contents include Public Key Serial #: 5 Subject: Bob – Serial number Public Key: – Subject (user) name From: 02-28-01 To: 02-28-03 – Validity period Signature – Optional information CA-2 (extensions)
  • 8. X.509 Certificate Revocation List • Analogous to the credit CRL Issued by CA-2 card “hot list” CA-2’s • Issuer’s un-expired Serial Public Key Numbers: 7, 17, 29, 47, certificates that aren’t 53, 67 Next update: trustworthy (a.k.a., 12-01-01 “revoked”) Signature CA-2
  • 9. X.509 Certification Path CA-2’s Certificate Bob’s Certificate Document Signed Issued by CA-1 Issued by CA-2 By Bob Alice’s Trusted CA-1 Subject: CA2 Subject: Bob Alice, Public Key Public Key: Public Key: 500 widgets would cost $500000.00 Signature Signature Signature CA-1 CA-2 Bob
  • 10. Achieving Security with PKI: An Encryption Example • Alice creates a key pair and goes to the RA to request a certificate • The RA checks her ID and requests the certificate from the CA • The CA posts it in the directory • Bob gets the certificate from the directory • Bob verifies her certificate, makes sure its not on the CRL, and uses her public key to send her a secret message
  • 11. Achieving Security with PKI: A Digital Signature Example • Alice creates a key pair and goes to the RA to request a certificate • The RA checks her ID and requests the certificate from the CA • The CA posts it in the directory • Alice uses her private key to sign a message • Bob gets the certificate from the directory • Bob verifies her certificate, makes sure its not on the CRL, and uses the public key to verify her signature
  • 12. Policy and Procedures • A PKI is only as strong as the policies and procedures that govern its operations – Certificate Policy (CP) • Describes the security policy for issuing certificates and maintaining certificate status information – Certification Practice Statement (CPS) • Describes how a CA implements a particular CP – Compliance analysis • Verifies that a CPS meets a CP – Certification and Accreditation • Verifies that a CA is performing the procedures described in its CPS.
  • 13. So, You Want To Deploy A PKI • Simple Steps: – Categorize the information you’re protecting – Develop an appropriate CP – Select your PKI products – Draft a CPS – Compliance analysis – Begin pre-production operations – Certification & Accreditation • You’re in business!
  • 14. Categorize the information and applications you’re protecting • What can go wrong: Requirements Creep – Everyone wants a PKI to solve all the security problems in an organization – A PKI that is appropriate for million dollar fund transfers will be overkill for Alice’s personal messages to Bob • Solution: Solve the 80% that’s easy
  • 15. Develop an Appropriate CP • What can go wrong: – There is a temptation for perfection, resulting in complex and expensive PKIs. • Solution: – Examine the level of security afforded this data today. Strive for cost-effect improvements.
  • 16. Select PKI Products • What can go wrong: – Products do not include technical mechanisms to implement your CP (e.g., two person control) – CA product does not support your applications • Solutions: – Compensate with physical and procedural controls in the CPS – Factor support for target applications into the procurement process
  • 17. Draft a CPS • What can go wrong: – No one wants to operate/house/support the CA – No one wants to be the RA – Everyone wants to use your directory for their applications • Solutions: – Get upper management buy-in – Limit directory responsibility to PKI
  • 18. Compliance Analysis (1 of 3) • What can go wrong: – The CP was too specific and boxed you in to inappropriate procedures • Solution: – Rewrite the CP to describe your goals, then write a CPS that meets those goals through sensible procedures
  • 19. Compliance Analysis (2 of 3) • What can go wrong: – The CP was too specific and PKI products just don’t work that way • Solutions: – If you wrote the CP first, use it as part of your procurement specification – If you bought the CA first, understand its mechanisms before writing the CP
  • 20. Compliance Analysis (3 of 3) • What can go wrong: – The CPS doesn’t match the CP • Solution: – Revise either the CP or CPS until you get it right
  • 21. Certification and Accreditation • What can go wrong: – System is not being operated according to the CPS • Solutions: – Use the CPS as the basis for your own operations manuals – Training, Training, Training
  • 22. Summary • PKI enables ubiquitous security services through public key cryptography. • The technical mechanisms for PKI are well understood and the products work. • The policies and procedures that make PKI work can be complicated, and common mistakes compound the problems • The problems are avoidable, and PKI can work for you and your agency
  • 23. For More Information Tim Polk 301-975-3348, tim.polk@nist.gov Draft NIST publication: An Introduction to Public Key Technology and the Federal PKI http://csrc.nist.gov/publications/drafts/pki-draft.pdf The NIST PKI website http://csrc.nist.gov/pki The Federal PKI Technical Working Group http://csrc.nist.gov/pki/twg The Federal PKI Steering Committee http://www.cio.gov/fpkisc/