What is Public
Key Infrastructure?
In order to overcome online
security threats, al large four cornerstones are noted for web
security. These are
- Authentication: When
you visit a web site and in particular when you intend to do online business
transaction you need to be sure that the host (the server) is actually who
it claims to be. In particular if
you are divulging credit card details, username and password, or any other
sensitive information, you need to be sure of the identity of the recipient.
The recipient or the host web site therefore needs to present credentials
as to its identity. These credentials
are referred to as digital
certificates.
- Integrity: When
communicating online, both the client and the server need to ensure that
sensitive information is not altered in transition either maliciously or
by accident. How can one ensure that
the received information is actually what the sender intended to send?
This is ensured through a scheme referred to as the message digest.
- Privacy: When
communicating online, one needs to ensure that sensitive and private information
remains confidential to both the sender and the receiver and that no other
but the two parties to communication know of the content of message.
How can you ensure that only you and the host are the only parties
that can read the sensitive information?
Encryption is used to ensure privacy.
- Non-repudiation: When
communicating online and in particular when doing business online or during
any other activity that sensitive documents or monitory fund may be exchanged,
how can the parties to the communication ensure that their counterpart will
not repudiate. The action of repudiation
is the act of refusal to admit having been party to the transaction.
For example if you make an online purchase, how can the server ensure
that at later stage you do not deny having made that purchase?
This can be done through the use of digital signature.
Public Key Infrastructure or PKI comprises of a set of standards, protocols,
schemes, and services that is designed to ensure the four cornerstones of
online security. There are different
perceptions as to what PKI is. Some
refer to it as simply a trust hierarchy that comprises of highly trusted authorities
(certificate authorities)
that certify parties to transaction (usually the merchant).
For our purpose and as it is generally conceived, PKI includes a number
of various other schemes and protocols that are designed to ensure comprehensive
authentication, integrity, privacy and non-repudiation when communicating
online. It is believed that in order to ensure success
and ubiquity of Electronic Commerce, parties to transactions need to feel
that the four cornerstones of security are adhered to and as such PKI becomes
the enabler of Electronic Commerce.
There is no single definition of PKI at the present time although efforts
are being made to ensure a cohesive definition, and interoperability of the
various schemes and definitions. The
protocol that brings all the above together to ensure all the security requirements
is SSL. SSL
is considered to be the implementation of security.
There is also another suite of protocols that are developed and proposed
by financial institutions to enable secure payment. This suite is referred to as SET.
For more information also see:
http://webopedia.internet.com/TERM/P/PKI.html
http://csrc.ncsl.nist.gov/pki/
http://www.opengroup.org/public/tech/security/pki/cki/
http://www.opengroup.org/security/pki/
http://www.rsasecurity.com/rsalabs/faq/4-1-3-1.html
http://www.pki-page.org/
http://www.ficora.fi/englanti/tietoturva/julkinen.htm
http://www.bbs.no/engelske_nettsider/tillitstjenester/bankid_faq.htm
Why
do we need a framework for public key security?
|
|
Test
yourself by answering the questions below:
|
State each of the four functions of PKI where indicated.
- Agreements
shall not be broken later:..........................
- It
is done through use of ..........................
- Knowing
the parties to communication:........................
- It
is done through use of ............................
- Changes
to message during transmission are detectable: ......................
- It
is done though use of.....................
- Messages
are visible to non-other but the parties to communication:
- It
is done through use of.......................
|
What
is the difference between authentication and confidentiality?
|
|
How
do encryption, digital signature, and digital certificate differ?
|
|