Title: Public Key Infrastructure, Digital Certificates and Digital Signatures
1Public Key Infrastructure, Digital Certificates
and Digital Signatures
Washington stateDigital Government Applications
2Certificate ?
Digital Signature ?
Subscriber ?
Private Key ?
Public Key ?
Certification Authority ?
PKI ?
3How Can You Get the Best of Both Worlds?
4Some Things Just Dont Change...
5Identification vs. Authentication
Identification
I am John Smith
Authentication
Or...
Says who? How do they know?
6The need for Credentials
In our paper-based world, we have paper-based
credentials
Who Says? Where Accepted
U.S. Government Worldwide
State of Washington United States
Costco Corp. Any Costco Store
7An electronic credential used to authenticate
parties in an electronic transaction that
a) Identifies the owner b) Identifies the
practices and procedures (policy) used to issue
the certificate c) Is signed by the entity
vouching for a) and b)
8Whom Can You Trust?
- Responsible for managing certificates and keys in
a secure, trustworthy manner - Can be trusted by all parties in a transaction,
even though all parties may not be known by each
other - Can reliably vouch for the identity of each party
in a transaction
9Primary Responsibilities of the Certification
Authority
To operate a secure system (PKI) Create digital
certificates that securely bind the identity of a
person to their Public and Private Keys
10How is a Certificate Created?
Public Key is presented to CA for insertion into
Certificate
Keys Generated by Browser, Hardware or Client
Software
Bob
11Establishing Trust in Electronic Commerce
Three parties to every digitally authenticated
transaction...
12 PKI - How it Works Together
13Two primary ways the technology can be used...
Support for Digital Signatures
Authentication for Access Control
14Benefits of Digital Signatures
Data cannot be altered once it is signed (data
integrity)
You can know who provided what data
(non-repudiation)
15Certificates Used for Digital Signatures
Name Address
16Benefits of Digital Certificates
Provide proof of identity for authentication to
secure applications
17Access Control - Today
USER I.D. Password
18Access Control - Digital Government Style
19Access Control - Digital Government Style
20Where Do You Want to Go Today?