Ad info
Search


image map

image map

Related Sites
Computing Japan News Network
Dai Job
LINC Media
 
 
October 1999 Volume 6 no.10

Enterprises bet on PKI
by Gohsuke Takama

In the past couple of years, Public Key Infrastructure (PKI) has become a mainstream buzzword in the computer security industry. Is PKI a silver bullet for all network security problems? Not quite. Is PKI an e-commerce enabler? Might be. But there's a good possibility that PKI will be able to provide sophisticated solutions for integration and streamlining of enterprise network security.

For a paper document, it is relatively easy to establish authenticity, confidentiality, integrity (have the message's contents been modified?), and non-repudiation (making sure that an engaged transaction is not to be denied later - key for e-commerce). But communication via computer networks is quite different, and one of the challenges barring the way to widespread e-commerce deployment is figuring out how senders and recipients of messages (say, a request to transfer ¥75,000 from the sender's bank account to the recipient's) can be sure that their communications are in fact authentic.

Hopping over the Web
Internet e-mail messages, for example, hop over a multitude of servers, many or most of which will be unknown to the sender or the receiver. Who knows if your message has been intercepted by someone who is eager to interfere with your business by surreptitiously altering its contents? How do you ensure that the person logging onto your company network is really the same person specified in the authentication list? PKI is a means to obtain certain answers to these and other security-related questions. PKI relies on public key cryptography, which uses a pair of keys: a public key and a private key. But don't think automobile or front door for these "keys." They actually consist of special numbers based on prime numbers - numbers divisible only by themselves and 1 (like 1, 2, 3, 5, and 7).

If Bob wants to send Alice a private message, he encrypts the message using Alice's public key (previously made available to anyone). No one, except Alice who has the private key of her key pair, is able to read the message, regardless of the communication path. When Alice sends Bob a reply, she signs the message using her private key, and Bob verifies the message and signature by using Alice's public key, confirming that the message really has been sent by Alice and has not been altered by anyone.

John Hancock with bits
Public key cryptography provides two main features: digital signaturing and asymmetric encryption. Digital signatures, in particular, perform an important role in the public key distribution process. While it is simple to exchange public keys between two individuals, when the number of people involved in the communication increases, chances are someone might be able to impersonate someone else and proffer fake keys to unwary recipients. This can be prevented if the key itself has been digitally signed by a third person who assures the recipient of the authenticity of the key. At its heart, then, the idea of the PKI starts with digital certificates.

PKI authorities
A PKI system usually has three entities: a Registration Authority, a Certificate Authority, and a Certificate Directory. The Registration Authority receives requests from users, confirms users' identity, and registers them into the directory database. The Certificate Authority issues, revokes, and verifies certificates based on the registration, and generates users' key pairs as well as controls network access and authentication. The Certificate Directory stores and manages users' registration data and certificates.

One of the benefits of PKI is that the same type of certificate can be used for authentication of both users and devices, such as PCs, smartcards, PDAs, firewalls, and Web servers. There is growing demand for two-factor authentication, which is typically achieved through a combination of a password and a smartcard-like device. This is especially useful for the authentication process for Virtual Private Networks which connect companies' branch offices or business partners with central networks.

But for implementation of a PKI system, there are several factors to keep in mind, first of which is cost. According to industry research, implementing a PKI system in a 5000-person enterprise would involve costs of $90-160k for initial PKI investment, and $300-400k for support and maintenance for a three-year period. Despite this initial barrier, many large firms are actively pursuing PKI systems. Canada's Scotiabank spent some $2 million to deploy an Entrust-based PKI system (including two Certificate Authority servers) in 1997, and about half the cost went to servers and network hardware (the rest went to software, testing, a new secure equipment vault, and consulting fees). Federal Express recently implemented PKI to manage network access and communications for its 150,000 employees worldwide.

PKI at an early stage
Although PKI has attracted a lot of attention, it is still difficult to predict if a boom in PKI usage will happen any time soon. Selling security infrastructure isn't an easy business unless companies have achieved a "security" frame of mind, and - other than those who have had their communications hacked or networks breached - few have.

 

Gohsuke Takama is an independent consultant specializing in computer security issues. Contact him at gt@twics.com.

Back to the Table of Contents

Comments or suggestions?
Contact cjmaster@cjmag.co.jp

Find Out Where you can buy Computing Japan Magazine in Japan and the US
© Copyright 1999 Computing Japan Magazine
All Rights Reserved
Links Jobs in Japan Hot Products ISPs in Japan User Groups  IT Events Extras Features Home Back Issues About Us subscriptions current issue