SlideShare a Scribd company logo
1 of 36
Download to read offline
Reshaping Key Management:
A Tale of Two Decades

John Iliadis, University of the Aegean, 2000
De Facto Joint Research Group on
Information and Communication Systems
Security
Overview






Communication Networks: Now and Then.
New Key Management Paradigm
Certificates
Certificate Management
Intro to TTPs and PKI

John Iliadis, University of the Aegean, 2000

Slide 2/36
Communication Networks:
Now and Then
 Then
–
–

Centralised
Closed


private or semi-private, no access allowed,
 wide spectrum of proprietary
networking/communication protocols,
 expensive,
 targeted user group,
 early Internet instances.
John Iliadis, University of the Aegean, 2000

Slide 3/36
Communication Networks:
Now and Then (cont.)
 Now
–

Distributed


no ownership,
 no central control,
 resilience.
–

Open


access to anyone,
 standardised protocols,
 low-cost access.
John Iliadis, University of the Aegean, 2000

Slide 4/36
Basic Services of
Key Management
 Generate-Key
 Register-Key
 Create-KeyCertificate
 Distribute-Key
 Install-Key
 Store-Key

John Iliadis, University of the Aegean, 2000







Derive-Key
Archive-Key
Revoke-Key
Deregister-Key
Destroy-Key

Slide 5/36
Key Distribution - Symmetric
Cryptosystems





Direct
Key Translation Center
Key Distribution Center
Based on asymmetric techniques
–
–

secret key agreement
secret key transport

John Iliadis, University of the Aegean, 2000

Slide 6/36
Key Translation Center
(symmetric crypto)
1

A

3

KTC

2

B

4

•A->KTC: enciphered key
•KTC->B: sends B re-enciphered key, OR
•KTC->A: sends A re-enciphered key
•A->B: A sends B re-enciphered key
John Iliadis, University of the Aegean, 2000

Slide 7/36
Key Distribution Center
(symmetric crypto)
1

A

2a

KDC

2b

B

•A->KDC: request for shared key
•KDC->A: sends A enciphered shared key
•KDC->B: sends B enciphered shared key
If KDC cannot communicate securely with B (2b),
then A assumes responsibility for distribution of
enciphered shared key to B
John Iliadis, University of the Aegean, 2000

Slide 8/36
Key Distribution in Symmetric
Cryptosystems - A Note
 All mechanisms require the existence of a
shared symmetric or asymmetric key and
an inline Key Center.
Centralised
Closed
Private
Proprietary protocols
Expensive

John Iliadis, University of the Aegean, 2000

Distributed
No ownership
No central control
Resilience
Access to anyone
Standardised protocols
Low-cost access.
Slide 9/36
Key Distribution - Asymmetric
Cryptosystems
 Protected channels (data origin
authentication and data integrity
protection, e.g. courier and registered mail)
 TTP-assisted (i.e. certificates)

John Iliadis, University of the Aegean, 2000

Slide 10/36
Key Distribution - Asymmetric
Cryptosystems (cont.)
CA

1
2
A

3

4

B

•A->CA: KeyA (?)
•CA->A: CertificateA
•CA<->B: CertificateA
•A->B: CertificateA

John Iliadis, University of the Aegean, 2000

Slide 11/36
Key Distribution in Asymmetric
Cryptosystems - A Note
 Mechanisms require the existence of either
an integrity protected channel, or an (at
least) offline TTP*
Centralised
Closed
Private
Proprietary protocols
Expensive
*Other TTP operational requirements, like
revocation, necessitate the online operation of TTPs

John Iliadis, University of the Aegean, 2000

Distributed
No ownership
No central control
Resilience
Access to anyone
Standardised protocols
Low-cost access.
Slide 12/36
Key Distribution - A Final
Note
 The Case of Asymmetric versus Symmetric
Cryptosystems, and vice-versa.
Verdict: Innocent on all charges, both of them.
–

–

there are communications that necessitate symmetric
crypto, like small scale closed networks, top-secret
communication lines (one-time pads) etc.
there are applications that necessitate symmetric
crypto, like encryption. Asymmetric encryption is far
too slow in most cases, either because of huge amount
of data or because of small computational power (e.g.
smart cards)

John Iliadis, University of the Aegean, 2000

Slide 13/36
Key Distribution - A Final
Note (cont.)
 The Case of Asymmetric versus Symmetric
Cryptosystems, and vice-versa.
Verdict 2: The Case should never have been
taken to court!
–

–

There’s no point in excluding or reducing usage of one
of them. Joint usage leads to best results (e.g. Digital
Envelopes, asymmetric based distribution of symmetric
keying material).
There are advantages and disadvantages in both. The
main difference is in key management requirements:
confidentiality against authenticity

John Iliadis, University of the Aegean, 2000

Slide 14/36
Key Distribution - A Final
Note (cont.)
Asymmetric crypto was not invented to meet the
needs of the new, distributed and loosely federated
networking environments. It existed before.
A solution in search of a problem or rather an
application area...

John Iliadis, University of the Aegean, 2000

Slide 15/36
Digital Certificates





Offline authentication token
Third, trusted entity vouches for it
Expiration, revocation
Contents:
–
–
–
–
–
–

identification info of certificate holder
identification info of CA
public key of certificate holder
expiration date
other info (e.g. CSI location info)
signed by CA

John Iliadis, University of the Aegean, 2000

Slide 16/36
Digital Signatures
 Generating certificate-supported signatures
 Non-repudiation
–
–
–

Timestamping
Non-repudiation mechanisms and fair exchange
mechanisms
Underlying legal framework

John Iliadis, University of the Aegean, 2000

Slide 17/36
European Directive on
Electronic Signatures
 Directive aims at technology independence
 Problem: Directive identifies requirements that
fall under the scope of technology (e.g. secure
signature creation devices, Annex III)
 Solution: Define sets of components that comply
with the Directive. Caution needed when defining
these sets; they must not conflict with other,
underlying regulatory frameworks

John Iliadis, University of the Aegean, 2000

Slide 18/36
Secure Signature Creation
Devices
 Hardware tokens
–
–
–

easier to deploy
wide acceptance by public as a «secure» method
degree of security awareness required: low

 Security requirements and evaluation standards
–
–
–

harder to deploy; compliance certification (end-user
systems)?
degree of public confidence: low
degree of security awareness required: high

John Iliadis, University of the Aegean, 2000

Slide 19/36
Secure Signature Creation
Devices (cont.)
 Factors to consider:
–
–
–
–
–

Ease of use,
confidence/acceptance by public,
cost of implementation, operation and maintenance,
security level and assurance,
others...

John Iliadis, University of the Aegean, 2000

Slide 20/36
Main Points in Certificate
Lifecycle






Key generation
Entity Registration
Certificate Distribution
Certificate Archiving
Revocation

John Iliadis, University of the Aegean, 2000

Slide 21/36
Some Threats in Electronic
Transactions





Monitoring of communication lines
Shared key guessing/stealing
Shared key stealing
Unauthorised modification of information in
transit
 Masquerade - Web spoofing
 Password stealing
 Unauthorised access
John Iliadis, University of the Aegean, 2000

Slide 22/36
Insecure Electronic
Transactions

Entity1

Network

Entity2

insecure transaction
John Iliadis, University of the Aegean, 2000

Slide 23/36
Facing Threats
 monitoring of communication lines
Encryption with randomly generated shared session
key
 shared session key stealing/guessing
-cryptographically secure random key generators
-encryption of shared session key with the public key
of the receiving entity
 Non-authorised modification of (in-transit)
information
secure hashing algorithms for message authentication
codes
John Iliadis, University of the Aegean, 2000

Slide 24/36
Facing Threats
 Masquerade - Web spoofing
Exchange of X509v3 certificates and verification
against a Directory
 Password stealing
Passwords are never transmitted in the network
 Unauthorised access
Local ACL. Authentication by certificate
verification

John Iliadis, University of the Aegean, 2000

Slide 25/36
Securing electronic
transactions
Entity1

Network

Issuing certificates

Entity2

Issuing certificates

TTP
secure transaction
insecure transaction
John Iliadis, University of the Aegean, 2000

Slide 26/36
TTP : The Cornerstone of a Public Key
Infrastructure. An Overview
TTP : “an impartial organisation delivering
business confidence, through commercial
and technical security features, to an
electronic transaction”

John Iliadis, University of the Aegean, 2000

Slide 27/36
TTP : The Cornerstone of a Public Key
Infrastructure.
Technical Infrastructure
•
•
•
•
•

Certificate Authority, providing certificates.
Registration Authority, registering users and binding their identities to
certificates.
Repositories, storage and dissemination entities containing TTPrelated public material such as certificates and CRLs.
Certificate holders, holding certificates from CAs which they use in
order to sign or authenticate themselves.
Dependent entities, entities which use the certificates presented by
other entities in order to authenticate the latter or verify their
signature.

John Iliadis, University of the Aegean, 2000

Slide 28/36
TTP : The Cornerstone of a Public Key
Infrastructure.
Technical Infrastructure
TTP

RDBMs

Directory
Services

local
repository
Web
browser

Web Server
John Iliadis, University of the Aegean, 2000

Slide 29/36
PKI





Set of TTPs
Interoperability and corroboration
Legal framework
Value-Added services
–
–
–
–

Timestamping
Information Archiving
Notary Public
...

John Iliadis, University of the Aegean, 2000

Slide 30/36
Fashion Issues concerning PKI
 Current commercial PKI trends
–
–

–

–

It’s fashionable
It’s easy to deploy…Typical installations of TTP
software, withour prior analysis of requirements and
without designing a Security Policy and a Certificate
Policy, are not that far. It happened (is happening?)
with firewalls some time ago...
It meets several security requirements, through a
wide set of security services ranging from
confidentiality to public notary
It’s a panacea!

John Iliadis, University of the Aegean, 2000

Slide 31/36
Fashion Issues concerning PKI
(cont.)
 …however:
–
–
–
–
–
–
–

PKI is nor a cure-all, neither a magical solution to
security problems
Requirements->Services->Functions
->Implementation
Certificate and Security Policy of TTP
Legal framework and regulations
Complexity in design and development
User-awareness needed
Clearly not an InfoSec bandage

John Iliadis, University of the Aegean, 2000

Slide 32/36
Conclusion
 PKI is a panacea for security as much
as aspirin is a panacea for pain.
Easing ulcer pains with aspirin
SHOULD BE AVOIDED AT ALL COSTS...

John Iliadis, University of the Aegean, 2000

Slide 33/36
Areas needing further research








Identification and naming.
Certificate path validation.
Signature policy.
Scalable revocations and scalable suspensions.
Role of notaries.
Trusted archival services.
Use of biometrics in relation to electronic
signatures.

John Iliadis, University of the Aegean, 2000

Slide 34/36
Some interesting problems to
be studied
 Certificate 1
Certificate 2
John Doe
John Doe
org: X
org: Y
org unit: Xu
org unit: Yu
Country: GR
Country: GR
 In general, TTP service-level collaboration has to
be studied further
–
–
–

cross-certification (technical, legal)
revocation
...

John Iliadis, University of the Aegean, 2000

Slide 35/36
References












Branchaud M., "A Survey of Public Key Infrastructures", Msc Thesis Department of Computer
Science McGill University, Montreal, 1997.
Directive 1999/93/EC of the European Parliament and of the Council on a Community framework
for electronic signatures, 13 December 1999, published in the Official Journal of the European
Communities, 19 January 2000.
Housley R., Ford W., Polk W., Solo D., Internet X.509 Public Key Infrastructure Certificate and
CRL Profile, , IETF Network Working Group, Request for Comments 2459 (Category: Standards
Track), January 1999, available at http://www.ietf.org/rfc/rfc2459.txt
ISO Standard 11770 (1996), Information Technology - Security Techniques - Key Management Part 1: Framework.
ITU-T Recommendation X.509 (1997) and ISO/IEC 9594-8:1997, Information technology - Open
Systems Interconnection, "The Directory: Authentication framework".
Kohnfelder L., Towards a practical public-key cryptosystem, BSc Thesis, M.I.T., Cambridge MA,
September 1978.
Ronald L. Rivest, Adi Shamir, Leonard M. Adleman, A Method for Obtaining Digital Signatures
and Public-Key Cryptosystems, Communications of the ACM, vol21, No2, pp.120-126, 1978.
Schneier B., Applied Cryptography, 2nd ed, John Wiley & Sons, 1996.
W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Transactions, vol IT-22, pages
644-654, 1976.

John Iliadis, University of the Aegean, 2000

Slide 36/36

More Related Content

Viewers also liked (8)

Comparison from preliminary to final production front cover
Comparison from preliminary to final production front coverComparison from preliminary to final production front cover
Comparison from preliminary to final production front cover
 
BDPA Indianapolis: HSCC Accelerator
BDPA Indianapolis: HSCC AcceleratorBDPA Indianapolis: HSCC Accelerator
BDPA Indianapolis: HSCC Accelerator
 
Pop Catcher Company Presentation
Pop Catcher Company PresentationPop Catcher Company Presentation
Pop Catcher Company Presentation
 
Go The Franchise Store
Go The Franchise StoreGo The Franchise Store
Go The Franchise Store
 
BDPA Chapter Building Workshop - Week #2
BDPA Chapter Building Workshop - Week #2BDPA Chapter Building Workshop - Week #2
BDPA Chapter Building Workshop - Week #2
 
Portfolio Christopher B Collins @ Metzler / Hull
Portfolio Christopher B Collins @ Metzler / HullPortfolio Christopher B Collins @ Metzler / Hull
Portfolio Christopher B Collins @ Metzler / Hull
 
BDPA and College Students
BDPA and College StudentsBDPA and College Students
BDPA and College Students
 
Bylaws: BDPA Memphis
Bylaws: BDPA MemphisBylaws: BDPA Memphis
Bylaws: BDPA Memphis
 

Similar to Reshaping Key Management: A Tale of Two Decades

SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?Alan Tatourian
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemInductive Automation
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Pierre-Jean Verrando
 
Secure Multicast Conferencing
Secure Multicast ConferencingSecure Multicast Conferencing
Secure Multicast Conferencingblogzilla
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonUlf Mattsson
 
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...Ulf Mattsson
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applicationscmstiernberg
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Brian Proctor - GICSP, CISSP, CRISC
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_Ende77
 

Similar to Reshaping Key Management: A Tale of Two Decades (20)

SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
169
169169
169
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
saag-3.ppt
saag-3.pptsaag-3.ppt
saag-3.ppt
 
Secure Multicast Conferencing
Secure Multicast ConferencingSecure Multicast Conferencing
Secure Multicast Conferencing
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_En
 

More from John ILIADIS

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsJohn ILIADIS
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's PlaygroundJohn ILIADIS
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.John ILIADIS
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsJohn ILIADIS
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeJohn ILIADIS
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security SoftwareJohn ILIADIS
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...John ILIADIS
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A PrimerJohn ILIADIS
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringJohn ILIADIS
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network SecurityJohn ILIADIS
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayJohn ILIADIS
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...John ILIADIS
 

More from John ILIADIS (12)

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's Playground
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It Be
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and Underdelivering
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network Security
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Reshaping Key Management: A Tale of Two Decades

  • 1. Reshaping Key Management: A Tale of Two Decades John Iliadis, University of the Aegean, 2000 De Facto Joint Research Group on Information and Communication Systems Security
  • 2. Overview      Communication Networks: Now and Then. New Key Management Paradigm Certificates Certificate Management Intro to TTPs and PKI John Iliadis, University of the Aegean, 2000 Slide 2/36
  • 3. Communication Networks: Now and Then  Then – – Centralised Closed  private or semi-private, no access allowed,  wide spectrum of proprietary networking/communication protocols,  expensive,  targeted user group,  early Internet instances. John Iliadis, University of the Aegean, 2000 Slide 3/36
  • 4. Communication Networks: Now and Then (cont.)  Now – Distributed  no ownership,  no central control,  resilience. – Open  access to anyone,  standardised protocols,  low-cost access. John Iliadis, University of the Aegean, 2000 Slide 4/36
  • 5. Basic Services of Key Management  Generate-Key  Register-Key  Create-KeyCertificate  Distribute-Key  Install-Key  Store-Key John Iliadis, University of the Aegean, 2000      Derive-Key Archive-Key Revoke-Key Deregister-Key Destroy-Key Slide 5/36
  • 6. Key Distribution - Symmetric Cryptosystems     Direct Key Translation Center Key Distribution Center Based on asymmetric techniques – – secret key agreement secret key transport John Iliadis, University of the Aegean, 2000 Slide 6/36
  • 7. Key Translation Center (symmetric crypto) 1 A 3 KTC 2 B 4 •A->KTC: enciphered key •KTC->B: sends B re-enciphered key, OR •KTC->A: sends A re-enciphered key •A->B: A sends B re-enciphered key John Iliadis, University of the Aegean, 2000 Slide 7/36
  • 8. Key Distribution Center (symmetric crypto) 1 A 2a KDC 2b B •A->KDC: request for shared key •KDC->A: sends A enciphered shared key •KDC->B: sends B enciphered shared key If KDC cannot communicate securely with B (2b), then A assumes responsibility for distribution of enciphered shared key to B John Iliadis, University of the Aegean, 2000 Slide 8/36
  • 9. Key Distribution in Symmetric Cryptosystems - A Note  All mechanisms require the existence of a shared symmetric or asymmetric key and an inline Key Center. Centralised Closed Private Proprietary protocols Expensive John Iliadis, University of the Aegean, 2000 Distributed No ownership No central control Resilience Access to anyone Standardised protocols Low-cost access. Slide 9/36
  • 10. Key Distribution - Asymmetric Cryptosystems  Protected channels (data origin authentication and data integrity protection, e.g. courier and registered mail)  TTP-assisted (i.e. certificates) John Iliadis, University of the Aegean, 2000 Slide 10/36
  • 11. Key Distribution - Asymmetric Cryptosystems (cont.) CA 1 2 A 3 4 B •A->CA: KeyA (?) •CA->A: CertificateA •CA<->B: CertificateA •A->B: CertificateA John Iliadis, University of the Aegean, 2000 Slide 11/36
  • 12. Key Distribution in Asymmetric Cryptosystems - A Note  Mechanisms require the existence of either an integrity protected channel, or an (at least) offline TTP* Centralised Closed Private Proprietary protocols Expensive *Other TTP operational requirements, like revocation, necessitate the online operation of TTPs John Iliadis, University of the Aegean, 2000 Distributed No ownership No central control Resilience Access to anyone Standardised protocols Low-cost access. Slide 12/36
  • 13. Key Distribution - A Final Note  The Case of Asymmetric versus Symmetric Cryptosystems, and vice-versa. Verdict: Innocent on all charges, both of them. – – there are communications that necessitate symmetric crypto, like small scale closed networks, top-secret communication lines (one-time pads) etc. there are applications that necessitate symmetric crypto, like encryption. Asymmetric encryption is far too slow in most cases, either because of huge amount of data or because of small computational power (e.g. smart cards) John Iliadis, University of the Aegean, 2000 Slide 13/36
  • 14. Key Distribution - A Final Note (cont.)  The Case of Asymmetric versus Symmetric Cryptosystems, and vice-versa. Verdict 2: The Case should never have been taken to court! – – There’s no point in excluding or reducing usage of one of them. Joint usage leads to best results (e.g. Digital Envelopes, asymmetric based distribution of symmetric keying material). There are advantages and disadvantages in both. The main difference is in key management requirements: confidentiality against authenticity John Iliadis, University of the Aegean, 2000 Slide 14/36
  • 15. Key Distribution - A Final Note (cont.) Asymmetric crypto was not invented to meet the needs of the new, distributed and loosely federated networking environments. It existed before. A solution in search of a problem or rather an application area... John Iliadis, University of the Aegean, 2000 Slide 15/36
  • 16. Digital Certificates     Offline authentication token Third, trusted entity vouches for it Expiration, revocation Contents: – – – – – – identification info of certificate holder identification info of CA public key of certificate holder expiration date other info (e.g. CSI location info) signed by CA John Iliadis, University of the Aegean, 2000 Slide 16/36
  • 17. Digital Signatures  Generating certificate-supported signatures  Non-repudiation – – – Timestamping Non-repudiation mechanisms and fair exchange mechanisms Underlying legal framework John Iliadis, University of the Aegean, 2000 Slide 17/36
  • 18. European Directive on Electronic Signatures  Directive aims at technology independence  Problem: Directive identifies requirements that fall under the scope of technology (e.g. secure signature creation devices, Annex III)  Solution: Define sets of components that comply with the Directive. Caution needed when defining these sets; they must not conflict with other, underlying regulatory frameworks John Iliadis, University of the Aegean, 2000 Slide 18/36
  • 19. Secure Signature Creation Devices  Hardware tokens – – – easier to deploy wide acceptance by public as a «secure» method degree of security awareness required: low  Security requirements and evaluation standards – – – harder to deploy; compliance certification (end-user systems)? degree of public confidence: low degree of security awareness required: high John Iliadis, University of the Aegean, 2000 Slide 19/36
  • 20. Secure Signature Creation Devices (cont.)  Factors to consider: – – – – – Ease of use, confidence/acceptance by public, cost of implementation, operation and maintenance, security level and assurance, others... John Iliadis, University of the Aegean, 2000 Slide 20/36
  • 21. Main Points in Certificate Lifecycle      Key generation Entity Registration Certificate Distribution Certificate Archiving Revocation John Iliadis, University of the Aegean, 2000 Slide 21/36
  • 22. Some Threats in Electronic Transactions     Monitoring of communication lines Shared key guessing/stealing Shared key stealing Unauthorised modification of information in transit  Masquerade - Web spoofing  Password stealing  Unauthorised access John Iliadis, University of the Aegean, 2000 Slide 22/36
  • 23. Insecure Electronic Transactions Entity1 Network Entity2 insecure transaction John Iliadis, University of the Aegean, 2000 Slide 23/36
  • 24. Facing Threats  monitoring of communication lines Encryption with randomly generated shared session key  shared session key stealing/guessing -cryptographically secure random key generators -encryption of shared session key with the public key of the receiving entity  Non-authorised modification of (in-transit) information secure hashing algorithms for message authentication codes John Iliadis, University of the Aegean, 2000 Slide 24/36
  • 25. Facing Threats  Masquerade - Web spoofing Exchange of X509v3 certificates and verification against a Directory  Password stealing Passwords are never transmitted in the network  Unauthorised access Local ACL. Authentication by certificate verification John Iliadis, University of the Aegean, 2000 Slide 25/36
  • 26. Securing electronic transactions Entity1 Network Issuing certificates Entity2 Issuing certificates TTP secure transaction insecure transaction John Iliadis, University of the Aegean, 2000 Slide 26/36
  • 27. TTP : The Cornerstone of a Public Key Infrastructure. An Overview TTP : “an impartial organisation delivering business confidence, through commercial and technical security features, to an electronic transaction” John Iliadis, University of the Aegean, 2000 Slide 27/36
  • 28. TTP : The Cornerstone of a Public Key Infrastructure. Technical Infrastructure • • • • • Certificate Authority, providing certificates. Registration Authority, registering users and binding their identities to certificates. Repositories, storage and dissemination entities containing TTPrelated public material such as certificates and CRLs. Certificate holders, holding certificates from CAs which they use in order to sign or authenticate themselves. Dependent entities, entities which use the certificates presented by other entities in order to authenticate the latter or verify their signature. John Iliadis, University of the Aegean, 2000 Slide 28/36
  • 29. TTP : The Cornerstone of a Public Key Infrastructure. Technical Infrastructure TTP RDBMs Directory Services local repository Web browser Web Server John Iliadis, University of the Aegean, 2000 Slide 29/36
  • 30. PKI     Set of TTPs Interoperability and corroboration Legal framework Value-Added services – – – – Timestamping Information Archiving Notary Public ... John Iliadis, University of the Aegean, 2000 Slide 30/36
  • 31. Fashion Issues concerning PKI  Current commercial PKI trends – – – – It’s fashionable It’s easy to deploy…Typical installations of TTP software, withour prior analysis of requirements and without designing a Security Policy and a Certificate Policy, are not that far. It happened (is happening?) with firewalls some time ago... It meets several security requirements, through a wide set of security services ranging from confidentiality to public notary It’s a panacea! John Iliadis, University of the Aegean, 2000 Slide 31/36
  • 32. Fashion Issues concerning PKI (cont.)  …however: – – – – – – – PKI is nor a cure-all, neither a magical solution to security problems Requirements->Services->Functions ->Implementation Certificate and Security Policy of TTP Legal framework and regulations Complexity in design and development User-awareness needed Clearly not an InfoSec bandage John Iliadis, University of the Aegean, 2000 Slide 32/36
  • 33. Conclusion  PKI is a panacea for security as much as aspirin is a panacea for pain. Easing ulcer pains with aspirin SHOULD BE AVOIDED AT ALL COSTS... John Iliadis, University of the Aegean, 2000 Slide 33/36
  • 34. Areas needing further research        Identification and naming. Certificate path validation. Signature policy. Scalable revocations and scalable suspensions. Role of notaries. Trusted archival services. Use of biometrics in relation to electronic signatures. John Iliadis, University of the Aegean, 2000 Slide 34/36
  • 35. Some interesting problems to be studied  Certificate 1 Certificate 2 John Doe John Doe org: X org: Y org unit: Xu org unit: Yu Country: GR Country: GR  In general, TTP service-level collaboration has to be studied further – – – cross-certification (technical, legal) revocation ... John Iliadis, University of the Aegean, 2000 Slide 35/36
  • 36. References          Branchaud M., "A Survey of Public Key Infrastructures", Msc Thesis Department of Computer Science McGill University, Montreal, 1997. Directive 1999/93/EC of the European Parliament and of the Council on a Community framework for electronic signatures, 13 December 1999, published in the Official Journal of the European Communities, 19 January 2000. Housley R., Ford W., Polk W., Solo D., Internet X.509 Public Key Infrastructure Certificate and CRL Profile, , IETF Network Working Group, Request for Comments 2459 (Category: Standards Track), January 1999, available at http://www.ietf.org/rfc/rfc2459.txt ISO Standard 11770 (1996), Information Technology - Security Techniques - Key Management Part 1: Framework. ITU-T Recommendation X.509 (1997) and ISO/IEC 9594-8:1997, Information technology - Open Systems Interconnection, "The Directory: Authentication framework". Kohnfelder L., Towards a practical public-key cryptosystem, BSc Thesis, M.I.T., Cambridge MA, September 1978. Ronald L. Rivest, Adi Shamir, Leonard M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol21, No2, pp.120-126, 1978. Schneier B., Applied Cryptography, 2nd ed, John Wiley & Sons, 1996. W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Transactions, vol IT-22, pages 644-654, 1976. John Iliadis, University of the Aegean, 2000 Slide 36/36