Lecture 9: PKI Cont

advertisement
PKI INFRASTRUCTURE
Digital Signatures
In the online world, how can one be sure that a
message is actually coming from the person
whom he or she thinks sent it? Similarly, how
can one be sure that a person cannot deny that he
or she sent a particular message?
Answer is a digital signature – electronic
equivalent of a personal signature that cannot be
forged.
They are based on public keys.
Used to authenticate the identity of the sender of
a message or a document.
1
PKI INFRASTRUCTURE
-
-
-
Also used to ensure that the original content of
an electronic message or document are
unchanged.
Added benefits to the online world is that, they
are portable, cannot be easily repudiated or
imitated, and can be time-stamped.
Scenario showing how digital signature works:
2
(1)
Message with
contract
Message Digest
(2)
Sender applies
hash function
Digital Signature
(3)
Sender encrypts using
sender’s private key
Message with
digital
signature
(4)
Sender encrypts using
recipient’s public key
Digital envelope
(5) Sender e-mails to recipient
Digital envelope
(8) Recipient
applies hash
function
(1)
Message with
contract
(6) Recipient decrypts using recipient’s
private key
Digital Signature
(7) Recipient
Decrypts using sender’s public key
3
New MD
(9) Compare for
match
Original MD
4
PKI INFRASTRUCTURE
1.
2.
3.
4.
The sender creates an email message in it.
Using a special software, a mathematical
computation called a hash function is applied to the
message, resulting in a small summary of the
message converted into a string of digits called a
message digest.
The sender uses his or her private key to encrypt the
hash. This is the sender’s digital signature. No one
can replicate it because it is based on the sender’s
private key.
The sender encrypts both the original message and
the digital signature with the recipients public key.
This is the digital envelope
5
PKI INFRASTRUCTURE
5.
6.
7.
8.
The sender emails the digital envelope to the
receiver.
Upon receipt, the receiver uses his or her private key
to decrypt the contents of the digital envelope. This
produces a copy of the message and the sender’s
digital signature.
The receiver uses the sender’s public key to decrypt
the digital signature, resulting in a copy of the
original message digest.
Using the same hash function employed in step 2,
the recipient then creates a MD from the decrypted
message.
6
PKI INFRASTRUCTURE
9.
10.
•
i.
ii.
The recipient compares this digest with the original
MD.
If the two digests match, then the recipient
concludes that the message is authentic.
From this scenario the following may be concluded:
The recipient has evidence that the sender sent the
email because the sender is the only one with access
to the private key.
The recipient knows the message has not been
tampered with because if it had then the two hashed
would not have matched.
7
PKI INFRASTRUCTURE
The process of creating and verifying a digital
signature, accomplishes the essential effects desired
of a signature for many legal purposes:
Signee Authentication
If a public and a private key pair is associated with
an identified signee, the digital signature cannot be
forged, unless the signee loses control of his private
key.
Message Authentication
the digital signature also identifies the signed
message. Verification reveals any tampering, since
the comparison of the hash results shows whether
the message is the same as when signed.
•
8
PKI INFRASTRUCTURE
Affirmative Act
Creating a digital signature requires the signee to the
signee’s private key. This act can alert the signee to
the fact that the signee is consummating with legal
consequences
Assurance
Process of creating and verifying a digital signature
provide a high level of assurance that the digital
signature is genuinely the signee’s.
9
PKI INFRASTRUCTURE
Digital Certificates and Certificate Authorities
•
If one has to know someone’s public key to send
that person a message, where does the public key
come from and how can one be sure of the person’s
actual identity.
•
A digital certificate will verify the holder of a
public/private key is who he or she claims to be.
•
3rd parties called Certificate Authorities (CAs) issue
digital certificates.
•
Certificates contain things like holder’s name,
validity period, public key information and a signed
hash of the certificate data. (i.e. hashes contents of
the certificate signed with the CA’s private key)
10
PKI INFRASTRUCTURE
•
•



•
Certificates are used to authenticate Web sites (site
certificates), individuals (personal certificates), and
software companies (software publisher certificates)
Well-known third party CA is VeriSign
(verisign.com). Issues three classes of certificates:
Class 1 verifies that an e-mail actually comes from
the user’s address.
Class 2 checks the user’s identity against a
commercial credit database.
Class 3 requires notarized documents
MSFT offer systems that enable companies to issue
their own private, in-house certificates.
11
PKI INFRASTRUCTURE
Security Protocols for epayments
1. Secure Socket Layer
•
Invented by Netscape to utilize standard certificates
for authentication and data encryption to ensure
privacy or confidentiality.
•
SSL is between HTTP and TCP on a Web Server.
•
It is a transport layer security protocol.
•
Provides simple encrypted connection between the
client’s computer and merchant’s server over the
Internet.
•
Provides authentication for the merchant’s server
with its digital certificate from a CA.
12
PKI INFRASTRUCTURE
•
•
•
•
•
This is a secured connection allowing cyber
shoppers to send payment information to e-tailor’s
web shop.
Reason for growth of SSL is that it provides a
secured
connection
with
encrypting
and
authenticating between two computers over the
Internet.
Provides a security handshake in which a client and
server computers exchange messages.
In these messages they agree upon, the level of
security to use when exchanging digital certificates.
The clients needs not to have a digital certificate, but
the server needs to have a valid certificate.
13
PKI INFRASTRUCTURE
•
2.
•
•
•
i.
ii.
SSL does not keep the credit card numbers after the
transaction is complete.
SET
A messaging protocol designed by VISA and
MasterCard for securing credit card transactions
over open networks.
In the SET protocol, the transaction has three
players – customer, merchant and merchant’s bank
It has three principle features:
All sensitive info sent within the three parties are
encrypted
All three parties are required to authenticate
themselves with certificates from SET CA
14
PKI INFRASTRUCTURE
iii.
•
•
•
The merchant never sees the customer’s card
number in plaintext.
It is more secure than SSL
To implement SET, it requires SET POS client
software such as SET “electronic wallet”
implemented widely in the client’s web browser.
It is quite a challenge to make such a POS software
available to the Internet community
15
ANY QUESTIONS …?
16
Download