Title: Enabling Trusted B2B Transactions with PKI
1Enabling Trusted B2B Transactions with PKI
BONUS OFFER a look at some commercial solutions
Tim McLaren
McMaster University, Hamilton University, Canada
2Agenda
- The nature of B2B
- How PKI can help
- Trust
- Working with Certificates
- Evaluating commercial PKI software
3E-biz Security Requirements
- access control
- authentication
- confidentiality
- integrity
- non-repudiation
4Why B2B is different
- ongoing trusted relationships critical
- identification (not just authentication)
- many-to-many relationships
- high volume, low margin
5B2B Requirements
- trusting identity of party very important
- keys need to be validated
- key identification certificate
- many-to-many relationships result in plethora of
certificates
6How PKI can help
- authentication of both parties
- encryption
- digital receipts (timestamped,notarized) for
audit - management of certificates
- trusted transactions independent of platform,
application
7Trust Models
- hierarchical
- top-down
- distributed
- web of trust
- all use third-party trust
8Third-party Trust
TRUSTS
TRUSTS
Therefore Bob trusts Bill
9Cross Certification
TRUSTS
TRUSTS
TRUSTS
Therefore Bob trusts Jane
10Direct Trust
In PersonKey Exchange
TRUSTS
TRUSTS
Bob directly trusts Guido
11Another Solution
TRUSTS
TRUSTS
Now Bob can trust Guido thru the 3rd-party
12Trust is Communicated with Certificates
CERTS
CERTS
CERTS
CERTS
Key Identification Certificate
13Certificate Example
14Certificate
15Details
16Trust Path
17InheritedTrust
18Certificate Tampering
19Email Warning
20Checking Revocation List
21SampleRevocation List
22ChangingTrust
23PKI Requirements
- certificate repository
- certificate revocation
- key backup, recovery, and history
- automatic update of certificates
- cross certification
- non-repudiation of signatures
- application integration
24Evaluating a PKI solution
- vendor reliability / references
- open, accepted standards and certification
- certificate management
- trust models supported
- trusted time stamping
- transparent integration with applications
25PKI Creates aTransparent Security Layer
26RSAs Keon PKI
27Entrusts PKI
28Summary of PKI Benefits
- authentication of both parties
- encryption
- digital receipts (timestamped, notarized) for
audit - management of certificates
- trusted transactions independent of platform,
application
29Acceptance of PKI
- PKI use has more than doubled from 6 to 13 in a
year -PriceWaterhouseCoopers, 2000 - "A central services approach where the PKI
provides keys and key management for multiple
applications is expensive, complicated, and if
not done well, career limiting, - Gartner Group,
2000 - Windows 2000 includes PKI
- and costs are coming down 40 in few years - Meta
Group, 2000