120 likes | 438 Views
Trust and the Public Key Infrastructure (PKI). Sangyoon Oh Florida State University Computer Security Projects GS5891-01 Spring 2001. Outlines. Security on Current Internet What is PKI? Structures and Models Weaknesses and Right PKI Trustworthiness in open network. Security on Internet.
E N D
Trust and the Public Key Infrastructure (PKI) Sangyoon Oh Florida State University Computer Security Projects GS5891-01 Spring 2001
Outlines • Security on Current Internet • What is PKI? • Structures and Models • Weaknesses and Right PKI • Trustworthiness in open network Computer Security
Security on Internet • Internet is cloud of connection • User is responsible for everything • E-commerce and B2B grow rapidly • Needs framework to exchange data and money securely and privately Computer Security
Public Key Infrastructure CA Alice’s public key Bob’s public key Alice Bob Privacy: Bob’s public key Authentication: Alice’s private key Computer Security
Structures and Models • Hierarchical structure: X.509 • Pretty Good Privacy • Virtual Private Network • Secure connection over the phone line. • Network service provider & Hardware vender • Authentication, Encryption, Tunneling, Access Control Computer Security
Weakness • Security is as strong as weakest link • User computer is not safe: Private key • Hacker use Root certificate • RA (certificate content) - CA link is very weak. Computer Security
Right PKI • Choose the right structure • B2B, B need Hierarchical structure: X.509 • Right Implementation • Stochastic, security policy management prevent reliability failure and low level penatration • Right Choice of PKI Structure prevent malicious attack Computer Security
Valuation of Trust(Thomas Beth, Malte Borcherding, Birgit Klein) • Direct and Recommended Trust • Trust Value • Deriving Trust Relationships • Combination of Trust Values • Use: entrust task worth 100 unit, risk 49 unit. Computer Security
Secure communication in an unknown network(M. Burmester and Y. Desmedt) • Structure of trust graph is not known except attacker • Using query flood, get neighbor list. • Label the vertexes • Get a good approximation of the trust graph Computer Security
Reference • Which PKI (Public Key Infrastructure) is the right one? -- Carlisle Adams, Mike Burmester, Yvo Desmedt (2000) • Valuation of Trust in Open Networks -- Thomas Beth, Malte Borcherding, Birgit Klein (1994) • Secure communication in an unknownnetwork using certificates. -- M. Burmester and Y. Desmedt. (1999) • Ten Risks of PKI: What you’re not being told about Public Key Infrastructure. -- Carl Ellison, Bruce Schneier (2000) • Security in Computing, 2nd -- Charles P. Pfleeger Computer Security
Reference Con’t • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. -- Rivest, R. L., Shamir, A., and Adleman, L. (1978). • SPKI/SDSI 2.0 A Simple Distributed Security Infrastructure -- Ronald L. Rivest (1997) • Virtual Private Networks -- Cris Banson (1999) • What is a VPN? -- Paul Ferguson, Geoff Huston (1998) Computer Security