You are on page 1of 12

Computer Communications 24 (2001) 1460±1471

www.elsevier.com/locate/comcom
Tutorial

Technological infrastructure for PKI and digital certi®cation


Ray Hunt*
Department of Computer Science, University of Canterbury, Private Bag 4800, Christchruch, New Zealand
Received 30 August 2000; revised 19 December 2000; accepted 20 December 2000

Abstract
Secure E-Commerce and VPN technology is only possible with the use of appropriate security systems such as encryption, digital
signatures, digital certi®cates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certi®cates,
certi®cate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable E-business.
This paper discusses these key technologies focusing particularly on recent standardisation as well as looking at some of the criticism and
challenges to its widespread operation in the industry. q 2001 Elsevier Science B.V. All rights reserved.
Keywords: Symmetric and asymmetric encryption; VPN; Dif®e±Hellman key exchange; Digital signature; X.509; IPSec; CA; RA; TTP; CRL; PKI; SPKI;
PKIX; Digital certi®cate; Key management

1. Introduction the different areas to which PKI can be applied to solve


existing problems and examines a range of current
Traditionally, information systems have been largely criticisms and challenges.
centralised with administration under the control of a single
management domain. Security mechanisms to support such
2. PKI background and standards developments
systems re¯ect this structure and this has lead to the deploy-
ment of in¯exible and non scalable security mechanisms
E-business is demanding a secure way to transmit ®nan-
administered under a single security policy. However,
cially or legally sensitive data. The three main problems
with the rapid growth of the Internet, the rise of E-business
faced by users of the Internet are integrity, authentication
and the trend towards decentralisation, situations arise in
and non-repudiation. Integrity requires the receiver be able
which entities in multiple domains need to communicate
to verify that the message has not been modi®ed in transit,
with each other securely. Public key cryptography can
authentication enables each party to a communication to be
play an important role in providing needed security services
sure of the identity of the other (i.e. message cannot be
including con®dentiality, authentication, digital signatures
forged and prevents an attacker masquerading as a legiti-
and integrity. One important factor critical to the operation
mate participant), while non-repudiation prevents the sender
of a global public key cryptosystem on the Internet is a
from denying that they sent the message. Cryptography
reliable and practical means of publishing the public keys
holds the most promise as a solution to these problems
and Public Key Infrastructure or PKI in its most simple form
and public key cryptography in particular appears to be
is a system for publishing public keys. PKI can be used to solve
best suited to ful®ll these requirements.
many problems, however there are still several problems and
Securing business and communications over computer
risks involved in its use as well as organisational and manage-
networks can be likened to an electronic equivalent of signing
ment issues for which solutions are still evolving.
a letter, sealing it an envelope and registering it with the Post
This paper provides a brief outline of the basic concepts
Of®ce. The signature proves authenticity, the sealed envelope
and principals involved in the operation of a PKI including
provides con®dentiality and registration guarantees delivery.
issues such as how a PKI operates, its characteristics and
Public key cryptography was conceived in 1976 by Dif®e
what problems need to be addressed before the use of PKI
and Hellman [3] and in 1977, Rivest, Shamir and Adleman
becomes more widespread. This paper also brie¯y looks at
designed the RSA Cryptosystem [35], the ®rst public key
system. Each public key cryptosystem has its own technical
* Tel.: 164-3-3642347; fax: 164-3-3642999. features, however they all share the property that given an
E-mail address: ray@cosc.canterbury.ac.nz (R. Hunt). encryption key it is computationally infeasible to determine
0140-3664/01/$ - see front matter q 2001 Elsevier Science B.V. All rights reserved.
PII: S 0140-366 4(01)00293-6
R. Hunt / Computer Communications 24 (2001) 1460±1471 1461

the decryption key and vice versa. This lets a user, Alice Development of the operational protocols has been more
publish her encryption key so that anyone can use her public straightforward. Two documents for LDAP (Lightweight
key to encrypt a message that only Alice can decipher with her Directory Access Protocol) have been developed Ð one
private key. Theoretically, no con®dential information needs for de®ning LDAPv3 as an access protocol to repositories
to be exchanged between participants before secure commu- [17,20] and one for storing PKI information in an LDAP
nication is possible. The problem is that everyone has access to directory [32]. Using FTP and HTTP to retrieve certi®cates
Alice's public key and that even though the communication and CRLs from PKI repositories is speci®ed in Ref. [31].
between Alice and another user, Bob is private, the message
cannot be authenticated. This shows that public key crypto-
3. Public key infrastructure
graphy on its own, is not enough. If the conditions for
traditional paper based commerce are to be reproduced in
In its simplest form, a PKI is a system for publishing the
the electronic environment, the following are required:
public keys used in public key cryptography. PKI provides
² Security policies to de®ne the rules under which crypto-
the core framework for a wide variety of components, appli-
graphic systems should operate.
cations, policies and practices to combine and achieve the
² Products to generate, store and manage certi®cates and their
three principal security functions (integrity, authentication
associated keys.
and non-repudiation). A PKI is a combination of hardware
² Procedures to dictate how the keys and certi®cates should
and software products, policies and procedures. It provides
be generated, distributed and used.
the basic security required to carry out E-business so that
users who do not know each other or are widely distributed,
In other words, a trusted and authenticated key distribution
can communicate securely through a chain of trust. Digital
infrastructure is necessary to support the use of public keys on
certi®cates are a vital component in the PKI infrastructure as
a public network such as the Internet. Recent efforts in stan-
they act as `digital passports' by binding the user's digital
dardisation have seen developments on a number of fronts.
signature to their public key. 2

2.1. Evolution of PKI standards 3.1. Components of a PKI

The ITU-T Recommendation X.509 provides a very useful A PKI consists of:
basis for de®ning data formats and procedures related to the
distribution of public keys via certi®cates that are digitally ² A Security Policy.
signed by CAs. X.509 does not however include a pro®le to ² Certi®cate Authority (CA).
specify the supporting requirements for many of the certi®cate ² Registration Authority (RA).
data structure's sub-®elds, extensions or for some data values. ² Certi®cate Repository and Distribution System.
The standards effort produced an outline for PKI of X.509 ² PKI-enabled Applications.
Version 3 certi®cates as well as Version 2 Certi®cate Revo-
cation Lists (see Section 3.2.3). The Internet PKI pro®le 3.1.1. Security policy
went through eleven draft versions before becoming ªInter- A security policy sets out and de®nes an organisation's
net X.509 Public Key Infrastructure Certi®cate and CRL top level direction on information security as well as the
Pro®leº [23]. Other pro®les have been developed for parti- processes and principles for the use of cryptography. Typi-
cular algorithms to make use of Ref. [23]. cally it will include statements on how the organisation will
The development of the PKI management protocols has handle keys and valuable information and will set the level
gone though a number of iterations. PKI [24] was developed of control required to match the levels of risk.
to specify a message protocol to be used between entities in Some PKI systems are operated by Commercial Certi®-
a PKI. The need for an enrolment protocol and the prefer- cate Authorities (CCAs) or Trusted Third Parties (TTPs)
ence to use PKCS [16] message format as the certi®cate and therefore require a Certi®cate Practice Statement
request syntax lead to two parallel developments. 1 (CPS) [1]. This is a detailed document containing the opera-
1
tional procedures on how the security policy will be
The Certi®cate Request Syntax was developed in the S/MiMe WG
enforced and supported in practice. It typically includes
which used PKCS #10 [16] as the certi®cation request message formate.
Certi®cate Request Message Format [25] draft was also developed but in vital speci®cations on how the CAs are constructed and
the PKIX WG. It was to de®ne a simple enrolment protocol that would work
2
for the PKI [24] enrolment protocols, but it did not use PKCS#10 [16] as the Only the user holds their private key. The user's computer generates the
certi®cate request message format. Then, the Certi®cate Management public and private key pair. The public key is then send to the CA where it is
Protocols [24] and Messages [4] were developed to de®ne an extended veri®ed and a digital certi®cate is issued. This certi®cate is then sent back to
set of management messages that ¯ow between the components of the the user and stored. Copies of this certi®cate can then accompany transac-
Internet PKI. These, combined with CMS [4] allowed the use of an existing tions from which the (certi®ed) public key is available. The fact that a
protocol (S/MIME) as a PKI management protocol, without requiring the cryptographically strong private key may be kept on a computer protected
development of an entirely new protocol such as CMP [24]. It also included by a cryptographically weak password is a security issue that needs careful
in PKCS#10 [16]as the certi®cate request syntax. consideration.
1462 R. Hunt / Computer Communications 24 (2001) 1460±1471

operated, how certi®cates are issued, accepted and revoked, There is also a hybrid-outsourcing model where an orga-
how keys will be generated, registered and certi®ed, where nisation outsourcers its private CA operations to a public
they will be stored and how they will be made available to CA in a similar manner to which PBXs are hosted at telco
users. The Electronic Commerce Promotion Council of premises (Centrex). An example of this infrastructure is the
Japan (ECOM) came out with some guidelines, which Equifax system [37].
form the basis for the general management requirements
for the operation of a CA, the requirements for speci®c 3.1.3. Registration authority (RA)
services conducted by CAs as well as facility and system An RA provides the interface between the user and the
requirements [10]. For more speci®c information of what a CA. It authenticates the identity of the users and submits the
CPS should contain, VeriSign, a leading provider of Internet certi®cate request to the CA. The quality of this authentica-
trust services, have also publicised their CPS [39]. tion process determines the level of trust that can be placed
in the certi®cates. For example, if all an RA requires an
3.1.2. Certi®cation authority (CA) e-mail address and a name Ð before it issues a certi®cate
The CA is an entity which issues and revokes certi®cates. Ð the level of trust that should be placed in that certi®cate
An in-house server or a TTP such as Entrust, Baltimore or would be considerably lower than if more stringent registra-
VeriSign, can provide a CA function. A CA provides the tion procedures were required.
trust basis for a PKI as it manages public key certi®cates for Registration is distinct from the process of creating, sign-
their whole life cycle. ing and issuing certi®cates. For example a Human
The CA will: Resources Department may manage the RA function
while an Information Technology Department manages
² Issue certi®cates by binding the identity of a user or the CA. A separate RA also makes it harder for any single
system to a public key with a digital signature. department to subvert the security of the system. Organisa-
² Schedule expiry dates for certi®cates. tions can choose to have registration handled by a separate
² Ensure certi®cates are revoked when necessary by RA, or included as a function of the CA.
publishing CRLs.
3.1.4. Certi®cate repository and distribution system
When implementing a PKI, an organisation can either The Certi®cate Repository provides a mechanism for
operate its own CA or use the services of a Commercial storing keys, certi®cates and Certi®cate Revocation Lists
CA or TTP. (CRLs), which is usually based on an LDAP-enabled direc-
While the principles of PKI are the same there are tory service. Key recovery is an advanced function required
currently two major commercial implementation models to recover data or messages when a key is lost and a PKI
which depend upon who the CA is: may provide such an automated key recovery service.
Certi®cates can be distributed in a number of ways
1. Private CA Ð vendors sell a complete PKI system to an depending on the structure of the PKI environment. For
organisation which then becomes its own CA and is example, certi®cates may be distributed by the users them-
responsible for the issuing and management of certi®- selves or through an LDAP directory service.
cates. Examples include RSA's Keon, IBM's Trust
Authority, Baltimore's Unicert and Entrust's PKI. 3.1.5. PKI-enabled applications
2. Public CA Ð certi®cates are purchased from a public A PKI is a means to an end Ð providing the security
CA organisation as required. The most common example framework by which PKI-enabled applications can be con®-
of this approach is VeriSign. dently deployed to achieve the end bene®ts. Fig. 1 shows the
relationship between some applications and infrastructure,
The fundamental difference between these two models is and their related standards. Examples include:
that the later sells commercial digital certi®cates while the
former sells the software for the user to produce their own ² Document exchange between web servers and remote
certi®cates. On each of the respective web sites are a access clients.
number of white papers claiming the advantages of these ² E-mail and Groupware (PGP, S/MIME, Lotus Notes
models [13,38]. Groupware).
Generally for a large organisation it is more cost effective to ² Online banking, shopping and credit card transactions
operate a private CA as it offers more ¯exible control and once over the Internet.
the system is in place the economies of scale allow extra ² Virtual Private Networks (VPNs) operating with PPTP,
certi®cates to be produced and managed very cheaply. For a IPSec, etc.
small organisation it is likely to be advantageous to purchase
individual certi®cates as such organisations are unlikely to 3.2. Operations of PKI
have the infrastructure required to deploy such a large system
nor the volume necessary to produce cheap certi®cates. The main PKI functions are shown in Table 1. These
R. Hunt / Computer Communications 24 (2001) 1460±1471 1463

Di gi t al l y E- mai l Onl i ne
Si gned Banki ng
Gr oupw ar e VPN
Code and Onl i ne
Fi l es Shoppi ng

St andar ds
S/ MI ME SSLv3 .0 I PSec
t hat r el y
TLSv1 .0 PPTP on a PKI
SET

St andar ds
X.5 09 PKI X PKCS t hat def i ne
t he PKI

Fig. 1. PKI security architecture [36].

include Ð registration, issuing and revoking certi®cates, ®cate. If a user, Alice wishes to communicate with
creating and publishing CRLs, storing and retrieving certi- another user, Bob using a public key cryptosystem,
®cates and CRLs, as well as key lifecycle management. Alice must have direct knowledge of Bob's public key.
Some of the enhanced functions include time-stamping With a PKI, Alice only needs to have direct knowledge
and policy-based certi®cate validation. of the CA's public key and the CA would issue an
These functions can be described in terms of three basic identity certi®cate for Bob's public key. If Alice and
PKI infrastructures: the CA are distinct entities, how Alice trusts the CA
would depend on how much con®dence she has in
² Certi®cation is the process of binding a public key value using the CA's certi®cates for secure communications.
to an entity. A CA might have different classes of certi®cates with
² Validation is the process of verifying that a certi®cate is each class providing a designated level of trust.
valid and revoking where necessary. For example to overcome these inherent limitations
² Key management Ð updating, backing up, archiving etc. VeriSign has introduced four different levels of certi®cate
[40] (each with different cost structures) corresponding to
the degree of authentication required. See Table 2.
3.2.1. Certi®cation In addition to the content and authenticity of a transac-
Certi®cation is the fundamental function of all PKIs tion, the exact time of the transaction can be important. For
and it is the means by which the public keys and infor- example, a transaction may have to be submitted within a
mation pertaining to those keys are published. PKI speci®ed timeframe to be valid. The solution to having
communicates this information through a certi®cate. trusted transactions is to combine digital signatures with a
Fig. 2 shows the information contained in a basic certi- time-stamping service. (See Section 5.5)

Table 1
Public Key Infrastructure (PKI) Functions

Function Description Implementation

Registering users Collect user information, verify Function of CA, or separate RA


identity
Issuing certi®cates Create certi®cates in response to Function of the CA
user or administrator request
Revoking certi®cates Create and publish Certi®cate Administrative software
Revocation Lists (CRLs) associated with the CA
Storing and retrieving Make certi®cates and CRLs Repository for certi®cates and
certi®cates and CRLs available to authourised users CRLs in secure replicated
directory service accessible via
LDAP
Policy-based certi®cate Impose policy-based constraints Function of the CA
path validation on certi®cate chain, and validate
if all constraints are met
Time-stamping Time-stamp each certi®cate Function of the CA or a
dedicated Time Server (TS)
Key lifecycle management Update, archive and restore keys Automated in software or
performed manually
1464 R. Hunt / Computer Communications 24 (2001) 1460±1471

Fig. 2. Basic Structure of a Digital Certi®cate.

3.2.2. CA hierarchy PCA-like entities in other vendors' PKIs as demonstrated


It is impractical to have a single universal CA and most in Fig. 3.
PKIs permit CAs to certify other CAs. Fig. 3 shows a ² CAs authorise subordinate CAs, which belong to the PKI
general hierarchy of how CAs operate. In the previous service company or the customer.
example, if Alice and Bob belongs to different CAs, for ² At the bottom of the hierarchy can be local registration
Alice to communicate with Bob, she must either have authorities (LRAs) that evaluate certi®cate applications
knowledge of Bob's public key or Bob's CA's public key on behalf of the root, PCA, or CA that issues the
(so she can obtain the key from Bob's CA) or have her CA certi®cates.
issue a certi®cate for that key (her CA would then try to ®nd
Bob's public key through other CAs). There may be an If a user does not already trust the CA that signed a
arbitrary number of CAs between Alice and Bob (through certi®cate, they can search upward through the hierarchy
E, B, A, C and F or just through E to F), and Alice would for a trusted CA that has certi®ed the public key of the
have to verify the certi®cation of each CA until she obtains CA in question. Further, a CA can issue another CA with
Bob's certi®cation. This process is called certi®cation path a certi®cate that allows the other CA to issue certi®cates,
validation. 3 Different PKIs arrange their CAs in different which will be recognised by the ®rst CA. 4 Cross-certi®ca-
hierarchies or they may even have arbitrary or bilateral tion works directly, without a third party.
structural agreements. An example of a PKI that does not It can make sense to implement both hierarchical and
impose any restrictions on its hierarchy is the PGP PKI. This cross-certi®cation in a single security domain, for different
is further discussed in Section 4. purposes or at different times. For example, a hierarchical
The scalability of a PKI depends on the relationship system based on a TTP may be necessary when setting up or
between its CAs. A problem here is that CAs may allocate expanding a PKI, but the bulk of day-to-day interoperability
trusts differently and this problem increases as the certi®ca- may be accomplished via cross-certi®cation.
tion path grows. The certi®cation path also runs the risks of Policy-based certi®cate path validation is still an evolving
becoming too long. It is estimated that in a global PKI, the part of CA functionality. Policy mapping matches one CA's
average certi®cation path length would be between six policy to another, allowing CAs to interoperate if they
and seven [15]. Path discovery and trust delegation (one support similar but not necessarily identical policies. Alter-
CA may de®ne its trust different from another) is dif®cult natively it may be desirable to prohibit policy mapping, so
to achieve across company and/or geographical bound- that the path will be validated only if the CAs have identical
aries. The dominant hierarchy is top down, but it has policies. This is the subject of ongoing research and
the problem that all users must trust the root CA and development.
since so many paths pass through the root CA, it is
vulnerable to attack. 3.2.3. Validation and revocation
The best known hierarchical certi®cation path processing The information in a certi®cate can change over time and
architectures are those maintained by PKI service organisa- a certi®cate user needs to validate that the certi®cate's data
tions such as Entrust, Baltimore and VeriSign. Typically, in is current. Users can either:
such a hierarchy:
² Ask the CA about a certi®cate's validity every time it is
used (online validation).
² There is a single root at the top. ² Request the CA to include a validity period in the
² The root certi®es public primary certi®cation authorities certi®cate (of¯ine validation).
(PCAs), which issue, suspend, and revoke certi®cates for
all CAs within their hierarchy. Closely related to the issue of validation of certi®cates is
² PCAs certify CAs. PCAs may also cross-certify with
4
For example the British Medical Association might grant registration
3
The implementation and operation of such a system is not a trivial rights to the New Zealand Medical Association such that the later could
exercise. It requires strict adherence to standards and compatible protocols. issue doctors' registration certi®cates on the basis of trust between the two
To date most pilot systems operate with a single (often proprietary) CA. associations.
R. Hunt / Computer Communications 24 (2001) 1460±1471 1465

Table 2 When verifying a signature, the relevant CRL is exam-


Classes of Digital Certi®cates available from VeriSign ined to ensure that the signer's certi®cate has not been
VeriSign Class 1 Individual Certi®cates enhances the revoked. Whether it is worth the time to perform this
security of some applications by assuring that a check depends on the importance of the signed document.
certi®cate's subject and e-mail address are included A CRL is maintained by a CA, and it provides information
within VeriSign's repository. Class 1 Certi®cates about revoked certi®cates that were issued by that CA.
provide assurances that communications originate from
CRLs only list current certi®cates, since expired certi®cates
a particular source but do not provide proof of identity.
VeriSign Class 2 Individual Certi®cates provide a should not be accepted in any case. When a revoked certi-
reasonable level of assurance of a subscriber's identity. ®cate's expiration date occurs, that certi®cate can be
Enterprise customers using OnSite SM validate certi®cate removed from the CRL.
applicants by checking their identities against enterprise CRLs can also be distributed in one of two ways. In the
local records or Trusted Third Parties (TTP).
`pull' model, veri®ers download the CRL from the CA, as
VeriSign Class 3 Individual Certi®cates provides a
higher level of assurance by validating the identity via needed. In the `push' model, the CA sends the CRL to the
in-person presentation of identi®cation credentials or veri®ers at regular intervals. Some systems use a hybrid
other enhanced procedures. These certi®cates are approach where the CRL is pushed to several intermediate
typically suitable for applications such as electronic repositories from which the veri®ers may retrieve it as
banking and contracting.
needed. Although CRLs are maintained in a distributed
VeriSign Class 3 Organisational (Server) Certi®cates
provide assurances to an entity trying to authenticate a manner, there may be central repositories for CRLs, such
Website. Validation of certi®cate applicants includes as, network sites containing the latest CRLs from many
comparison of certi®cate application information to organisations. For example a bank might require an
information held by TTPs or of®cial records provided by in-house CRL repository to make CRL searches on every
the applicant and supplemented by independent
transaction feasible.
contacts.
There are two major problems with the CRL approach:
Firstly, time-granularity relates to what happens between
the time when a CA receives noti®cation that a certi®cate
certi®cation revocation. A certi®cate should be revoked should be revoked and when it publishes its next CRL. Since
when it is suspected that it has been compromised. If a the revoked certi®cate will only appear on the next CRL,
certi®cate is validated online with the CA, the CA can any users checking the current CRL will not know of the
simply state that the certi®cate is no longer valid. With revocation and assume that the certi®cate is still valid. A
of¯ine validation, the most common way is to use CRLs. solution that has been proposed to solve this problem is to
A CRL is a list of certi®cates that have been revoked before issue a list of certi®cates that have been revoked since the
their scheduled expiration date. There are several reasons last CRL. This list of certi®cates is called a delta-CRL.
why a certi®cate might need to be revoked. For example, the Delta-CRLs are much smaller than a CRL and can be issued
key speci®ed in the certi®cate might have been compro- more frequently.
mised or the user speci®ed in the certi®cate may no longer Secondly, when a CRL gets too large, it may be dif®cult
have authority to use the key. An employee may have for users to retrieve it, particularly when bandwidth access
resigned or changed names. to a CA is limited. There have been several solutions

Fig. 3. Certi®cate path validation via a path of trust in the CA hierarchy.


1466 R. Hunt / Computer Communications 24 (2001) 1460±1471

proposed such as dividing the CRL into smaller sections (for tion and should not accept a message signed with an expired
example grouped by reason for revocation). At best this is key. This means that when one's own key expires, every-
only a temporary solution to the problem and research is still thing signed with it will no longer be considered valid.
being carried out. There may be cases in which it is important that a signed
The PKIX recommendation does not require CAs to issue document be considered valid for a much longer period of
CRLs [18]. On-line methods of revocation noti®cation may time and time stamping is therefore necessary.
be applicable in some situations as an alternative to CRLs. If a private key is lost or destroyed but not compromised,
PKIX de®nes an Online Certi®cate Status Protocol that messages can no longer be signed or decrypted Ð but
facilitates on-line checking of the status of certi®cates anything previously signed with the lost key is still valid.
[7,30]. The key must be placed on a CRL to prevent any illegiti-
mate use should the key be found or recovered by an
3.2.4. Key management attacker. Loss of a private key can happen, for example, if
The PKI performs functions, such as issuing a certi®cate the smart-card used to store keys is lost, or if the disk on
and listing a certi®cate on a CRL in response to a current which the key is stored is damaged.
request. In contrast, key lifecycle functions, such as updat-
ing, backing up, and archiving keys, are performed
routinely. Each user is likely to have a number of keys 4. Use of PKI with PGP
that require lifecycle management. For example, users
typically have at least one key pair for each secure There are a number of important protocols, which will
application (e.g. e-mail, desktop ®le encryption, VPN). bene®t from the use of PKI Ð these include S/MIME, PGP
Some applications use several key pairs for different and TLS1.0 (old SSLv3). One of these Ð PGP (Pretty Good
purposes, such as digital signatures, bulk encryption, and Privacy) is brie¯y discussed here.
authentication. PGP is a public key cryptography program designed for
use with Internet e-mail and created by Zimmermann [41].
3.2.4.1. Updating keys. New keys are usually issued at It is the world's defacto standard for e-mail encryption with
regular intervals so as to reduce the exposure from keys over six million users. PGP is a hybrid cryptosystem made
that have been unknowingly compromised. up of four cryptographic elements Ð a symmetric encryp-
tion cipher (IDEA), an asymmetric encryption cipher
3.2.4.2. Backing up keys. Users frequently forget the (RSA), a hash function (MD5) and a random number
passwords that protect their private keys Ð or they may generator. Each of these four elements are subject to a
lose the keys, for example, through a disk crash or virus different form of attack [14]. PGP users each maintain
attack. The company should be able to restore the keys to their own list (keyring) of the public keys of the people
the user. they communicate with. This keyring is signed by the user's
3.2.4.3. Archiving keys. When employees leave the own private key as a precaution against tampering. PGP
company, their keys must be invalidated, while retaining allows users to exchange keyrings and a user can add
the keys in order to access previously encrypted ®les and another key to the keyring, assigning one of the following
messages. Keys used for digital signatures may be retained four values to this new key:
for as long as the signed documents exist so that signatures
can be veri®ed. Some organisations archive encryption keys ² Completely trusted Ð if any other key is signed by this
but not signing keys, since the availability of archived key, then add the new key to the keyring.
signing keys could invite abuse via identity impersonation. ² Marginally trusted Ð a key signed by this key must also
be signed by one or more keys before it is added to the
3.2.4.4. Key expiry. To guard against a long-term keyring.
cryptanalytic attack, every key must have an expiration ² Untrusted Ð this key should not be used in determining
date. The time to expiration must therefore be much whether other keys can be added to the keyring or not.
shorter than the expected time for cryptanalysis. That is, ² Unknown Ð the level of trust for this key cannot be
the key length must be long enough to make the chances determined.
of cryptanalysis before key expiration extremely small. The
validity period for a key pair may also depend on the These values allow a user to assign a level of trust and the
circumstances in which the key is used. The appropriate user is able to tune the PGP's criteria for accepting a key.
key size is determined by the validity period, together For example if there are four users, Alice, Bob, Eve and
with the value of the information protected and the Chris. Bob knows Alice personally and has her key, while
estimated strength of an expected attacker. In a certi®cate Chris knows Eve and has her key. On day, Chris and Bob
the expiration date of a key is typically the same as the met and decided to exchange their keys.
expiration date of the certi®cate. At this point, Alice's keyring contains keys for Bob,
A signature veri®cation program should check for expira- Bob's keyring contains keys for Alice and Chris, Chris's
R. Hunt / Computer Communications 24 (2001) 1460±1471 1467

keyring contains keys for Bob and Eve and Eve's keyring quali®ed resources and a critical mass of businesses. It
only contains the key for Chris. would seem that PKI would eventually become more wide-
One day, Bob decides to exchange keyrings with Alice spread when it ®nally ®nds a solution to the problems
and Chris. He is able to exchange keyrings with Chris mentioned above. In the meantime, companies are imple-
securely because he knows Chris's key. Since Alice menting PKIs as a practical way to solve technological
knows Bob's key, when Bob sends her his keyring, she is problems such as managing VPNs.
able to verify that it is indeed Bob's keyring. Alice now has VPNs are now standardising on the IP Security (IPSec)
the keys for Bob, Chris and Eve. Alice can now commu- protocol [21]. A critical aspect of IPSec is how keys are
nicate reasonably securely with Chris since Bob obtained exchanged to authenticate each endpoint of the encrypted
Chris's key directly before giving it to her. However, if tunnel. The protocol for doing this is called Internet Key
Alice wants to communicate with Eve, she is relying on Exchange (IKE) [22] and supports manually entering
Chris. This effectively implies a chain of trust. Because pre-shared keys into both hosts, by the use of a secure
Alice trusts Bob, she ends up trusting Chris (someone she DNS and by a PKI CA. Manually con®guring shared secrets
never met). Alice also has no way of knowing which keys on every router and ®rewall is giving way to central
came from Chris unless Bob tells her explicitly. management through a CA. Con®guring VPN devices [19]
to authenticate via a CA provides a scalable, centrally
4.1. PGP PKI managed solution to revoking and reassigning the certi®-
cates used to create a trusted connection. This is just one
As users trade keyrings, they build up a web of trust and example of the many services that a PKI can provide.
this is the simplest form of a PKI. Each user, effectively
acting as their own root CA, is able to assign a level of
trust. The user's public key, with the keyring included, 5. PKI working group activities
could also be considered to be a type of user's certi®cate.
This simplicity, together with the fact that there is no expli- There are two key IETF working groups focused on PKI
cit infrastructure (the only infrastructure needed is e-mail) standards and implementations.
to maintain, allowed PGP to gain acceptance on the Internet. The Simple Public Key Infrastructure (SPKI) working
However, in applications where strong authentication is group 5 is developing Internet drafts for public key certi®cate
needed, the PGP±PKI is not acceptable. formats, signature formats and key acquisition protocols.
SPKI is intended to provide mechanisms to support security
4.2. Shortcomings of PGP±PKI over a range of protocols (e.g. IPSec) and applications,
which may require public key certi®cates such as encrypted
The web of trust method forces users to trust someone's e-mail, web documents and electronic payment systems.
entire keyring even if the user only really trusts the owner of Two important RFCs developed under SPKI are included
the keyring. In the example above, Alice trusts Bob, and in Refs. [33,34].
because she trusts Bob and his entire keyring, she is also The PKIX working group 6 has developed recommended
forced to trust Chris. Another problem related to the web of standards covering ®ve signi®cantly different sections [18]:
trust method is that if one user is fooled into believing some-
one else's identity, any other users will also be fooled into ² Pro®les of the X.509v3 certi®cate standards and the
believing that person's identity by trusting the keyring of the X.509v2 CRL standards for the Internet.
user who was originally fooled. ² Operational protocols, in which relying parties can obtain
A PGP certi®cate contains only an e-mail address, a information such as certi®cates or certi®cate status.
public key and a degree of trust attribute. Since an e-mail ² Management protocols, in which different entities in the
address can easily be forged, PGP does not provide strong system exchange information needed for proper manage-
authentication of a person's identity. Also PGP's use of ment of the PKI.
e-mail addresses prevents its users from having any degree ² Certi®cate policies and certi®cate practice statements,
of anonymity. Another issue with PGP certi®cates is that covering the areas of PKI security not directly addressed
they are not extensible and currently there is no coherent in the rest of PKIX.
method for validating, revoking PGP certi®cates (currently ² Time-stamping and data certi®cation services, which can
performed by word-of-mouth) or recovering lost keys. be used to build services such as non-repudiation.
These problems, and the fact that PGP was designed only
for securing e-mail prevents PGP from being used for appli-
cations beyond causal e-mail communication. 5.1. X.509v3 pro®les

4.3. An application of PKI X.509v3 certi®cates are complex data structures as they

To date, use of PKI has not been widespread due to 5


www.ietf.org/html.charters/spki-charter.html.
reasons such as cost, complexity as well as a lack of 6
www.ietf.org/html.charters/pkix-charter.html.
1468 R. Hunt / Computer Communications 24 (2001) 1460±1471

offer a variety of extensions, which can take on a wide range requirements, revocation policy and others. PKI of Ref. [26]
of options. This provides considerable ¯exibility, which provides such a framework.
allows the X.509v3 certi®cate format to be used with a
many applications. Unfortunately, this same ¯exibility 5.5. Time-stamp and data certi®cation services
makes it extremely dif®cult to produce independent imple-
Time-stamping is a service in which a Time-stamp
mentations that will actually interoperate. To build an Inter-
Authority (TSA), which may be a TTP Ð signs a message
net PKI based on X.509v3 certi®cates, the PKIX working
to provide evidence that it existed prior to a speci®c time. A
group developed a pro®le of the X.509v3 speci®cation.
Time-stamping Protocol [9] provides some support for non-
A pro®le of the X.509v3 speci®cation is a description of
repudiation so that a user cannot claim that a transaction was
the contents of the certi®cate together with mandatory,
later forged after compromise of a private key. Existence of
optional or denied extensions. PKI of Ref. [23] provides
the signed time-stamp indicates that the transaction in
such a pro®le of X.509v3 and recommends a range of values
question could not have been created after the speci®ed
for various extensions. To promote interoperability, it is
time.
necessary to constrain the choices an implementer supports.
A token associates a message with a particular event and
In addition to pro®ling the certi®cate and CRL formats, it
provides supplementary evidence for the time speci®ed in
is necessary to specify particular Object Identi®ers (OIDs)
the time-stamp token. For example a token could associate
for certain encryption algorithms, since there are a variety of
the message with the most recent ®nal currency exchange
OIDs registered for certain algorithm suites. PKIX has
rate for the day.
produced two documents Ð [6,27], which provide
A Data Certi®cation Server protocol [5] is a TTP that
assistance on the implementation of speci®c algorithms.
veri®es the correctness of speci®c data submitted to it thus
Some countries are in a process of updating their legal
going beyond a simple time-stamping service. The DCS
frameworks in order to regulate and incorporate recognition
certi®es possession of data or validity of another entity's
of signatures in electronic format. Many of these frame-
signature. As part of this, the DCS veri®es the mathematical
works introduce certain basic requirements on certi®cates,
correctness of the actual signature value contained in a
(Quali®ed Certi®cates) for the support of these types of
request and also checks the full certi®cation path from the
`legal' signatures. There is a need for a speci®c certi®cate
signing entity to a trusted point (e.g. the DCS's CA, or the
pro®le providing standardised support for related issues
root CA in a hierarchy).
such as a common structure for expressing identities of
certi®ed subjects (unmistakable identity). The PKIX work- 5.6. PKI authorities, services and toolkits
ing group has adopted a re®nement of Ref. [23] that further
pro®les PKIX certi®cates into quali®ed certi®cates. This In Australia, Baltimore has been granted full accredita-
work is described in Ref. [8]. tion for `Gatekeeper' Ð the Australian Government PKI Ð
The Government Public Key Authority (GPKA), provides
5.2. Operational protocols public key infrastructure services for online Government
services. Other Australian organisations with `entry level'
Certi®cates and CRLs can be delivered by protocols such status include eSign (Verisign and Telstra), Price Water-
as LDAP, HTTP, FTP and X.500. Operational protocols that house Coopers, 7 while other regional PKI authorities
facilitate certi®cate delivery are de®ned in Refs. [7,28±31]. include: 128i-BayCorp (New Zealand), Singapore Govern-
ment, Hong Kong Post, and others. Suppliers of PKI
5.3. Management protocols systems include: Entrust (PKI 4.0), RSA (Keon 5.0), Micro-
soft (Windows 2000), Baltimore (Unicert), IBM Vault
Management protocols are needed to support online inter- Registry and SecureWay Trust Authority 3.1.
actions between PKI user and management entities. For
example, a management protocol might be used between a
6. Risks associated with the use of PKI
CA and a client with whom a key pair is associated, or
between CAs, which cross-certify one another. A manage-
Security has long been identi®ed as the major obstacle to
ment protocol can be used to carry user or client system
Internet-based commerce and PKI is frequently quoted as
registration information, or requests for certi®cate revoca-
the solution critical to secure transmissions over the Inter-
tion. Management protocols that facilitate message format
net. More recently questions have been raised [11] and this
and transmission are de®ned in Refs. [4,24].
reference questions some of the fundamental assumptions of
the PKI solution. The risks outlined in this paper are
5.4. Certi®cate policies discussed here Ð and to a considerable degree refuted. 8
Certi®cate policy and certi®cate practice statements 7
www.betrusted.com.
should address a variety of protocol security requirements 8
Comments drawn from Albertson, A., Analysis on the Ten Risks of
such as physical and personal security, subject identi®cation Using PKI, Work in Progress, University of Canterbury, 2000.
R. Hunt / Computer Communications 24 (2001) 1460±1471 1469

Fig. 4. Sample of certi®cates preloaded in Microsoft Internet explorer.

Can we trust the CAÐ and for what purposes are they be expected that CAs take adequate measures to provide
trustworthy? such protection and a good security audit would ensure
While it is possible that a `rogue' CA could be set up that this to be the case. For example VeriSign's issuing compu-
issued certi®cates of dubious value, a customer or business ters is housed in a secure non-networked environment that
would still need to be convinced that they are of some value requires multi-operator simultaneous access to counter such
and can be trusted. Currently browsers contain a number of problems.
public certi®cates from CAs that the user considers to be Can one determine which person is linked to a certi®cate
trustworthy (see Fig. 4). If a certi®cate from an unknown and how is this person different from any others?
CA is presented, the browser informs the user that this If all that was know about someone was that their name
certi®cate is from an unlisted CA and requests con®rmation was John Robinson and then one met someone called John
before acceptance. Robinson, there is not enough information to determine if
Who has access to your private key and how safe is it on this is an exact match. In real life, additional information is
your computer? known and this is the very reason why multiple factor
This is the greatest weakness of any cryptographic system authentication is becoming commonplace.
controlling access to private keys and is not speci®cally a When a digital certi®cate is received from somebody,
PKI issue. Cryptographically strong private keys are stored additional information is available over and above the
on a computer that is protected by a cryptographically weak name. Even if the certi®cate cannot authenticate a person
system such as normal passwords. However this is not a it does show that the same private key signed every message
dif®cult problem to guard against. Thus the risks here are received from John Robinson. To assist with such an issue,
real but they are the same as with any cryptographic system public key CAs such as VeriSign offer a certi®cate hierarchy
Ð the weakest link being that of controlling access to the as was discussed in Section 3.2.1.
keys rather than the strength of the encryption algorithm. Can the CA determine whom they are dealing with? Who
How secure is the verifying computer? has granted authority for the CA to be an authority?
The issue here is Ð can an attacker add their own private Private CA organisations that have bought PKI soft-
key to a list of keys used by the verifying computer? This ware and systems from companies can generate their
would allow an intruder to issue their own certi®cates that own certi®cates. As they know who the people in
are indistinguishable from legitimate certi®cates. It would their organisation are, they can identify who is being
1470 R. Hunt / Computer Communications 24 (2001) 1460±1471

issued with certi®cates. The major weakness is that keys. However, the solution to these issues should not
although the private CA can authenticate whom they impede the use of PKI at this time.
have issued certi®cates to, a recipient may not be able In summary Ð although there is some element of concern
to identify, who the CA is. over the path of trust, it is likely that CAs will become linked to
Public CAs such as VeriSign have the opposite problem. de®nitive sources such as a Government Department (e.g.
Everyone can identify the CA `VeriSign or an international Ministry of Commerce or other Government Security Bureau)
Af®liate' but who is named on the certi®cate? To overcome Ð even though the CA as seen from a user's perspective may
this inherent limitation, again CAs such as VeriSign can well be a (quasi) private organisation. The issuing of passports
offer a hierarchical level of certi®cates with appropriate by the Government passport of®ce Ð via another Department
levels of information content and associated trust (See or quasi government body Ð is not unlike the manner in which
Section 3.2.1). digital certi®cates could be issued.
Does the user get to see, read or check the certi®cate or is
it processed automatically within the computer? Does the
user control when a certi®cate is sent? 7. Summary
In practise both Netscape Navigator and Microsoft
Internet Explorer ask the user before any certi®cates are This paper has reviewed a range of technical, infrastruc-
sent (https://digitalid.verisign.com/client/help/privacy.htm) tural, operational and management issues associated with
although most users prefer the automatic features and the use of PKI. The major problem lies not in that it has a
allow the process to operate on their behalf. This is not number of limitations but that its supporters have sold it as a
similar to the manner in which cookies operate Ð most super safe security system [12]. They have equated the
users do not read, edit or analyse their cookies. cryptographic strength of current asymmetric and
Is the user dealing with the CA or the CA and an RA? symmetric algorithms with that of the strength of the PKI
Some systems on-sell the rights to certi®cate production system itself. There is no weakness in the cryptographic
to other companies. If a company does not consider itself an strength of the encryption and digital signature processes.
authority it can buy the rights to issues certi®cates from an However, the management of these processes, storage of
RA. This is more a theoretical risk since the major issue is cryptographically strong keys, identi®cation of entities,
whether the CA will follow the guidelines set down by the storage of certi®cates, etc. all need be subject to good
RA. While it is possible that a company could start issuing business practices Ð common to many security-based
certi®cates without following the procedures or proper business infrastructures.
authentication checks for its users, it is the responsibility PKI is still open to misrepresentation but the improve-
of the RA to control such subcontracts. As all full CAs have ments mentioned above would go a long way to ensuring
an RA authority function as well, it is just as likely that a full realistic expectations from PKI.
CA will not follow the correct procedures as a subcontracted PKI is still in its infancy and yet many organisations have
CA. So overall the risk is low as long as good business already begun deploying certi®cate-enabled applications
practises are adhered to. and infrastructures. 9 Looking ahead, businesses and organi-
This does raise the issue of new companies entering the sations who intend to use PKI will have to look at issues
market. Most customers are likely to choose an established such the legal aspects of liability, 10 interoperability between
supplier, which has a trusted history. This does mean that multiple PKIs, certi®cation validation paths, protection of
the current dominant public CA (VeriSign and its interna- private keys and user acceptance.
tional af®liates), will continue to have a virtual monopoly on PKI is a very promising security technology and if used
public CA certi®cation. properly, businesses and organisations can bene®t from it to
How secure are the certi®cate practices? Can anyone support a number of E-business initiatives, ranging from
steal a certi®cate? Can certi®cates be revoked? Do certi®- electronic commerce to secure communications to reduced
cates have a lifetime? infrastructure. The development of smart-cards is also likely
Again the issue of stolen certi®cates relates to good to be closely linked to future PKI development and deploy-
business practice, private key security, etc. Certi®cate revo- ment. However at this stage Ð given the complexity of the
cation and lifetime are pertinent management issues, which infrastructure required to implement and support a public
can currently be solved with small to medium scale PKI PKI system Ð continued deployment of PKI-enabled
systems. Both VeriSign and Entrust explain these problems applications for speci®c industry groups seems to be the
to their customers on their web sites. VeriSign has greater most likely path. By addressing the issues described
control as is responsible for generating certi®cates, which above, organisations should be able to take full advantage
have a ®nite lifetime (normally one year) as well as a simple of this new and signi®cant technology.
mechanism for users to revoke and renew their certi®cates 9
An example of this is the U.S. Department of Defense (DOD) imple-
(www.verisign.com/repository/digidren.html). The operation menting PKI department wide during the 2000±2003 timeframe.
of PKI on a much broader scale does pose some important 10
The legal status of digital signatures still requires further clari®cation
issues for the storage of revoked certi®cates and expired [2].
R. Hunt / Computer Communications 24 (2001) 1460±1471 1471

References [20] M. Wahl, T. Howes, S. Kille, ªLightweight Directory Access Protocol


(v3) º December 1997.
[1] A. Arsenault, S. Turner, Certi®cation Practice Statement, Internet [21] R. Atkinson, 1998. Security Architecture for the Internet Protocol.
Draft PKIX Roadmap, October 1999. RFC 2401, 1998. RFC 2402 and 2406 are also related.
[2] R.W. Daniels, The Legal Aspects of PKI ISSA Password, March/ [22] D. Harkins, D. Carrel, Internet Key Exchange (IKE), 1998 and kdraft-
April, 2000, pp. 3ndash;4. ietf-ipsec-ike-01.txtl, 1999
[3] W. Dif®e, M.E. Hellman, New directions in cryptography, IEEE [23] R. Housley, W. Ford, W. Polk, D. Solo, ªInternet X.509 Public Key
Transactions on Information Theory 22 (1976) 644±654. Infrastructure Certi®cate and CRL Pro®leº, January 1999.
[4] M. Myers, X. Liu, B. Fox, J. Weinstein, ªCerti®cate Management [24] C. Adams, S. Farrell, ªInternet X.509 Public Key Infrastructure Certi-
Messages over CMSº, kdraft-ieft-pkix-cmc-xx.txtl, July 1999. ®cate Management Protocolsº, March 1999.
[5] C. Adams, P. Sylvester, M. Zolotarev, R. Zuccherato, ªInternet X.509 [25] M. Myers, C. Adams, D. Solo, D. Kemp, ªInternet X.509 Certi®cate
Public Key Infrastructure Data Certi®cation Server Protocolsº, kdraft- Request Message Formatº, March 1999.
ietf-pkix-dcs-xx.txtl, March 2000. [26] S. Chokhani, W. Ford, ªInternet X.509 Public Key Infrastructure
[6] L. Bassham, D. Johnson, W. Polk, ªInternet X.509 Public Key Certi®cate Policy and Certi®cation Practices Frameworkº, March
Infrastructure: Representation of Elliptic Curve Digital Signature 1999.
Algorithm (ECDSA) Keys and Signatures in Internet X.509 Public [27] R. Housley, W. Polk, ªInternet X.509 Public Key Infrastructure
Key Infrastructure Certi®catesº, kdraft-ietf-pkix-ipki-ecdsa-xx.txtl, Representation of Key Exchange Algorithm (KEA) Keys in Internet
October 1999. X.509 Public Key Infrastructure Certi®catesº, March 1999.
[7] M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, ªX.509 [28] S. Boeyen, T. Howes, P. Richard, ªInternet X.509 Public Key Infra-
Internet Public Key Infrastructure Online Certi®cate Status Protocol structure Operational Protocols Ð LDAPv2º, April 1999.
Ð OCSP Extensionsº, September 1999. [29] A. Arsenauly, S. Turner, ªX.509 Internet Public Key Infrastructure
[8] S. Santesson, W. Polk, P. Barzin, M. Nystrom, ªInternet X.509 Public Online Certi®cate Status Protocol Ð OCSPº, 2000.
Key Infrastructure Quali®ed Certi®catesº, kdraft-ietf-pkix-qc-xx.txtl, [30] M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, ªX.509
February 2000. Internet Public Key Infrastructure Online Certi®cate Status Protocol
[9] C. Adams, P. Cain, D. Pinkas, R. Zuccherato, ªInternet X.509 Public Ð OCSPº, June 1999.
Key Infrastructure Time Stamp Protocolsº, kdraft-ietf-pkix-time- [31] R. Housley, P. Hoffman, ªInternet X.509 Public Key Infrastructure
stamp-xx.txtl, March2000. Operational Protocols: FTP and HTTPº, July1998.
[10] Electronic Commerce Promotion Council of Japan (ECOM) Certi®- [32] S. Boeyen, T. Howes, P. Richard, ªInternet X.509 Public Key Infra-
cation Authority Working Group, Certi®cation Authority Guidelines, structure LDAPv2 Schemaº, June 1999.
www.ecom.or.jp, 1997. [33] C. Ellison, ªSPKI Requirementsº, September 1999.
[11] C. Ellison, B. Schneier, Ten risks of PKI: what you're not being told [34] C. Ellison et al., SPKI Certi®cate Theory, September 1999.
about public key infrastructure, Computer Security Journal 16 (1) [35] R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital
(2000) 1±8. signatures and public key cryptosystems, Communications of the
[12] The Security Enabled E-business (White paper) (www.entrust.com), ACM 21 (1978) 120±126.
1999. [36] RSA Data Security, ªUnderstanding PKIº. (www.rsa.com) 1999.
[13] A Total Economic Impact Analysis of Two PKI Vendors: Entrust and [37] S. Taylor, Choosing a PKI Vendor Ð Total Cost of Management
Versign, White Paper, Giga Information Group (www.entrust.com), Analysis of Entrust, VeriSign, and Equifax; White Paper (www.equi-
1998, pp. 1±24. fax.com/) 2000, pp. 1±15.
[14] PGP attacks, http://axion.physics.ubc.ca/pgp-attack.html, 1999. [38] Public Key Infrastructure Ð The VerisSign Difference; White paper
[15] N. McBurnett, PGP Web of Trust Statistics.1999 kget rest of on VeriSign web site (www.verisign.com/whitepaper/enterprise/
referencel. difference), 1999.
[16] RSA Laboratories, The Public-Key Cryptography Standards (PKCS), [39] VeriSign Certi®cation Practice Statement, www.verisign.com/reposi-
RSA Data Security, Redwood City, California, November 1993. tory/CPS1.2/intro.html, 1997.
[17] D.W. Chadwick, ªInternet X.509 Public Key Infrastructure Opera- [40] VeriSign., VeriSign Certi®cation Infrastructure, 1997,https://
tional Protocols Ð LDAPv3º, August 1999. www.verisign.com/repository/CPS1.2/CPSCH2.HTM#
[18] A. Arsenauly, S. Turner, ªInternet X.509 Public Key Infrastructure toc361806948.
PKIX Roadmapº. kdraft-ietf-pkix-roadmap-0x.txtl, March 2000. [41] P. Zimmermann, www.pgp.com, 2000.
[19] J. Reavis, Is VPN the Killer Application for PKI?, www.nwfusion.-
com/newsletters/sec/0920sec2.html, 1999.

You might also like