Top Banner
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 12 Advanced Cryptography
59

Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Jul 26, 2018

Download

Documents

dinhmien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network

Security Fundamentals,

Fourth Edition

Chapter 12

Advanced Cryptography

Page 2: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Objectives

• Define digital certificates

• List the various types of digital certificates and how

they are used

• Describe the components of Public Key

Infrastructure (PKI)

• List the tasks associated with key management

• Describe the different transport encryption

algorithms

Security+ Guide to Network Security Fundamentals, Fourth Edition 2

Page 3: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Digital Certificates

• Common application of cryptography

• Aspects of using digital certificates

– Understanding their purpose

– Knowing how they are managed

– Determining which type of digital certificate is

appropriate for different situations

Security+ Guide to Network Security Fundamentals, Fourth Edition 3

Page 4: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Defining Digital Certificates

• Digital signature

– Used to prove a document originated from a valid

sender

• Weakness of using digital signatures

– Imposter could post a public key under a sender’s

name

Security+ Guide to Network Security Fundamentals, Fourth Edition 4

Page 5: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 5

Figure 12-1 Imposter public key © Cengage Learning 2012

Page 6: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Defining Digital Certificates (cont’d.)

• Trusted third party

– Used to help solve the problem of verifying identity

– Verifies the owner and that the public key belongs to

that owner

– Helps prevent man-in-the-middle attack that

impersonates owner of public key

• Information contained in a digital certificate

– Owner’s name or alias

– Owner’s public key

– Issuer’s name

Security+ Guide to Network Security Fundamentals, Fourth Edition 6

Page 7: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Defining Digital Certificates (cont’d.)

• Information contained in a digital certificate

(cont’d.)

– Issuer’s digital signature

– Digital certificate’s serial number

– Expiration date of the public key

Security+ Guide to Network Security Fundamentals, Fourth Edition 7

Page 8: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates

• Technologies used for managing digital certificates

– Certificate Authority (CA)

– Registration Authority (RA)

– Certificate Revocation List (CRL)

– Certificate Repository (CR)

– Web browser

• Certificate Authority

– Trusted third party

– Responsible for issuing digital certificates

– Can be internal or external to an organization

Security+ Guide to Network Security Fundamentals, Fourth Edition 8

Page 9: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• Duties of a CA

– Generate, issue, an distribute public key certificates

– Distribute CA certificates

– Generate and publish certificate status information

– Provide a means for subscribers to request

revocation

– Revoke public-key certificates

– Maintain security, availability, and continuity of

certificate issuance signing functions

Security+ Guide to Network Security Fundamentals, Fourth Edition 9

Page 10: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• Subscriber requesting a digital certificate

– Generates public and private keys

– Sends public key to CA

– CA may in some instances create the keys

– CA inserts public key into certificate

– Certificates are digitally signed with private key of

issuing CA

Security+ Guide to Network Security Fundamentals, Fourth Edition 10

Page 11: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• Registration Authority

– Subordinate entity designed to handle specific CA

tasks

• Offloading registration functions creates improved

workflow for CA

• General duties of an RA

– Receive, authenticate, and process certificate

revocation requests

– Identify and authenticate subscribers

Security+ Guide to Network Security Fundamentals, Fourth Edition 11

Page 12: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• General duties of an RA (cont’d.)

– Obtain a public key from the subscriber

– Verify that the subscriber possesses the asymmetric

private key corresponding to the public key

submitted for certification

• Primary function of an RA

– Verify identity of an individual

Security+ Guide to Network Security Fundamentals, Fourth Edition 12

Page 13: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• Means for a digital certificate requestor to identify

themselves to an RA

– E-mail

• Insufficient for activities that must be very secure

– Documents

• Birth certificate, employee badge

– In person

• Providing government-issued passport or driver’s

license

Security+ Guide to Network Security Fundamentals, Fourth Edition 13

Page 14: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• Certificate Revocation List

– Lists digital certificates that have been revoked

• Reasons a certificate would be revoked

– Certificate is no longer used

– Details of the certificate have changed, such as

user’s address

– Private key has been lost or exposed (or suspected

lost or exposed)

Security+ Guide to Network Security Fundamentals, Fourth Edition 14

Page 15: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 15

Figure 12-2 Certificate Revocation List (CRL) © Cengage Learning 2012

Page 16: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• Certificate Repository

– Publicly accessible centralized directory of digital

certificates

– Used to view certificate status

– Can be managed locally as a storage area

connected to the CA server

– Can be made available through a Web browser

interface

Security+ Guide to Network Security Fundamentals, Fourth Edition 16

Page 17: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 17

Figure 12-3 Certificate Repository (CR) © Cengage Learning 2012

Page 18: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing Digital Certificates (cont’d.)

• Web browser management

– Modern Web browsers preconfigured with default list

of CAs

• Advantages

– Users can take advantage of digital certificates

without need to manually load information

– Users do not need to install a CRL manually

• Automatic updates feature will install them

automatically if feature is enabled

Security+ Guide to Network Security Fundamentals, Fourth Edition 18

Page 19: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 19

Figure 12-4 Web browser default CAs © Cengage Learning 2012

Page 20: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Types of Digital Certificates

• Different categories of digital certificates

– Class 1 through Class 5

– Dual-key sided

– Dual sided

• Other uses for digital certificates

– Provide secure communication between clients and

servers by encrypting channels

– Encrypt messages for secure Internet e-mail

communication

Security+ Guide to Network Security Fundamentals, Fourth Edition 20

Page 21: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Types of Digital Certificates (cont’d.)

• Other uses for digital certificates (cont’d.)

– Verify the identity of clients and servers on the Web

– Verify the source and integrity of signed executable

code

• Common categories of digital certificates

– Personal digital certificates

– Server digital certificates

– Software publisher digital certificates

Security+ Guide to Network Security Fundamentals, Fourth Edition 21

Page 22: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Types of Digital Certificates (cont’d.)

• Class 1: personal digital certificates

– Issued by an RA directly to individuals

– Frequently used to secure e-mail transmissions

– Typically only require user’s name and e-mail

address to receive

• Class 2: server digital certificates

– Issued from a Web server to a client

– Ensure authenticity of the Web server

– Ensure authenticity of the cryptographic connection

to the Web server

Security+ Guide to Network Security Fundamentals, Fourth Edition 22

Page 23: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 23

Figure 12-5 Server digital certificate © Cengage Learning 2012

Page 24: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Types of Digital Certificates (cont’d.)

• Class 2: server digital certificates (cont’d.)

– Server authentication and secure communication

can be combined into one certificate

• Displays padlock icon in the Web browser

• Click padlock icon to display information about the

digital certificate

• Extended Validation SSL Certificate (EV SSL)

– Requires more extensive verification of legitimacy of

the business

Security+ Guide to Network Security Fundamentals, Fourth Edition 24

Page 25: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 25

Figure 12-6 Padlock icon and certificate information © Cengage Learning 2012

Page 26: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Types of Digital Certificates (cont’d.)

• Class 3: software publisher digital certificates

– Provided by software publishers

– Purpose: verify programs are secure and have not

been tampered with

• Dual-key digital certificates

– Reduce need for storing multiple copies of the

signing certificate

– Facilitate certificate handling in organizations

• Copies kept in central storage repository

Security+ Guide to Network Security Fundamentals, Fourth Edition 26

Page 27: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Types of Digital Certificates (cont’d.)

• Dual-sided certificates

– Provides ability for client to authenticate back to the

server

– Both sides of the session validate themselves

• X.509 digital certificates

– Standard for most widely accepted format for digital

certificates

Security+ Guide to Network Security Fundamentals, Fourth Edition 27

Page 28: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 28

Table 12-1 X.509 structure

Page 29: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Public Key Infrastructure (PKI)

• Important management tool for the use of:

– Digital certificates:

– Asymmetric cryptography

• Aspects of PKI

– Public-key cryptography standards

– Trust models

– Key management

Security+ Guide to Network Security Fundamentals, Fourth Edition 29

Page 30: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

What is Public Key Infrastructure?

• Need for consistent means to manage digital

certificates

• PKI: framework for all entities involved in digital

certificates

• Certificate management actions facilitated by PKI

– Create

– Store

– Distribute

– Revoke

Security+ Guide to Network Security Fundamentals, Fourth Edition 30

Page 31: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Public-Key Cryptographic Standards

(PKCS)

• Numbered set of PKI standards defined by the

RSA Corporation

– Widely accepted in industry

– Based on the RSA public-key algorithm

Security+ Guide to Network Security Fundamentals, Fourth Edition 31

Page 32: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 32

Table 12-2 PKCS standards (continues)

Page 33: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 33

Table 12-2 PKCS standards (cont’d.)

Page 34: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 34

Figure 12-7 Microsoft Windows PKCS support © Cengage Learning 2012

Page 35: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Trust Models

• Trust

– Confidence in or reliance on another person or entity

• Trust model

– Refers to type of trusting relationship that can exist

between individuals and entities

• Direct trust

– One person knows the other person

• Third-party trust

– Two individuals trust each other because each trusts

a third party

Security+ Guide to Network Security Fundamentals, Fourth Edition 35

Page 36: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Trust Models (cont’d.)

• Hierarchical trust model

– Assigns single hierarchy with one master CA called

the root

– Root signs all digital certificate authorities with a

single key

– Can be used in an organization where one CA is

responsible for only that organization’s digital

certificates

• Hierarchical trust model has several limitations

– Single CA private key may be compromised

rendering all certificates worthless

Security+ Guide to Network Security Fundamentals, Fourth Edition 36

Page 37: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 37

Figure 12-8 Hierarchical trust model © Cengage Learning 2012

Page 38: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Trust Models (cont’d.)

• Distributed trust model

– Multiple CAs sign digital certificates

– Eliminates limitations of hierarchical trust model

• Bridge trust model

– One CA acts as facilitator to connect all other CAs

• Facilitator CA does not issue digital certificates

– Acts as hub between hierarchical and distributed

trust model

– Allows the different models to be linked

Security+ Guide to Network Security Fundamentals, Fourth Edition 38

Page 39: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 39

Figure 12-9 Distributed trust model © Cengage Learning 2012

Page 40: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 40

Figure 12-10 Bridge trust

model © Cengage Learning 2012

Page 41: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Trust Models (cont’d.)

• Bridge trust application examples

– Federal and state governments

– Pharmaceutical industry

– Aerospace industry

Security+ Guide to Network Security Fundamentals, Fourth Edition 41

Page 42: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing PKI

• Certificate Policy (CP)

– Published set of rules that govern operation of a PKI

– Provides recommended baseline security

requirements for use and operation of CA, RA, and

other PKI components

• Certificate Practice Statement (CPS)

– Describes in detail how the CA uses and manages

certificates

Security+ Guide to Network Security Fundamentals, Fourth Edition 42

Page 43: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Managing PKI (cont’d.)

• Certificate life cycle

– Creation

• Occurs after user is positively identified

– Suspension

• May occur when employee on leave of absence

– Revocation

• Certificate no longer valid

– Expiration

• Key can no longer be used

Security+ Guide to Network Security Fundamentals, Fourth Edition 43

Page 44: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Key Storage

• Means of public key storage

– Embedding within digital certificates

• Means of private key storage

– Stored on user’s local system

• Software-based storage may expose keys to

attackers

• Alternative: storing keys in hardware

– Tokens

– Smart-cards

Security+ Guide to Network Security Fundamentals, Fourth Edition 44

Page 45: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Key Usage

• Multiple pairs of dual keys

– Created if more security needed than single set of

public/private keys

– One pair used to encrypt information

• Public key backed up in another location

– Second pair used only for digital signatures

• Public key in that pair never backed up

Security+ Guide to Network Security Fundamentals, Fourth Edition 45

Page 46: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Key-Handling Procedures

• Key escrow

– Keys managed by a third party

– Private key is split and each half is encrypted

– Two halves sent to third party, which stores each

half in separate location

– User can retrieve and combine two halves and use

this new copy of private key for decryption

• Expiration

– Keys expire after a set period of time

Security+ Guide to Network Security Fundamentals, Fourth Edition 46

Page 47: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Key-Handling Procedures (cont’d.)

• Renewal

– Existing key can be renewed

• Revocation

– Key may be revoked prior to its expiration date

– Revoked keys may not be reinstated

• Recovery

– Need to recover keys of an employee hospitalized

for extended period

– Key recovery agent may be used

– Group of people may be used (M-of-N control)

Security+ Guide to Network Security Fundamentals, Fourth Edition 47

Page 48: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 48

Figure 12-11 M-of-N control © Cengage Learning 2012

Page 49: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Key-Handling Procedures (cont’d.)

• Suspension

– Suspended for a set period of time and then

reinstated

• Destruction

– Removes all public and private keys and user’s

identification from the CA

Security+ Guide to Network Security Fundamentals, Fourth Edition 49

Page 50: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Transport Encryption Algorithms

• Secure Sockets Layer (SSL)

– Most common transport encryption algorithm

– Developed by Netscape

– Uses a public key to encrypt data transferred over

the SSL connection

• Transport Layer Security (TLS)

– Protocol that guarantees privacy and data integrity

between applications communicating over the

Internet

• Both provide server and client authentication, and

data encryption

Security+ Guide to Network Security Fundamentals, Fourth Edition 50

Page 51: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Secure Shell (SSH)

• Encrypted alternative to Telnet protocol used to

access remote computers

• Linux/UNIX-based command interface and protocol

• Suite of three utilities: slogin, ssh, and scp

• Client and server ends of connection are

authenticated using a digital certificate

• Passwords are encrypted

• Can be used as a tool for secure network backups

Security+ Guide to Network Security Fundamentals, Fourth Edition 51

Page 52: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 52

Table 12-3 SSH commands

Page 53: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Hypertext Transport Protocol over

Secure Sockets Layer (HTTPS)

• Common use of SSL

– Secure Web Hypertext Transport Protocol (HTTP)

communications between browser and Web server

– Users must enter URLs with https://

• Secure Hypertext Transport Protocol (SHTTP)

– Cryptographic transport protocol released as a

public specification

– Supports a variety of encryption types, including

3DES

– Not as widely used as HTTPS

Security+ Guide to Network Security Fundamentals, Fourth Edition 53

Page 54: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

IP Security (IPsec)

• Open System Interconnection (OSI) model

– Security tools function at different layers

• Operating at higher levels such as Application layer

– Advantage: tools designed to protect specific

applications

– Disadvantage: multiple security tools may be needed

• IPsec

– Set of protocols developed to support secure

exchange of packets

– Operates at a low level in the OSI model

Security+ Guide to Network Security Fundamentals, Fourth Edition 54

Page 55: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 55

Figure 12-12 Security tools and the OSI model © Cengage Learning 2012

Page 56: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

IP Security (cont’d.)

• IPsec considered transparent to:

– Applications

– Users

– Software

• Located in the operating system or communication

hardware

• Provides authentication, confidentiality, and key

management

• Supports two encryption modes: transport and

tunnel

Security+ Guide to Network Security Fundamentals, Fourth Edition 56

Page 57: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Security+ Guide to Network Security Fundamentals, Fourth Edition 57

Figure 12-13 New IPsec packet using transport or tunnel mode © Cengage Learning 2012

Page 58: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Summary

• Digital certificate provides third party verification of

public key owner’s identity

• A Certificate Authority issues digital certificates for

others

• Personal digital certificates are issued by an RA to

individuals

• Server digital certificates ensure authenticity of a

Web server and its cryptographic connection

Security+ Guide to Network Security Fundamentals, Fourth Edition 58

Page 59: Security+ Guide to Network Security Fundamentals, Fourth ...cf.linnbenton.edu/bcs/cs/beckerd/upload/CS284Ch12.pdf · Managing Digital Certificates (cont’d.) •Duties ... Security+

Summary (cont’d.)

• PKI is a framework for all entities involved in digital

certificates

• Three basic PKI trust models exist

• Cryptography can protect data as it is being

transported across a network

– SSL/TLS is a widely used algorithm

• IPsec supports a secure exchange of packets

– Considered to be a transparent security protocol

Security+ Guide to Network Security Fundamentals, Fourth Edition 59