1 / 0

Signed, Sealed Delivered

Signed, Sealed Delivered. Dan Kazzaz Kazzaz@Verizon.Net. Introduction. Multi-factor authentication Public & Private Keys Certificates Possibilities. Authentication. Something you know Something you have Something you are

filia
Download Presentation

Signed, Sealed Delivered

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Signed, Sealed Delivered

    Dan Kazzaz Kazzaz@Verizon.Net
  2. Introduction Multi-factor authentication Public & Private Keys Certificates Possibilities
  3. Authentication Something you know Something you have Something you are 1-Factor, 2-Factor and 3-Factor is based on a combination of theabove
  4. Everyday Examples Single Factor Password EZ-Pass Credit card Two Factor Passport / Driver license ATM Card
  5. What is the relationship? Rivest Shamir Adelman
  6. Inventors of RSA This happened over a Passover meal Encryption ABCDEFG 472984835 Symmetric (both parties use the same password) Asymmetric one key locks and the other unlocks
  7. Public and Private Key Public keys – distributable Private keys – you keep secure You encrypt using the destination’s public key You sign using your private key You decrypt using your private key
  8. Holding the key X.509 Version - X.509 standard version number. Serial Number - A sequence number given to each certificate. Signature Algorithm Identifier - Name of the algorithm used to sign this certificate by the issuer Issuer Name - Name of the issuer. Validity Period - Period during which this certificate is valid. Subject Name - Name of the owner of the public key. Subject Public Key Information - The public key and its related information
  9. Certification
  10. Certification
  11. Same message
  12. Available in Desktop OS Encryption based on X.509 Certificate stores Trust store
  13. This means… You can enable secure communication with commercial-off-the-shelf email software
  14. How are certificates created? Certificate authority I can list my employees XYZ can verify that SES is a company How do I use certificates to designate who gets to write electronic checks? How do I use certificates to share music between devices?
  15. Possible applications Common secure exchange in healthcare Doctor to school for immunization Teacher recommendations for college applications Combining on-line and in-store shopping
  16. Problems How do we generically establish trust? What is too little and too much trust? COTS EmailProducts are designed for human readable Notautomate file exchange Not automated EDI exchange
  17. Problems Networked computers End user use – but organization certificate Where do we keep a single key? Hard drive USB card RFID What support is there in mobile devices?
  18. If multiple keys … Since we communicate via ‘our’ PC – What happens when we upgrade OS? How can sync our multiple private keys with our handhelds? What if you are a doctor with patients at multiple hospitals?
  19. Solutions Address book / Directory Customer / Supplier Patient / Doctor / Insurance company PKI – synchronizing keys Exchange of certificates and other information Keys to keys Bill Pay/ Credit Card / PayPal / New items
  20. Cross industry standards are needed Synchronize directories No one can own all the TP’s Payments Consumer Merchant Device Other consumer
  21. Questions? Kazzaz@Verizon.net
More Related