Public Key Infrastructure: - Raghav Shankar, 4 February, 2019
Public Key Infrastructure: - Raghav Shankar, 4 February, 2019
Public Key Infrastructure: - Raghav Shankar, 4 February, 2019
Infrastructure
- RAGHAV SHANKAR, 4TH February, 2019
STUXNET and FLAME/SKYWIPER
• Thousands of Diplomatic secrets declassified
• Millions of user activities, voice recordings captured, transmitted
• At least 3 Zero-day vulnerabilities exploited
• Minimal damage to attacker
• Highly accomplished cryptographers involved
• Mathematical vulnerabilities exploited
• Nuclear facility repeatedly destroyed
STUXNET – The Nuclear Facility killer
[Explain]
• Intentions
• Payload Delivery (worm) + Payload (Siemens Controller controller)
• Deletion Logic
• Propagation Logic
• Replication Techniques
Affected Countries
Public Key Infrastructure Attacks
• One of the many Zero Day attacks used in Stuxnet, Flame
• Rogue Certificates issued
• Solution?
SSL
• Establish encrypted HTTP communication links
• Providing the CIA triad on the Internet
• Confidentiality
• Integrity
• Authenticity
• [Browser demonstration of SSL Cert]
• Non HTTPS example: MIT
SSL Use cases
• Online banking
• Desktop login
• Citizen identification
• Mass transit
• Device credentialing in the IoT
• E-commerce transactions – FreshMenu Proxy hack
PKI
• PKI Overview
• Types of Encryption
• The Public and Private Key Pair
• Digital Certificates
• Certificate Authorities
• Registration Authorities
• Certification Revocation Lists
• Recovery Agent
• Key Escrow
• Diffie-Hellman Key Exchange
PKI Overview
• A two-key asymmetric encryption system of communication
• A set of rules, guidelines
• Universal infra that works across multiple systems and vendors
• Provides:
• Authentication: Confirms the owner of the keys through Digital Certificates
• Confidentiality: Encrypts data transmissions
Symmetric Encryption vs Asymmetric Encryption
Symmetric Asymmetric
Same key for Encryption & Decryption Different keys for Encryption & Decryption
Host needs to store large database of keys for Host needs to store only 1 key to operate
different clients (ex: Ecommerce portal)
Public Private Key Pair
• Symmetric Key Encryption: Single Key for Encryption & Decryption
• Asymmetric Key Encryption:
• 2 mathematically related keys created at the same time
• Private key stored securely in the server (host)
• Public key publicly distributed to the entire world