1. Public Key Infrastructure Definition: A public key infrastructure (PKI) is an arrangement that provides for • trusted third party vetting of, • and vouching for, • user identities. Note: Broadly, vetting is a process of examination and evaluation. 1.1. Purpose and Function • PKI arrangements enable computer users to be authenticated • To use each other’s public key • Which allows to decrypt and encrypt messages send between receiver and sender -2- 1.2. Certificate History Stolen from: http://www.cs.auckland.ac.nz/˜pgut001/pubs/pkitutorial.pdf • Why is X.509 PKI so complicated? • Original paper on publick-key encryption proposed the Public File • — Public-key white pages — Key present -> valid — Communications where protected by a signature Straight forward in 1976 - not today 1.3. X.500 • X.500 proposed various access control mechanisms • series of cmputer networking standards — DAP (Directory Access Protocol) — DSP (Directory System Protocol) — DISP (Directory Information Shadowing Protocol) — DOP (Directory Operational Bindings Management Protocol)o • presentation layer given to users was that the DNS site name "www.foobar.com" was verified in a browser • user has reached the correct web site via HTTPS. • CA Certs are loaded into the browser statically • the browser can verify the SSL cert of the website. 1.4. Use Case Skip :) 1.5. Ten Risks of PKI Computer security has been victim of the "year of the..." syndrome. First it was firewalls, then intrusion detection systems, then VPNs, and now certification authorities (CAs) and public-key infrastructure (PKI). "If you only buy X," the sales pitch goes, "then you will be secure." But reality is never that simple, and that is especially true with PKI. 1.6. 1 Who do we trust, and for what?" There’s a risk from an imprecise use of the word "trust." A CA is often defined as trusted. 1.7. 2 Who is using my key? 1.8. 3 How secure is the verifying computer? 1.9. 4 Which John Robinson is he? 1.10. 5 Is the CA an authority? -3- 1.11. 6 Is the user part of the security design? 1.12. 7 Was it one CA or a CA plus a Registration Authority? 1.13. 8 How did the CA identify the certificate holder? 1.14. 9 How secure are the certificate practices? 1.15. 10 Why are we using the CA process, anyway? -4- 1.16. Call for Paper ** Apologies for multiple copies ** F i n a l C a l l F o r P a p e r s Fourth European PKI Workshop: Theory and Practice (EuroPKI’07) 28-30 June 2007 Palma de Mallorca, Balearic Islands, Spain http://dmi.uib.es/europki07 The 4th European PKI Workshop: Theory and Practice is focusing on all research aspects of Public Key Applications, Services and Infrastructures. Submitted papers may present theory, applications or practical experiences on topics including, but not limited to: - Architecture and Modeling Authentication Authorization and Delegation Bridge CA Case Studies Certificates Status Certification Policy Certification Practices Cross Certification Directories eCommerce/eGovernment Evaluation Fault-Tolerance Federations ID-based schemes Identity Management Implementations Interoperability Key Management Legal issues Long-time archiving Mobile PKI Policies & Regulations Privacy Privilege Management Protocols Reliability in PKI Repositories Risk/attacks Standards Timestamping Trust Ubiquitous scenarios Verification *Instructions for paper submission -5- The Workshop welcomes original papers from academic, government, and industry contributors dealing with the above or related issues. Papers which describe ongoing research or provide an excellent surveying work are welcome too. All submissions will be subjected to a thorough blind review by at least three reviewers. Papers should be up to 6000 words in English, including references and well-marked appendices. Like in all previous EuroPKI events, it is planned that accepted papers are published by Springer in the Lecture Notes in Computer Science (LNCS) series. To submit a paper, please follow instructions on the Workshop webpage. Note that the submitted paper (PDF or PostScript format), must follow the template indicated at (http://www.springer.de/comp/lncs/authors.html) by Springer, starting with a title, a short abstract, and a list of keywords, with no author names, affiliations, acknowledgements, nor obvious references. * Special Issue A Special Issue of EuroPKI 2007 with extended versions of the best papers of the workshop will be published in the "Journal of Computer Security" (http://www.iospress.nl/loadtop/load.php?isbn=0926227x), IOS Press. Note also that those selected papers will need to undergo another round of review. * Important dates Submission of papers: February 28, 2007 Notification to authors: March 30, 2007 Camera-ready copies: April 16, 2007 * Programme Committee co-Chairs Javier Lopez, University of Malaga, Spain Pierangela Samarati, University of Milan, Italy *General Chair Jose L. Ferrer, University of Balearic Islands, Spain *Programme Committee: Carlisle Adams, University of Ottawa, Canada Oscar Canovas, University of Murcia, Spain Sabrina De Capitani di Vimercati, University of Milan, Italy David Chadwick, University of Kent, UK Marco Cremonini, University Of Milan, Italy Jorge Davila, UPM, Spain Ed Dawson, QUT, Australia Stephen Farrell, Trinity College Dublin, Ireland Jordi Forne, Polytechnic University of Catalonia, Spain Dieter Gollmann, Hamburg University of Technology, Germany Stefanos Gritzalis, University of Aegean, Greece Dimitris Gritzalis, AUEB, Greece Socrates Katsikas, University of Aegean, Greece Stephen Kent, BBN Technologies, USA Kwangjo Kim, ICU, Korea Chi-Sung Laih, National Cheng Kung University, Taiwan Antonio Lioy, Politecnico di Torino, Italy Fabio Martinelli, IIT-CNR, Italy Apol.lonia Martinez, University of Balearic Islands, Spain -6- Fabio Massacci, University of Trento, Italy Stig F. MjC8lsnes, NTNU, Norway Jose A. Montenegro, University of Malaga, Spain Yi Mu, University of Wollongong, Australia Rolf Oppliger, eSecurity, Switzerland Eiji Okamoto, University of Tsukuba, Japan Guenther Pernul, University of Regensburg, Germany Bart Preneel, Katholieke Univ. Leuven, Belgium Chunming Rong, University of Bergen, Norway Kouichi Sakurai, Kyushu University, Japan Ravi Sandhu, George Mason University, USA Damien Sauveron, University of Limoges, France Sean Smith, Dartmouth College, USA Julien Stern, Cryptolog, France Jianying Zhou, I2R, Singapore Sencun Zhu, Penn State University, USA * Links to EuroPKI’06 EuroPKI’05 EuroPKI’04 previous EuroPKI events - http://security.polito.it/europki2006/ - http://sec.isi.salford.ac.uk/europki2005/index.shtml - http://www.aegean.gr/EuroPKI2004/ --------------------------------------------------------------------To unsubscribe, e-mail: computational.science-unsubscribe@lists.optimanumerics.com For additional commands, e-mail: computational.science-help@lists.optimanumerics.com Computational Science mailing list hosting is provided by OptimaNumerics (http://www.OptimaNumerics.com) ---------------------------------------------------------------------