1 / 22

Secure Communications

Secure Communications. … or, the usability of PKI. Agenda. Announcement: Security Symposium on Oct. 10. Questions? Stories to share? Project discussion & IRB overview Secure communications. Project. Initial draft: 2 weeks Final plan: 4 weeks

thetis
Download Presentation

Secure Communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Communications … or, the usability of PKI

  2. Agenda • Announcement: Security Symposium on Oct. 10. • Questions? Stories to share? • Project discussion & IRB overview • Secure communications

  3. Project • Initial draft: 2 weeks • Final plan: 4 weeks • Initial draft is NOT graded, credit for reasonable effort • Some introduction, motivation, related work • Draft of tasks, survey & interview questions, etc. • Mockup or description if you are building something • The more complete it is, the more feedback you’ll get! • We will pilot your materials during class in 2 weeks (SO BRING YOUR MATERIALS TO CLASS!!!)

  4. IRB • http://www.research.uncc.edu/comp/human.cfm • Download application form and consent form template • See Wiki for one sample application

  5. Public Key Infrastructure “A PKI is a set of agreed-upon standards, Certification Authorities (CA), structure between multiple CAs, methods to discover and validate Certification Paths, Operational Protocols, Management Protocols, Interoperable Tools and supporting Legislation” “Digital Certificates” book – Jalal Feghhi, Jalil Feghhi, Peter Williams In other words: A Public Key Infrastructure is an Infrastructure to support and manage Public Key-based Digital Certificates

  6. Secure Communications • PKI: • What is your best technical explanation? • What is your best non-tech explanation? • How much should users be aware of keys? • What’s a CA? How to explain a CA? Should users be aware of CAs?

  7. Communication under PKI • Both Alice and Bob have their own individual private and public keys signed by a certificate authority. • The CA might be an employer, Verisign, or some other organization.

  8. Communication under PKI Bob’s public key Alice’s public key 100110 • The public key is used for encryption and digital signature verification. • The private key is used for decryption and the creation of digital signatures.

  9. Digital Signature

  10. Digital Certificate A Digital Certificate is a binding between an entity’s Public Key and one or more Attributes relating its Identity. • The entity can be a Person, an Hardware Component, a Service, etc. • A Digital Certificate is issued (and signed) by someone - Usually the issuer is a Trusted Third Party • A self-signed certificate usually is not very trustworthy

  11. X509 PKI * Alice Bob Trusted Root Alice trusts the root CA Bob sends a message to Alice Alice needs Bob’s certificate, the certificate of the CA that signed Bob’s certificate, and so on up to the root CA’s self signed certificate. Alice also needs each CRL for each CA. Only then can Alice verify that Bob’s certificate is valid and trusted and so verify the Bob’s signature. 11

  12. Secure Communications • PKI: • What is your best technical explanation? • What is your best non-tech explanation? • How much should users be aware of keys? • What’s a CA? How to explain a CA? Should users be aware of CAs?

  13. Problems with PKI • Public-key cryptography is counterintuitive. • PKI seems too far removed from application goals. • Users do not understand how their tasks require PKI. • PKI tasks are too cumbersome. • Large CAs run into naming collisions. • Users shoulder the burden of ensuring that the person they’re looking up is indeed the person they want.

  14. IBM Lotus Notes & Domino Solution • Client/server infrastructure for collaborative applications • Usage of PKI • Authentication of Notes client to Domino Server • Signing and encrypting mail messages • Implementation • Note keys are created by Notes administrator and distributed to user in a “identity file” • Most of key management is hidden from user within the organization • Communicating outside the enterprise requires user input to acquire or verify certificates • Thoughts?

  15. Alternative: iPKI • Lightweight PKI centered around a local, standalone CA • Automated PKI and CA setup • Simple, intuitive enrollment mechanism • A simple, intuitive trust model • Secure bootstrapping • Certificates as capabilities • No need for direct user interactions with certificates 15

  16. Example: Network-in-a-box Utilize location-limited channels to simplify configuration while maintaining security Laptop and AP exchange public keys Use it to perform full-fledged security auto-configuration

  17. iPKI discussion • Easier? • Secure enough? • What is it good for? • Limitations?

  18. NiaB validation • Users study with 12? users • Task: connect to a secure wireless network, NiaB or other • Results: NiaB 10x faster, fewer errors, more confidence and satisfaction • 2nd study in an enterprise • Watched 5 users with each enrollment • Same results as before, but even bigger differences!

  19. Alternative: Key Continuity Management • Goal: Make key generation & management easier to accomplish • Ignore the X.509 certification chain • Applications are directly aware of public key certificates • User would be notified only when server’s key suddenly changes • Thoughts?

  20. Johnny 2 • Study conducted on KCM • Closely followed the original Johnny study • Same scenario, recruiting, descriptions, etc. • Added additional attacks to examine user understanding and trust of keys • 43 subjects • 3 conditions: • no KCM • Color • Color + briefing • Question: study critique?

  21. Results? • KCM worked against New Key Attack • KCM didn’t work against New Identity Attack • Users noticed the change, but felt it was justified • KCM really didn’t work against Unsigned Message Attack • users instead noticed they were being asked to send to hotmail and distrusted those instructions

  22. Trust • The encryption itself is not the problem • Trust required to make PKI work • Did Alice really send this? • Is this the right Alice or another one? • Do I trust the certificate? • Do I trust the CA? • Do I trust that no one has taken over her computer? • At what point do I decide to not trust the message?

More Related