SlideShare a Scribd company logo
Implementing Public Key Infrastructures Dr. Oliver Pfaff Siemens AG KEMA Seminar "Utility Communications “ June 2003 ,  Amsterdam, Netherlands
Contents of this Presentation  Setting-the-scene  Introducing PKI  Exploring PKI Lessons-learnt  Conclusions Appendix: success stories
Setting-the-Scene How to Trust? Trust is fundamental in IT: RFC 2828 defines trust as:  The extent to which someone who relies on a system can have confidence that the system meets its specifications.   What is needed for trust in IT?  Ability to determine the source of information as well as its integrity.  This property is called authentication.  The need for authentication is ubiquitous in IT:  Literally all kinds of IT-systems do have some inherent understanding of authentication.  Quite often this is as simple as: ... we believe anything coming across this interface to be authentic ... I.e. authentication might be defined by a condition that is always true.
Setting-the-Scene  What are Authentication-Enabled Services? Authentication Encryption Thwart active attacks Single-Sign-On Transfer authentication Access control Determine authorization Non-repudiation Validate and interpret evidence Privacy Enforce policies Digital rights management Control content distribution
Setting-the-Scene  How to Advance Authentication? Non-cryptographic Cryptographic Keyed checksums allow to verify the authenticity of data objects Shared secrets Allow origin authentication; do not bind exchanged information Classical codes Provide protection against transmission errors; not against intentional attacks Biometrics Can authenticate human beings; not IT-systems or data objects In-band Supplementary information via secondary channel Supplementary information attached with payload Out-of-band Used in various scenarios; not generic due to availability, cost, handling issues  Our focus
Setting-the-Scene  Is Cryptography the Final Answer? Good news: cryptography is a means to provide authentication...  Bad news: ...supposed the keying associations between the peers are authentic  Alice‘s  signature key 10100101001010100111... Verification key for Alice 01010101001 010010... Alice Bob I love You! I love You! Check- sum I love You! Check- sum O K? Network Verification key for attacker 0000000000000000 ... Attacker‘s signature key 111111111111111 ... I hate You! I hate You! Check- sum Attacker Intercept, exchange message I hate You! Check- sum 000000000000000 ... Replace key value
Introducing PKI  What is Public Key Cryptography? Public key cryptography employs pairs of related keys: Private keys Kept secret by their owners. Public keys Made widely available (without loss of security). Public key cryptography supports a variety of security services including: Authentication: Entity authentication Message / document authentication with signer identification Encryption Encryption pattern: Authentication pattern: Generate checksum Validate checksum Encrypt data Decrypt data Plain text Cipher text Plain text Private  key Public  key Check sum O K? Private  key Public  key Data object Data object
Introducing PKI  What is Public Key Infrastructure? Unfortunately, the term Public Key Infrastructure (PKI) is interpreted in various ways throughout the community. This requires a working definition for this presentation: Motivation: The term PKI essentially comprises two parts, 'public key' and ‘infrastructure‘: Public key A concept in cryptography, denoting a key that may be made public.  Infrastructure A notion denoting resources that are required for an activity. Working definition: PKI comprises techniques and services to safeguard the authenticity of public keys in distributed IT-systems .
Introducing PKI What Are Public Key Certificates? Thus, certificates are persistent carriers for public keys along with supplementary information.  Public key Public key certificates explicitly bind supplementary information to public keys. This binding is usually lasting.  Key holder, authorization s ...  To be useful, public keys need to be augmented by supplementary information (e.g. about key holder, authorizations).  Signature Its contents are protected by a cryptographic checksum for protection against manipulation.
Introducing PKI  Which PKI Technologies Exist? Attribute/ authorization Attribute certificates:  Bind entity IDs and attributes Represent attribute claims; proof via private-key-possession  E.g.  X.509, PKIX Attribute certificate Authorization-oriented PKI technologies: Authorization certificates  Bind authorizations and public keys  Represent authorization claims; proof via private-key-possession  E.g.  SPKI Authorization certificate Public key Entity ID Identity-oriented PKI technologies: Identity certificates:  Bind entity IDs and public keys  Represent identity claims; proof via private-key-possession  E.g.  X.509, PEM, PGP, PKIX Identity certificate
Exploring   PKI Which Duties Does PKI Have? Certification request Process applications for public key certificates Certificate generation Issuance of public key certificates according given certification practices Certificate use Provisioning of public key certificates  Provisioning of certificate status information Certificate revocation  Exceptional premature termination Certificate termination  According validity period or upon revocation event Certificate generation Certificate use Certificate termination Certificate revocation Certification request
Exploring   PKI  Which Entities Comprise a PKI?  Infrastructure Applications End entity ( subscribing ) PKI stub End entity (relying) PKI stub Application entities – use PKI services: Subscribing party Owns and employs private keys Owns public key certificates Relying party Employs public keys (via certificate) RA Repository CA Infrastructure entities - supply PKI services: RA - Registration Authority Processes registration requests CA - Certification Authority  Issues public key certificates Repository Supports certificate and CRL distribution
Exploring PKI  How to Interface with Applications?  New approach: Multi-tier: delegate the processing of public   key certificates to XKMS / SCVP services. Lean PKI clients: simpler to PKI-enable applications. Easier to enforce uniform policies.  Trusted certificates, policies RA Repository CA XKMS / SCVP service Path construction Path validation Status checking End entity (relying) XKMS / SCVP  integration XKMS /  SCVP configuration Traditional approach : 2-tier: end entities vs. PKI services Fat PKI clients: difficult and costly to  PKI- enable applications. Hard to enforce uniform, domain-wide trust policies. End entity (relying) RA Repository CA Path construction Path validation Status checking Trusted certificates, policies
Exploring PKI How to Interface with Smart-Cards? Network Data object Generate checksum Validate checksum Data object Check- sum Data object Check- sum O K? Authentication Public   key certificate Infrastructure Applications PKI RA Repository CA As above PKCS#11, MS-CAPI... Smart-Cards Keying association Keys Cert
Exploring PKI How to Interface with Identity Management? Identity management is concerned with the lifecycle of digital identity information for users.  Identity-oriented PKI technologies such as PKIX bind entity identifiers and public keys: Inventing an own identity management for PKIs – from the scratch - should be avoided. Present identity management services and resources should be integrated with PKI services.  distinguishedName org orgUnit surname givenName commonName serialNumber subjectAltName kerberosPrincipalName rfc822Name Identity management HR IT ... PKI RA Repository CA
Exploring PKI How to Cross Organization Boundaries? Hierarchical PKI domains Tree structure with dedicated CAs: single root CA, multiple subordinate CAs (employing intra-domain cross certification) Examples: PEM-PKI, PKIX-based enterprise PKIs Autonomic PKI domains Multiple independent and unrelated PKI hierarchies Example: PKIs for Web server authentication Federal PKI domains Multiple PKI hierarchies in cooperation Example: inter-domain cross-certified PKI hierarchies, bridge CA models User-centric PKI domains Non-hierarchical: each participant may certify public keys of others Example: PGP-PKI (Web-of-trust)
Lessons-Learnt  How to Deploy PKIs? In-house PKI: Implement required infrastructure components (RA, CA, repository) yourself Maximal control; tailored services and assurances Significant fixed-cost expenditures for hardware, software, personnel, implementation, operations... Outsourced PKI: Obtain RA and CA services from provider (opt. repository services too) Limited control; standard services and assurances Expenditures correlate to the number of certificates issued Mixed models: E.g. implement RA, repository yourself; obtain CA services from provider Retains control of certificate issuance Reduced fixed-cost expenditures for integration with third-party CA plus  costs correlating to the number of certificates issued
Lessons-Learnt What Happened Until Now? During its hype there was hope for ‘ubiquitous PKI‘. This has not happened yet:  PKIs for large and diverse populations have not materialized until now  PKIs for smaller or less diverse populations are emerging: Enterprise PKI, ID-card projects PKIs for dedicated purposes are well-established: PKIs for Web server authentication Reasons include: PKIs for large and diverse populations: User awareness and demand Compelling business cases PKIs for smaller or less diverse populations: PKI is somewhat invasive requiring a spread in employment and use Organizations need to think global, act local PKIs for dedicated purposes: Specific constraints ease introduction
Lessons-Learnt  What Should Be On Your Checklist?  Strategy / commitment PKI project mission / vision  Management support Business processes alignment Target processes / applications Target community Technical implementation PKI technologies, services, key and certificate profiles... Technical integration PKI applications, security token technologies, other infrastructure Operations PKI processes Change management, new applications Human factors Training of providers and users PKI understanding Be also aware of pitfalls Misconceptions Certificates    signature Certificates are created using signatures (and vice versa) Certificates    authentication Certificates do not authenticate the claims they represent Negligence Certificates are not routinely checked or attributes ignored Signature protects contents  of a certificate, but not the integrity of  a  set of certificates.
Lessons-Learnt   What Can PKI Do For You? Support of signer identification  Symmetric schemes do not support an unambiguous signer identification. Capability to support non-repudiation Digital signatures and underlying PKI support non-repudiation services by delivering evidence generation and validation.  But they do not provide non-repudiation since they do not define evidence interpretation. Non-repudiation policies need to be established in addition to digital signatures and underlying PKI. Reducing third party trust Functional trust in third parties sufficient for asymmetric schemes. Symmetric schemes require unconditional trust in third parties. Sharing / distribution of credentials representing ‘entity ID and key’ bindings Symmetric schemes require secrecy of ‘entity ID and key’ bindings.  Cost sharing for the management of such credentials Symmetric schemes prohibit large scale resource and cost sharing.
Conclusions Applications deploying public key cryptography need to assure the authenticity of public keys: PKI provides measures to achieve this goal. PKI is an enabling infrastructure for public key based IT-security services:  It provides key management services for public keys.  Its main value proposition are persistent document authentication services with support for non-repudiation. PKI credentials such as certificates may be widely employed allowing cost sharing for the management of such objects.
Author Information Dr. Oliver Pfaff ICN EN SNS TNA 4 Mail: oliver.pfaff@siemens.com Phone: +49.89.722.53227 Mobile: +49.172.8250805

More Related Content

PDF
Public key Infrastructure (PKI)
PPTX
Public key infrastructure
PPT
PKI and Applications
PPTX
Introduction to Public Key Infrastructure
PPTX
CA API Gateway: Web API and Application Security
PDF
Broken access control
PDF
Future-proofing Authentication with Passkeys
ODP
OAuth2 - Introduction
Public key Infrastructure (PKI)
Public key infrastructure
PKI and Applications
Introduction to Public Key Infrastructure
CA API Gateway: Web API and Application Security
Broken access control
Future-proofing Authentication with Passkeys
OAuth2 - Introduction

What's hot (20)

PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PDF
Pki and OpenSSL
PPTX
Digital certificates and information security
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PDF
Digital Identity Wallets: What They Mean For Banks
PPTX
Identity and access management
PDF
Broken access controls
PPTX
Email Security Awareness
PDF
5. Identity and Access Management
PPT
Secure code practices
PPTX
IBM - Hey FIDO, Meet Passkey!.pptx
PPT
Presentation on digital signatures & digital certificates
PPTX
Multifactor Authentication
PDF
OWASP API Security Top 10 Examples
PDF
Cyber Security Awareness
PDF
Windows Service Hardening
PPTX
Ransomware
PPTX
IBM: Hey FIDO, Meet Passkey!.pptx
PDF
Blockchain
PPTX
Fido Technical Overview
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Pki and OpenSSL
Digital certificates and information security
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Digital Identity Wallets: What They Mean For Banks
Identity and access management
Broken access controls
Email Security Awareness
5. Identity and Access Management
Secure code practices
IBM - Hey FIDO, Meet Passkey!.pptx
Presentation on digital signatures & digital certificates
Multifactor Authentication
OWASP API Security Top 10 Examples
Cyber Security Awareness
Windows Service Hardening
Ransomware
IBM: Hey FIDO, Meet Passkey!.pptx
Blockchain
Fido Technical Overview
Ad

Similar to Implementing Public-Key-Infrastructures (20)

PPTX
Introduction to Public Key Infrastructure (PKI)
PDF
PUBLIC KEY INFRASTRUCTURE Network and network devices
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPT
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
PPTX
Public Key Infrastructure (PKI) in Action
PDF
Ijarcet vol-2-issue-7-2307-2310
PDF
Ijarcet vol-2-issue-7-2307-2310
PDF
Iaetsd secure emails an integrity assured email
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PPTX
Unit 4 (Part II) - Authentication Framework for PKC.pptx
PPTX
Kerberos-PKI-Federated identity
PDF
PKI in Korea
PPT
Jerad Bates - Public Key Infrastructure.ppt
PPT
Jerad Bates - Public Key Infrastructure.ppt
PPT
Jerad Bates - Public Key Infrastructure (1).ppt
PDF
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
PDF
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
PDF
Everything you need to Know about PKI .pdf
PDF
www.ijerd.com
Introduction to Public Key Infrastructure (PKI)
PUBLIC KEY INFRASTRUCTURE Network and network devices
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
Public Key Infrastructure (PKI) in Action
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Iaetsd secure emails an integrity assured email
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Kerberos-PKI-Federated identity
PKI in Korea
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure (1).ppt
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Everything you need to Know about PKI .pdf
www.ijerd.com
Ad

More from Oliver Pfaff (18)

PDF
Trends in IIoT and OT Security
PDF
Web-of-Things and Services Security
PDF
Deciphering 'Claims-based Identity'
PDF
IT-Security@Contemporary Life
PDF
OAuth Base Camp
PDF
New Trends in Web Security
PDF
OpenID Connect - An Emperor or Just New Cloths?
PDF
Does REST Change the Game for IAM?
PDF
Analyzing OAuth
PPT
Trust in E- and M-Business - Advances Through IT-Security
PPT
Identifying How WAP Can Be Used For Secure mBusiness
PPT
Early Adopting Java WSIT-Experiences with Windows CardSpace
PPT
Identity 2.0 and User-Centric Identity
PDF
State-of-the-Art in Web Services Federation
PPT
Unified Security Architectures for Web and WAP
PPT
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
PPT
Identity 2.0, Web services and SOA in Health Care
PPT
SOA Security - So What?
Trends in IIoT and OT Security
Web-of-Things and Services Security
Deciphering 'Claims-based Identity'
IT-Security@Contemporary Life
OAuth Base Camp
New Trends in Web Security
OpenID Connect - An Emperor or Just New Cloths?
Does REST Change the Game for IAM?
Analyzing OAuth
Trust in E- and M-Business - Advances Through IT-Security
Identifying How WAP Can Be Used For Secure mBusiness
Early Adopting Java WSIT-Experiences with Windows CardSpace
Identity 2.0 and User-Centric Identity
State-of-the-Art in Web Services Federation
Unified Security Architectures for Web and WAP
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Identity 2.0, Web services and SOA in Health Care
SOA Security - So What?

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Big Data Technologies - Introduction.pptx
Modernizing your data center with Dell and AMD
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...

Implementing Public-Key-Infrastructures

  • 1. Implementing Public Key Infrastructures Dr. Oliver Pfaff Siemens AG KEMA Seminar "Utility Communications “ June 2003 , Amsterdam, Netherlands
  • 2. Contents of this Presentation Setting-the-scene Introducing PKI Exploring PKI Lessons-learnt Conclusions Appendix: success stories
  • 3. Setting-the-Scene How to Trust? Trust is fundamental in IT: RFC 2828 defines trust as: The extent to which someone who relies on a system can have confidence that the system meets its specifications. What is needed for trust in IT? Ability to determine the source of information as well as its integrity. This property is called authentication. The need for authentication is ubiquitous in IT: Literally all kinds of IT-systems do have some inherent understanding of authentication. Quite often this is as simple as: ... we believe anything coming across this interface to be authentic ... I.e. authentication might be defined by a condition that is always true.
  • 4. Setting-the-Scene What are Authentication-Enabled Services? Authentication Encryption Thwart active attacks Single-Sign-On Transfer authentication Access control Determine authorization Non-repudiation Validate and interpret evidence Privacy Enforce policies Digital rights management Control content distribution
  • 5. Setting-the-Scene How to Advance Authentication? Non-cryptographic Cryptographic Keyed checksums allow to verify the authenticity of data objects Shared secrets Allow origin authentication; do not bind exchanged information Classical codes Provide protection against transmission errors; not against intentional attacks Biometrics Can authenticate human beings; not IT-systems or data objects In-band Supplementary information via secondary channel Supplementary information attached with payload Out-of-band Used in various scenarios; not generic due to availability, cost, handling issues Our focus
  • 6. Setting-the-Scene Is Cryptography the Final Answer? Good news: cryptography is a means to provide authentication... Bad news: ...supposed the keying associations between the peers are authentic Alice‘s signature key 10100101001010100111... Verification key for Alice 01010101001 010010... Alice Bob I love You! I love You! Check- sum I love You! Check- sum O K? Network Verification key for attacker 0000000000000000 ... Attacker‘s signature key 111111111111111 ... I hate You! I hate You! Check- sum Attacker Intercept, exchange message I hate You! Check- sum 000000000000000 ... Replace key value
  • 7. Introducing PKI What is Public Key Cryptography? Public key cryptography employs pairs of related keys: Private keys Kept secret by their owners. Public keys Made widely available (without loss of security). Public key cryptography supports a variety of security services including: Authentication: Entity authentication Message / document authentication with signer identification Encryption Encryption pattern: Authentication pattern: Generate checksum Validate checksum Encrypt data Decrypt data Plain text Cipher text Plain text Private key Public key Check sum O K? Private key Public key Data object Data object
  • 8. Introducing PKI What is Public Key Infrastructure? Unfortunately, the term Public Key Infrastructure (PKI) is interpreted in various ways throughout the community. This requires a working definition for this presentation: Motivation: The term PKI essentially comprises two parts, 'public key' and ‘infrastructure‘: Public key A concept in cryptography, denoting a key that may be made public. Infrastructure A notion denoting resources that are required for an activity. Working definition: PKI comprises techniques and services to safeguard the authenticity of public keys in distributed IT-systems .
  • 9. Introducing PKI What Are Public Key Certificates? Thus, certificates are persistent carriers for public keys along with supplementary information. Public key Public key certificates explicitly bind supplementary information to public keys. This binding is usually lasting. Key holder, authorization s ... To be useful, public keys need to be augmented by supplementary information (e.g. about key holder, authorizations). Signature Its contents are protected by a cryptographic checksum for protection against manipulation.
  • 10. Introducing PKI Which PKI Technologies Exist? Attribute/ authorization Attribute certificates: Bind entity IDs and attributes Represent attribute claims; proof via private-key-possession E.g. X.509, PKIX Attribute certificate Authorization-oriented PKI technologies: Authorization certificates Bind authorizations and public keys Represent authorization claims; proof via private-key-possession E.g. SPKI Authorization certificate Public key Entity ID Identity-oriented PKI technologies: Identity certificates: Bind entity IDs and public keys Represent identity claims; proof via private-key-possession E.g. X.509, PEM, PGP, PKIX Identity certificate
  • 11. Exploring PKI Which Duties Does PKI Have? Certification request Process applications for public key certificates Certificate generation Issuance of public key certificates according given certification practices Certificate use Provisioning of public key certificates Provisioning of certificate status information Certificate revocation Exceptional premature termination Certificate termination According validity period or upon revocation event Certificate generation Certificate use Certificate termination Certificate revocation Certification request
  • 12. Exploring PKI Which Entities Comprise a PKI? Infrastructure Applications End entity ( subscribing ) PKI stub End entity (relying) PKI stub Application entities – use PKI services: Subscribing party Owns and employs private keys Owns public key certificates Relying party Employs public keys (via certificate) RA Repository CA Infrastructure entities - supply PKI services: RA - Registration Authority Processes registration requests CA - Certification Authority Issues public key certificates Repository Supports certificate and CRL distribution
  • 13. Exploring PKI How to Interface with Applications? New approach: Multi-tier: delegate the processing of public key certificates to XKMS / SCVP services. Lean PKI clients: simpler to PKI-enable applications. Easier to enforce uniform policies. Trusted certificates, policies RA Repository CA XKMS / SCVP service Path construction Path validation Status checking End entity (relying) XKMS / SCVP integration XKMS / SCVP configuration Traditional approach : 2-tier: end entities vs. PKI services Fat PKI clients: difficult and costly to PKI- enable applications. Hard to enforce uniform, domain-wide trust policies. End entity (relying) RA Repository CA Path construction Path validation Status checking Trusted certificates, policies
  • 14. Exploring PKI How to Interface with Smart-Cards? Network Data object Generate checksum Validate checksum Data object Check- sum Data object Check- sum O K? Authentication Public key certificate Infrastructure Applications PKI RA Repository CA As above PKCS#11, MS-CAPI... Smart-Cards Keying association Keys Cert
  • 15. Exploring PKI How to Interface with Identity Management? Identity management is concerned with the lifecycle of digital identity information for users. Identity-oriented PKI technologies such as PKIX bind entity identifiers and public keys: Inventing an own identity management for PKIs – from the scratch - should be avoided. Present identity management services and resources should be integrated with PKI services. distinguishedName org orgUnit surname givenName commonName serialNumber subjectAltName kerberosPrincipalName rfc822Name Identity management HR IT ... PKI RA Repository CA
  • 16. Exploring PKI How to Cross Organization Boundaries? Hierarchical PKI domains Tree structure with dedicated CAs: single root CA, multiple subordinate CAs (employing intra-domain cross certification) Examples: PEM-PKI, PKIX-based enterprise PKIs Autonomic PKI domains Multiple independent and unrelated PKI hierarchies Example: PKIs for Web server authentication Federal PKI domains Multiple PKI hierarchies in cooperation Example: inter-domain cross-certified PKI hierarchies, bridge CA models User-centric PKI domains Non-hierarchical: each participant may certify public keys of others Example: PGP-PKI (Web-of-trust)
  • 17. Lessons-Learnt How to Deploy PKIs? In-house PKI: Implement required infrastructure components (RA, CA, repository) yourself Maximal control; tailored services and assurances Significant fixed-cost expenditures for hardware, software, personnel, implementation, operations... Outsourced PKI: Obtain RA and CA services from provider (opt. repository services too) Limited control; standard services and assurances Expenditures correlate to the number of certificates issued Mixed models: E.g. implement RA, repository yourself; obtain CA services from provider Retains control of certificate issuance Reduced fixed-cost expenditures for integration with third-party CA plus costs correlating to the number of certificates issued
  • 18. Lessons-Learnt What Happened Until Now? During its hype there was hope for ‘ubiquitous PKI‘. This has not happened yet: PKIs for large and diverse populations have not materialized until now PKIs for smaller or less diverse populations are emerging: Enterprise PKI, ID-card projects PKIs for dedicated purposes are well-established: PKIs for Web server authentication Reasons include: PKIs for large and diverse populations: User awareness and demand Compelling business cases PKIs for smaller or less diverse populations: PKI is somewhat invasive requiring a spread in employment and use Organizations need to think global, act local PKIs for dedicated purposes: Specific constraints ease introduction
  • 19. Lessons-Learnt What Should Be On Your Checklist? Strategy / commitment PKI project mission / vision Management support Business processes alignment Target processes / applications Target community Technical implementation PKI technologies, services, key and certificate profiles... Technical integration PKI applications, security token technologies, other infrastructure Operations PKI processes Change management, new applications Human factors Training of providers and users PKI understanding Be also aware of pitfalls Misconceptions Certificates  signature Certificates are created using signatures (and vice versa) Certificates  authentication Certificates do not authenticate the claims they represent Negligence Certificates are not routinely checked or attributes ignored Signature protects contents of a certificate, but not the integrity of a set of certificates.
  • 20. Lessons-Learnt What Can PKI Do For You? Support of signer identification Symmetric schemes do not support an unambiguous signer identification. Capability to support non-repudiation Digital signatures and underlying PKI support non-repudiation services by delivering evidence generation and validation. But they do not provide non-repudiation since they do not define evidence interpretation. Non-repudiation policies need to be established in addition to digital signatures and underlying PKI. Reducing third party trust Functional trust in third parties sufficient for asymmetric schemes. Symmetric schemes require unconditional trust in third parties. Sharing / distribution of credentials representing ‘entity ID and key’ bindings Symmetric schemes require secrecy of ‘entity ID and key’ bindings. Cost sharing for the management of such credentials Symmetric schemes prohibit large scale resource and cost sharing.
  • 21. Conclusions Applications deploying public key cryptography need to assure the authenticity of public keys: PKI provides measures to achieve this goal. PKI is an enabling infrastructure for public key based IT-security services: It provides key management services for public keys. Its main value proposition are persistent document authentication services with support for non-repudiation. PKI credentials such as certificates may be widely employed allowing cost sharing for the management of such objects.
  • 22. Author Information Dr. Oliver Pfaff ICN EN SNS TNA 4 Mail: oliver.pfaff@siemens.com Phone: +49.89.722.53227 Mobile: +49.172.8250805

Editor's Notes

  • #5: Encryption conceals the original meaning of data to prevent it from being known to or used by unauthorized entities; authentication is a prerequisite to thwart active attacks on encryption schemes SSO user authentication employs 3-party authentication protocols; authentication is performed between client as well as authentication service and transferred to target services. Access control is the regulation of access to resources according to a security policy; authentication is a prerequisite to determine authorization. Non-repudiation is the capability to prevent the denial of (prior) actions, statements, commitments; authentication is required in evidence validation and thus a prerequisite for evidence interpretation Digital rights management is considered to be the digital management of rights, I.e. the digital management of physical, digital, abstract entities; protection of IPR requires sound access control and thus authentication. Privacy is considered to be the right of a person to determine the degree to which she/he will interact with its environment; authentication is a prerequisite to enforce privacy policies (esp. when communicating in distributed environments).
  • #9: Note: resources that are required to deploy public key cryptography are authentic public keys
  • #15: Note: there is another layer beneath PKI (cf. next slide)
  • #20: Intro: assume audience belongs to the middle case of ‚ smaller, less diverse populations ‘ and is considering the introduction of PKI
  • #21: No generic infrastructure technology for life-cycle management of initial ‘entity identifier and key’-bindings emerged in secret key authentication.