throbber
Public key infrastructure - Wikipedia, the free encyclopedia
`
`Page 1 of 7
`
`Public key infrastructure
`
`From Wikipedia, the free encyclopedia
`
`A public key infrastructure (PKI) is a set of
`hardware, software, people, policies, and procedures
`needed to create, manage, distribute, use, store, and
`revoke digital certificates[1] and manage public-key
`encryption. The purpose of a PKI is to facilitate the
`secure electronic transfer of information for a range
`of network activities such as e-commerce, internet
`banking and confidential email. It is required for
`activities where simple passwords are an inadequate
`authentication method and more rigorous proof is
`required to confirm the identity of the parties
`involved in the communication and to validate the
`information being transferred.[2]
`
`Diagram of a public key infrastructure
`
`In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means
`of a certificate authority (CA). The user identity must be unique within each CA domain. The third-party
`validation authority (VA) can provide this information on behalf of the CA. The binding is established
`through the registration and issuance process. Depending on the assurance level of the binding, this may
`be carried out by software at a CA or under human supervision. The PKI role that assures this binding is
`called the registration authority (RA). The RA is responsible for accepting requests for digital
`certificates and authenticating the person or organization making the request.[3] In a Microsoft PKI, a
`registration authority is usually called a subordinate CA.[4]
`
`Contents
`
`■ 1 Design
`■ 2 Methods of certification
`■ 2.1 Certificate authorities
`■ 2.1.1 Issuer Market Share
`■ 2.1.2 Temporary certificates and single sign-on
`■ 2.2 Web of trust
`■ 2.3 Simple public key infrastructure
`■ 2.4 Blockchain-based PKI
`■ 3 History
`■ 4 Uses
`■ 5 Open Source Implementations
`■ 6 Criticism
`■ 7 References
`
`https://en.wikipedia.org/wiki/Public_key_infrastructure
`
`9/29/2015
`
`DISH, Exh. 1024, p. 1
`
`

`
`Public key infrastructure - Wikipedia, the free encyclopedia
`
`Page 2 of 7
`
`Design
`
`Public key cryptography is a cryptographic technique that enables users to securely communicate on an
`insecure public network, and reliably verify the identity of a user via digital signatures.[5]
`
`A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital
`certificates which are used to verify that a particular public key belongs to a certain entity. The PKI
`creates digital certificates which map public keys to entities, securely stores these certificates in a central
`repository and revokes them if needed.[6][7][8]
`
`A PKI consists of:[7][9][10]
`
`■ A certificate authority (CA) that both issues and verifies the digital certificates
`■ A registration authority which verifies the identity of users requesting information from the CA
`■ A central directory—i.e., a secure location in which to store and index keys
`■ A certificate management system
`■ A certificate policy
`
`Methods of certification
`
`Broadly speaking, there have traditionally been three approaches to getting this trust: certificate
`authorities (CAs), web of trust (WoT), and simple public key infrastructure (SPKI).
`
`Certificate authorities
`
`The primary role of the CA is to digitally sign and publish the public key bound to a given user. This is
`done using the CA's own private key, so that trust in the user key relies on one's trust in the validity of
`the CA's key. When the CA is a third party separate from the user and the system, then it is called the
`Registration Authority (RA), which may or may not be separate from the CA.[11] The key-user binding is
`established, depending on the level of assurance the binding has, by software or under human
`supervision.
`
`The term trusted third party (TTP) may also be used for certificate authority (CA). Moreover, PKI is
`itself often used as a synonym for a CA implementation.
`
`Issuer Market Share
`
`In this model of trust relationships, a CA is a trusted third party - trusted both by the subject (owner) of
`the certificate and by the party relying upon the certificate.
`
`According to NetCraft [2] (http://news.netcraft.com/archives/2015/05/13/counting-ssl-certificates.html),
`the industry standard for monitoring Active TLS certificates, states that "Although the global [TLS]
`ecosystem is competitive, it is dominated by a handful of major CAs — three certificate authorities
`(Symantec, Comodo, GoDaddy) account for three-quarters of all issued [TLS] certificates on public-
`facing web servers. The top spot has been held by Symantec (or VeriSign before it was purchased by
`Symantec) ever since [our] survey began, with it currently accounting for just under a third of all
`
`https://en.wikipedia.org/wiki/Public_key_infrastructure
`
`9/29/2015
`
`DISH, Exh. 1024, p. 2
`
`

`
`Public key infrastructure - Wikipedia, the free encyclopedia
`
`Page 3 of 7
`
`certificates. To illustrate the effect of differing methodologies, amongst the million busiest sites
`Symantec issued 44% of the valid, trusted certificates in use — significantly more than its overall
`market share."
`
`Temporary certificates and single sign-on
`
`This approach involves a server that acts as an online certificate authority within a single sign-on
`system. A single sign-on server will issue digital certificates into the client system, but never stores
`them. Users can execute programs, etc. with the temporary certificate. It is common to find this solution
`variety with X.509-based certificates.[12]
`
`Web of trust
`
`Main article: Web of trust
`
`An alternative approach to the problem of public authentication of public key information is the web-of-
`trust scheme, which uses self-signed certificates and third party attestations of those certificates. The
`singular term "web of trust" does not imply the existence of a single web of trust, or common point of
`trust, but rather one of any number of potentially disjoint "webs of trust". Examples of implementations
`of this approach are PGP (Pretty Good Privacy) and GnuPG (an implementation of OpenPGP, the
`standardized specification of PGP). Because PGP and implementations allow the use of e-mail digital
`signatures for self-publication of public key information, it is relatively easy to implement one's own
`web of trust.
`
`One of the benefits of the web of trust, such as in PGP, is that it can interoperate with a PKI CA fully
`trusted by all parties in a domain (such as an internal CA in a company) that is willing to guarantee
`certificates, as a trusted introducer. If the "web of trust" is completely trusted then, because of the nature
`of a web of trust, trusting one certificate is granting trust to all the certificates in that web. A PKI is only
`as valuable as the standards and practices that control the issuance of certificates and including PGP or a
`personally instituted web of trust could significantly degrade the trustability of that enterprise's or
`domain's implementation of PKI.[13]
`
`The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for
`PGP version 2.0:
`
`As time goes on, you will accumulate keys from other people that you may want to
`designate as trusted introducers. Everyone else will each choose their own trusted
`introducers. And everyone will gradually accumulate and distribute with their key a
`collection of certifying signatures from other people, with the expectation that anyone
`receiving it will trust at least one or two of the signatures. This will cause the emergence of
`a decentralized fault-tolerant web of confidence for all public keys.
`
`Simple public key infrastructure
`
`https://en.wikipedia.org/wiki/Public_key_infrastructure
`
`9/29/2015
`
`DISH, Exh. 1024, p. 3
`
`

`
`Public key infrastructure - Wikipedia, the free encyclopedia
`
`Page 4 of 7
`
`Another alternative, which does not deal with public authentication of public key information, is the
`simple public key infrastructure (SPKI) that grew out of three independent efforts to overcome the
`complexities of X.509 and PGP's web of trust. SPKI does not associate users with persons, since the key
`is what is trusted, rather than the person. SPKI does not use any notion of trust, as the verifier is also the
`issuer. This is called an "authorization loop" in SPKI terminology, where authorization is integral to its
`design.
`
`Blockchain-based PKI
`
`An emerging approach for PKI is to use the blockchain technology commonly associated with modern
`cryptocurrency. Since blockchain technology aims to provide a distributed and unalterable ledger of
`information, it has qualities considered highly suitable for the storage and management of public keys.
`EmerCoin is an example of a blockchain-based cryptocurrency that supports the storage of different
`public key types (SSH, GPG, RFC 2230, etc.) and provides open source software that directly supports
`PKI for OpenSSH servers.
`
`History
`
`Developments in PKI occurred in the early 1970s at the British intelligence agency GCHQ, where James
`Ellis, Clifford Cocks and others made important discoveries related to encryption algorithms and key
`distribution.[14] However, as developments at GCHQ are highly classified, the results of this work were
`kept secret and not publicly acknowledged until the mid-1990s.
`
`The public disclosure of both secure key exchange and asymmetric key algorithms in 1976 by Diffie,
`Hellman, Rivest, Shamir, and Adleman changed secure communications entirely. With the further
`development of high-speed digital electronic communications (the Internet and its predecessors), a need
`became evident for ways in which users could securely communicate with each other, and as a further
`consequence of that, for ways in which users could be sure with whom they were actually interacting.
`
`Assorted cryptographic protocols were invented and analyzed within which the new cryptographic
`primitives could be effectively used. With the invention of the World Wide Web and its rapid spread,
`the need for authentication and secure communication became still more acute. Commercial reasons
`alone (e.g., e-commerce, online access to proprietary databases from web browsers) were sufficient.
`Taher Elgamal and others at Netscape developed the SSL protocol ('https' in Web URLs); it included
`key establishment, server authentication (prior to v3, one-way only), and so on. A PKI structure was
`thus created for Web users/sites wishing secure communications.
`
`Vendors and entrepreneurs saw the possibility of a large market, started companies (or new projects at
`existing companies), and began to agitate for legal recognition and protection from liability. An
`American Bar Association technology project published an extensive analysis of some of the foreseeable
`legal aspects of PKI operations (see ABA digital signature guidelines), and shortly thereafter, several
`U.S. states (Utah being the first in 1995) and other jurisdictions throughout the world began to enact
`laws and adopt regulations. Consumer groups raised questions about privacy, access, and liability
`considerations, which were more taken into consideration in some jurisdictions than in others.
`
`https://en.wikipedia.org/wiki/Public_key_infrastructure
`
`9/29/2015
`
`DISH, Exh. 1024, p. 4
`
`

`
`Public key infrastructure - Wikipedia, the free encyclopedia
`
`Page 5 of 7
`
`The enacted laws and regulations differed, there were technical and operational problems in converting
`PKI schemes into successful commercial operation, and progress has been much slower than pioneers
`had imagined it would be.
`
`By the first few years of the 21st century, the underlying cryptographic engineering was clearly not easy
`to deploy correctly. Operating procedures (manual or automatic) were not easy to correctly design (nor
`even if so designed, to execute perfectly, which the engineering required). The standards that existed
`were insufficient.
`
`PKI vendors have found a market, but it is not quite the market envisioned in the mid-1990s, and it has
`grown both more slowly and in somewhat different ways than were anticipated.[15] PKIs have not solved
`some of the problems they were expected to, and several major vendors have gone out of business or
`been acquired by others. PKI has had the most success in government implementations; the largest PKI
`implementation to date is the Defense Information Systems Agency (DISA) PKI infrastructure for the
`Common Access Cards program.
`
`Uses
`
`PKIs of one type or another, and from any of several vendors, have many uses, including providing
`public keys and bindings to user identities which are used for:
`
`■ Encryption and/or sender authentication of e-mail messages (e.g., using OpenPGP or S/MIME)
`■ Encryption and/or authentication of documents (e.g., the XML Signature [3]
`(http://www.w3.org/TR/xmldsig-core/) or XML Encryption [4] (http://www.w3.org/TR/xmlenc-
`core/) standards if documents are encoded as XML)
`■ Authentication of users to applications (e.g., smart card logon, client authentication with SSL).
`There's experimental usage for digitally signed HTTP authentication in the Enigform and
`mod_openpgp projects
`■ Bootstrapping secure communication protocols, such as Internet key exchange (IKE) and SSL. In
`both of these, initial set-up of a secure channel (a "security association") uses asymmetric key—
`i.e., public key—methods, whereas actual communication uses faster symmetric key—i.e., secret
`key—methods.
`■ Mobile signatures are electronic signatures that are created using a mobile device and rely on
`signature or certification services in a location independent telecommunication environment[16]
`
`Open Source Implementations
`
`■ OpenSSL is the simplest form of CA and tool for PKI. It is a toolkit, developed in C, that is
`included in all major Linux distributions, and can be used both to build your own (simple) CA and
`to PKI enable applications. (Apache licensed)
`■ EJBCA (http://www.ejbca.org) is a full featured, Enterprise grade, CA implementation developed
`in Java. It can be used to set up a CA both for internal use and as a service. (LGPL licensed)
`■ (No longer exists.) TinyCA (http://tinyca.sm-zone.net/) was a graphical interface for OpenSSL.
`■ XCA (http://xca.sourceforge.net/) is a graphical interface, and database. XCA uses OpenSSL for
`the underlying PKI operations.
`■ OpenCA (http://www.openca.org/) is a full featured CA implementation using a number of
`different tools. OpenCA uses OpenSSL for the underlying PKI operations.
`
`https://en.wikipedia.org/wiki/Public_key_infrastructure
`
`9/29/2015
`
`DISH, Exh. 1024, p. 5
`
`

`
`Public key infrastructure - Wikipedia, the free encyclopedia
`
`Page 6 of 7
`
`Criticism
`
`Some argue that purchasing certificates for securing websites by SSL and securing software by code
`signing is a costly adventure for small businesses.[17] Presently Symantec holds a major share in PKI
`certificate market which sold one third of all certificates issued globally in 2013. [18] HTTP/2, the latest
`version of HTTP protocol allows unsecured connections in theory, in practice major browser companies
`have made it clear that they would support this state-of-art protocol only over a PKI secured TLS
`connection. [19] Web browser implementation of HTTP/2 including edge from Microsoft, Chrome from
`Google and Firefox from Mozilla and Opera supports HTTP/2 only over TLS, by using ALPN extension
`of TLS protocol. This would mean that to get the speed benefits of HTTP/2, website owners would be
`forced to purchase SSL certificates controlled by corporations such as Symantec.
`
`Current web browsers carry pre-installed intermediary certificates issued and signed by a Certificate
`Authority. This means browser need to carry a large number of different certificate providers, increasing
`the risk of a key compromise. Further more governments can force certificate providers to give their root
`certificate keys, which in turn would help them to decrypt traffic by doing a man-in-middle-attack.
`
`When a key is known to be compromised it could be fixed by revoking the certificate, but such a
`compromise is not easily detectable and can be a huge security breach. Browsers have to issue a security
`patch to revoke intermediary certificates issued by a compromised root certificate authority.[20] Some
`practical security vulnerabilities of X.509 certificates and known cases where keys were stolen from a
`major Certificate Authority listed below.
`
`■ See PKI security issues with X.509
`■ See Breach of Comodo CA
`■ See Breach of Diginotar CA
`
`References
`
`1. "What is PKI? - A Complete overview , January –23, 2015". Retrieved 2015-02-24.
`2. "What is a Public Key Infrastructure - A Simple Overview , April 17, 2015".
`3. "An Overview of Public Key Infrastructures (PKI)". Techotopia. Retrieved 26 March 2015.
`4. "Public Key Infrastructure". MSDN. Retrieved 26 March 2015.
`5. Adams, Carlisle & Lloyd, Steve (2003). Understanding PKI: concepts, standards, and deployment
`considerations. Addison-Wesley Professional. pp. 11–15. ISBN 978-0-672-32391-1.
`6. Trček, Denis (2006). Managing information systems security and privacy. Birkhauser. p. 69. ISBN 978-3-
`540-28103-0.
`7. Vacca, Jhn R. (2004). Public key infrastructure: building trusted applications and Web services. CRC Press.
`p. 8. ISBN 978-0-8493-0822-2.
`8. Viega, John et al. (2002). Network Security with OpenSSL. O'Reilly Media. pp. 61–62. ISBN 978-0-596-
`00270-1.
`9. McKinley, Barton (January 17, 2001). "The ABCs of PKI: Decrypting the complex task of setting up a
`public key infrastructure". Network World.
`10. Al-Janabi, Sufyan T. Faraj et al. (2012). "Combining Mediated and Identity-Based Cryptography for
`Securing Email". In Ariwa, Ezendu et al. Digital Enterprise and Information Systems: International
`Conference, Deis, [...] Proceedings. Springer. pp. 2–3.
`11. "Mike Meyers CompTIA Security+ Certification Passport", by T. J. Samuelle, p. 137.
`
`https://en.wikipedia.org/wiki/Public_key_infrastructure
`
`9/29/2015
`
`DISH, Exh. 1024, p. 6
`
`

`
`Public key infrastructure - Wikipedia, the free encyclopedia
`
`Page 7 of 7
`
`12. Single Sign-On Technology for SAP Enterprises: What does SAP have to say? [1]
`(http://www.secude.com/html/?id=1890)
`13. Ed Gerck, Overview of Certification Systems: x.509, CA, PGP and SKIP, in The Black Hat Briefings '99,
`http://www.securitytechnet.com/resource/rsc-center/presentation/black/vegas99/certover.pdf and
`http://mcwg.org/mcg-mirror/cert.htm
`14. Ellis J. H., January 1970,The Possibility of Secure Non-Secret Digital Encryption
`(http://cryptocellar.web.cern.ch/cryptocellar/cesg/possnse.pdf)
`15. Stephen Wilson, December 2005, "The importance of PKI today" (http://www.china-
`cic.org.cn/english/digital%20library/200512/3.pdf), China Communications, Retrieved on 2010-12-13
`16. Mark Gasson, Martin Meints, Kevin Warwick (2005), D3.2: A study on PKI and biometrics
`(http://www.fidis.net/resources/deliverables/hightechid/#c1785), FIDIS deliverable (3)2, July 2005
`17. Should We Abandon Digital Certificates, Or Learn to Use Them Effectively?
`(http://www.forbes.com/sites/richardstiennon/2013/05/14/should-we-abandon-digital-certificates-or-learn-to-
`use-them-effectively), Forbes magazine
`18. SSL statistics (http://www.netcraft.com/internet-data-mining/ssl-survey/) Statistics report collected by
`Netcraft, an internet service company in UK
`19. HTTP/2 Frequently Asked Questions (https://http2.github.io/faq/) From Github HTTP/2 wiki
`20. "Microsoft Security Advisory: Fraudulent Digital Certificates could allow spoofing". Microsoft. March 23,
`2011. Retrieved 2011-03-24.
`
`Retrieved from "https://en.wikipedia.org/w/index.php?
`title=Public_key_infrastructure&oldid=683216129"
`
`Categories: Public-key cryptography Key management Computing infrastructure
`
`Public key infrastructure Transport Layer Security
`
`■ This page was last modified on 28 September 2015, at 22:05.
`■ Text is available under the Creative Commons Attribution-ShareAlike License; additional terms
`may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a
`registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
`
`https://en.wikipedia.org/wiki/Public_key_infrastructure
`
`9/29/2015
`
`DISH, Exh. 1024, p. 7

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket