Title: Introduction to PKI, Certificates
1Introduction to PKI,Certificates Public Key
Cryptography
2Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Role of Computer Security
- CIA
- Confidentiality protection against data
disclosure - Integrity protection against data modification
- Availability protection against data
disponibility - Identification Authentication (IA)
- Provide a way of identifying entities, and
controlling this identity - Non-repudiability
- Bind an entity to its actions
3Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
How to implement CIA, IA, N-R ? With
Cryptography !
- Main cryptographic tools
- Hash Functions
- Secret Key Cryptography
- Public Key Cryptography
- And their combinations
- Certificates
- PKI
4Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Main cryptographic tools
- Hash Functions
- Bind one entity with a unique ID gt Signature
- Hash Encryption gt trusted signature
- Symmetric Key Cryptography
- 2 users share a secret key S and
- an algorithm.
- S(S(M)) M
- Problem
- how to exchange secret keys ?
- gtSecret Key Server (ex kerberos)
5Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Main cryptographic tools
- Public Key Cryptography
- Each user has a public key P and a private key S,
and an algorithm A. - P(S(M)) S(P(M)) M
- No shared secret !
Encryption with Public Key Crypto
Authentication with Public Key Crypto
6Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Main cryptographic tools, PKI
- How to distribute public keys ?
- Public Key Server (PKS), key exchange protocols
- Public Key Infrastructure (PKI)
- PKI N x (Entities with private keys) public
key exchange system - REM Public Key algorithms are slow
- Need to use both Public Secret Key Cryptography
- Public Key Protocols work in 3 phases
- Authentication via Public Key Cryptography
(challenge) - Exchange of a session Secret Key, encrypted with
Public Key Crypto - Session encrypted with Symmetric Cryptography
7Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Certificate
- A certificate binds an entity with its public
key. - Its just a digitally signed piece of data.
- digital ID card
The certificate is issued and signed by a
trusted Certificate Authority (CA)
- Digital signature
- CA signature certificate hash,
- encrypted with CAs private key
8Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Certificate
- The certificates CA is the only entity able to
create/modify the certificate - the CA has to be trusted
- Certificates enable
- Clients to authenticate servers
- Servers to authenticate clients
- Public key exchange without Public Key Server
- No disclosure of private/secret keys.
- Certificates are usually stored encrypted.
- Special features
- chains of CAs, to distribute the task of issuing
Certificates - Certificate Revocation List, to disable
certificates
9Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Usual cryptographic algorithms infrastructures
Hash MD4, MD5, SHA-1 Symmetric Key DES,
3DES, AES (Rijnael), IDEA, RC4 Public/Private
Key RSA, Diffie-Hellman Certificat
X509 PKI IPSec, SSL, (kerberos)
10Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
example IPSec
- IPSec works at IP level.
- Provide authentication and encryption. Used to
build VPNs. - Configuration
- 2 transfert modes tunnel or transport
- 2 transfert protocols
- AH (Authentication Header) gt authenticated
traffic - ESP (Encapsulating Security Payload) gt
encrypted traffic - Key exchange protocols
- Internet Key Exchange (IKE),
- Internet Security Association and Key Management
Protocol (ISAKMP), - etc.
11Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Weaknesses of PKI and Certificates
- PKI
- unsecured server hackable Public
Key/Certificate servers - unsecured client private keys/passwords can be
stolen/spied - weak algorithm short keys, implementation or
design breach - Certificate
- unsecured computer certificates can be stolen,
password spied - certificate password certificates are stored
encrypted, with weak password - untrustable CA easy to be issued a
certificate from a CA - users they seldom check if CA can be trusted
before accepting certificates (netscape GUI) - Attack example
- hack clients computer, steal certificate
password - man in the middle
12Introduction to PKI, Certificates Public Key
Cryptography erwan_at_defcom.com
Links
Book Applied cryptography, Bruce
Schneier URLs theory.lcs.mit.edu/rivest/crypto-
security.html www.counterpane.com/pki-risks.html w
ww.csc.gatech.edu/copeland/8813/slides/ www.iplan
et.com/developer/docs/articles/security/pki.html w
eb.mit.edu/6.857/OldStuff/Fall96/www/main.html