Use of Public-Key Infrastructure (PKI) Erik Andersen

advertisement
Use of Public-Key Infrastructure (PKI)
Erik Andersen
Association for the Directory Information and Related
Search Industry (EIDQ - http://www.eidq.org )
Andersen's L-Service consultancy
Rapporteur for Directory services, Directory systems, and publickey/attribute certificates
era@x500.eu
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
1
Where it all starts
Geneva, 6-7 December 2010
Addressing security challenges on a global
scale
2
What to cover
Introduction to basic PKI principles
Use of PKI within Identity Management
Use of PKI for IP Security (IPSec)
Use of PKI for RFID identification
Use of PKI within cloud computing
Geneva, 6-7 December 2010
Addressing security challenges on a global
scale
3
Public-key Certificates
Public-key certificate
Name of user
Public key
The public-key certificate is the
basic concept for public-key
infrastructure (PKI).
A public-key certificate provides
the binding between a name
and a public key for a user for a
given period and is issued and
confirmed by a Certification
Authority (CA).
Signed by Certification Authority (CA)
Can I trust a certificate?
A certificate may have expired
The corresponding private key may be
compromised
The CA policy for issuing certificates may not
be satisfactory
A certificate my be a forgery as the CA's
private key may be compromised
Etc.
Geneva, 6-7 December 2010
Addressing security challenges on a global
scale
5
Public-Key Infrastructure (PKI)
Security is about Trust!
PKI is an infrastructure for checking the
validity or quality of a presented public-key
certificate
A PKI consists of a number of interworking
components
Somewhere there must be a trust anchor
Geneva, 6-7 December 2010
Addressing security challenges on a global
scale
6
Relationship with IdM (Identity proofing)
Public-key certificate
Name of user
Public key
Pointer to policy
Name to be verified by the Certification
Authority or Registration Authority
Uniqueness
Proof of identity
Legal right to name
Level of verification depending on use of
certificate
Part of Identity Management (IdM)
Guidelines provided by
ITU-T SG 17 IdM group
CA Browser Forum
ETSI ESI activity
Rules may be expressed in a Certificate
Policy document
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
7
IP Security (IPsec)
Specified in RFC 4301
Provides end-to-end protection for all applications
using this end-to-end connection
Uses shared cryptographic keys for authentication,
integrity, and confidentiality of data
Uses Internet Key Exchange (IKE) for establishing
shared keys (security association) - RFC 5996
Diffie-Hellman key exchange is used by IKE for that
purpose (RFC 3526)
Geneva, 6-7 December 2010
Addressing security challenges on a global
scale
8
Problem using Internet Key Exchange
Bob
Alice
without PKI
Diffie-Hellman key exchange
Bob
”Man-in-the-middle”
Diffie-Hellman
key exchange
Geneva, 6-7 December 2010
Alice
Diffie-Hellman
key exchange
Addressing security challenges on a global scale
Using Internet Key Exchange with PKI
Bob
Alice
Diffie-Hellman key exchange
using digital signature and optionally
certificate information
A man-in-the-middle will be detected!
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
10
Radio-Frequency Identification Directory
infrastructure
RFID
tag
RFID
reader
Client
system
The RFID tag contains information,
including a unique identity
The unique identity is used access
information associated with the tag
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
11
Protecting RFID information
RFID tag
Unique identity
Pharmaceutical drugs
from Counterfeit Drugs Inc.
Information
Signature over
essential information
RFID tag says:
Pharmaceutical drugs
from Roche Ltd.
Geneva, 6-7 December 2010
Signature produced by private
key of vendor (tag creator)
Signature not produced using
Roche’s private key
Signature checked using Rotch’s
public key
Signature check fails
Addressing security challenges on a global scale
12
Radio-Frequency Identification (RFID)
Directory
infrastructure
RFID
tag
Identifier
Signed Info
RFID
reader
Client
system
Search using identifier
as search criterion
Certificate information
Other Information
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
13
Authentication and authority for Cloud Computing
Generally of importance
Check of identity
Check of privileges
Public-key certificate
Name of user
Public key
Even of greater importance for Cloud
Computing
A Public-key certificate may contain
privilege information
Alternatively, an attribute certificate may
be used
Attribute
certificate
Privileges
Geneva, 6-7 December 2010
Privileges
Addressing security challenges on a global scale
14
Identity and privilege issues for hybrid clouds
Hybrid Cloud
Private
Cloud
Public
Cloud
Cloud
Clouds with multiple service providers/hybrid clouds:
Different privileges
different identities
danger of complex key management
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
15
Authentication and authority for Cloud Computing
ITU-T Study Group 17, Question 11 has the
issue on its to-do list
It has relationship with Identity Management
One solution may be use of attribute
certificates
Attribute certificate:
Used for assigning privileges to user
Points to user , e.g., by pointer to user's public-key
certificate
Geneva, 6-7 December 2010
Addressing security challenges on a global
scale
16
END
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
17
Download