Module 5 - Standards and Protocols
Module 5 - Standards and Protocols
Online banking
Business processes
and shopping
based on the X.509 certificate standard and establish complementary standards for
implementing PKI
PKIX
produced by the Internet Engineering Task Force (IETF) and defines standards for
interactions and operations for four component types: the user, the CA, the RA, and
the repository for certificates and certificate revocation lists
PKCS
composed of a set of 13 active standards, with 2 other standards that are no longer
active
The PKIX Model
End-entity
PKI management entities
PKI users
Operational and
management
transactions
CA
Publish certificates and CRLs
External CA
PKIX Standards:
❑ PKIX outlines certificate extensions and content not covered by X.509 v3 and the
format of version 2 CRL thus providing compatibility standards for sharing
certificates and CRL between CAs and end-entities in different PKIs.
❑ PKIX provides certificate management message formats and protocols, defining
the data structures, management messages, and management functions for PKIs.
❑ PKIX outlines certificate policies and certification practices statements, establishing
the relationship between policies and CPSs.
❑ PKIX specifies operational protocols, defining the protocols for certificate handling.
❑ PKIX includes time-stamping and data certification and validation services, which
are areas of interest to the PKIX working group, and which will probably grow in
use over time.
Importance of Knowing PKIX / PKCS
❑ To identify the standards already in place used to plan the
implementation of a private PKI in support secure services.
❑ To identify how the decision to use a particular PKI implementation
(domestic or commercial) may lead to incompatibilities with other
certificate- issuing entities.
❑ To know the business-to-business requirements that must be
considered when deciding how to implement a PKI within an
organization.
specification for digital certificates published by the ITU-T
(International Telecommunications Union -
Telecommunication)
TLS
protocol intended to secure and authenticate communications across a public
networks by using data encryption
derived from SSL and uses the same certificates but does not require each service to
be given a new port number
composed of two parts: TLS Record Protocol
and TLS Handshake Protocol
Internet Security Association and Key Management Protocol
provides a method for implementing a key exchange protocol and for negotiating a
security policy
defines procedures and packet formats to negotiate, establish, modify, and delete
security associates
three tiers of service based on the client requests and application requirements
❑ Tier 0
❑ Tier 1
❑ Tier 2
relies on the client or underlying communications mechanism to provide for the security
of the communications with the XKMS server
Tier 0 XKMS retrieval
Request for key info
Server response
Client
Server
Request Request
Response Response
Client
Managed PKI
(validation) XKMS Server
XKMS tier 2 validate service
Request Request
Response Response
Client Managed PKI
XKMS Server
(validation)
Secure/Multipurpose Internet Mail Extensions
uses the standard port 443 for TCP/IP communications rather than the
standard port 80 used for HTTP
designed to be used to provide secure virtual private network capability over the
Internet
provides two types of security service to ensure authentication and confidentiality for
either the data alone (referred to as IPSec transport mode) or for both the data and
header (referred to as tunnel mode)
Certificate Enrollment Protocol
supports access to certificates and CRLs using either LDAP or the CEP-
defined certificate query
Federal Information Processing Standards Publications
three categories:
❑ Hardware and Software Standards/Guidelines
❑ Data standards/guidelines
❑ Computer security standards/guidelines
international standard (ISO 15408) for computer security