PKI Mod 3
PKI Mod 3
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 1 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 2 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 3 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
• The above encodings are all equivalent; they all denote the same
octet string. Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 4 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 5 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 6 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
• The advanced transport representation allows all of the • As an arbitrary S-expression, enclosed in the form ( Local-Name: n ).
• ( Local-Name: ( Accounting ( Bob Smith ) ) )
representation forms include quoted strings, base-64 and
hexadecimal representation of strings, tokens, representations of
strings with omitted lengths, and so on.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 7 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 8 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
S-Expression: Certificate
S-Expression: Certificates
(Cert: Show how the certificate is represented in S-Expression
(Local-Name: name) with the following information.
(Value: Security_Admin)
(Description: Max_Privilege) Parameters Value
(Public-Key: Name Ram
(RSA-with-SHA1: Security Clearance Security_Admin
(N: 123456) Description Max_Privilege
(E: 78910) Public key information Algorithm: RSA with SHA1
) N: 123456
E: 78910
(Signed:
For the purpose of Algorithm: SHA1
(Object-Hash: (SHA1: =ABC=))
Signature Hash Value: =ABC=
(Date: 01.08.2024) Date: 01.08.2024
(Signature: &ABCDE&) Signature: &ABCDE&
)
Homework
3.2 PGP
Show how the certificate is represented in S-Expression Show how the certificate is represented in S-Expression
with the following information. with the following information. The Certificate contains
encrypted Public Key. • Pretty Good Privacy (PGP) is a method for encrypting and digitally signing
Parameters Value e-mail messages and files.
Name AAA Parameters Value
• Phil Zimmermann introduced the first version of PGP in the early 1990s.
Public key information Algorithm: RSA with SHA1 Name Ram
N: 123456 Public key information Algorithm: RSA with SHA1
• The latest version of PGP, referred to as OpenPGP, has been published as
E: 78910 N: 123456 an IETF standards-track specification entitled OpenPGP Message Format.
• PGP specifies packet formats that convey messages and files from one
For the purpose of Algorithm: SHA1 E: 78910
Signature Hash Value: =ABC= For the purpose of Algorithm: SHA1
Date: 01.08.2024 Signature Hash Value: =ABC= entity to another.
Signature: &ABCDE& Date: 01.08.2024 • PGP also includes packet formats that convey PGP keys (sometimes
Signature: &ABCDE&
referred to as PGP certificates) from one entity to another.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 9 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
4. Certificate Policies
3.4 Attribute Certificates
• A number of policy-related extensions may be present in a given certificate.
• The X.509 attribute certificate (AC) binds attributes [role, security • The policy-related extensions refer either directly or indirectly to a
clearance, group membership and others] to an AC holder. certificate policy.
• AC is used in conjunction with a public key certificate. • Certificate Policy
• A named set of rules that indicates the applicability of a certificate to a particular
• An access control function may make use of the attributes in an AC community and/or class of application with common security requirements.
for authorization, but it is not a replacement for authentication. • Eg: Applicability of a certificate towards electronic data exchange.
• Certificate Policy is a high-level statement of requirements and restrictions
• The public key certificate must first be used to perform associated with the intended use of the certificates issued under that policy
authentication, then the AC is used to associate attributes with the • Set of rules for the use of certificate
authenticated identity.
• Certification Practice Statement (CPS):
• Fields • A CPS is an extremely detailed (and potentially extremely sensitive) document that
• Version, holder, issuer, signature algorithm identifier, serial number, validity describes the internal operating procedures of the CA and/or PKI that issues those
period, attributes, issuer unique identifier, and extensions. certificates.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 10 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 11 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 12 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 13 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 14 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 15 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 16 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 17 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 18 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 19 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 20 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
7.1.9 Certificate Revocation Trees (CRTs) 7.1.9 Certificate Revocation Trees (CRTs)
• Paul Kocher proposed another method based on trees which this time are • We have three CAs with public key hashes CA1 < CA2 < CA3, where
hashed trees called Certificate Revocation Trees (CRT). [ValiCert company]
CA1 has revoked 3 certificates (156, 343, and 344), CA2 has revoked
• The main idea of this system is building of the tree using the revocation
information obtained from CAs. no certificates, and CA3 has 1 revoked certificate (987).
• This will be done by special authority called the CRT issuer. • The CRT issuer can now make the following statements about
• A CRT issuer can serve several CAs. certificate serial number X from a CA whose public key hash is CAX:
• The basic action is to write down statements about the numbers of the revoked
certificates so that each possible certificate number matches exactly one of these
statements.
• After this, the issuer hashes these statements into a binary hash tree and publishes
the value of the root hash.
• If a user requests information about a certain certificate, the CRT issuer finds the
matching statement and sends it back together with the necessary intermediate
hashes required to calculate the root value.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
If: −∞ < CAX < CA1 Then: Unknown CA (revocation status unknown) N0,0
N2,2 = H(N1,4|N1,5), where H is a hash function and “|” denotes
If: CAX = CA1 and −∞ ≤ X < 156 Then: X is revoked if and only if X = −∞. N0,1
concatenation.
Root value N4,0 will be made public.
If: CAX = CA1 and 156 ≤ X < 343 Then: X is revoked if and only if X = 156. N0,2
If: CAX = CA1 and 343 ≤ X < 344 Then: X is revoked if and only if X = 343. N0,3 Check the validity of the certificate number 600 from CA1
If: CAX = CA1 and 344 ≤ X < ∞, then: X is revoked if and only if X
If: CAX = CA1 and 344 ≤ X < ∞ Then: X is revoked if and only if X = 344. N0,4
= 344. N0,4
If: CA1 < CAX < CA2 Then: Unknown CA (revocation status unknown). N0,5
The verifier can hash this statement structure to get N0,5.
The supporting nodes in this example are N0,4, N1,3, N2,0 and N
If: CAX = CA2 and −∞ ≤ X < ∞ Then: X is revoked if and only if X = −∞. N0,6
The verifier can now use the secure hash function H to
compute:
If: CA2 < CAX < CA3 Then: Unknown CA (revocation status unknown). N0,7 N1,2 = H(N0,4|N0,5)
N2,1 = H(N1,2|N1,3)
If: CAX = CA3 and −∞ ≤ X < 987 Then: X is revoked if and only if X = −∞. N0,8 N3,0 = H(N2,0|N2,1)
N4,0 = H(N3,0|N3,1)
If: CAX = CA3 and 987 ≤ X < ∞ Then: X is revoked if and only if X = 987. N0,9
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 21 of 22
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore.
7.2 On-line Query Mechanisms 7.2.1 Online Certificate Status Protocol (OCSP)
• The on-line mechanisms typically require that the relying party be on- • OCSP is a relatively simple request-
line whenever a question regarding the revocation status of a given response protocol that offers a vehicle for
certificate must be resolved. obtaining on-line revocation information
• Periodic publication mechanisms are better suited for off-line from a trusted entity referred to as an
operation because the revocation information can be cached. OCSP responder.
• Online Certificate Status Protocol (OCSP) achieved RFC Proposed
Standard status in June 1999. "good"
"revoked"
"unknown
"
Signed using OCSP
responders private key
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of Prepared by: Dr.Swetha.N.G., Asst Prof Senior, Dept of
Analytics, SCOPE, VIT, Vellore. Analytics, SCOPE, VIT, Vellore.
Prepared by: Dr.Swetha.N.G., Assistant Professor Senior, Dept of Analytics, SCOPE, VIT, Vellore. Page 22 of 22