+ All Categories
Home > Documents > PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr...

PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr...

Date post: 10-May-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
46
Wes Hubert Information Services The University of Kansas PKI: Public Key Infrastructure What is it, and why should I care? Conference on Higher Education Computing in Kansas June 3, 2004
Transcript
Page 1: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Wes HubertInformation Services

The University of Kansas

PKI: Public Key Infrastructure

What is it, and why should I care?

Conference on Higher EducationComputing in KansasJune 3, 2004

Page 2: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Why?

Page 3: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

PKI adoption will continue growing to support highly sensitive or regulated

business processes. However, the dream of using it for general-purpose

authentication and ubiquitous digital signatures is still several years in the

future and not a certainty.

Public Key Infrastructure: Making Progress, But Many Challenges RemainDan Blum and Gerry Gebel, Burton GroupMarch 2003 ECAR report

Page 4: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

PKI adoption hurdles are lower than ever, and the benefits are greater than ever.

The time has come to stop studying and testing and take the plunge.

EDUCAUSE Review March/April 2004

PKI: A Technology Whose Time Has Come in Higher EducationMark Franklin, Larry Levine, Denise Anthony, and Robert BrentrupDartmouth College

Page 5: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

You should know enough about PKI to determine which view applies to your

current situation.

Page 6: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

BenefitsStrong authentication

HIPAA, FERPA, etc.

Protection from “sniffing” attacks

S/MIME secure email

Signing, encryption

Work with other PKI developments

Inter-university use of PKI

Kansas government PKI use

Grant signing requirements

Page 7: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Hurdles

Certification Authority Issues

Outsource, Buy, or Build?

Key/Certificate Management

Policy Development

Registration of users (vetting)

Finding compatible applications

User key management

Page 8: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Common PKI UseEstablishing SSL Connections

Authenticates web server to browser

Uses CA root built into browser

University buys certificates from CA

Protection is only for data transfer

Does not authenticate user

Does not authenticate a specific service

User-level: Individual CA Certs/Keys

Page 9: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Non-PKI Keys/Certificates

Argus Server Authentication

Certificates for server-to-server authentication

Locally generated keys and certs

No direct user involvement

Argus User Authentication

NOT certificate-based

User-level: PGP, GPG, SSH

Page 10: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Higher Education Organizations for PKINMI-EDIT

NSF Middleware Initiative Enterprise and Desktop Integration Technologies

Members

EDUCAUSE

Internet 2

SURA (SE Univ Research Assoc)

HEPKI-TAG

Coordinates many PKI developments

Page 11: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Higher Education Initiatives

USHER

US Higher Education Root

Follow-on to CREN as CA

InCommon

Shibboleth Federation

CA Signs Institutional Shib Certs

HEBCA

Higher Education Bridge Certification Authority

Page 12: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

USHER Certificates

Low

Few constraints on campus operations

Suitable for many campus needs

Good for learning

Basic

CP places more constraints on use

HEBCA peering

Both will issue only institutional certs

Page 13: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

HEBCA Trust

HEBCA

HECPInCommon

Campus Campus

HECA

FBCA

Fd Root CA

Agency CAAgency CA

Page 14: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Kansas Government PKIDistributed across several agencies

Information Technology Executive Council (ITEC)

Responsible for Kansas Certificate Policy

Office of Secretary of State (SOS)

Responsible for CA services contract

Information Network of Kansas (INK)

Responsible for KS Info Consortium contract

KIC manages official state web site

www.accesskansas.org

Page 15: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Kansas Government PKIDistributed across several agencies

General state PKI information online at: http://da.state.ks.us/itab/PKIMain.htm

Agencies using service act as Local Registration Authority

Current end-entity certs $40/year

Page 16: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Kansas Government PKI

Agencies using PKI

State Treasurer’s Office

“The Vault” Extranet

Department of Revenue

E-Lein

Department of Transportation

Page 17: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Kansas Government PKI

Identity Management Security Levels

Level 1

Virtual Vetting (no physical presence)

Level 2

Physical Vetting; LRA

Level 3, 4

Not yet issuing

Page 18: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Kansas Statutes

Chapter 16. Contracts and PromisesArticle 16. Electronic Transactions

Electronic Signature [16-1602(i)]

Digital Signature [16-1602(e)]

If a law requires a signature, an electronic signature satisfies the law. [16-1607(d)]

http://www.kslegislature.org/cgi-bin/statutes/index.cgi/

Page 19: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Electronic Signature

... an electronic sound, symbol or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record.

Page 20: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Digital Signature

... a type of electronic signature consisting of a transformation of an electronic message using an asymmetric crypto system such that a person having the initial message and the signer's public key can accurately determine whether: ! ! ! (1) ! The transformation was created using the private key that corresponds to the signer's public key; and ! ! ! (2) ! the initial message has not been altered since the transformation was made.

Page 21: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Given a choice between security and convenience,

users will choose convenience.

Page 22: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

A system of CAs (and, optionally, RAs and other supporting servers and agents) that perform some set of certificate management, archive

management, key management, and token management functions for a

community of users in an application of asymmetric cryptography.

Public Key Infrastructure

(RFC2828 Definition)

Page 23: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Traditional Cryptography

Symmetric

Same key that encrypts, decrypts

Key is always secret

Problems

Exchanging key with trusted parties

Same key gives everyone access

Access includes ability to modify

Page 24: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Traditional Cryptography

DES (Data Encryption Standard)

IBM, NIST, NSA 1970s

56-bit key

Triple DES, 112-bit effective key size

AES (Advanced Encryption Standard)

Rijndael

128/192/256-bit key sizes

Page 25: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Public Key Cryptography

Diffie-Hellman 1976

Asymmetric

Two keys: one private, one public

Each decrypts what other encrypts

Problems

Much slower than symmetric

Key management

Page 26: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Public Keys Provide

Confidentiality

Protection again unauthorized access

Integrity

Protection against unauthorized changes

Authentication

Verification of an identity

Nonrepudiation

Cannot deny private key was used

Page 27: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Key Management

Generating Keys

Authenticating Public Keys

Distributing Keys

Page 28: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Generating KeysKeys are generated in pairs

Private/Public

Keeping private keys secret

Ideally no one but owner ever has key

Problems

convenience

escrow

recovery

Page 29: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Authenticating Public KeysX.509 Certificates

Bind public keys to identity information

Contents Include

Version Number

Public Key

Owner’s Name

Initial / Final Dates Valid

... other information ...

Signed by issuing CA

Page 30: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Digital Credentials

Private Key

For exclusive use of owner

MUST be kept secure

Public Key Certificate

Available to everyone

Links key with owner’s identity

Trust must be established somehow

Page 31: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Distributing CredentialsPKCS#12

Standard for secure transportation of user identity information

Wraps data in password-protected object

Content can include

Keys

Certificates

Passwords

Page 32: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

PKCS#12 Package

X.509 Certificate

Public Key

Identity Info

Other Info

CA Signature

Private Key

Credential Package

Page 33: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Certificate ManagementDistribution

User to user (e.g. email)

LDAP directories

Revoking Certificates

Certificate Revocation Lists (CRL)

Online Cert Status Protocol (OCSP)

Keys and Certificates are not the same

Certificates not used for private keys

Page 34: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Credential GenerationKey Generation

Private Key Public Key ID Information

CertificateSigningRequest

Public Key Certificate

CA Private Key

CA Signing

PKCS#12Generation

PKCS#12ObjectPackage

Page 35: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Public Key Infrastructure

Solves some problems of public keys

Establishing owner’s identity

Defining validity dates, uses

Based on trusted third party

Signing may be through multiple levels

CA cert may sign other CA certs

Must end at trusted root CA

Page 36: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Certification Authority Functions

Register Users

Directly or through Registration Authority

Issue Public Key Certificates

Revoke Certificates

Publish revocation information

Archive Key and Certificate Data

Retrieve archives when appropriate

May or may not ever have user private key

Page 37: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Policies and ProceduresCertificate Policy Statement

Broad specification of policy objectives

Accepted by CA & relying party

Certification Practices Statement

Detailed practices for issuing certificates

Certificate lifetime, revocation, etc.

Page 38: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

KU as Certification Authority

Strong authentication for campus services

Registration already done via Registrar & Human Resources

A natural extension of current I/A/A activity

KU Online ID, AMS, Argus, LDAP

Policy framework: EDUCAUSE, I2

Build on open source foundation

Page 39: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

KU Root CA

KU Intermediate CA

KU Institutional CA

User Certificates

KU Personal CA

User Certificates

Other potential uses

KU Certificate Hierarchy

Page 40: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

KU Root Certificate

Available on web at:

https://www.ku.edu/kuca

Currently root/anchor certificate

Must be installed into client system

Plan USHER-based path in future

Corresponding private key:

Used only to sign Intermediate CA Cert

Now stored only on encrypted CD

Page 41: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

KU Digital Credential Process

Action Initiated by LocationTest Request User Web

Approval CA ServerID Request User WebGeneration CA Offline CANotification CA Email

Retrieval User WebInstallation User User’s PC

Use User Application

Page 42: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

S/Mime Email

Normal Email is like a postcard

Message encryption seals the envelope

Digital signature adds unique “sealing wax” stamp

Page 43: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Message

Message Digest

Compute

Transmitted Message

(Original message encrypted digest

Sender!sPrivate Key

Encrypted Message Digest

Encrypt

Sender!s Cert(Public Key)

(Optional-- may be obtained by other means)

optional sender cert)

Signing Process

Page 44: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Message(with encrypted digest)(optional public key cert)

Message Digest

Compute

Encrypted Message Digest

(Extract)

Sender!s Cert(Public Key)

Verify throughCA Root Cert

Decrypt

Message Digest

Compare

The message digests match only if 1) Sender!s private key signed the message 2) The message has not been altered

Signature Verification

Page 45: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

MessageGenerate(Random)

Symmetric Key

Encrypted Message

Encrypt

(Key)(Data)

Encrypt

Recipient!s Cert(Public Key)

EncryptedSymmetric Key

(One for each recipient)

(Key)(Data)

Transmitted Message

(Encrypted message Encrypted key)

Encryption Process

Page 46: PKI: Pub lic K ey Infr astr uctur epeople.ku.edu/~wes/acs/pki-check-slides.pdf · business pr ocesses . How ever, the dr eam of using it f or g ener al-pur pose authentica tion and

Transmitted Message

(Encrypted message Encrypted key)

Recipient!sPrivate Key

Symmetric Key

Decrypt

EncryptedSymmetric Key

(Key)(Data)

Extract

Encrypted Message

Message

Decrypt

(Key)(Data)

Decryption Process


Recommended