Top Banner
Cryptography Infrastructure IETF 83, 2012 Tom Lowenthal [email protected] @flamsmark
17

Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal [email protected] @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Mar 17, 2018

Download

Documents

phungcong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Cryptography InfrastructureIETF 83, 2012

Tom [email protected]

@flamsmark

Page 2: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

A fairytale origin story

Everything is beautiful and broken

Implementation details matter

Page 3: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Once upon a time...

Page 4: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image
Page 5: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image
Page 6: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

the magic of RSA:Public key cryptography is splendid. Encrypt to your recipient's public key.

Page 7: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Problem:Are you sure this is their key?

Page 8: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image
Page 9: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Solution:Find a person everyone trusts.

Page 10: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

just trust

1500people

Page 11: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image
Page 12: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Every secure connection relies on 1500 entities not ever

having made a critical error.

Page 13: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Summary

Cryptography is close to perfect

Everyone trusts 650 CAs perfectly

CAs sometimes make mistakes

Page 14: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

“Implementation details”

Expectations about cert meaning

Who is responsible for validity?

Are intercept certs permitted?

Page 15: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

- implementers

My implementation is correct, some other people just don't understand what this system is for.

Page 16: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Mitigation

How to deal with CA mistakes?

What about very large CAs?

Options limited by trust model

Page 17: Tom Lowenthal Cryptography @flamsmark Infrastructure Lowenthal tom@mozilla.com @flamsmark All images used under Creative Commons license or clear fair use. Please contact me for image

Tom Lowenthal

[email protected]

@flamsmark

All images used under Creative Commons license or clear fair use.

Please contact me for image attribution and license details.