Introduction to Public Key Technology and Federal PKI Infrastructure
Total Page:16
File Type:pdf, Size:1020Kb
Withdrawn NIST Technical Series Publication Warning Notice The attached publication has been withdrawn (archived), and is provided solely for historical purposes. It may have been superseded by another publication (indicated below). Withdrawn Publication Series/Number NIST Special Publication 800-32 Title Introduction to Public Key Technology and the Federal PKI Infrastructure Publication Date(s) February 26, 2001 Withdrawal Date September 13, 2021 Withdrawal Note SP 800-32 is withdrawn in its entirety. Superseding Publication(s) (if applicable) The attached publication has been superseded by the following publication(s): Series/Number Title Author(s) Publication Date(s) URL/DOI Additional Information (if applicable) Contact Computer Security Division (Information Technology Laboratory) Latest revision of the N/A attached publication Related Information https://csrc.nist.gov/projects/crypto-publication-review-project https://csrc.nist.gov/publications/detail/sp/800-32/archive/2001-02-26 Withdrawal https://csrc.nist.gov/news/2021/withdrawal-of-nist-special-pubs-800-15-25- Announcement Link and-32 Date updated: September 13, 2021 SP 800-32 IIInnntttrrroooddduuuccctttiiiooonnn tttooo PPPuuubbbllliiiccc KKKeeeyyy TTTeeeccchhhnnnooolllooogggyyy aaannnddd ttthhheee FFFeeedddeeerrraaalll PPPKKKIII IIInnnfffrrraaassstttrrruuuccctttuuurrreee D. Richard Kuhn Vincent C. Hu 26 February 2001 W. Timothy Polk Shu-Jen Chang 1 National Institute of Standards and Technology, 2001. U.S. Government publication. Not subject to copyright. Portions of this document have been abstracted from other U.S. Government publications, including: “Minimum Interoperability Specification for PKI Components (MISPC), Version 1” NIST SP 800-15, January 1998; “Certification Authority Systems”, OCC 99-20, Office of the Comptroller of the Currency, May 4, 1999; “Guideline for Implementing Cryptography in the Federal Government”, NIST SP800-21, November 1999; Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology, U.S. General Accounting Office, GAO-01-277, February, 2001. Additional portions were used with permission from “Planning for PKI: Best practices for PKI Deployment”, R. Housley and T. Polk, Wiley & Sons, 2001. John Wack contributed material on PKI architectures. 2 1 INTRODUCTION .......................................................................................................................................................... 5 1.1 GOALS....................................................................................................................................................................... 5 1.2 MOTIVATION ............................................................................................................................................................. 5 1.3 OVERVIEW ................................................................................................................................................................ 6 2 BACKGROUND............................................................................................................................................................. 7 2.1 SECURITY SERVICES.................................................................................................................................................. 7 2.2 NON-CRYPTOGRAPHIC SECURITY MECHANISMS ....................................................................................................... 7 2.2.1 Parity Bits and Cyclic Redundancy Checks...................................................................................................... 7 2.2.2 Digitized Signatures ......................................................................................................................................... 8 2.2.3 PINs and Passwords......................................................................................................................................... 8 2.2.4 Biometrics......................................................................................................................................................... 8 2.2.5 Summary - Non-Cryptographic Security Mechanisms ..................................................................................... 9 2.3 CRYPTOGRAPHIC SECURITY MECHANISMS................................................................................................................ 9 2.3.1 Symmetric Key.................................................................................................................................................. 9 2.3.2 Secure Hash.................................................................................................................................................... 10 2.3.3 Asymmetric (public key) Cryptography .......................................................................................................... 11 2.3.4 Summary – Cryptographic Mechanisms......................................................................................................... 12 2.4 SECURITY INFRASTRUCTURES ................................................................................................................................. 13 3 PUBLIC KEY INFRASTRUCTURES ....................................................................................................................... 15 3.1 PKI COMPONENTS................................................................................................................................................... 16 3.1.1 Certification Authorities................................................................................................................................. 17 3.1.2 Registration Authorities.................................................................................................................................. 17 3.1.3 PKI Repositories............................................................................................................................................. 18 3.1.4 Archives.......................................................................................................................................................... 18 3.1.5 PKI users ........................................................................................................................................................ 18 3.2 PKI ARCHITECTURES .............................................................................................................................................. 18 3.2.1 Enterprise PKI Architectures ......................................................................................................................... 19 3.2.2 Bridge PKI Architecture................................................................................................................................. 20 3.2.3 Physical Architecture ..................................................................................................................................... 20 3.3 PKI DATA STRUCTURES.......................................................................................................................................... 22 3.3.1 X.509 Public Key Certificates ........................................................................................................................ 22 3.3.2 Certificate Revocation Lists (CRLs) ............................................................................................................... 24 3.3.3 Attribute Certificates ...................................................................................................................................... 26 3.4 ADDITIONAL PKI SERVICES..................................................................................................................................... 26 3.5 CASE STUDY ........................................................................................................................................................... 27 4 ISSUES AND RISKS IN CA SYSTEM OPERATION ............................................................................................. 29 4.1 VERIFYING IDENTITY............................................................................................................................................... 29 4.2 CERTIFICATE CONTENT ........................................................................................................................................... 29 4.3 CERTIFICATE CREATION, DISTRIBUTION, AND ACCEPTANCE ................................................................................... 30 4.4 MANAGING DIGITAL CERTIFICATES ......................................................................................................................... 30 4.4.1 Customer Disclosures..................................................................................................................................... 30 4.4.2 Subscriber Service and Support ..................................................................................................................... 31 4.4.3 Suspending and Revoking Certificates ........................................................................................................... 31 4.4.4 Processing Relying Party Requests ................................................................................................................ 32 4.4.5 Certificate Revocation ...................................................................................................................................