SlideShare a Scribd company logo
Public Key Infrastructure
and Applications
Agenda
 PKI Overview
 Digital Signatures
 What is it?
 How does it work?
 Digital Certificates
 Public Key Infrastructure
 PKI Components
 Policies
 Internet Security
 Web Security with SSL
 Smart Cards
 Email signing – S/MIME
What’s the problem?
 Information over the Internet is Free,
Available, Unencrypted, and Untrusted.
 Not desirable for many Applications
 Electronic Commerce
 Software Products
 Financial Services
 Corporate Data
 Healthcare
 Subscriptions
 Legal Information
Multiple Security Issues
Privacy
Integrity
Authentication
Non-repudiation
Interception Spoofing
Modification Proof of parties involved
Security Algorithms
 Symmetric Algorithms
 Triple-DES, DES, CAST, RC2, IDEA
 Public Key Algorithms
 RSA, DSA, Diffie-Hellman, Elliptic Curve
 Hashing Algorithms
 SHA-1, MD5, RIPEMD
Symmetric Key Encryption
 If any one’s key is compromised, all keys
need to be replaced
 Not practical or cost effective for Internet
environments
INTERNET
Public Key Cryptography
Public
Encryption
Private
Decryption
 Public-Key Cryptography is an encryption scheme
that uses mathematically related, but not
identical keys.
 Each user has a key pair (public key/private key).
 Information encrypted with the public key can
only be decrypted using the private key.
What is a Digital Signature ?
 A Digital Signature is the result of encrypting the
Hash of the data to be exchanged.
 A Hash (or Message Digest) is the process of
mathematically reducing a data stream down to a
fixed length field.
 The Hash uniquely represents the original data.
 The probability of producing the same Hash with
two sets of different data is <.001%.
 Signature Process is opposite to Encryption Process
 Private Key is used to Sign (encrypt) Data
 Public Key is used to verify (decrypt) Signature
Digital Signature Process
 Step 1. Hash (digest) the data using one of the
supported Hashing algorithms, e.g., MD2, MD5, or
SHA-1.
 Step 2. Encrypt the hashed data using the sender’s
private key.
 Step 3. Append the signature (and a copy of the
sender’s public key) to the end of the data that was
signed.
Data
Hash
Encrypt
Hash
Digital Signature
Digital Signature
Private
Step 1. Step 2.
Step 3.
Public
Signature Verification Process
 Step 1. Hash the original data using the same hashing
algorithm.
 Step 2. Decrypt the digital signature using the sender’s
public key. All digital signatures contain a copy of the
signer’s public key.
 Step 3. Compare the results of the hashing and the
decryption. If the values match then the signature is
verified. If the values do not match, then the data or
signature was probably modified in transit.
Data
Hash
Decrypt
Hash
Digital Signature
Public Key
Step 2.
Step 3.
Hash
Step 1.
The Critical Questions
 How can the recipient know with certainty
the sender’s public key? (to validate a
digital signature)
 How can the sender know with certainty
the recipient’s public key? (to send an
encrypted message)
Digital Certificates
 Before B accepts a message with A’s Digital Signature,
B wants to be sure that the public key belongs to A
and not to someone masquerading as A on an open
network
 One way to be sure, is to use a trusted third party to
authenticate that the public key belongs to A. Such a
party is known as a Certification Authority (CA)
 Once A has provided proof of identity, the
Certification Authority creates a message containing
A’s name and public key. This message is known as a
Digital Certificate.
~~~~
~~~~
~~~~
Digital
Signature
 Before two parties exchange data using
Public Key cryptography, each wants to be
sure that the other party is authenticated
Digital Certificates
 A Digital Certificate is simply an X.509 defined data
structure with a Digital Signature. The data
represents who owns the certificate, who signed the
certificate, and other relevant information
Version #
Serial #
Signature Algorithm
Issuer Name
Validity Period
Subject Name
Subject Public Key
Issuer Unique ID
Subject Unique ID
Extensions
Digital Signature
X.509 Certificate  When the signature is generated
by a Certification Authority
(CA), the signature can be
viewed as trusted.
 Since the data is signed, it can
not be altered without
detection.
 Extensions can be used to tailor
certificates to meet the needs
of end applications.
Certificate Life Cycle
Key pair generated
Certificate issued
Key pair in use Private key
compromised
Certificate
revoked
Certificate expires
Key pair lifetime exceeded?
New key
pair
generated
Re-certify
Certificate Revocation Lists
 CA periodically publishes a data structure
called a certificate revocation list (CRL).
 Described in X.509 standard.
 Each revoked certificate is identified in a
CRL by its serial number.
 CRL might be distributed by posting at
known Web URL or from CA’s own X.500
directory entry.
PKI Players
 Registration Authority (RA) to identity proof
users
 Certification Authorities (CA) to issue
certificates and CRL’s
 Repositories (publicly available databases)
to hold certificates and CRLs
Certification Authority (CA)
Certification Authority
 Trusted (Third) Party
 Enrolls and Validates
Subscribers
 Issues and Manages
Certificates
 Manages Revocation and
Renewal of Certificates
 Establishes Policies &
Procedures
What’s Important
 Operational Experience
 High Assurance Security
Architecture
 Scalability
 Flexibility
 Interoperability
 Trustworthiness
Certification Authority = Basis of Trust
Registration Authority (RA)
 Enrolling, de-enrolling, and approving or
rejecting requested changes to the certificate
attributes of subscribers.
 Validating certificate applications.
 Authorizing requests for key-pair or certificate
generation and requests for the recovery of
backed-up keys.
 Accepting and authorizing requests for
certificate revocation or suspension.
 Physically distributing personal tokens to and
recovering obsolete tokens from people
authorized to hold and use them.
Certificate Policy (CP) is …
 the basis for trust between unrelated
entities
 not a formal “contract” (but implied)
 a framework that both informs and
constrains a PKI implementation
 a statement of what a certificate means
 a set of rules for certificate holders
 a way of giving advice to Relying Parties
Public Key Security
Services
Public Key Technology
Digital Certificates
Certification Authorities
Security Management
Technology
Infrastructure
PRIVACY
AUTHENTICATION
INTEGRITY
NON-REPUDIATION
 Public Key Technology Best Suited to Solve Business Needs
 Infrastructure = Certification Authorities
Authentication/Access Control
 Can Public Key Technology be
used to perform Authentication
and Access Control?
Sure Can
How?
Digital
Signature
Using Digital Signatures
and Digital Certificates
SSL Protocol
Secure Socket Layer
Application
and so on …..
HTTP
TCP/IP Layer
Network Layer
FTP NNTP
 Secure Socket Layer (SSL) is a Network
Layer protocol used to secure data on
TCP/IP networks.
SSL 2.0 Protocol
• Browser
Connects to
Secure Server
CertS
{SessKeyB } CertS
{Data} SessKeyB
• Browser verifies
signature on CertS
• Browser generates
session key
(SessKeyB)
• Browser encrypts
SessKeyB using CertS
• Server sends copy of
Server certificate (CertS) to
Browser, indicating that
SSL 2.0 is enabled
• Server decrypts
SessKeyB using it’s
private key
• Browser and Server use SessKeyB to encrypt all data exchanged over the Internet
 SSL 2.0 provides encryption between the server
and the browser.
SSL 3.0 with Client Authentication
• Browser Connects to
Secure Server
CertS - SSL 3.0
{SessKeyB } CertS + CertB
{Data} SessKeyB
• Browser verifies
signature on CertS
• Browser generates
session key (SessKeyB)
• Browser encrypts
SessKeyB using CertS
• Browser asks operator to
select a Browser
certificate (CertB) to
access server
• Server sends copy of Server
certificate (CertS) to Browser,
indicating that SSL 3.0 is enabled
with client authentication
• Server verifies signature on
CertB (Server can check other
information as well)
• Server decrypts SessKeyB
using it’s private key
• Browser and Server use SessKeyB to encrypt all data exchanged over the Internet
Smart Cards
 Microprocessor with memory that can generate and
store keys and certificates
 Different form factors and interface mechanisms
 Cryptographic functions using private key are
processed on the card itself
Smart Cards and PKI
 Smart cards are «certificate wallets»
 Secure storage for:
 Owner private key
 Smart Cards are a «PC-in-your-Pocket»
 Generation of owner’s digital signature
 Smart cards provide:
 Mobility
 Security
 Transparency
Digital ID
 Asymmetric key-pair
 public key
 private key
 X.509 certificate
 ISO standard
 public key
 credentials
Smart card application example:
Digital Signature
Smart card in
heterogeneous environments
 Smart cards need readers and drivers
 Readers
 desktop or embedded (keyboard, floppy slot)
 optional display and keypad
 PC world ready for installation
 Mac, Unix & Linux ‘waiting’ for USB
 Drivers
 PC/SC standard for Windows PC
 custom developments
Pay-TV, did you know it’s PKI ?
 Pay-TV systems installed worldwide
 22 millions customers
 pay-per-view
 electronic purse
 Internet
 Managed and secured with a very high
proprietary secured PKI solution
 based on a smartcard
Signed and Encrypted Email – S/MIME
 S/MIME – Secure Multipurpose Internet Mail
Extensions
 Prevent email spoofing
 Helps preventing forged email
 Helps preventing spam
 Protect sensitive messages & documents
 Secure business processes
 Signed messages
 S/MIME-based applications
Using PKI Certificates in Outlook (1)
Open Outlook.
Select Tools
from the main
menu then
choose Options
from the drop-
down menu.
1
Using PKI Certificates in Outlook (2)
Click on the
Security tab.
2
Using PKI Certificates in Outlook (3)
Click the
Settings
button.
3
Using PKI Certificates in Outlook (4)
4
In the Security
Settings Name field,
enter a name for the
new Security Setting .
Type S/MIME in the
Secure Message
Format field.
Click the Choose button
next to the Signing
Certificate field.
Using PKI Certificates in Outlook (5)
Click on the
certificate issued
by C3 Mail CA.
This is your Email
Signing certificate.
Click OK.
5
Using PKI Certificates in Outlook (6)
Choose SHA1 from
the Hash Algorithm
drop down menu.
Click on the Choose
button next to the
Encryption
Certificate field.
6
Using PKI Certificates in Outlook (7)
Click on the certificate
issued by C3 Mail CA.
This is your Email
Encryption certificate.
Click OK.
7
Using PKI Certificates in Outlook (8)
Choose 3DES from
the Encryption
Certificate drop
down box.
Check all 3 boxes in
the Change Security
Settings window.
Click OK.
8
Using PKI Certificates in Outlook (9)
Click the
Apply button
then click OK.
9
Questions?

More Related Content

PPT
Public Key Infrastructure and Application_Applications.ppt
PPT
PKI and Applications
PPTX
PPT
Secure payment systems
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPT
Digital certificates
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PPTX
public key infrastructure
Public Key Infrastructure and Application_Applications.ppt
PKI and Applications
Secure payment systems
Ch12 Cryptographic Protocols and Public Key Infrastructure
Digital certificates
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
public key infrastructure

Similar to PKI_Applications digital certificate.ppt (20)

PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PPTX
Digital certificates in e commerce
PPTX
Digital signature & PKI Infrastructure
PDF
The world of encryption
PPTX
Impact of digital certificate in network security
PPTX
Impact of digital certificate in network security
PPTX
Secrity project keyvan
PPTX
Cryptography
PDF
Cisco cybersecurity essentials chapter -5
PPTX
Digital certificates
PPT
PPT
Presentation on digital signatures & digital certificates
DOCX
PDF
Digital certificates &amp; its importance
PDF
Difference between digital signature and digital certificate.pdf
PPT
Ynamono Hs Lecture
PDF
How encryption works
PPT
Internet Security Basics
PDF
Introduction of an SSL Certificate
PPTX
How to back up data.pptx
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Digital certificates in e commerce
Digital signature & PKI Infrastructure
The world of encryption
Impact of digital certificate in network security
Impact of digital certificate in network security
Secrity project keyvan
Cryptography
Cisco cybersecurity essentials chapter -5
Digital certificates
Presentation on digital signatures & digital certificates
Digital certificates &amp; its importance
Difference between digital signature and digital certificate.pdf
Ynamono Hs Lecture
How encryption works
Internet Security Basics
Introduction of an SSL Certificate
How to back up data.pptx
Ad

More from ubaidullah75790 (20)

PPTX
Chapter20 transaction processing system .pptx
PPTX
Chapter22 database security in dbms.pptx
PPTX
Chapter27 distributed database syst.pptx
PPTX
File Organization in database management.pptx
PPTX
transaction processing databse management.pptx
PPT
physical database design distributed .ppt
PPT
module03-ipaddr ipv6 addressing in net.ppt
PPT
PDBD- Part2 physical database design.ppt
PPT
Physical_Design system development life.PPT
PPT
S3 application and network attacks in.ppt
PPT
Chapter 5 cyber security in computer.ppt
PPTX
1606802425-dba-w7 database management.pptx
PPT
ENCh18 database management system ss.ppt
PPT
Chapter07 database system in computer.ppt
PPT
Chapter05 database sytem in computer . ppt
PPT
Chapter04 database system in computer.ppt
PPT
Chapter03 database system in computer.ppt
PPT
Chapter02 database system in computer.ppt
PPT
Chapter01 database system in computer.ppt
PPT
MYCH8 database management system in .ppt
Chapter20 transaction processing system .pptx
Chapter22 database security in dbms.pptx
Chapter27 distributed database syst.pptx
File Organization in database management.pptx
transaction processing databse management.pptx
physical database design distributed .ppt
module03-ipaddr ipv6 addressing in net.ppt
PDBD- Part2 physical database design.ppt
Physical_Design system development life.PPT
S3 application and network attacks in.ppt
Chapter 5 cyber security in computer.ppt
1606802425-dba-w7 database management.pptx
ENCh18 database management system ss.ppt
Chapter07 database system in computer.ppt
Chapter05 database sytem in computer . ppt
Chapter04 database system in computer.ppt
Chapter03 database system in computer.ppt
Chapter02 database system in computer.ppt
Chapter01 database system in computer.ppt
MYCH8 database management system in .ppt
Ad

Recently uploaded (20)

PPTX
Brown and Beige Vintage Scrapbook Idea Board Presentation.pptx.pptx
PPTX
Green and Blue Illustrative Earth Day Presentation.pptx
PDF
waiting, Queuing, best time an event cab be done at a time .pdf
PPTX
Military history & Evolution of Armed Forces of the Philippines
PPTX
E8 Q1 020ssssssssssssssssssssssssssssss2 PS.pptx
PPTX
G10 HOMEROOM PARENT-TEACHER ASSOCIATION MEETING SATURDAY.pptx
PPTX
Lesson 1-Principles of Indigenous Creative Crafts.pptx
PPTX
400kV_Switchyard_Training_with_Diagrams.pptx
PPTX
A slideshow about aesthetic value in arts
PPTX
CMU-PPT-LACHICA-DEFENSE FOR RESEARCH PRESENTATION
PPTX
VAD - Acute and chronic disorders of mesenteric.pptx
PPTX
Certificados y Diplomas para Educación de Colores Candy by Slidesgo.pptx
PPTX
Slide_Egg-81850-About Us PowerPoint Template Free.pptx
PPTX
CPAR7 ARTS GRADE 112 LITERARY ARTS OR LI
PPTX
Socio ch 1 characteristics characteristics
PPTX
current by laws xxxxxxxxxxxxxxxxxxxxxxxxxxx
PDF
; Projeto Rixa Antiga.pdf
PPTX
slide head and neck muscel for medical students
PPTX
SAPOTA CULTIVATION.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
PPTX
DIMAYUGA ANDEA MAE P. BSED ENG 3-2 (CHAPTER 7).pptx
Brown and Beige Vintage Scrapbook Idea Board Presentation.pptx.pptx
Green and Blue Illustrative Earth Day Presentation.pptx
waiting, Queuing, best time an event cab be done at a time .pdf
Military history & Evolution of Armed Forces of the Philippines
E8 Q1 020ssssssssssssssssssssssssssssss2 PS.pptx
G10 HOMEROOM PARENT-TEACHER ASSOCIATION MEETING SATURDAY.pptx
Lesson 1-Principles of Indigenous Creative Crafts.pptx
400kV_Switchyard_Training_with_Diagrams.pptx
A slideshow about aesthetic value in arts
CMU-PPT-LACHICA-DEFENSE FOR RESEARCH PRESENTATION
VAD - Acute and chronic disorders of mesenteric.pptx
Certificados y Diplomas para Educación de Colores Candy by Slidesgo.pptx
Slide_Egg-81850-About Us PowerPoint Template Free.pptx
CPAR7 ARTS GRADE 112 LITERARY ARTS OR LI
Socio ch 1 characteristics characteristics
current by laws xxxxxxxxxxxxxxxxxxxxxxxxxxx
; Projeto Rixa Antiga.pdf
slide head and neck muscel for medical students
SAPOTA CULTIVATION.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
DIMAYUGA ANDEA MAE P. BSED ENG 3-2 (CHAPTER 7).pptx

PKI_Applications digital certificate.ppt

  • 2. Agenda  PKI Overview  Digital Signatures  What is it?  How does it work?  Digital Certificates  Public Key Infrastructure  PKI Components  Policies  Internet Security  Web Security with SSL  Smart Cards  Email signing – S/MIME
  • 3. What’s the problem?  Information over the Internet is Free, Available, Unencrypted, and Untrusted.  Not desirable for many Applications  Electronic Commerce  Software Products  Financial Services  Corporate Data  Healthcare  Subscriptions  Legal Information
  • 5. Security Algorithms  Symmetric Algorithms  Triple-DES, DES, CAST, RC2, IDEA  Public Key Algorithms  RSA, DSA, Diffie-Hellman, Elliptic Curve  Hashing Algorithms  SHA-1, MD5, RIPEMD
  • 6. Symmetric Key Encryption  If any one’s key is compromised, all keys need to be replaced  Not practical or cost effective for Internet environments INTERNET
  • 7. Public Key Cryptography Public Encryption Private Decryption  Public-Key Cryptography is an encryption scheme that uses mathematically related, but not identical keys.  Each user has a key pair (public key/private key).  Information encrypted with the public key can only be decrypted using the private key.
  • 8. What is a Digital Signature ?  A Digital Signature is the result of encrypting the Hash of the data to be exchanged.  A Hash (or Message Digest) is the process of mathematically reducing a data stream down to a fixed length field.  The Hash uniquely represents the original data.  The probability of producing the same Hash with two sets of different data is <.001%.  Signature Process is opposite to Encryption Process  Private Key is used to Sign (encrypt) Data  Public Key is used to verify (decrypt) Signature
  • 9. Digital Signature Process  Step 1. Hash (digest) the data using one of the supported Hashing algorithms, e.g., MD2, MD5, or SHA-1.  Step 2. Encrypt the hashed data using the sender’s private key.  Step 3. Append the signature (and a copy of the sender’s public key) to the end of the data that was signed. Data Hash Encrypt Hash Digital Signature Digital Signature Private Step 1. Step 2. Step 3. Public
  • 10. Signature Verification Process  Step 1. Hash the original data using the same hashing algorithm.  Step 2. Decrypt the digital signature using the sender’s public key. All digital signatures contain a copy of the signer’s public key.  Step 3. Compare the results of the hashing and the decryption. If the values match then the signature is verified. If the values do not match, then the data or signature was probably modified in transit. Data Hash Decrypt Hash Digital Signature Public Key Step 2. Step 3. Hash Step 1.
  • 11. The Critical Questions  How can the recipient know with certainty the sender’s public key? (to validate a digital signature)  How can the sender know with certainty the recipient’s public key? (to send an encrypted message)
  • 12. Digital Certificates  Before B accepts a message with A’s Digital Signature, B wants to be sure that the public key belongs to A and not to someone masquerading as A on an open network  One way to be sure, is to use a trusted third party to authenticate that the public key belongs to A. Such a party is known as a Certification Authority (CA)  Once A has provided proof of identity, the Certification Authority creates a message containing A’s name and public key. This message is known as a Digital Certificate. ~~~~ ~~~~ ~~~~ Digital Signature  Before two parties exchange data using Public Key cryptography, each wants to be sure that the other party is authenticated
  • 13. Digital Certificates  A Digital Certificate is simply an X.509 defined data structure with a Digital Signature. The data represents who owns the certificate, who signed the certificate, and other relevant information Version # Serial # Signature Algorithm Issuer Name Validity Period Subject Name Subject Public Key Issuer Unique ID Subject Unique ID Extensions Digital Signature X.509 Certificate  When the signature is generated by a Certification Authority (CA), the signature can be viewed as trusted.  Since the data is signed, it can not be altered without detection.  Extensions can be used to tailor certificates to meet the needs of end applications.
  • 14. Certificate Life Cycle Key pair generated Certificate issued Key pair in use Private key compromised Certificate revoked Certificate expires Key pair lifetime exceeded? New key pair generated Re-certify
  • 15. Certificate Revocation Lists  CA periodically publishes a data structure called a certificate revocation list (CRL).  Described in X.509 standard.  Each revoked certificate is identified in a CRL by its serial number.  CRL might be distributed by posting at known Web URL or from CA’s own X.500 directory entry.
  • 16. PKI Players  Registration Authority (RA) to identity proof users  Certification Authorities (CA) to issue certificates and CRL’s  Repositories (publicly available databases) to hold certificates and CRLs
  • 17. Certification Authority (CA) Certification Authority  Trusted (Third) Party  Enrolls and Validates Subscribers  Issues and Manages Certificates  Manages Revocation and Renewal of Certificates  Establishes Policies & Procedures What’s Important  Operational Experience  High Assurance Security Architecture  Scalability  Flexibility  Interoperability  Trustworthiness Certification Authority = Basis of Trust
  • 18. Registration Authority (RA)  Enrolling, de-enrolling, and approving or rejecting requested changes to the certificate attributes of subscribers.  Validating certificate applications.  Authorizing requests for key-pair or certificate generation and requests for the recovery of backed-up keys.  Accepting and authorizing requests for certificate revocation or suspension.  Physically distributing personal tokens to and recovering obsolete tokens from people authorized to hold and use them.
  • 19. Certificate Policy (CP) is …  the basis for trust between unrelated entities  not a formal “contract” (but implied)  a framework that both informs and constrains a PKI implementation  a statement of what a certificate means  a set of rules for certificate holders  a way of giving advice to Relying Parties
  • 20. Public Key Security Services Public Key Technology Digital Certificates Certification Authorities Security Management Technology Infrastructure PRIVACY AUTHENTICATION INTEGRITY NON-REPUDIATION  Public Key Technology Best Suited to Solve Business Needs  Infrastructure = Certification Authorities
  • 21. Authentication/Access Control  Can Public Key Technology be used to perform Authentication and Access Control? Sure Can How? Digital Signature Using Digital Signatures and Digital Certificates
  • 22. SSL Protocol Secure Socket Layer Application and so on ….. HTTP TCP/IP Layer Network Layer FTP NNTP  Secure Socket Layer (SSL) is a Network Layer protocol used to secure data on TCP/IP networks.
  • 23. SSL 2.0 Protocol • Browser Connects to Secure Server CertS {SessKeyB } CertS {Data} SessKeyB • Browser verifies signature on CertS • Browser generates session key (SessKeyB) • Browser encrypts SessKeyB using CertS • Server sends copy of Server certificate (CertS) to Browser, indicating that SSL 2.0 is enabled • Server decrypts SessKeyB using it’s private key • Browser and Server use SessKeyB to encrypt all data exchanged over the Internet  SSL 2.0 provides encryption between the server and the browser.
  • 24. SSL 3.0 with Client Authentication • Browser Connects to Secure Server CertS - SSL 3.0 {SessKeyB } CertS + CertB {Data} SessKeyB • Browser verifies signature on CertS • Browser generates session key (SessKeyB) • Browser encrypts SessKeyB using CertS • Browser asks operator to select a Browser certificate (CertB) to access server • Server sends copy of Server certificate (CertS) to Browser, indicating that SSL 3.0 is enabled with client authentication • Server verifies signature on CertB (Server can check other information as well) • Server decrypts SessKeyB using it’s private key • Browser and Server use SessKeyB to encrypt all data exchanged over the Internet
  • 25. Smart Cards  Microprocessor with memory that can generate and store keys and certificates  Different form factors and interface mechanisms  Cryptographic functions using private key are processed on the card itself
  • 26. Smart Cards and PKI  Smart cards are «certificate wallets»  Secure storage for:  Owner private key  Smart Cards are a «PC-in-your-Pocket»  Generation of owner’s digital signature  Smart cards provide:  Mobility  Security  Transparency
  • 27. Digital ID  Asymmetric key-pair  public key  private key  X.509 certificate  ISO standard  public key  credentials
  • 28. Smart card application example: Digital Signature
  • 29. Smart card in heterogeneous environments  Smart cards need readers and drivers  Readers  desktop or embedded (keyboard, floppy slot)  optional display and keypad  PC world ready for installation  Mac, Unix & Linux ‘waiting’ for USB  Drivers  PC/SC standard for Windows PC  custom developments
  • 30. Pay-TV, did you know it’s PKI ?  Pay-TV systems installed worldwide  22 millions customers  pay-per-view  electronic purse  Internet  Managed and secured with a very high proprietary secured PKI solution  based on a smartcard
  • 31. Signed and Encrypted Email – S/MIME  S/MIME – Secure Multipurpose Internet Mail Extensions  Prevent email spoofing  Helps preventing forged email  Helps preventing spam  Protect sensitive messages & documents  Secure business processes  Signed messages  S/MIME-based applications
  • 32. Using PKI Certificates in Outlook (1) Open Outlook. Select Tools from the main menu then choose Options from the drop- down menu. 1
  • 33. Using PKI Certificates in Outlook (2) Click on the Security tab. 2
  • 34. Using PKI Certificates in Outlook (3) Click the Settings button. 3
  • 35. Using PKI Certificates in Outlook (4) 4 In the Security Settings Name field, enter a name for the new Security Setting . Type S/MIME in the Secure Message Format field. Click the Choose button next to the Signing Certificate field.
  • 36. Using PKI Certificates in Outlook (5) Click on the certificate issued by C3 Mail CA. This is your Email Signing certificate. Click OK. 5
  • 37. Using PKI Certificates in Outlook (6) Choose SHA1 from the Hash Algorithm drop down menu. Click on the Choose button next to the Encryption Certificate field. 6
  • 38. Using PKI Certificates in Outlook (7) Click on the certificate issued by C3 Mail CA. This is your Email Encryption certificate. Click OK. 7
  • 39. Using PKI Certificates in Outlook (8) Choose 3DES from the Encryption Certificate drop down box. Check all 3 boxes in the Change Security Settings window. Click OK. 8
  • 40. Using PKI Certificates in Outlook (9) Click the Apply button then click OK. 9