public key infrastructures - faculteit wiskunde en informatica · ecc challenges 17-11-2016 page 12...

119
Public Key Infrastructures Andreas Hülsing

Upload: buidang

Post on 17-Mar-2019

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public Key

Infrastructures

Andreas Hülsing

Page 2: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Exchange Problem

PAGE 117-11-2016

n*(n-1)/2 keys = O(n2)

[From: http://www.internetworldstats.com/stats.htm , June 30, 2016]

Internet: 2,405,518,376 users

6,755,844,026,095,330,078 keys

≈6,8* 1018 keys

Page 3: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Solution 1: Key Server

PAGE 217-11-2016

Key-Server

The key-server knows all secret keys!

Page 4: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Authentication Center

PAGE 317-11-2016

• The authentication center (AC) in mobile

communications knows all the keys.

It stores them in a database.[From “IT-Sicherheit”, page 785, 800]

Page 5: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Solution 2: Use Public Key Crypto

PAGE 417-11-2016

Public-Key-Server

The server does not know any private information!

Page 6: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Asymmetric encryption problems

Performance

Key availability

Key ownership

Key validity

Public-Key-Server

PAGE 517-11-2016

Page 7: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Hybrid encryption

PAGE 617-11-2016

plaintextdecrypt

Sdkfj

kj

djd

fj

djf

jkj

encryptplaintext

decryptencrypt

symmetric session key

Bob’s

public

Bob’s

private

Page 8: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Digital signature problems

PAGE 717-11-2016

Key availability

Key ownership

Key validity

Public-Key-Server

Page 9: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity?

PAGE 817-11-2016

Page 10: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Lifetime of Hash Functions

PAGE 917-11-2016

Source: http://valerieaurora.org/hash.html

Page 11: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

RSA - published in 1978

PAGE 1017-11-2016

…using 200 digits provides

a margin of safety against

future developments…

Page 12: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

RSA Factoring Challenge

PAGE 1117-11-2016

number digits prize factored

RSA-100 100 Apr. 1991

RSA-110 110 Apr. 1992

RSA-120 120 Jun. 1993

RSA-129 129 $100 Apr. 1994

RSA-130 130 Apr. 10, 1996

RSA-140 140 Feb. 2, 1999

RSA-150 150 Apr. 16, 2004

RSA-155 155 Aug. 22, 1999

RSA-160 160 Apr. 1, 2003

RSA-200 200 May 9, 2005

RSA-576 174 $10,000 Dec. 3, 2003

RSA-640 193 $20,000 Nov. 4, 2005

RSA-704 212 $30,000 July 2, 2012

RSA-768 232 $50,000 Dec. 12, 2009

RSA-896 270 $75,000 not factored

RSA-1024 309 $100,000 not factored

RSA-1536 463 $150,000 not factored

RSA-2048 617 $200,000 not factored

Challenge is no longer active, original webpage unavailablebut you can see results

https://en.wikipedia.org/wiki/RSA_Factoring_Challenge

Page 13: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

ECC challenges

PAGE 1217-11-2016

ECC Field Size Days Date

ECC2-79 79 352 1997

ECC2-89 89 11278 1998

ECC2K-95 97 8637 1998

ECC2-97 97 180448 1999

ECC2K-108 109 1.3x10^6 2000

ECC2-109 109 2.1x10^7 2004

ECCp-79 79 146 1997

ECCp-89 89 4360 1998

ECCp-97 97 71982 1998

ECCp-109 109 9x10^7 2002

[From www.certicom.com/images/pdfs/challenge-2009.pdf]

Page 14: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Moore’s Law

PAGE 1317-11-2016

Page 15: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Improved Cryptanalysis

PAGE 1417-11-2016

2013

Page 16: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Another Problem

PAGE 1517-11-2016

Page 17: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Post-Quantum Crypto

• Hash-based signatures

• Lattice-based cryptography

• Coding-based cryptography

• Multivariate cryptography

PAGE 1617-11-2016

Page 18: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public key infrastructures

PAGE 1717-11-2016

Page 19: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public Key Infrastructures

… a public key infrastructure (PKI) is designed to

facilitate the use of public key cryptography.

Source: Housley, R. and Polk, T.: Planning for PKI; Wiley 2001

PAGE 1817-11-2016

Page 20: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Tasks of a PKI

• Assure that the public key is available

• Assure that the public key is authentic

• Assure that the public key is valid

• Enforce security and interoperability

PAGE 1917-11-2016

Page 21: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Authenticate Public Keys

• Bind public key to electronic identity

• Seal the binding

• Answer for the binding

Public key certificates

PAGE 2017-11-2016

Page 22: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public Key Certificate

Public key certificates are data structures that bind

public key values to subjects. The binding is

asserted by having a trusted CA digitally sign each

certificate …

[From RFC 5280]

PAGE 2117-11-2016

Page 23: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public Key Certificate

PAGE 2217-11-2016

Page 24: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public Key Certificate

PAGE 2317-11-2016

Digital Signature

Subject (Name)

Public-keyBinding eID public key

protection of authenticity

Page 25: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Certificate Properties

• Protected binding of a key to the key holder

• Authenticity independent of means of transportation

• Can be used online and offline

• Proof of the binding

• Can be used for key servers

PAGE 2417-11-2016

Page 26: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Certificate Standards

PAGE 2517-11-2016

• X.509• X.509 (ITU-T)

• PKIX (RFC 5280)

• Pretty Good Privacy (PGP)• OpenPGP (RFC 4880)

• GNU Privacy Guard (GnuPG or GPG)

• WAP certificates• Like X.509 certificates but smaller

• Card Verifiable Certificates (CVC)• Even smaller than WAP certificates

• Simple PKI / Simple Distributed Security Infrastructure• SPKI, pronounced spoo-key

• SDSI, pronounced sudsy

Page 27: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Validity of Public Keys

• Monitor binding public key electronic identity

key owner

• Establish time constraints

• Provide means to revoke binding

Certificate revocation

PAGE 2617-11-2016

Page 28: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Certificate Revocation

PAGE 2717-11-2016

• Abortive ending of the binding between

• subject and key (public key certificate)

OR

• subject and attributes (attribute certificate)

• The revocation is initiated by

• the subject

OR

• the issuer

• Typical frequency (assumption):

• 10% of the issued certificates will be revoked (See: “Selecting

Revocation Solutions for PKI” by Årnes, Just, Knapskog, Lloyd and Meijer)

Page 29: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Certificate Revocation List

PAGE 2817-11-2016

Page 30: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Publish Public Key Information

PAGE 2917-11-2016

• Directories• (L)DAP

• Active Directory

• Web pages• HTTP

• File transfer• FTP

• Services

• OCSP

• SCVP

Page 31: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

LDAP

PAGE 3017-11-2016

Page 32: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Security of Key Pairs

Select suitable algorithms and key sizes

Monitor possible security threads and react adequately

Provide suitable means to generate key pairs

Provide suitable formats and media to store private keys

Provide suitable means of delivering private keys

Personal security environments

PAGE 3117-11-2016

Page 33: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

PSE: Smartcard

PAGE 3217-11-2016

Page 34: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Interoperability

• Comply to accepted (international) standards

• Certificates / revocations

− X.509, PGP, SPKI/SDSI, …

• Directory services

− (L)DAP, Active Directory, …

• Cryptographic algorithms / protocols / formats

− PKCS, RFC, …

• Constraints on content and processing

− PKIX, ISIS-MTT, …

PAGE 3317-11-2016

Page 35: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Policy Enforcement

• Certificate policy (CP)

• States what to comply to

• Certificate practice statement (CPS)

• States how to comply

• Policies are enforced by the PKI through:

• Selecting standards, parameters, hardware, …

• Monitor behavior of involved parties

• Reacting on infringement of the policy

PAGE 3417-11-2016

Page 36: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trust Models

PAGE 3517-11-2016

Page 37: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trust

The perhaps most important part of a PKI is to

establish trust in the binding between an entity and a

certificate

PAGE 3617-11-2016

Page 38: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Direct Trust

PAGE 3717-11-2016

• User receives public key directly from owner

OR

• User verifies public key directly with owner

Page 39: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Most Common: Fingerprint comparison

PAGE 3817-11-2016

Fingerprint = hash value of the certificate (incl. Signature) (e.g. SHA1)

Page 40: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Face-to-Face Verification

PAGE 3917-11-2016

Page 41: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Phone Verification

PAGE 4017-11-2016

Page 42: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Web Page Verification

PAGE 4117-11-2016

http://www.cacert.org/index.php?id=3

Page 43: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Printed Media Verification

PAGE 4217-11-2016

BNetzA publishes the public key

Page 44: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

…and more

PAGE 4317-11-2016

~# gpg --list-public-keys

/root/.gnupg/pubring.gpg

------------------------

pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team

<[email protected]>

pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key

<[email protected]>

sub 2048g/8495160C 2000-10-19 [expires: 2006-02-12]

e.g. public keys on software CD/DVD

Page 45: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Summary: Direct Trust

• Establishes• Which keys are authentic

• Why they are considered authentic

• Bad scalability• n * (n-1) = O(n2) verifications

• Worse complexity than secret key exchange!

• Basis for all other trust models• To be seen

PAGE 4417-11-2016

Page 46: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

PGP(Pretty Good Privacy)

PAGE 4517-11-2016

Page 47: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Web of Trust

PAGE 4617-11-2016

[From PGP-Pretty Good Privacy by Simon Garfinkel]

Page 48: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Web of Trust

PAGE 4717-11-2016

A web of trust is a concept used in PGP, GnuPG, and

other OpenPGP-compatible systems to establish the

authenticity of the binding between a public key and a

user.

Its decentralized trust model is an alternative to the

centralized trust model of a public key infrastructure (PKI),

which relies exclusively on a certificate authority (or a

hierarchy of such).

Source: http://en.wikipedia.org/wiki/Web_of_trust

Page 49: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity

PAGE 4817-11-2016

• Alice computes key validity using Bob’s signatures

Carl

Dorian

BobAlice

Page 50: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Chaining Key Validity

PAGE 4917-11-2016

• Alice computes key validity using Bob’s and Carl’s

signatures

Alice Bob Carl

Dorian

Eve

Page 51: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public Keyring

PAGE 5017-11-2016

Page 52: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Public Keyring

PAGE 5117-11-2016

Alice’s public keyring

Page 53: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity vs. Owner Trust

PAGE 5217-11-2016

• Key Validity:

• Is the key owner who he claims to be?

• Levels: no answer; unknown; marginal; complete;

ultimate

• Owner trust:

• Is the key owner reliable? (in respect to signing keys of others)

• Levels: unknown; none; marginal; complete; ultimate

Page 54: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity: Levels

PAGE 5317-11-2016

• no answer

• Nothing is said about this key.

• unknown

• Nothing is known about this key.

• marginal

• The key probably belongs to the name.

• complete

• The key definitely belongs to the name.

• (ultimate)

• (Own keys).

Page 55: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Owner Trust: Levels

PAGE 5417-11-2016

• unknown

• Nothing can be said about the owner's judgmentin key signing.

• none

• The owner is known to improperly sign keys.

• marginal

• The owner is known to properly sign keys.

• complete

• The owner is known to put great care in keysigning.

• ultimate

• The owner is known to put great care in keysigning, and is allowed to make trust decisions foryou.

Page 56: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Assigning Key Validity

• Manually (Key Signing)

OR

• computed from the trust in the corresponding

signers, only considering signers with key validity

“complete” (or better).

PAGE 5517-11-2016

Page 57: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Assigning Key Validity

PAGE 5617-11-2016

Alice signs the public key of other users.

Page 58: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Signing: Direct Trust

PAGE 5717-11-2016

Bob’s key validity is complete for Alice because she decided it when signing the key after verifying the fingerprint.

Page 59: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity Computation: “complete” (1)

PAGE 5817-11-2016

If the key is signed by at least one user with owner trust complete.

Page 60: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity Computation: “complete” (2)

PAGE 5917-11-2016

If the key is signed by at least x (here x=2) names with owner trust marginal.

Page 61: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity Computation: “marginal”

PAGE 6017-11-2016

If the key is signed by less than x (here x=2) names with owner trust marginal.

Page 62: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Validity Computation: “unknown”

PAGE 6117-11-2016

If the key is signed by no one with owner trust at least marginal

Page 63: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Assigning Owner Trust

• Manually (Trust Setting)

OR

• computed from the owner trust of signers only using

“ultimate” valid keys.

PAGE 6217-11-2016

Page 64: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trust Anchor: Owner Trust

PAGE 6317-11-2016

Alice assigns owner trust to users.

Page 65: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

“Simple” PGP

PAGE 6417-11-2016

Alice signs Bob’s key (level 0) and trusts him. Alice uses Bob’s signatures on Dorian’s and Frank’s

keys.

Page 66: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trusted Introducers

PAGE 6517-11-2016

Alice signs Bob’s key (level 1) and trusts him. Bob signs Carl’s key (level 0) and trusts him. Alice uses Carl’s signatures on Dorian’s and Frank’s

keys. Bob = Trusted Introducer

By allowing more intermediate signers (level >1), Bob becomes a Meta Introducer

Page 67: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

PGP Certificates

PAGE 6617-11-2016

Page 68: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

PGP Certificates: Content

PAGE 6717-11-2016

[From http://www.ece.cmu.edu/~adrian/630-f04/PGP-intro.html]

Page 69: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

How to share Keys with PGP

• Attach to mail

• Use Key Server

→ Still need to verify key validity!

PAGE 6817-11-2016

Page 70: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

PGP Keys

PAGE 6917-11-2016

http://pgp.jjim.de/sks/

Page 71: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

• http://www.rediris.es/keyserver/graph.html

PGP Keyserver Synchronization Graph

Page 72: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

PGP Revocation

• Uses Key Revocation Certificate

• generated during KeyGen using private key

• Uploading Key Revocation Certificate to one of the

public key servers revokes key pair.

• Key Revocation Certificate can contain new UserID

PAGE 7117-11-2016

Page 73: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

X.509

PAGE 7217-11-2016

Page 74: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Example: Secured Website

Page 75: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Click once

PAGE 7417-11-2016

Page 76: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Click on button

Page 77: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Click on view

Page 78: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Click on details

PAGE 7717-11-2016

Page 79: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

In the browser

The browser is shipped with trusted authorities

Page 80: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Built-in object token

Page 81: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Bob Carl

Hierarchical trust

Alice

Certification Authority (CA) trust anchor

issues certificates

Page 82: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

DFN PCA

TUD CA Uni Gießen

Alice Bob Carl Doris Emil

TUD Student CA TUD Employee CA

Hierarchical trust

root CA

Why does Alice trust in Doris’ key?

Page 83: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Why does Alice trust in Doris’ key?

DFN PCA

TUD CA Uni Gießen

Alice Bob Carl Doris Emil

TUD Student CA TUD Employee CA

Hierarchical trust

root CA

Page 84: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Alice

TUD Student CA

TUD CA

TUD Employee CATUD Student CA

DFN PCADFN PCA

TUD CA Uni Gießen

Alice Bob Carl Doris Emil

Hierarchical trust

Emil to Alice

Trust anchor

Certification path

Public-key in question

Intermediate CAs

Page 85: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trust models in multiple hierarchies

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

When does Alice accept the certificate of Fred?

Page 86: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Method 1: Trusted List

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

Every participant has a list of trusted CAs. Alice trusts TC2 and TC3 Every user maintains an own list (like in the Web of Trust) Used in Web Browsers (preinstalled + user defined)

Page 87: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trusted List: certification path

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

Alice to Fred

Page 88: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trusted List: Example

Page 89: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Trusted List: Example

Page 90: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Method 2: Common Root

Every user who trusts TC1, accepts every other end-user certificate.

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

TC1

Page 91: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Common Root: certification path

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

TC1

Alice to Fred

Page 92: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Method 3: Cross-certification

TC2 issues a CA-certificate for TC3.

TC3 issues a CA-certificate for TC2.

Every user who trusts TC3, accepts every certificate, that was issued by TC2

(or a subordinate CA). Every user who trusts TC2, accepts every certificate, that was issued by TC3

(or a subordinate CA).

Not always bilateral

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

Page 93: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Cross-certification

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

Alice to Fred

Page 94: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Cross-certification: Another possibility

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

TC2 issues one CA-certificate to TC7 and vice versa.

Hans accepts the certificate of Emil and vice versa.

Emil does not accept the certificate of Fred.

Page 95: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

TC4 issues one CA-certificate to TC6 and vice versa.

Alice accepts the certificate of Fred and vice versa.

Fred does not accept the certificate of Emil.

Cross-certification: Another possibility

Page 96: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Cross-certification

n*(n-1) cross-certificats =

O(n2)

n*(n-1) cross-certificats =

O(n2)

Page 97: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Method 4: Bridge

Idea: Bridge TC has cross-certifications with TC2 and TC3.

Alice accepts all certificates beneath TC3.

Fred accepts all certificates beneath TC2.

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

Bridge TC

Page 98: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Bridge: certification path

TC2

Alice Bob Carl Doris Emil

TC4 TC5

TC3

TC6 TC7

Fred Gerd Hans

Bridge TC

Alice to Fred

Bridge enforces minimal policy

Page 99: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Bridge Trust Center

• The bridge TC acts as a connector.

• This TC is not subordinate to a third CA.

• Interesting for corporate CAs that:

• want to enable secure communication for their users outside the organisation’s borders.

• do not want to be subordinate to a third CA.

Page 100: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

URL: http://www.bridge-ca.org

European Bridge-CA

Page 101: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Certification Path Validation

PAGE 10617-11-2016

Page 102: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Shell model

time

root

certificate

CA

certificate

participant

certificate

signature

time

verification

time

Page 103: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Modified or hybrid model

time

root

certificate

CA

certificate

participant

certificate

signature

time

verification

time

Page 104: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Chain model

time

root

certificate

CA

certificate

participant

certificate

signature

time

verification

time

Page 105: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Shell model

Certificate 1

Certificate 2

Certificate 3

Signed Document

Sig. valid creation

Signature valid verification

Signature invalid verification

Time

Page 106: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Signed Document

Chain model

Sig. valid creation

Signature valid

Certificate 1

Certificate 3

Certificate 2

verification

Time

Page 107: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Chain model:

multiple-

validation Document A

Document B

Document C

Signature verification:

Certificate 1

Certificate 3

Certificate 2

Document A

Time

Document B

Document C

?

!

Page 108: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Algorithms

Certificate 1

Certificate 2

Shell model

Chain model

Hybrid model

Time

Signature valid Signature invalid

Sig. valid creation

Signature valid

Sig. valid creation

Signature valid

Page 109: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Root CA

CA

Participant

Chain model

Hybrid model

Time [a]

Sig. valid creation (max. 3 a)

Signature valid

Sig. valid creation (max. 1 a)

Signature valid

1 2 3 4 5 6

Page 110: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

X.509 Certificates

PAGE 11517-11-2016

Page 111: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

X.509 Certificates

Relevant Standard:

X.509 (ITU-T)

PKIX (RFC 5280)

Content (excerpt):

Name / Pseudonym of the holder

Public Key (and algorithm) of the holder

Unique ID of the certificate

Validity period of the certificate

Identity of the certificate issuer

Key usage limitation for the public keys

Encoding:

Abstract Syntax Notation Nr.1: ASN.1

Distinguished Encoding Rules: DER

PAGE 11617-11-2016

Page 112: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

X.509 Certificates

Page 113: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

X.509 Certificates: Contents

Version (0=v1, 1=v2, 2=v3)Serial Number (Unique within PKI)Certificate Signature AlgorithmIssuerValidity PeriodSubjectSubject Public Key Info

Version 1

(1988)

Subject Unique ID (worldwide unique)Issuer Unique ID (worldwide unique)Version 2

(1993)

ExtensionsVersion 3

(1997)

PAGE 11817-11-2016

Page 114: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

X.509 Extensions: Properties

• Assignment of extra attributes to

• the owner

• public or private key

• issuer

• Support for better certificate management

• Arbitrary extensions Bad interoperability

PAGE 11917-11-2016

Page 115: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

X.509 (Non)critical extensions

Critical Non-Critical

Known valid valid

Unknown invalid valid

PAGE 12017-11-2016

Page 116: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Key Usage

Defines the purpose of the key contained in the certificate.

KeyUsage ::= BIT STRING {

digitalSignature (0),

nonRepudiation (1),

keyEncipherment (2),

dataEncipherment (3),

keyAgreement (4),

keyCertSign (5),

cRLSign (6),

encipherOnly (7),

decipherOnly (8) }

http://www.ietf.org/rfc/rfc5280.txt (pp 29ff)

PAGE 12117-11-2016

Page 117: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Extended Key Usage (1)

Indicates one or more purposes for which the certified public key may be used, in addition to or in place of the basic purposes indicated in the key usage extension

For example:

• Code signing

• OCSP signing

• Timestamping

ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId

KeyPurposeId ::= OBJECT IDENTIFIER

PAGE 12217-11-2016

Page 118: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Extended Key Usage (2)

If a certificate contains both a key usage extension and

an extended key usage extension, then both extensions

MUST be processed independently and the certificate

MUST only be used for a purpose consistent with both

extensions. If there is no purpose consistent with both

extensions, then the certificate MUST NOT be used for any

purpose.

Source: RFC 4334

PAGE 12317-11-2016

Page 119: Public Key Infrastructures - Faculteit Wiskunde en Informatica · ECC challenges 17-11-2016 PAGE 12 ECC Field Size Days Date ECC2-79 79 352 1997 ECC2-89 89 11278 1998 ECC2K-95 97

Based on a lecture by

Johannes Braun, Johannes Buchmann, Alexander

Wiesmaier

https://www.cdc.informatik.tu-darmstadt.de/en/students/teaching/ss14/

vorlesung/pki/pki-unterlagen-kopie-1/

Book: J. Buchmann, E. Karatsiolis, and A. Wiesmaier

Introduction to Public Key Infrastructures

Springer-Verlag Berlin Heidelberg, 2013.

PAGE 12417-11-2016