Introduction to Public Key Infrastructure (PKI)
description
Transcript of Introduction to Public Key Infrastructure (PKI)
![Page 1: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/1.jpg)
Introduction to Public Key Infrastructure (PKI)
Office of Information Security
The University of Texas at Brownsville & Texas Southmost College
![Page 2: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/2.jpg)
Topics
Goals of Secure Messaging
How Asymmetric Key Systems Meet These Goals
Attacks Against Asymmetric Key Systems
How PKI mitigates these attacks
![Page 3: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/3.jpg)
Goals for Secure Messaging
Confidentiality
Integrity
Data Origin Authentication
Non-repudiation
![Page 4: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/4.jpg)
Goals For Secure Messaging Confidentiality: messages are kept private
Integrity: messages have not been altered in transit
Data origin authentication: recipient has assurance that the message really came from the ostensible author
Non-repudiation: author may not later claim that she did not write a certain message
![Page 5: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/5.jpg)
How do we achieve these goals?
Confidentiality can be achieved via symmetric key systems or asymmetric key systems
Each has its benefits and drawbacks
![Page 6: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/6.jpg)
Symmetric Key Systems
Same key is used for encryption and decryption
Alice generates a key and uses it to encrypt a message
Alice sends this key along with her message so that Bob can decrypt the message
![Page 7: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/7.jpg)
Asymmetric Key Systems
Uses two separate keys: one for encryption and decryption
Private key – kept secret and never shared
Public key – advertised publicly as part of your certificate
Symmetric/shared secret/session key - This key is generated for one-time or one-session use, and then discarded.
![Page 8: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/8.jpg)
THE KEYS
Private Key Public KeySymmetric KeyShared Secret KeySession Key
![Page 9: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/9.jpg)
Asymmetric Cryptography
Alice obtains Bob’s public key and encrypts the message using that key
Only Bob’s private key can decrypt the message, which ensures that only Bob can read the message
(Probably)
![Page 10: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/10.jpg)
Additional Benefits of Asymmetric Key Systems
Asymmetric key systems also provide integrity, data origin authentication, and non-repudiation
Alice can use her private key to “sign” a document
Bob knows that the message really came from Alice, and that the message has not been altered in transit (integrity)
![Page 11: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/11.jpg)
Integrity with Digital Signatures
Digital signatures also provide integrity via a process called hashing
A hash also “encrypts” a message, but in this case, the goal is not confidentiality.
A hash is a “non-invertible” or one-way function, which means that once a hash is performed on a message, you cannot get the original message back
![Page 12: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/12.jpg)
Hashing, continued
Hash algorithm defined: a one-way “encryption” algorithm that takes a message of any length and produces a smaller, unique output message
Analogy: Your fingerprint is a smaller version of you that uniquely identifies you, but you cannot be reconstructed from your fingerprint
Remember that hashing does not keep your data private!!!
![Page 13: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/13.jpg)
How Hashing Creates a Signature
Alice hashes her message, then encrypts the hash with her private key
This process creates a “signature” that is appended to a plaintext message
Bob obtains Alice’s public key, decrypts the signature to uncover the plaintext hash, then runs the same hash function on the plaintext message.
![Page 14: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/14.jpg)
Signing Messages - Alice
Message
Message Digest1
HHashAlgorithm
Encrypted Digest
(Digital Signature)
Message
Signing
Encrypted Digest(Digital Signature)
Alice’s private key
![Page 15: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/15.jpg)
Receiving - Bob
Message H Message Digest2
Receiving
HashAlgorithm
Encrypted Digest(Digital Signature)
Message Digest1
Alice’s public key
Match?
![Page 16: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/16.jpg)
Problems with Asymmetric Key Systems
Computational load for encryption
Man-in-the-middle attacks: public key substitution and signature forging
![Page 17: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/17.jpg)
Computational Overhead
Asymmetric systems provide better security, but symmetric systems provide better performance
Solution: use the symmetric key to encrypt and decrypt the data; use public and private keys to encrypt and decrypt the symmetric key
![Page 18: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/18.jpg)
Putting it All TogetherMessage Encrypted Message
Symmetric Key
Bob’s Public Key
Encrypted Symmetric Key
Digital Envelope
![Page 19: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/19.jpg)
Putting it All Together
MessageEncrypted Message
Symmetric Key
Encrypted Symmetric Key
Digital Envelope
Bob’s Private Key
![Page 20: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/20.jpg)
Attacks Against Asymmetric Key Systems
Public Key Substitution Risks
![Page 21: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/21.jpg)
Public-Key Substitution Risk Molly can remove Bob’s public key and replace it
with her own. Then Alice encrypts using “Bob’s” public key.
Molly intercepts the message, decrypts it with her own private key, and modifies it.
Molly re-encrypts it with Bob’s real public key. Bob can decrypt it with his private key, so he never detects the attack.
![Page 22: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/22.jpg)
Forging Signatures Molly removes Alice’s public key and replaces it
with her own.
Alice signs a message with her private key. Molly intercepts it, strips the signature, then modifies the message.
Molly creates a new signature for the message using her own private key.
![Page 23: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/23.jpg)
Forging Signatures
Bob receives the signature and decrypts it with “Alice’s” public key.
Bob also runs the hash over Molly’s bogus message and verifies the signature.
![Page 24: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/24.jpg)
The Problem
We need a way to tie a public/private key pair to a person
A digital signature only ties a message to a private key, not to a person!
![Page 25: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/25.jpg)
The Solution We need a trusted third party that can
authoritatively bind a key pair to a person
This trusted third party is called a “certification authority” (CA)
The CA issues a digital certificate to each user, which contains the public key for that user
![Page 26: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/26.jpg)
Certificates: Binds a Person to a Key Pair
The public key (embedded in a digital certificate) is in a public directory that is freely accessible
Now when you download someone’s public key, you know that it belongs to a specific person
![Page 27: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/27.jpg)
How This Binding is Accomplished
The CA has a public and private key pair, just like people and devices
The CA uses its private key to sign the body of the certificate, just as people use personal private keys to sign messages
To verify, one must use the CA’s public key to decrypt the signature, just as one would verify a personal signature from another user!
![Page 28: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/28.jpg)
How This Binding is Accomplished
If the CA is a widely recognized authority, its certificate (along with its public key) will already be embedded in browsers
Two matching hashes ensure that the contents of the certificate have not been tampered with – certificate integrity
![Page 29: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/29.jpg)
X.509 Certificate Format
Validity PeriodIssuer X.500 distinguished name
Subject X.500 distinguished name
Serial Number
Public keyKey/certificate usage
ExtensionsCA Digital Signature
![Page 30: Introduction to Public Key Infrastructure (PKI)](https://reader036.fdocuments.net/reader036/viewer/2022082217/56816030550346895dcf49f8/html5/thumbnails/30.jpg)
ReviewThis slide will help you check your understanding of digital IDs
Define confidentiality, integrity, data origin authentication, and non-repudiation
What does it mean when I receive a message that is digitally signed? What does it mean when I receive a message that is encrypted?
From a technical standpoint, how do I send a message with a digital signature? How do I send an encrypted message?
What could happen if someone were to obtain my private key? What security goals does this weaken? What is the most secure way to maintain the private key?