Lecture 18
Lecture 18
(PKI)
Trusted Intermediaries
Suppose that you have received a digitally signed message that claims
to have been signed by Alice and that you want to verify this signature.
This requires you to possess a public verification key. By some means
(we won’t specify how) you are presented with a key and told “this key
is Alice’s public key”. You use it to verify the signature, and it seems to
work.
It may well be valid – but you should always be suspicious!
Meaning of certificates
By digitally signing the information in the public key certificate, the
Certification Authority is effectively making the statement:
K+
Verification
/public CA
key
Public key certificates
A public key certificate is a set of data that binds an identity to a
particular public key value. The four core pieces of information that are
contained in a public key certificate are as follows:
Name of owner
could be a person, device, or even role.
Should uniquely identify the owner within the environment in which
the public key will be employed.
Public key value
Validity time period
identifies date and time from which the public key is valid, and more
importantly the date and time of its expiry.
Signature
Creator of certificate digitally signs all data that forms the public key
certificate. This binds the data and acts as a guarantee that the
creator of the certificate believes the data is correct.
X509 v3 public key certificates
Version This specifies the X.509 version being used (in this case v3).
Serial Number A unique identifier for the certificate.
Signature The digital signature algorithm used to sign the certificate.
Issuer The name of the creator of the digital certificate.
Validity The dates and times between which the digital certificate is valid.
Subject The name of the owner of the digital certificate.
Subject Public Key The actual public key and the identifier of the public key algorithm
Info associated with it.
Issuer Unique ID An optional identifier for the creator of the digital certificate.
Subject Unique ID An optional identifier for the owner of the digital certificate.
Extensions A range of optional fields that include:
• a key identifier (in case owner owns more than one public key)
• key usage information that specifies valid uses of key
• the location of revocation information
• identifier of the certificate policy
• alternative names for the owner
A certificate contains:
Serial number (unique to issuer)
info about certificate owner, including algorithm and
key value itself (not shown)
info about
certificate
issuer
valid dates
digital
signature
by issuer
Internet Web Security Architecture
Web Server B
CA
K +B
K-CA(K+B)
KAB(m)
Joining CA domains
An owner of a public key certificate has by necessity placed some
trust in the CA who has issued this certificate.
However, for larger and more open PKIs, it is likely to be the case
that the owner of a certificate will:
• want users who do not have a business relationship with the owner’s
CA to be able to rely on the owner’s certificate
• want to rely on certificates that were not issued by the owner’s CA.
CA1 CA2
Root CA
certifies the two
CA’s public
keys
CA1 CA2
Notes:
•Everybody trusts the root.
•But people may or may not trust intermediate CAs. If Alice needs to get Bob's
certificate, she may find a CA somewhere to issue the certificate. But Alice may
not trust that CA. In a hierarchy Alice can ask the next-higher CA to certify the
original CA. The inquiry may go all the way to the root.
Certificate chains
When Alice wants to check
the authenticity of Bob’s
CA1 CA2
public key she must verify
each link in the chain:
Public CA1
key of
CA2
Alice CA3
Public CA2
key of
CA3
Public CA3
key of
Bob Bob
Revocation
We must consider how to handle certificates that need to be
“withdrawn” before their expiry date. This process is often referred to
as certificate revocation.