PKI Architecture Lecture2

59
1 PKI Architecture Lecture #2

Transcript of PKI Architecture Lecture2

Page 1: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 1/59

1

PKI Architecture

Lecture #2

Page 2: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 2/59

2

Scenario

• Alice received a document digitally signedby Bob

• Alice needs Bob’s public key to verify the

document • How does Alice ensure that the public key

which she is using is in fact Bob’s public key

and not of any other person impersonatingBob?

• Solution – Digital Certificate

Page 3: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 3/59

3

Scenario…. 

• A Digital Certificate is a document that binds the

information of the certificate holder to a public

key.

• This certificate is digitally signed by a third party,also referred to as a Certification Authority (CA).

• Hence, to verify Bob’s certificate, Alice needs to

first obtain the CA’s public key. 

• Alice can obtain the CA’s public key out−of−band. 

Page 4: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 4/59

4

Scenario… 

• CAs can certify other CAs also

• Every entity can trust every other entity,

provided it is able to establish a chain from

its trusted CA to the other entity’s trusted

CA, called certificate path.

• The number of CAs in a certificate path and

the arrangement of these CAs determine the

different PKI architectures.

Page 5: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 5/59

5

Types of PKI Architecture

• Single CA architecture

• Enterprise PKI architecture

• Hybrid PKI architecture

These different architectures are based on the

number of CAs, their arrangement, and therelationship between them.

Page 6: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 6/59

6

Single CA Architecture 

• Most basic type of PKI architecture.

• One CA who issues and distributescertificates and Certificate Revocation Lists

(CRLs) to the entities.• Entities use only those certificates that are

issued by this CA.

• All the entities in this architecturecommunicate with each other in a trustedenvironment 

Page 7: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 7/59

7

Single CA Architecture

both of them can validate and verify each others certificates and then

communicate

Page 8: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 8/59

8

Single CA Architecture

• Quite Easy

• a single point of failure.

• If the private key of this CA is compromisedthen all certificates issued by this CA will

become invalid, and this might result in a

complete breakdown of the PKI system.

• every entity should immediately be

informed about it.

Page 9: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 9/59

9

Single CA Architecture

• CA needs to be re−established. 

• All the certificates issued by the CA should

be deemed invalid and should be reissued.

• Suffers from scalability issues.

Page 10: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 10/59

10

Basic Trust List Model 

• An enhancement to the single CA architecture

• PKI services are provided by a number of CAs.

• These CAs do not establish a trust relationship

between them

• Entities have to maintain a list of CAs that they

trust 

• The entities can work with only a single certificateor with CRLs that have been issued to them by any

of the CAs listed in the trust list.

Page 11: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 11/59

11

Basic Trust List Model

Page 12: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 12/59

12

Basic Trust List Model

• Problems:

– A user tends to add new CAs to list without the

CA’s knowledge.

– It is difficult for a user to discover a CA

compromise since there is no direct 

relationship between the user and a CA

Page 13: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 13/59

13

Certificate Paths

• Before a certificate can be used, it must bevalidated

• A chain of certificates or a certification path

between the certificate and an establishedpoint of trust must be established

• Every certificate within that path must be

checked• This process is referred to as certification

 path processing 

Page 14: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 14/59

14

Certification path processing

• Path construction involves "building" one

or more candidate certification paths.

• Path validation includes making sure that 

each certificate in the path is within its

established validity period, has not been

revoked, has integrity, etc and any

constraints levied on part or all of the

certification path are honored

Page 15: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 15/59

15

Certificate Path Construction in a Single CA 

• Simple as the architecture involves only one

trust point.

• there is no path construction in a single CA

architecture, and a single certificate

represents the entire path.

Page 16: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 16/59

16

Certificate Path Construction 

[CA−1 Alice] 

[CA−1 Bob] 

A single certificate is needed to connect the entity to the trust point.

Page 17: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 17/59

17

Certificate path construction

CA-1

CA-2

CA-2

CA-3

CA-4

·[CA−1  Alice] 

[CA−2   Alice] 

· [CA−2  Bob] 

· [CA−3 

Bob] · [CA−4  Bob] 

Page 18: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 18/59

18

Enterprise PKI Architecture 

• Single CA model can serve the requirementsof a small organization

• As the needs of the organization grow or

interoperability between different organizations increases, there arises a needfor delegating the task of a single CA.

• This requires the distribution of operationsof a single CA between multiple CAs that arearranged either in a hierarchy or mesh

Page 19: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 19/59

19

Enterprise PKI Architecture 

• Superior−subordinate(hierarchical PKI) 

•  Peer−to−peer (mesh PKI) 

Page 20: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 20/59

20

Hierarchical PKI Architecture 

• PKI services are provided by multiple CAs.

• All CAs in a hierarchical PKI architecture

share a trust relationship among them.

• The CAs in this type of architecture are

connected through superior−subordinate

relationships.

Page 21: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 21/59

21

Hierarchical PKI Architecture

• The CA hierarchy is an inverted tree

• Root CA and subordinate CAs

• subordinate CAs are like any other CA andperform all the functions of a CA

• they can also delegate the responsibility of 

certificate issuance to other subordinateCAs beneath them.

Page 22: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 22/59

22

Hierarchical PKI Architecture

Page 23: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 23/59

23

 Adding new CA

Page 24: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 24/59

24

Hierarchical PKI

Page 25: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 25/59

25

Hierarchical PKI

• A single point of trust, the root CA

• Root CA controls the complete hierarchical PKI

architecture

• In case of a compromise of the root CA, the

complete PKI architecture will break down

• The compromise of subordinate CAs can still be

handled, as the superior CAs can revoke theircertificates and establish them again.

Page 26: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 26/59

26

Compromise of a single CA

• Assume that a single CA(not the root CA)

has been compromised

– The superior CA revokes the compromised CA’s

certificate

– Once the compromised CA has been

reestablished it issues new certificates to all its

users– The superior CA then issues a new certificate to

the reestablished CA

Page 27: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 27/59

27

Certificate Path Construction 

CA-2

CA-1

 Alice

Root CA

CA-4

CA-5

CA-3

Bob

James

Smith

For every entity there exists only one

certification path

Page 28: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 28/59

28

Certificate Path Construction 

• the certification path for Alice can be depicted as follows:

[Root   CA−3]: [CA−3   CA−2]: [CA−2   CA−1]:[CA−1  Alice] 

• Bob’s certification path can be depicted as follows: [Root   CA−3]: [CA−3   CA−2]: [CA−2   CA−1]:[CA−1  Bob] 

• James’s certification path can be depicted as follows: 

[Root   CA−4]: [CA−4  James] 

Page 29: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 29/59

29

Mesh PKI 

• The CAs have a peer−to−peer relationship,

rather than a superior subordinate

relationship

• All CAs in a mesh PKI can be trust points

• Since CAs issue certificates to each other,

they share a bi-directional trust relationship

Page 30: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 30/59

30

Mesh PKI

Page 31: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 31/59

31

 Adding new CA

• Can be easily added

• The new CA exchanges certificates with

atleast one CA that is already a member of 

the mesh

Page 32: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 32/59

32

Mesh PKI

• Multiple trust points

• Compromise of a single CA cannot 

result in a breakdown of the complete PKI

• If a CA is compromised, entities with other CAs astheir trust points continue to communicate withother entities.

• Certificate of the compromised CA can be

revoked by the CAs who have issued the certificatesto that CA

• The compromise of the CA affects only

the entities associated with that CA

Page 33: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 33/59

33

Certificate Path Construction 

• Initiated at the trust point, and it moves towards

the issuer of the end entity certificate

• More complex since there are multiple choices, so

non deterministic path construction• The maximum length of a certification path in a

mesh PKI is the number of CAs in the PKI.

• There is usually more than one certification pathbetween any entity and a trust point.

Page 34: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 34/59

34

Certificate Path Construction

Page 35: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 35/59

35

Certificate Path Construction

• Alice can construct the followingcertification path for Bob:

[CA−1  Bob]

• But for James, she can construct thefollowing certification paths:

[CA−1   CA−2]: [CA−2   CA−4]: [CA−4   

 James][CA−1   CA−3]: [CA−3   CA−2]:[CA−2   CA−4]: [CA−4  James]

Page 36: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 36/59

36

Hybrid PKI Architecture 

• PKI-based applications may cross

boundaries between communities or

enterprises

• Hybrid architectures can be used to connect 

community and enterprise PKIs

– extended trust list 

– cross-certified enterprise PKIs

– bridge CA architecture

Page 37: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 37/59

37

Hybrid PKI Architecture

Page 38: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 38/59

38

Extended Trust List Architecture 

• Each user maintains a list of trusted CAs

– each trust point in the list is a single CA, a

hierarchy, or a mesh

– a user trust any certification path that starts

with a trust point in the list 

Page 39: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 39/59

39

Extended Trust List Architecture

• Alice receives a certificate from CA−1.

• Alice must trust PKI2 and PKI3 to

communicate with James, Charlie, Smith,

and Robert.

• Alice can trust any one CA in PKI2 or PKI3,

or she can add the entire organization to her

trust list .

Page 40: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 40/59

40

Extended Trust List Architecture

Page 41: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 41/59

41

Certificate Path Construction 

• Extended Trust List might contain both hierarchical andmesh PKI architecture.

• The extended Trust List generates a certificate cache.

• This cache consists of all the possible certification paths.

• Instead of constructing a certification path, we can refer tothe cache and search for the appropriate path with the helpof the certification path value.

• This value is based on the complexity of the certification

path.• Simple certification paths are assigned a higher value thancomplex paths.

Page 42: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 42/59

42

Cross−Certified Enterprise PKIs 

• A cross-certified enterprise PKI establishes

peer-to-peer trust relationship

• Each user maintains a single trust point,

the CA that issued the certificate

• Problem: building of certification paths

may be complex

Page 43: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 43/59

43

Cross−Certified Enterprise PKIs 

Page 44: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 44/59

44

Path Construction

• Users construct different certification path

for the same entity certificate

• Path begins with the trust point of the

native PKI

• The straight forward path construction

method is used within a hierarchy, but this

ends when an outside root is reached.

Page 45: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 45/59

45

Bridge CA

• A special CA, called the bridge CA, is an

intermediary that establishes peer-to-peer

relationships with enterprise PKIs

• A CA that enters into a trust relationship

with the bridge CA is termed a principal CA

• Also known as hub and spoke PKI as it connects

multiple PKIs at a common point • If a principal CA is compromised, bridge CA

revokes its certificate

Page 46: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 46/59

46

Bridge CA 

Page 47: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 47/59

47

Path Construction

Page 48: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 48/59

48

Path Construction

•  Alice will construct the following certification path for Bob:[CA−1  Bob]

•  Alice will construct the following certification path for James:

[CA−1 Bridge CA]: [Bridge CA   CA−2]: [CA−2   CA−4]: [CA−4    James]

• The following certification paths would be constructed by Alice for Charlie:

[CA−1  Bridge CA]: [Bridge CA   CA−3]: [CA−3   CA−5]: [CA−5   Charlie]

[CA−1  Bridge CA]: [Bridge CA   CA−3]: [CA−3   CA−6]: [CA−6   

CA−5]: [CA−5  Charlie]

P h C i Si l

Page 49: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 49/59

49

Path Construction – Simple

Hierarchy

User1 sends a digitally signed email to User2

P h C i Si l

Page 50: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 50/59

50

Path Construction – Simple

Hierarchy

• Construct a certification path between User1'scertificate and a trust anchor recognized by User2.

• CA0,root CA is the common trust anchor for allusers within this strict hierarchy

• User2 wants to know if CA0 has established a trust relationship (either directly or indirectly) with theissuer of User1's certificate (CA1).

• If the relying party software is able to resolve the

certification path CA0->CA1->User1, then wewould have a candidate certification path that could be submitted to the path validation logic.

P h C i Si l

Page 51: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 51/59

51

Path Construction – Simple

Hierarchy

• Paths are typically constructed in the

forward direction

• we start with the target certificate and work 

our way to a recognized trust anchor

P th C t ti C

Page 52: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 52/59

52

Path Construction – Cross

Enterprise PKI

User2 sends a digitally signed email to User3

P th C t ti C

Page 53: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 53/59

53

Path Construction – Cross

Enterprise PKI• Construct a certification path between User2's verification

certificate and a trust anchor that User3 recognizes(CA7)

• Work our way "out" from the relying party's trust anchor(CA7) to eventually discover the crosscertificate

that CA5 issued to CA0• path construction in the reverse direction and it produces

a partial path CA7->CA5->CA0

• This partial path is constructed by retrieving theissuedByThisCA certificates under CA7's directory entry,

which, in turn, leads to the retrieval of theissuedByThisCA certificates under CA5's directory entry.

P th C t ti C

Page 54: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 54/59

54

Path Construction – Cross

Enterprise PKI

• Try to construct the rest of the path in the

forward direction

• we work our way back from the target 

certificate to CA0.

• CA7->CA5->CA0->CA2->CA4->User2.

Forward versus Reverse

Page 55: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 55/59

55

Forward versus ReverseCertification Path Construction

• In a strict hierarchy, working in the forwarddirection makes sense

• We are always guaranteed to find theissuedToThisCA element of the cross-certificate

pair attribute populated with the certificate(s)that have been issued to each subordinate CA.

• When we encounter a distributed trust model,building certification paths in the forwarddirection can become much less efficient.

• We may encounter tens or even hundreds of forward elements associated with a given CA, not just one or two.

P th t ti F ll

Page 56: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 56/59

56

Path construction- Fully

distributed

P th t ti F ll

Page 57: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 57/59

57

Path construction- Fully

distributed

• BCA1 might be cross-certified with tensor even hundreds of other CAs and those CAsmay be crosscertified with tens or hundredsmore.

• If we are looking at the issuedToThisCAelement only, we could encounter a largenumber of CAs that lead away from the path weare seeking.

•  Attempting to construct every possible path inthe forward direction is clearly less practical

• under these circumstances.

P th t ti F ll

Page 58: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 58/59

58

Path construction- Fully

distributed

• Constructing in the reverse direction also

involves trial and error 

• but we will always be working with a

(partial) path emanating from the relyingparty's trust anchor since we are

answering the question "who have you

issued certificates to" rather than "who hasissued certificates to you."

Page 59: PKI Architecture Lecture2

7/27/2019 PKI Architecture Lecture2

http://slidepdf.com/reader/full/pki-architecture-lecture2 59/59

59

Conclusion

• Certification path construction in the

forward direction is optimal for hierarchical

trust models

• Certification path construction in the

reverse direction is optimal for distributed

trust models.