Certificate Management Using Distributed Trusted Third Parties

Download Report

Transcript Certificate Management Using Distributed Trusted Third Parties

Certificate Management
Using Distributed Trusted
Third Parties
Alexander W. Dent
[email protected]
Joint work with Geraint Price
Trust in a ubiquitous environment


Trust is a difficult commodity to find/trade in a
dynamically evolving network, e.g. in a PAN or
PDE.
Public key cryptography offers attractive
features in such a situation, however
–
–

at a computational cost,
with the usual authentication problem.
PKIs are hard to implement efficiently in
dynamically evolving networks.
2
PKIs in dynamic networks


Mitchell and Schaffelhofer suggest security
criteria for a “personal PKI”.
Distributed approaches given by:
–
–
–
–

Zhou and Haas, 1999.
Luo and Lu, 2000.
Varadharajan, Shankaran and Hitchens, 2004.
Zouridaki, Mark, Gaj and Thomas, 2004.
Here a CA is elected by a cluster of devices.
3
PKIs in dynamic networks



Our solution uses a different form of distributed
certification authority.
Takes advantage of emerging hardware-based
secure execution environment technologies,
such as Microsoft’s NGSCB and the Trusted
Computing Group’s Trusted Computing
Platform.
We use an abstract execution environment.
4
Secure Execution Environments

It can, and is able to demonstrate that it can,
–
–
–
–



be initialised securely,
download applications in a secure fashion,
securely execute applications,
demonstrate that an application has been
successfully executed.
Allows “black boxes” to be installed.
Allows any TTP service to be installed…
…however, not always efficiently.
5
CA-applets

Let’s examine how to use this technique to
distribute CA functionality…
6
CA-applets – Initialisation
Generate
Verifies device’s
a new signature
identity
using
key pair
authentication
for the device.
data.
Request for applet
Send authentication data
Verify authenticity of SEE
Initiate a secure download channel
Download applet with new key pair
Download certificate for new key pair
7
CA-applets – Registering a key
Checks identity and issues
Request
certificate
certificate
to person
named for a public key
on initialisation only.
Send authentication data
Demonstrate proof of possession
Download newly generated certificate
(Download master certificate)
8
CA applets – In use





CA applet can also host a directory service.
CA applet can also host a revocation service.
Problems with the need for always-on devices.
Methods to cope with the renewal problem.
Limited methods to cope with the effects of a
compromise of the CA applet (i.e. the release
of an applet’s private signing key).
9
Sub CAs verses CA applets



CA applets share a lot of characteristics with a
sub CA…
… i.e. a smaller CA that has been obtained a
certificate from a larger root CA…
… especially if the root CA issues a policy
when certifying the sub CA that states that the
sub CA can only issue certificates to certain
individuals or according to a certain policy.
10
Sub CAs verses CA applets




The main difference is the level of trust the root
CA has to extend to its progeny.
For a CA applet, the root CA has to trust the
hosts SEE and the authentication data.
For a sub CA, the root CA has to trust that the
user can properly set up and administrate a
secure CA application.
In a CA applet, the security decisions rest with
the security experts – the root CA.
11
Sub CAs verses CA applets

Sub CAs do not require proof of possession,
and, in some instances, this may be a flaw.
12
Personal CAs



CA applets make excellent personal CAs
(according to the criteria laid down by Mitchell
and Schaffelhofer).
Root CA can either be provided by a company
or by a single dedicated device in the user’s
PDE.
The root CA can be configured by the
manufacturer, rather than the user.
13
Other applications






Ad hoc networks.
Short lived certificates.
Distributed registration/certificate data
preparation.
Lightweight PKI.
Supporting web services.
Paper to appear in upcoming book on Trusted
Computing Platforms.
14
The End
All images of Torg copyright Pete Abrams.
http://www.sluggy.com/
15