An Overview of Public Key Infrastructure
Total Page:16
File Type:pdf, Size:1020Kb
AN OVERVIEW OF PUBLIC KEY INFRASTRUCTURE A Thesis Presented to the Faculty of San Diego State University In Partial Fulfillment of the Requirements for the Degree Master of Science in Applied Mathematics with a Concentration in Mathematical Theory of Communication Systems by Pavan Kandepet Fall 2013 iii Copyright c 2013 by Purushothaman Pavan Kandepet iv DEDICATION I would like to dedicate this thesis to my chair Dr. Carmelo Interlando for helping me extensively through the course of my study at San Diego State University. His valuable advice, insight and knowledge have helped me tremendously. I thank him for all the help he has provided. v ABSTRACT OF THE THESIS An Overview of Public Key Infrastructure by Pavan Kandepet Master of Science in Applied Mathematics with a Concentration in Mathematical Theory of Communication Systems San Diego State University, 2013 Security for electronic commerce has become increasingly demanding in recent years owing to its widespread adoption across geographically distributed systems. Public Key Infrastructure (PKI) is a relatively new technology with foundations in mathematics and which provides the necessary security features for digital commerce. The main goal of this work is to provide an introduction to PKI and how it can be used across geographically distributed systems. We start with an introduction to electronic commerce security and discuss its security concerns. This is followed by an introduction to cryptography, which sets the stage for the main chapter on PKI which introduces several components of this system in detail and its expectations. Next, certificates and certificate management, which are key components of electronic security, are discussed. The work is concluded with real world applications of PKI, its restrictions and problems, and its future. vi TABLE OF CONTENTS PAGE ABSTRACT .................................................................................... v LIST OF FIGURES ............................................................................ viii ACKNOWLEDGMENTS ..................................................................... ix CHAPTER 1 INTRODUCTION ..................................................................... 1 1.1 Motivation....................................................................... 1 1.2 OutlineofThesis................................................................ 2 2 BACKGROUND ON CRYPTOGRAPHY ........................................... 3 2.1 TheBasics....................................................................... 3 2.1.1 Symmetric or Secret Key Ciphers ........................................ 4 2.1.2 Asymmetric (Public Key) Ciphers........................................ 5 2.2 DigitalSignatures ............................................................... 7 2.2.1 Hash Functions ............................................................ 8 3 SECURITY INFRASTRUCTURE.................................................... 10 3.1 Introduction...................................................................... 10 3.1.1 Secure Single Sign-on..................................................... 10 3.1.2 End user transparency ..................................................... 11 3.1.3 Comprehensive security................................................... 12 4 PUBLIC KEY INFRASTRUCTURE................................................. 13 4.1 Basics............................................................................ 13 4.2 Core PKIServices............................................................... 13 4.2.1 Authentication ............................................................. 14 4.2.2 Integrity .................................................................... 15 4.2.3 Confidentiality ............................................................. 17 4.3 Services Offered byPKI........................................................ 18 4.4 Certificates....................................................................... 19 4.4.1 Certificate Initialization ................................................... 22 4.4.2 Certificate Issuance........................................................ 23 vii 4.4.3 Certificate Cancellation ................................................... 23 4.4.4 Certificate Distribution .................................................... 23 4.4.5 Certificate Trust Models................................................... 24 5 PRACTICAL PUBLIC KEY INFRASTRUCTURE SYSTEMS .................... 27 5.1 Essential Components........................................................... 27 5.2 Roles and Responsibilities...................................................... 28 6 CHALLENGES AND THE FUTURE OF PUBLIC KEY INFRASTRUCTURE.. 29 BIBLIOGRAPHY.............................................................................. 31 viii LIST OF FIGURES PAGE Figure 2.1. Cryptographic System. ............................................................ 3 Figure 2.2. Symmetric Cipher System......................................................... 4 Figure 2.3. Public and private key encryption/decryption system............................ 6 Figure 2.4. Digital signature. .................................................................. 7 Figure 2.5. Hashing messages. ................................................................ 8 Figure 3.1. Single sign-on system. ............................................................ 11 Figure 4.1. Remote Authentication. ........................................................... 15 Figure 4.2. MAC process....................................................................... 17 Figure 4.3. X.509 Version 3 Certificate........................................................ 21 Figure 4.4. Strict Hierarchical trust model. ................................................... 25 Figure 4.5. Distributed Hierarchical trust model. ............................................. 26 ix ACKNOWLEDGMENTS I would like to thank Dr. William Root and Dr. Peter Blomgren for taking the time out of their busy schedules to be on my committee and for their valuable comments. 1 CHAPTER 1 INTRODUCTION Over 90% of website use today is to generate revenue through electronic commerce. Web security is critical to business and end users alike. Electronic commerce is a major driving force of the economy today. It has improved our lives significantly. Imagine if you had to walk to the bank everyday to check your account balance. Checking it online is so much more convenient. Think what would happen to Amazon or Apple if there were no electronic commerce. Even though electronic commerce has improved our economy significantly it also comes with some significant issues. What happens if electronic commerce transactions are compromised? How are these transactions secured? When a typical user performs an online transaction such as buying something online, there are usually multiple hops (computer nodes) between which the transaction passes through. A complex path between different countries and over various networks will likely carry this personal and sensitive information. The end user who initiated the transaction has no control over the communication path due to the nature of connected networks. How secure are these connections? How can we trust the website at the other end is what it claims? If an impostor in the middle seems to show a fake website claiming that it is the actual website, how can we find that out? 1.1 MOTIVATION One of the major factors stopping the success of electronic commerce for both business and customers alike is trust. Trust is paramount when money is involved. Many aspects of this trust can be satisfied using cryptographic techniques. If a business organization spans branches across multiple countries a medium of trust is necessary for secure communication among necessary servers, clients etc. Using cryptographic strong techniques and Pubic Key Infrastructure (PKI), this trust can be established. Electronic commerce can basically be of two types, business to business transactions and consumer to business transactions [10]. Banks were the pioneers in business electronic commerce early on due to the inherent nature of their work. Managing huge transactions both domestic and international requires secure communication techniques. This was due to the nature of such businesses to cut down on communication costs, facilitate ordering, negotiations, pricing, invoicing and payment processes. 2 The basic electronic commerce model is built on the observation that the most elemental building block is a transaction. It always involves two parties, a customer and a seller. The customer begins with a request where it requests the seller for information. The buyer needs to be absolutely sure that the nature or content of information that the seller is providing has not been compromised. The seller must also make sure that their offer remains confidential to the buyer. What is fundamentally different from traditional commerce in electronic commerce is the absence of human interaction for trust. The machines have no reliable way of knowing who is really on the other end of the line to confirm the identity. This is where the role of authenticity comes into play [10]. Electronic commerce needs confidentiality, integrity, availability and authenticity to be successful. PKI provides both availability and authenticity while cryptography provides confidentiality and integrity. 1.2 OUTLINE OF THESIS This expository work introduces the concept of Public Key Infrastructure (PKI) as a necessary component