1999 Conferences

4th CACR Information Security Workshop

Speaker
Marc Laroche, Entrust Technologies

Title
Trusted Public Key Infrastructures

Abstract
The notion of trust is fundamental in public-key infrastructures (PKIs). For PKIs to be valuable, users must be assured that the parties they communicate with are safe, i.e. their identities and keys are valid and trustworthy. To provide this assurance, it is essential that the technology involved in binding the names of users to their public keys is trusted. The technology used to create these bindings includes security mechanisms and services that provide the secure generation, destruction, and distribution of cryptographic keys, cryptographic operations, complete access control, management of security functions and services, roles and separation of duties, audit of security critical events, secure communications, data protection, and more. These mechanisms and services contribute jointly in allowing the Certification Authority (CA) to securely bind together the user identities and public keys in a digital format known as a public-key certificate. In creating these certificates, CAs act as trusted third parties in a PKI. As long as users trust the CA and its business policies for issuing and managing certificates, they can trust the public-key certificates issued by the CA.

Trust can be defined as the degree to which one believes another will behave in a predictable or favorable manner. Trusting a CA implies that the people, processes and tools involved in the creation and management of public-key certificates can be trusted to make it so that the binding between users identities and public keys can always be relied upon. Thus there must be confidence that the technology involved in creating the public-key certificates can be trusted to operate with an appropriate level of security.

Security evaluations performed by certified third party evaluation facilities against recognized security criteria are instrumental in establishing trust in PKI technology. They allow unbiased security experts to analyze the security functions, interface specifications, guidance documentation and design of the product. The Common Criteria, which was newly adopted as ISO standard 15408, presents a suitable set of security functional and assurance requirements which can be used to evaluate Certificate Authority products. Such criteria also allow the security community to share a common understanding and interpretation of what PKI and CA security requirements are, and what "trusted PKI and trusted CA" really means.

For Entrust PKIs, the Common Criteria Evaluation of Entrust/Authority and Entrust/Admin serves as a fundamental extension to the FIPS 140-1 process in that it extends the security assurance to the services involved in issuing and managing the life cycle of public-key certificates. The certification of these products confirms that these products have met the specified Common Criteria Part 3 Evaluation Assurance Level (EAL) 3 augmented requirements, and can be trusted to reliably and securely deliver CA services.

The presentation will discuss on the Entrust's experience and approach with FIPS 140-1 validation and CC evaluation.

Speaker Bio
Marc Laroche, Manager Product Evaluation at Entrust Technologies Limited is responsible for the security evaluation of Entrust products, including Common Criteria evaluations, FIPS 140-1 validations, and other government security endorsements. Marc joined Entrust Technologies from the Communications Security Establishment (CSE), a Canadian federal agency. As the System Security Engineering unit head, Marc provided security engineering support services to the Canadian Federal Government Departments, prepared IT security technical reports and guidance documents, developed and delivered network security courses and training sessions. Prior to joining CSE, he served as a Communications and Electronic Engineer Officer in the Canadian Forces. Marc has a bachelor's degree in electrical engineering from Laval University, Quebec City, Canada.