Title: Certificate
1Certificate
2Basic Concepts
- CertificateA document containing a certified
statement, especially as to the truth of
something - Digital certificateInformation digitally signed
by trusted certificate authority
3Public-key Certificate
- Identify the holder of the private-key
- A Certificate consists of
- Subject Identification information
- Subject public key value
- Certification authority name
- Certification authoritys digital signature
4(No Transcript)
5Different kinds of certificate
- Certification authority certificates
- Server certificate
- Personal certificate
- Software certificate
6Certification path
7(No Transcript)
8(No Transcript)
9Certification Authorizer
- GlobalSign NV-SA. GlobalSign is the Leading
European Trusted Network of Certification
Authorities (CA) that, signs and manages digital
certificates - Thawte Certification offers free personal
certificates for signing and encrypting e-mail.
Thawte is a global CA that has already certified
30 of the worlds Internet e-commerce servers.
10http//www.thawte.com/getinfo/products/personal/co
ntents.html
11(No Transcript)
12http//www.verisign.com/products/class1/index.html
13(No Transcript)
14(No Transcript)
15(No Transcript)
16(No Transcript)
17(No Transcript)
18Export your ID
19Specify Export format
20Sign your E-mail with attached ID
21Import your contacts ID
22View other peoples ID
23Send a signed and encrypted email
24Validity Periods and Revocation
- Any key pair should have a restricted lifetime
- A certificate may be revoked by certificate
authority
25Legal Relationships
- Legal Relationships betweenCA and its Subscriber
- Closed community
- Open community Third party
- Two controls
- Subject authentication
- Private key protection
26Key-pair Management
- Key-pair generation
- Private-key protection
- Key-pair update
- Management requirement
27Certification Authorizer
- VeriSign
- Internet Information Server (IIS) and Internet
Explorer Client certificates for SSL, - S/MIME certificates for Outlook Express and
Outlook 98, - SGC certificates for enabling 128-bit encryption
for banks, - Authenticode Certificates and time stamping
service for Digitally Signing your Active-X
applications.
28Key-pair Generation
- Private key goes to key-pair holder
- Public key goes to certification authorities
- Key-pair holder systemPrivate key never leaves
its native environment - Central systemPrivate key is transportedeasy
backup or archive
29Private key protection
- Storage in a temper-resistant hardware module or
token - Storage in an encrypted data file
30Management requirement for digital signature
- Private key for digital signature must be stored
in its life time - Private key need not be backed-up or archived
- Private key need to be destroyed when expired
- Public key for digital signature need to be
achieved
31Management requirement for encryption
- Private key need to be backed-up or archived
- Private key should not be destroyed when expired
- Public key does not need to be backed-up or
achieved
32Certificate Issuance
- Apply for a certificate
- Certificate generation
- Subject authentication
- Personal presence
- Identification documents
- Local registration authorities
- Not issue but approve application
- Certificate update
33Certificate Distribution
- Certificate accompanying signature
- Distribution via directory serviceX.500
directory standardsMicrosoft Exchange
directoryLotus Notes directoryNovells Netware
Directory Service (NDS)Internet Lightweight
Directory Access Protocol (LDAP)
34X.509 Certificate Format
- X.509 version 1 and 2
- X.500 namesRelative distinguished name (RDN)
- Object registrationIdentify an object, e.g. an
algorithm identifier
35(No Transcript)
36(No Transcript)
37(No Transcript)
38X.509 version 3
- The Need for extension
- Different purpose certificate
- Additional subject-identifying information
- Application-specific name forms
- Different certificate policies and practice
- Certificate authorization information
39(No Transcript)
40The need for Certificate Revocation
- Detected or suspected compromise of private key
- Change of name
- Change of relationship between subject and CA
41Certificate Revocation
- Requesting revocation
- Certificate revocation list (CRL)identifiedtime-
stampedsigneddistributed pull or push - Immediate revocation
- Real-time revocation checking
42Revocation Time-line
43(No Transcript)
44Key-pair and certificate validity period
- Encryption-related key pairs
- Public key for encryption should be used only
when certificate is valid - Private key for decryption may be used after
certificate is expired
45Key-pair and certificate validity period
- Digital signature key pairs
- Historical validation for non-repudiation, it is
necessary to preserve certificate state
information as it existed at the time of signing - Real-time validation for downloading software,
check if a valid, unrevoked certificate exist
now
46Key-pair and certificate validity period
- Certification authority signature key pairs
- The certification authority should ensure that
the validity of its own public key extends over
the intended validity period of any certificate
it is signing
47Problems
- Private keys are not people
- Distinguished names are not people
- There are too many Robert Smiths
- Todays digital certificates dont tell enough
- X.509 v3 does not allow selective disclosure
48Problems
- Digital certificates allow for easy data
aggregation - How many CAs does society need?
- How do you loan a key?
- Are there better suited alternative to public
key? - digital postmark
- digital notary
49(No Transcript)
50Summary of Benefits
- Tamperproof notarization of any digital data type
- Simple integration with legacy systems
- Patented, cryptographically-secure process
- Advanced system architecture and implementation
provides security, scalability and fault
tolerance - Very low communications overhead
- Complete privacy - only a digital fingerprint of
a file is sent to Surety for notarization - Incredible ease-of-use no training required