25
Shubham Sharma

Digital signature & PKI Infrastructure

Embed Size (px)

Citation preview

Page 1: Digital signature & PKI Infrastructure

Shubham Sharma

Page 2: Digital signature & PKI Infrastructure

Username and Password are the only things in a

Digital Signature.

Any electronic document is a valid document, no need not signed because it is computer generated.

Digital Signature are for personal use and can’t be kept in court for perusal.

Common Myths

Page 3: Digital signature & PKI Infrastructure

To provide Authenticity, Integrity and Non-repudiation to electronic documents.

Why Digital Signatures ?

Page 4: Digital signature & PKI Infrastructure

Digital code attached to an electronically transmitted

document to verify its contents and the sender's identity.

Digital Signature of a person therefore varies from document to document thus ensuring authenticity of each word of that document.

What is Digital Signature?

Page 5: Digital signature & PKI Infrastructure

Symmetric encryption uses the identical key to both

encrypt and decrypt the data.

Symmetric/Asymmetric Encryption

Page 6: Digital signature & PKI Infrastructure

Two related keys (public and private) for data encryption and decryption.

The private key is never exposed.

Takes away the security risk of key sharing.

Asymmetric

Page 7: Digital signature & PKI Infrastructure
Page 8: Digital signature & PKI Infrastructure

Message

+

Signature

Hash

Decrypt

Signature

With Sender’s

Public Key

SIGN hash

With Sender’s

Private key

Message

+

signature

COMPARE

Calculated

HashMessage

Sender Receiver

Hash

Sent thru’ Internet

if

OKSignatures

verified

Signed Messages

Page 9: Digital signature & PKI Infrastructure
Page 10: Digital signature & PKI Infrastructure

PIN Protected Soft Tokens

Private key is encrypted and kept on the Hard Disk in a file, this file is password protected.

Forms the lowest level of security in protecting the key, as

The key is highly reachable.

PIN can be easily known or cracked.

Page 11: Digital signature & PKI Infrastructure

Private key is generated in the crypto module residing in the

smart card.

The key is kept in the memory of the smart card.

The key is highly secured as it doesn’t leave the card.

The message digest is sent inside the card for signing, and the signatures leave the card.

Smart Cards

Page 12: Digital signature & PKI Infrastructure

Hardware Tokens

They are similar to smart cards in functionality as

Key is generated inside the token.

Key is highly secured as it doesn’t leave the token.

Highly portable.

Machine Independent.

Page 13: Digital signature & PKI Infrastructure

Class 0 : Issued only for demonstration/ test purposes.

Class 1 : Confirms user's name and E-mail address.

Class 2 : Issued for both business personnel and private individuals use. Information in the application provided by the subscriber does not conflict with the information in well-recognized consumer databases.

Class 3 : This certificate issued to individuals as well as organizations. High assurance certificates. Issued to individuals only on their personal (physical) appearance before the Certifying Authorities.

Different Classes of Digital Signatures

Page 14: Digital signature & PKI Infrastructure

The pattern also has some (possible) liabilities:

Both participants must trust the identity of each other.

Thus, certificates issued by some certification authority are needed.

Both the sender and the receiver have to previously agree what cryptographic algorithm they support.

Liabilities

Page 15: Digital signature & PKI Infrastructure

Public Key Infrastructure

(PKI)

Page 16: Digital signature & PKI Infrastructure

Trusted Agency is required which certifies the association of an individual with the key pair.

Certifying Authority (CA)

This association is done by issuing a certificate to the user by the CA

Public key certificate (PKC)

All public key certificates are digitally signed by the CA.

Public Key Infrastructure

Page 17: Digital signature & PKI Infrastructure

• Controller is the Root certifying authority responsible for regulating Certifying Authorities (CAs).

• CA Must be widely known and trusted.• CA must have well defined Identification process before

issuing the certificate.• CA certifies the association of an individual with his

public key.

• Provides online access to the list of certificates revoked.

• Displays online the license issued by the Controller.

Certifying Authority

Page 18: Digital signature & PKI Infrastructure

Paper Electronic

IDRBT Certificate

Page 19: Digital signature & PKI Infrastructure

Public-Key Certification

Signed

by using

CA’s

private

key

User

Name &

other

credentials

User’s

Public

key

User Certificate

Certificate

Database

PublishCertificate

Request

User Name

User’s

Public Key

CA’s Name

Validity

Digital

Signature

of CA

Certificate

Class

User’s Email

Address

Serial No.

Key pair Generation

Private

Public

Web site of CA

User 1 certificate

User 2 certificate

.

Public

License issued

by CCA

Page 20: Digital signature & PKI Infrastructure
Page 21: Digital signature & PKI Infrastructure

• There are only 6 certificate Authorities

1. Safescrypt

2. iTrust (IDRBT)

3. National Informatics Centre(NIC)

4. Tata Consultancy Services

5. (n)Code Solutions

6. e-Mudhra

There is only one Root Certificate Authority Root Certifying Authority of India (RCAI)

CA’s of India

Page 22: Digital signature & PKI Infrastructure

Tragedy!!

Page 23: Digital signature & PKI Infrastructure

Battle is ON!!

Page 24: Digital signature & PKI Infrastructure

Download and install Gpg4Win(supports Outlook).

Download and install Thunderbird.

Add extension Engimail (adds OpenPGP message encryption and authentication to your thunderbird client.)

Create your key pair.

Encrypt/Sign on the go !!

DEMO Steps

Page 25: Digital signature & PKI Infrastructure

Would like to hear from you !!

Thank You !!

[email protected]