PKI Architecture Lecture2
PKI Architecture Lecture2
Lecture #2
Scenario
Alice received a document digitally signed by Bob Alice needs Bobs public key to verify the document How does Alice ensure that the public key which she is using is in fact Bobs public key and not of any other person impersonating Bob? Solution Digital Certificate
2
Scenario.
A Digital Certificate is a document that binds the information of the certificate holder to a public key. This certificate is digitally signed by a third party, also referred to as a Certification Authority (CA). Hence, to verify Bobs certificate, Alice needs to first obtain the CAs public key. Alice can obtain the CAs public key outofband.
Scenario
CAs can certify other CAs also Every entity can trust every other entity, provided it is able to establish a chain from its trusted CA to the other entitys trusted CA, called certificate path. The number of CAs in a certificate path and the arrangement of these CAs determine the different PKI architectures.
4
Single CA Architecture
Most basic type of PKI architecture. One CA who issues and distributes certificates and Certificate Revocation Lists (CRLs) to the entities. Entities use only those certificates that are issued by this CA. All the entities in this architecture communicate with each other in a trusted environment
6
Single CA Architecture
both of them can validate and verify each others certificates and then communicate
7
Single CA Architecture
Quite Easy a single point of failure. If the private key of this CA is compromised then all certificates issued by this CA will become invalid, and this might result in a complete breakdown of the PKI system. every entity should immediately be informed about it.
8
Single CA Architecture
CA needs to be reestablished. All the certificates issued by the CA should be deemed invalid and should be reissued. Suffers from scalability issues.
11
12
Certificate Paths
Before a certificate can be used, it must be validated A chain of certificates or a certification path between the certificate and an established point of trust must be established Every certificate within that path must be checked This process is referred to as certification path processing
13
Certificate Path Construction in a Single CA Simple as the architecture involves only one trust point. there is no path construction in a single CA architecture, and a single certificate represents the entire path.
15
16
[CA1Alice] [CA2Alice]
17
19
20
22
Adding new CA
23
Hierarchical PKI
24
Hierarchical PKI
A single point of trust, the root CA Root CA controls the complete hierarchical PKI architecture In case of a compromise of the root CA, the complete PKI architecture will break down The compromise of subordinate CAs can still be handled, as the superior CAs can revoke their certificates and establish them again.
25
Compromise of a single CA
Assume that a single CA(not the root CA) has been compromised
The superior CA revokes the compromised CAs certificate Once the compromised CA has been reestablished it issues new certificates to all its users The superior CA then issues a new certificate to the reestablished CA
26
CA-3
CA-4
CA-1
Smith For every entity there exists only one certification path 27
Alice
Bob
28
Mesh PKI
The CAs have a peertopeer relationship, rather than a superior subordinate relationship All CAs in a mesh PKI can be trust points Since CAs issue certificates to each other, they share a bi-directional trust relationship
29
Mesh PKI
30
Adding new CA
Can be easily added The new CA exchanges certificates with atleast one CA that is already a member of the mesh
31
Mesh PKI
Multiple trust points Compromise of a single CA cannot result in a breakdown of the complete PKI If a CA is compromised, entities with other CAs as their trust points continue to communicate with other entities. Certificate of the compromised CA can be revoked by the CAs who have issued the certificates to that CA The compromise of the CA affects only the entities associated with that CA
32
33
34
37
38
39
40
42
43
Path Construction
Users construct different certification path for the same entity certificate Path begins with the trust point of the native PKI The straight forward path construction method is used within a hierarchy, but this ends when an outside root is reached.
44
Bridge CA
A special CA, called the bridge CA, is an intermediary that establishes peer-to-peer relationships with enterprise PKIs A CA that enters into a trust relationship with the bridge CA is termed a principal CA Also known as hub and spoke PKI as it connects multiple PKIs at a common point If a principal CA is compromised, bridge CA revokes its certificate
45
Bridge CA
46
Path Construction
47
Path Construction
Alice will construct the following certification path for Bob: [CA1 Bob] Alice will construct the following certification path for James: [CA1 Bridge CA]: [Bridge CA CA2]: [CA2 CA4]: [CA4 James] The following certification paths would be constructed by Alice for Charlie: [CA1 Bridge CA]: [Bridge CA CA3]: [CA3 CA5]: [CA5 Charlie] [CA1 Bridge CA]: [Bridge CA CA3]: [CA3 CA6]: [CA6 CA5]: [CA5 Charlie]
48
49
51
52
53
54
56
Conclusion
Certification path construction in the forward direction is optimal for hierarchical trust models Certification path construction in the reverse direction is optimal for distributed trust models.
59