Module 5 - Standards and Protocols

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Standards that define the PKI

Standards that define the interface between the applications


and the underlying PKI

Standards that provide bits and pieces that glue everything


together and may address not only the PKI structure and the
methods and protocols for using it, but that may also provide an
overarching business process environment for PKI
implementation
Relationships between PKI standards and
protocols

Online banking
Business processes
and shopping

E-mail, VPNs, Applications


EDI

S/MIME, SSL, Standards/protocols


TLS, WTLS, that use PKI
IPSec, PPTP

ISAKMP, CMP, PKI


XKMS, X.509, implementation
PKIX, PKCS level
Public Key Infrastructure X.509 (PKIX) and Public Key Cryptography Standards
(PKCS)

based on the X.509 certificate standard and establish complementary standards for
implementing PKI

PKIX
produced by the Internet Engineering Task Force (IETF) and defines standards for
interactions and operations for four component types: the user, the CA, the RA, and
the repository for certificates and certificate revocation lists

PKCS
composed of a set of 13 active standards, with 2 other standards that are no longer
active
The PKIX Model

End-entity
PKI management entities
PKI users
Operational and
management
transactions

Ce rtificate Publish certificates RA Management


and CRL
transactions
repository

CA
Publish certificates and CRLs

External CA
PKIX Standards:
❑ PKIX outlines certificate extensions and content not covered by X.509 v3 and the
format of version 2 CRL thus providing compatibility standards for sharing
certificates and CRL between CAs and end-entities in different PKIs.
❑ PKIX provides certificate management message formats and protocols, defining
the data structures, management messages, and management functions for PKIs.
❑ PKIX outlines certificate policies and certification practices statements, establishing
the relationship between policies and CPSs.
❑ PKIX specifies operational protocols, defining the protocols for certificate handling.
❑ PKIX includes time-stamping and data certification and validation services, which
are areas of interest to the PKIX working group, and which will probably grow in
use over time.
Importance of Knowing PKIX / PKCS
❑ To identify the standards already in place used to plan the
implementation of a private PKI in support secure services.
❑ To identify how the decision to use a particular PKI implementation
(domestic or commercial) may lead to incompatibilities with other
certificate- issuing entities.
❑ To know the business-to-business requirements that must be
considered when deciding how to implement a PKI within an
organization.
specification for digital certificates published by the ITU-T
(International Telecommunications Union -
Telecommunication)

specifies information and attributes required for the


identification of a person or a computer system

portion of the X.500 standard that addresses the structure


of certificates used for authentication
Secure Sockets Layer / Transport Layer Security

provide the most common means of interacting with a PKI and


certificates

provide secure connections between the client and server for


exchanging information

provide server authentication and confidentiality of information transfers


SSL
protocol developed by Netscape for transmitting
private documents via the Internet
protocol developed by Netscape for transmitting private documents via the Internet
works by using a private key to encrypt data
that's transferred over the SSL connection

TLS
protocol intended to secure and authenticate communications across a public
networks by using data encryption
derived from SSL and uses the same certificates but does not require each service to
be given a new port number
composed of two parts: TLS Record Protocol
and TLS Handshake Protocol
Internet Security Association and Key Management Protocol

provides a method for implementing a key exchange protocol and for negotiating a
security policy

defines procedures and packet formats to negotiate, establish, modify, and delete
security associates

intended to support security association at all


layers of the network stack
Certificate Management Protocol

defines the messages and operations required to provide certificate management


services within the PKIX model

provides a framework that works well with other


standards (PKCS #7 and PKCS #10)

provides for the following certificate operations:


❑ CA establishment, including creation of the initial CRL and export of the public key for the CA
❑ Certification of an end-entity
XML Key Management Specification

defines services to manage PKI operations within XML environment

intended to simplify integration of PKIs and management of certificates in


applications

three tiers of service based on the client requests and application requirements
❑ Tier 0
❑ Tier 1
❑ Tier 2

relies on the client or underlying communications mechanism to provide for the security
of the communications with the XKMS server
Tier 0 XKMS retrieval
Request for key info

Server response
Client
Server

XKMS tier 1 locate service

Request Request

Response Response
Client
Managed PKI
(validation) XKMS Server
XKMS tier 2 validate service

Request Request

Response Response
Client Managed PKI
XKMS Server
(validation)
Secure/Multipurpose Internet Mail Extensions

extension to the MIME standard that provides a way to send and


receive signed and encrypted MIME data

the v2 specifications outline a basic strategy to


provide security services for electronic mail
Pretty Good Privacy

used to encrypt and decrypt e-mail and files

provides the ability to digitally sign a message so the receiver can be


certain of the sender’s identity

uses a variation of the standard public key encryption process


Hypertext Transfer Protocol over SSL

Web protocol developed by Netscape Communications and built into its


browser that encrypts and decrypts user page requests as well as the
pages that are returned by the Web server

uses the standard port 443 for TCP/IP communications rather than the
standard port 80 used for HTTP

makes use of the 40-bit RC4 encryption algorithm in most cases


collection of IP security features designed to introduce security at the network or
packet- processing layer in network communication

designed to be used to provide secure virtual private network capability over the
Internet

provides a secure version of the Internet Protocol by introducing authentication and


encryption at the packet level

provides two types of security service to ensure authentication and confidentiality for
either the data alone (referred to as IPSec transport mode) or for both the data and
header (referred to as tunnel mode)
Certificate Enrollment Protocol

developed by VeriSign for Cisco Systems

designed to support certificate issuance, distribution, and revocation


using existing technologies

use existing technology where possible

supports access to certificates and CRLs using either LDAP or the CEP-
defined certificate query
Federal Information Processing Standards Publications

set of standards developed by the National Institute of Standards and


Technology for use by the US government

developed for use in areas such as security or system interoperability


when there is no recognized industry standard

three categories:
❑ Hardware and Software Standards/Guidelines
❑ Data standards/guidelines
❑ Computer security standards/guidelines
international standard (ISO 15408) for computer security

allow users to specify their security requirements, to allow developers to


specify the security attributes of their products, and to allow evaluators
to determine if products actually meet their claims

provides a listing of laboratories that apply the criteria in the testing of


security products

provides a listing of products by function that has performed at a


specific Evaluation Assurance Level
Wireless Transport Layer Security

based on the fixed network Transport Layer Security protocol

provide privacy, data integrity, and authentication for WAP applications

necessary due to the limited memory and processing capabilities of WAP-enabled


phones

WTLS can be implemented in one of three classes:


❑ Class 1 is called anonymously authentication but is not designed for practical use
❑ Class 2 is called server authentication and is the most common model
❑ Class 3 is server and client authentication where the client and server’s WTLS certificates are
authenticated
Wired Equivalent Privacy

part of the IEEE 802.11 standard and is used to protect wireless


communications from interception

relies on a secret key that is shared between a


mobile station and an access point
security standard for creating and implementing security policies

based on Version 2 of the British Standard 7799 (BS7799)


published in May 1999

divided into ten sections, each containing more detailed


statements describing what is involved for that topic

You might also like