Introduction to public-key infrastructure (PKI) ITU Workshop on “Caller ID Spoofing” Erik Andersen,

advertisement
ITU Workshop on “Caller ID Spoofing”
(Geneva, Switzerland, 2 June 2014)
Introduction to
public-key infrastructure (PKI)
Erik Andersen,
Q.11 Rapporteur,
ITU-T Study Group 17
era@x500.eu
Geneva, Switzerland, 2 June 2014
PKI and PMI
Public-key certificates: The basis for
public-key infrastructure (PKI)
Attribute certificates: The basis for
privilege management infrastructure
(PMI)
Rec. ITU-T X.509 | ISO/IEC 9594-8
base specification for both types of
infrastructure
Geneva, Switzerland, 2 June 2014
2
Facts about X.509
Part of the X.500 Series of
Recommendations
Also issued as ISO/IEC 9594-8
Issued in seven editions
First edition in 1988
Eight edition on its way
Number one in downloads
Defines:
Public key/private key principles
Public-key certificates
Public-key infrastructure (PKI)
Attribute certificates
Privilege management
infrastructure (PMI)
Geneva, Switzerland, 2 June 2014
3
Asymmetric cryptography
Asymmetric cryptography is basic
technology behind PKI and PMI
A
B
Private key
Public key
Action using
private key
Resolving using
public key
Resolving using
private key
Action using
public key
Geneva, Switzerland, 2 June 2014
4
PKI entities
End
entity
Certificate
&
CRL
repository
(e.g., an
LDAP or
X.500
directory)
Registration
Authority
CA
CRL
Issuer
CA
Geneva, Switzerland, 2 June 2014
5
Certifying the identity using
public-key certificates
Certification Authority
Geneva, Switzerland, 2 June 2014
6
Public-key certificate
Version
Serial number
Algorithm
Issuer
Validity
Subject
Public key info
Issuer unique id
Subject unique id
Extensions
Version 2 (do not use!)
Version 3 - Important
Digital signature of issuer
Geneva, Switzerland, 2 June 2014
7
Extensions
The extension concept allows adding
additional information to a publickey certificate.
Organizations may define own
extensions.
If the information changes, the
public-key certificate has to be
renewed.
Certification authority (CA)
NOT: Certificate authority
Verify the identity of the subject
Verify the position of the key-pair
Verify the other information as
required
Issues and sign the public-key
certificate
Maintain revocation status
Publishes revocation status
Geneva, Switzerland, 2 June 2014
9
Checking the credentials
Subject
Relying party
A passport is a type of
certificate binding a picture
to a subject ID
Has to be issued by a
trustworthy authority
A passport may be false
It is checked by the
validator, also called the
relying party
Geneva, Switzerland, 2 June 2014
10
Trust
Would you buy
a certificate of
this man?
Certificates
Geneva, Switzerland, 2 June 2014
Would you trust
a certificate
issued by this
man?
11
Hierarchical Structure
Trust anchor
CA
CA
CA
EE
CA
EE
EE
CA
EE
CA = Certification authority
EE = End entity
EE
CA
EE
EE
EE
Trust anchor
Trusted by a relying party
Trust anchor information:
Configured into relying
party
Public-key certificate
or similar information
Geneva, Switzerland, 2 June 2014
13
Certificate Revocation
List (CRLs)
Version
Algorithm
Issuer
Time for this update
Time for next update
Certificate Serial
Number
Revocation Date
Extensions
Certificate Serial
Number
Revocation Date
Extensions
CRL Extensions
Digital signature of issuer
Revoked
Certificate
Revoked
Certificate
Online Certificate Status Protocol
(OCSP)
OCSP
responder
OCSP client
OCSP
request
OCSP
response
Geneva, Switzerland, 2 June 2014
15
Validation procedure
Storing of
Trust Anchor
Information
User system B
(Relying Party)
Check of
revocation
Signed
data
Trust
Ancho
r
CA
CA
User system
A
(end entity)
Where to go
The central source for information on the
X.500 Directory Standard including X.509.
www.x500standard.com
Geneva, Switzerland, 2 June 2014
17
Download