Pki and Digital Certification Infrastructure PDF
Pki and Digital Certification Infrastructure PDF
235
Di gi t at Iy
Signed
Code and
Fi I es
St andar ds
that r e l y
on a PKI
St andar ds
X509 PKI X t hat def i ne
t h e PKI
Figure 1 PKI security architecture [13]
3.2 Operations of PKI and retrieving certificates and CRLs, as well as key
lifecycle m.anagement. Some of the enhanced
The main PKI functions are shown in Table 1. functions include time-stamping and policy-based
These include - registration, issuing and revoking certificate validation.
certificates, creating and publishing CRLs, storing
Time-stamping
1 Impose policy-based constraints on
certificate chain, and validate if all
constraints are met
Time-stamp each certificate
Function of the CA
Key lifecycle management Update, archive and restore keys Automated in software or performed manual
236
Validation is the process of verifying that a information pertaining to those keys are published.
certificate is valid and revoking where A CA might have different classes of certificates
necessary with each class providing a designated level of trust.
For example to overcome these inherent limitations
Key management - updating, backing up and
archiving VeriSign has introduced four different levels of
certificate [ 141 (each with different cost structures)
3.2.1 Certification corresponding to the degree of authentication
required and shown in Table 2 .
Certification is the fundamental function of all PKIs
and it is the means by which the public keys and
VeriSign Class 1 Individual Certificates enhances the security of some applications by assuring that a certificate’s
subject and e-mail address are included within VeriSign’s repository but do not provide proof of identity.
VeriSign Class 2 Individual Certificates provide a reasonable level of assurance of a subscriber’s identity. Identities art
checked against local records or Trusted Third Parties (TTP).
VeriSign Class 3 Individual Certificates provides a higher level of assurance by validating the identity via in-person
presentation of identification credentials or other enhanced procedures. Used in banking and contracting applications.
VeriSign Class 3 Organisational (Server) Certificates provide assurances for web site authentication. Validation
includes comparison of certificates to information held by TTPs or official records.
In addition to the content and authenticity of a Request the CA to include a validity period in
transaction, the exact time of the transaction can be the certificate (offline validation)
important. For example, it may have to be submitted
within a specified time to be valid. The solution Closely related to the issue of validation of
therefore is to combine signatures with a time- certificates is certification revocation. A certificate
stamping service. (Section 5.5) should be revoked when it is suspected that it has
been compromised. If a certificate is validated online
3.2.2 CA hierarchy with the CA, the CA can simply state that the
It is impractical to have a single universal CA certificate is no longer valid. With offline validation,
and most PKIs permit CAS to certify other CAS. the most common method is to use Certificate
Different PKIs arrange their CAS in different Revocation Lists (CRLs). A CRL is a list of
hierarchies or they may even have arbitrary or certificates that have been revoked before their
bilateral structural agreements. scheduled expiration date. For example, the key
specified in the certificate might have been
The scalability of a PKI depends on the compromised or the user specified in the certificate
relationship between its CAS. A problem here is that may no longer have authority to use the key.
CAS may allocate trusts differently and this problem
increases as the certification path grows. The The PKIX recommendation does not require CAS
certification path also runs the risks of becoming too to issue CRLs [15]. On-line methods of revocation
long. Path discovery and trust delegation is difficult notification may be applicable in some situations as
to achieve across company and/or geographical an alternative to CRLs. PKIX defines an Online
boundaries. The dominant hierarchy is top down, but Certificate Status Protocol that facilitates on-line
it has the problem that all users must trust the root checking of the status of certificates [ 161 [ 171.
CA and since so many paths pass through the root 3.2.4 Key management
CA, it is vulnerable to attack.
Each user is likely to have a number of keys that
3.2.3 Validation and revocation require lifecycle management. For example, users
The information in a certificate can change over typically have at least one key pair for each secure
time and a certificate user needs to validate that the application (e.g. e-mail, desktop file encryption,
certificate’s data is current. Users can either: VPN). Some applications use several key pairs for
different purposes, such as digital signatures, bulk
Ask the CA about a certificate’s validity every
encryption, and authentication.
time it is used (online validation)
237
Updating keys - new keys are usually issued at Time-stamping and data certification services,
regular intervals so as to reduce the exposure from which tcan be used to build services such as non-
keys that have been unknowingly compromised. repudiation
Backing up keys - Users frequently forget 5.1 X.5091~3profiles
passwords that protect their private keys - or they
may lose the keys, for example, through a disk crash X . 5 0 9 3~ certificates are complex data structures
or virus attack. as they offer a variety of extensions which can take
on a wide range of options. This provides
Archiving keys - When employees leave the considerable flexibility, which allows the X . 5 0 9 ~ 3
company, their keys must be invalidated, while certificate format to be used with many applications.
retaining the keys in order to access previously Unfortunately, this same flexibility makes it
encrypted files and messages. Keys used for digital extremely difficult to produce independent
signatures may be retained for as long as the signed implementations that will actually inter-operate. To
documents exist so that signatures can be verified. build an Internet PKI based on X . 5 0 9 ~ 3certificates,
the PKIX working group developed a profile of the
Key expiry - To guard against a long-term
cryptanalytic attack, every key must have an X . 5 0 9 ~ 3sipecification - RFC 2459 [3] together
expiration date. The key length should be long with additional ongoing work [20].
enough to make the chances of cryptanalysis before In addic ion to profiling the certificate and CRL
key expiration extremely small. The validity period formats, it is necessary to specify particular Object
for a key pair may also depend on the circumstances Identifiers (OIDs) for certain encryption algorithms,
in which the key is used. The appropriate key size is since there are a variety of OIDs registered for
determined by the validity period, together with the certain algorithm suites. PKIX has produced two
value of the information protected and the estimated documents [21] and [22], which provide assistance
strength of an expected attacker. on the implementation of specific algorithms.
5. PKI Working Group activities 5.2 Operiational protocols
There are two main IETF working groups Certificates and CRLs can be delivered by
focused on PKI standards and implementations. protocols such as LDAP, HTTP, FTP and X.500.
Operationall protocols that facilitate certificate
The SPKI (Simple Public Key Infrastructure)
delivery are: defined in [lo], [17], [16] and [23].
working group (www.ietf.org/html.charters/spki-
charter.htm1) is developing Internet drafts for public 5.3 Mana,gementprotocols
key certificate formats, signature formats and key
acquisition protocols. SPKI is intended to provide Management protocols are needed to support
mechanisms to support security over a range of online inr.eractions between PKI user and
protocols (e.g. IPSec) and applications which may management entities. For example, a management
require public key certificates such as encrypted e- protocol might be used between a CA and a client
mail, web documents and electronic payment with whom a key pair is associated, or between CAS
systems. Two important RFCs developed under which cross-certify one another. A management
SPKI include RFC 2692 [ 181 and RFC 2693 [ 191. protocol can be used to carry user or client system
registration information, or requests for certificate
The PKIX working group has developed revocation. Management protocols that facilitate
recommended standards covering five significantly message format and transmission are defined in [4]
different sections (www.ietf.org/html.charters/pkix- and [7]. Certificate Policies and practice statements
charter.html) [ 151: are defined by [24].
Profiles of the X . 5 0 9 ~ 3certificate standards and
5.4 Time-stampand data certification
the X . 5 0 9 ~ 2CRL standards for the Internet
Operational protocols - relying parties can Time-stamping is a service in which a Time-
obtain information such as certificates or stamp Authority (TSA) signs a message to provide
certificate status evidence that it existed prior to a specific time. A
Time-stamping protocol [25] provides some support
Management protocols, in which different for non-repudiation so that a user cannot claim that a
entities in the system exchange information transaction was later forged after compromise of a
needed for proper management of the PKI private key.
Certificate policies and certificate practice
A Data Certification Server protocol [26] is a
statements, covering the areas of PKI security
TTP that verifies the correctness of specific data
not directly addressed in the rest of PKIX
238
submitted to it, thus going beyond a simple time- [[9] RFC 2587, Boeyen, S . , Howes, T., Richard, P.,
stamping service. The DCS certifies possession of "Internet X.509 Public Key InfrastructureLDAPv2
data or validity of another entity's signature. As part Schema", June 1999
of this, the DCS verifies the mathematical [IO] RFC 2585, Housley, R., and Hoffman, P., "Internet
correctness of the actual signature value contained in X.509 Public Key Infrastructure Operational Protocols:
a request and also checks the full certification path J T P and H'ITP", July1998
from the signing entity to a trusted point (e.g., the [ 111 Arsenault, A & Turner, S., Certification Practice
DCS's CA, or the root CA in a hierarchy). Statement, Internet Draft PKIX Roadmap, October 1999
[ 121 Public- Key Infrastructure- The VerisSign
6. Summary Difference; VeriSign whitpaper, 1999
(www.verisign.com/whitepaper/enterprise/difference)
This paper has reviewed a range of technical,
infrastructural, operational and management issues [ 131 RSA Data Security, "UnderstandingPKI".
(www.rsa.coni) 1999
associated with the use of PKI. There is no weakness
in the cryptographic strength of the encryption and [ 141 VeriSign., VeriSign Certification Infrastructure,
www.verisign.com/repository/CPS 1.2/CPSCH2.HTM#
digital signature processes, however the
toc36 1 806948, 1997
management of these processes, storage of
cryptographically strong keys, identification of [ 151 Arsenauly, A and Turner, S., "Internet X.509 Public
Key Infrastructure PKIX Roadmap". <draft-ietf-pkix-
entities, storage of certificates etc, all need be
roadmap.txt>, November 2000
subject to good business practices.
[ 161 RFC 2560, Arsenauly, A and Turner, S., X.509
PKI is still in its infancy and yet many Internet Public Key Infrastructure Online Certificate
organisations have already begun deploying Status Protocol - OCSP, 2000
certificate-enabled applications and infrastructures. [ 171 Myers, M., Ankney, R., Malpani, A., Galperin, S.,
Looking ahead, businesses and organisations who and Adams, C., "X.509 Internet Public Key Infrastructure
intend to use PKI will have to examine issues such Online Certificate Status Protocol - OCSP Extensions",
the legal aspects of liability, interoperability between September 1999
multiple PKIs, certification validation paths, [ 181 RFC 2692, Ellison, C., "SPKI Requirements",
protection of private keys and user acceptance. September 1999
Given the complexity of the infrastructure required [I91 RFC 2693 Ellison, C. et al, SPKI Certificate Theory,
to implement and support a public PKI system, in September 1999
the short term continued deployment of PKI-enabled [20] Santesson, S., Polk, W., Barzin, P., and Nystrom, M.,
applications for specific industry groups seems to be "Internet X.509 Public Key Infrastructure Qualified
the most likely scenario. Certificates",<draft-ietf-pkix-qc.txt>, February 2000
[21] Bassham, L., Johnson, D., and Polk, W., "Internet
8. References x.509 Public Key Infrastructure: Representation of Elliptic
[ I ] Diffie, W. and Hellman, M. E., New Directions in Curve Digital Signature Algorithm (ECDSA)", cdraft-ietf-
Cryptography. IEEE Transactions on Information Theory, pkix-ipki-ecdsa.txt>,October 1999
22 ( 1 976), pp. 644-654. [22] Housley, R., and Polk, W., "Internet X.509 Public
[2] Rivest, R., Shamir, A. and Adleman, L., A Method for Key Infrastructure Representation of Key Exchange
Obtaining Digital Signatures and Public Key Cryptosystems Algorithm (KEA) Keys in Internet X.509 Public Key
Communications of the ACM, 21(1978), pp. 120-126. Infrastructure certificates", March 1999
[3] RFC 2459, Housley, R., Ford, W., Polk, W., and Solo, [23] RFC 2559, Boeyen, S., Howes, T., and Richard, P.,
D., "Internet X.509 Public Key Infrastructure Certificate "Intcmet X.509 Public Key Infrastructure Operational
and CRL Profile", January 1999 Proiocols - LDAPvZ", April 1999
[4] RFC 2510, Adams, C., Farrell, S., "Internet X.509 [24] RFC 2527, Chokhani, S., and Ford, W., "Internet
Public Key Infrastructure Certificate Management X.509 Public Key Infrastructure Certificate Policy and
Protocols", March 1999 Certification Practices Framework", March 1999
(51 PKCS#IO, RSA, "The Public-Key Cryptography 1251 Adams, C., Cain, P., Pinkas, D., and Zuccherato, R.,
Standards ", RSA Data Security Inc., November 1993 "Internet X.509 Public Key Infrastructure Time Stamp
[6] RFC 251 I , Myers, M., Adams, C., Solo, D., and Protocols", <draft-ietf-pkix-time-stamp.txt>,2000
Kcmp, D., "Internet X.509 Certificate Request Message 1261 Adams, C., Sylvester, P., Zolotarev, M., Zuccherato,
Format", March 1999 R., "Internet X.509 Public Key Infrastructure Data
[7] Myers, M., Liu. X., Fox, B., and Weinstein, J., Certification Server Protocols", <draft-ietf-pkix-dcs-.txt>,
"CertificateManagement Messages over CMS", <draft- March 2000
ieft-pkix-cmc.txt>, July 1999
[SJ RFC 2251, Wahl, M., Howes, T., Kille, S.
"Lightweight Directory Access Protocol (v3)" 1997
239