SlideShare una empresa de Scribd logo
1 de 24
A Seminar on
Public Key
Infrastructure
Under the guidance of :
K. Jeevan Pradeep, M.Tech
Assistant professor
1
Presented by:
M. Vimal Kumar
(11121A0557)
SREE VIDYANIKETHAN ENGINEERING COLLEGE
(AUTONOMOUS)
Sree Sainath Nagar, A.Rangampet-517102
Chittoor Dist, Andhra Pradesh.
Department of Computer Science and Engineering
Contents
 Introduction to Access Control Policy
 Password Authentication
 Symmetric and Asymmetric Encryption
 Hashing
 Digital Signature
 Public Key Infrastructure
 Certification
 Validation
 Revocation
 Authentication
 Keys
 Related Technologies
 Conclusion
 References
2
Introduction to Access Control
Policy
 To be able to access data and applications
from within a company, a user first needs to
be authenticated, and then needs to be
authorized to perform the operation.
 Authentication Procedures perform the
former task, and Access Control Decision
functions perform the later task.
Password Authentication
 When a company has several applications
hosted by different systems and
servers, there are several ways of identity
authentication.
Multiple passwords, one for each
system/application
Same password, replicated in each system
 Single sign-on software
Directory Server
Symmetric and Asymmetric
Encryption
 The objective of encryption is to transform a
message to a cipher text, ensuring confidentiality
 In the symmetric encryption schemes the same key
(called the secret key) is used to both encrypt and
decrypt the text.
Ex :- DES algorithm.
 Asymmetric cryptosystems use one key (the public
key) to encrypt a message and a different key (the
private key) to decrypt it.
Ex:- RSA and ECDSA algorithms.
Contd…
• Comparison between symmetric and asymmetric
encryption
Hashing
 Hashing is the method used to obtain a "digital
fingerprint" (hash) for a given message.
 The hash code has a fixed-length (normally 128 or
160 bits) and it's designed to be unique
 Some examples are MD2, MD4, MD5 (128 bits)
and SHA1 (Secure Hash Algorithm,160 bits )
Digital Signature
 To obtain a secure digital signature,
 At first the message is hashed
 Creating a digital fingerprint which is encrypted using the
receiver's public key
 Creating a digital signature. The clear message is combined with
the digital signature
 The result (an authenticated message) is sent
 After the reception, the message is separated from the digital
signature
 which is decrypted using the receiver's private key
 The message is hashed into a "temporary" digital fingerprint
 which is used to validate the received fingerprint
 If the message has not been modified during the transfer process,
it's authenticated.
Mechanism of Digital
Signature
Public Key Infrastructure
 Three different formats of messages can be used in public-
key cryptosystems: Encrypted message, Signed
message, Signed and encrypted message.
 An infrastructure must be set-up to allow them to be
undoubtedly trusted , as they are accessible via unsecured
networks (Internet)
 PKI entities:
-CA ( certification authority )
-RA ( registration authority )
-Subscriber
-Relying Party
-Repository
PKI basic entities and
operations
Certification
 Certification is the fundamental function of all PKIs.
The certificates provide a secure way of publishing
public keys, so that their validity can be trusted.
 A certificate contains (at least) the basic
information needed to provide a third party entity
with the subject's public key:
• Subject Identification information
• Subject public Key
• CA Identification Information
• Validity (e.g. time)
Certification contd...
 Cross certification :- Not all the entities will trust the
same CA to hold their certificates. Cross
certification is used to create the certificate
between two CAs. If both CAs trust each other, a
cross certificate pair is established. In other cases,
only one certificate would be created, and not a
pair.
Certification contd...
 Certification path :- In a universe composed of
several different CAs an arbitrary number of CAs
must validate each other, until a certificate is
obtained. This process is called certification path
validation.
Validation
 This is the process that ensures that
the certificate information is still valid,
as it can change over time.
 Either the user can ask the CA directly
about the validity - every time it's used
- or the CA may include a validity
period in the certificate. This second
alternative is also known as offline
validation.
Revocation
 This is the process of informing the users when the
information in a certificate is not valid.
 This is especially interesting in the absence of
online validation approaches, and the most
common revocation methods consist in publishing
Certification Revocation Lists (CRL).
 A CRL is a "black" list of revoked certificates that is
signed and periodically issued by a CA.
Authentication
 In order for the subject to gain access
to its private key, it has to possess a
smart card or an encrypted key file
and know something (PIN or
password) or be something (e.g. a
particular fingerprint).
Keys
 Key pair models :- To increase the security level,
different key pairs might exist for different
functions, which may be divided into the following
categories:
• Non-repudiatable message signing (e.g. e-mail).
• Encryption/Decryption functions.
• Authentication only (e.g. LOG ON functions).
Key Management
 These are the main steps performed
in a PKI structure to handle the key
pairs:
•Key Generation
•Storage of Private Keys
•Revocation of Public Keys
•Publication of certificates and CRL
•Key Update
•Backup / Recovery
•Escrow / Recovery
Related Technologies
 CMS - Cryptographic Message Syntax
 SSL
 Secure e-mail / S/MIME
 VPN (Virtual Private Network)
 PGP (Pretty Good Privacy)
Conclusion
 RFC 2822(Internet Security Glossary)
defines public-key infrastructure(PKI) as the
set of hardware , software , people , policies
and procedures needed to revoke digital
certificates based on asymmetric
cryptography.
 The principal objective for developing a PKI
is to enable secure , convenient and
efficient acquisition of public keys.
References
 Wikipedia
 www.studymafia.com
 Network Security Essentials
-by William Stallings
23
QUERIES…???
THANK YOU   

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Pgp
PgpPgp
Pgp
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
SSL
SSLSSL
SSL
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Destacado

Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)Apridila Anggita Suri
 
steps to apply for background verification
steps to apply for background verificationsteps to apply for background verification
steps to apply for background verificationpassportindia
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
Security officer kpi
Security officer kpiSecurity officer kpi
Security officer kpijomrichsa
 
Steps to apply for Passport Services
Steps to apply for Passport ServicesSteps to apply for Passport Services
Steps to apply for Passport Servicespassportindia
 

Destacado (9)

Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
 
steps to apply for background verification
steps to apply for background verificationsteps to apply for background verification
steps to apply for background verification
 
Marco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overviewMarco Casassa Mont: Pki overview
Marco Casassa Mont: Pki overview
 
Pki for dummies
Pki for dummiesPki for dummies
Pki for dummies
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
Security officer kpi
Security officer kpiSecurity officer kpi
Security officer kpi
 
Steps to apply for Passport Services
Steps to apply for Passport ServicesSteps to apply for Passport Services
Steps to apply for Passport Services
 

Similar a public key infrastructure

Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization ModelsCSCJournals
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications nishchal29
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10githe26200
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modiMohit Modi
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 

Similar a public key infrastructure (20)

Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Security
SecuritySecurity
Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Ch15
Ch15Ch15
Ch15
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
 
Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
CISSPills #1.02
CISSPills #1.02CISSPills #1.02
CISSPills #1.02
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 

Último

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

public key infrastructure

  • 1. A Seminar on Public Key Infrastructure Under the guidance of : K. Jeevan Pradeep, M.Tech Assistant professor 1 Presented by: M. Vimal Kumar (11121A0557) SREE VIDYANIKETHAN ENGINEERING COLLEGE (AUTONOMOUS) Sree Sainath Nagar, A.Rangampet-517102 Chittoor Dist, Andhra Pradesh. Department of Computer Science and Engineering
  • 2. Contents  Introduction to Access Control Policy  Password Authentication  Symmetric and Asymmetric Encryption  Hashing  Digital Signature  Public Key Infrastructure  Certification  Validation  Revocation  Authentication  Keys  Related Technologies  Conclusion  References 2
  • 3. Introduction to Access Control Policy  To be able to access data and applications from within a company, a user first needs to be authenticated, and then needs to be authorized to perform the operation.  Authentication Procedures perform the former task, and Access Control Decision functions perform the later task.
  • 4. Password Authentication  When a company has several applications hosted by different systems and servers, there are several ways of identity authentication. Multiple passwords, one for each system/application Same password, replicated in each system  Single sign-on software Directory Server
  • 5. Symmetric and Asymmetric Encryption  The objective of encryption is to transform a message to a cipher text, ensuring confidentiality  In the symmetric encryption schemes the same key (called the secret key) is used to both encrypt and decrypt the text. Ex :- DES algorithm.  Asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Ex:- RSA and ECDSA algorithms.
  • 6. Contd… • Comparison between symmetric and asymmetric encryption
  • 7. Hashing  Hashing is the method used to obtain a "digital fingerprint" (hash) for a given message.  The hash code has a fixed-length (normally 128 or 160 bits) and it's designed to be unique  Some examples are MD2, MD4, MD5 (128 bits) and SHA1 (Secure Hash Algorithm,160 bits )
  • 8. Digital Signature  To obtain a secure digital signature,  At first the message is hashed  Creating a digital fingerprint which is encrypted using the receiver's public key  Creating a digital signature. The clear message is combined with the digital signature  The result (an authenticated message) is sent  After the reception, the message is separated from the digital signature  which is decrypted using the receiver's private key  The message is hashed into a "temporary" digital fingerprint  which is used to validate the received fingerprint  If the message has not been modified during the transfer process, it's authenticated.
  • 10. Public Key Infrastructure  Three different formats of messages can be used in public- key cryptosystems: Encrypted message, Signed message, Signed and encrypted message.  An infrastructure must be set-up to allow them to be undoubtedly trusted , as they are accessible via unsecured networks (Internet)  PKI entities: -CA ( certification authority ) -RA ( registration authority ) -Subscriber -Relying Party -Repository
  • 11. PKI basic entities and operations
  • 12. Certification  Certification is the fundamental function of all PKIs. The certificates provide a secure way of publishing public keys, so that their validity can be trusted.  A certificate contains (at least) the basic information needed to provide a third party entity with the subject's public key: • Subject Identification information • Subject public Key • CA Identification Information • Validity (e.g. time)
  • 13. Certification contd...  Cross certification :- Not all the entities will trust the same CA to hold their certificates. Cross certification is used to create the certificate between two CAs. If both CAs trust each other, a cross certificate pair is established. In other cases, only one certificate would be created, and not a pair.
  • 14. Certification contd...  Certification path :- In a universe composed of several different CAs an arbitrary number of CAs must validate each other, until a certificate is obtained. This process is called certification path validation.
  • 15. Validation  This is the process that ensures that the certificate information is still valid, as it can change over time.  Either the user can ask the CA directly about the validity - every time it's used - or the CA may include a validity period in the certificate. This second alternative is also known as offline validation.
  • 16. Revocation  This is the process of informing the users when the information in a certificate is not valid.  This is especially interesting in the absence of online validation approaches, and the most common revocation methods consist in publishing Certification Revocation Lists (CRL).  A CRL is a "black" list of revoked certificates that is signed and periodically issued by a CA.
  • 17. Authentication  In order for the subject to gain access to its private key, it has to possess a smart card or an encrypted key file and know something (PIN or password) or be something (e.g. a particular fingerprint).
  • 18. Keys  Key pair models :- To increase the security level, different key pairs might exist for different functions, which may be divided into the following categories: • Non-repudiatable message signing (e.g. e-mail). • Encryption/Decryption functions. • Authentication only (e.g. LOG ON functions).
  • 19. Key Management  These are the main steps performed in a PKI structure to handle the key pairs: •Key Generation •Storage of Private Keys •Revocation of Public Keys •Publication of certificates and CRL •Key Update •Backup / Recovery •Escrow / Recovery
  • 20. Related Technologies  CMS - Cryptographic Message Syntax  SSL  Secure e-mail / S/MIME  VPN (Virtual Private Network)  PGP (Pretty Good Privacy)
  • 21. Conclusion  RFC 2822(Internet Security Glossary) defines public-key infrastructure(PKI) as the set of hardware , software , people , policies and procedures needed to revoke digital certificates based on asymmetric cryptography.  The principal objective for developing a PKI is to enable secure , convenient and efficient acquisition of public keys.
  • 22. References  Wikipedia  www.studymafia.com  Network Security Essentials -by William Stallings 23
  • 24. THANK YOU   