Page 61 - 2015 Security in Telecommunications and Information Technology
P. 61

SECURITY  IN  TELECOMMUNICATIONS  AND  INFORMATION  TECHNOLOGY


            6       The  role  of  the  Directory  and  the  importance  of  the  ITU-T  X.500  series  of
                    Recommendations

            The ITU-T X.500 series of Recommendations provides specifications for establishment of a directory (referred
            to below as an ITU-T X.500 directory).

            A  directory  is  a  term  for  an  organized  collection  of  information  that  can  be  queried  to  obtain  specific
            information. Within the ITU-T and within the context of security and telecommunications standardization, the
            term  X.500  directory  refers  to  a  repository  of  information  based  on  the  ITU-T  X.500  series  of
            Recommendations that were developed jointly with ISO/IEC. The directory specification is introduced in
            Recommendation ITU-T X.500 and elaborated in Recommendation ITU-T X.501, Recommendation ITU-T
            X.511 specifies the service provided by an X.500 directory.  Recommendation ITU-T X.518 specifies the
            procedure for a distributed directory. Recommendation ITU-T X.519 provides directory protocols to facilitate
            communication and information exchange between entities.  Recommendation ITU-T X.525 specifies how
            directory  information  may  be  replicated.  The  Recommendations  ITU-T  X.520  and  ITU-T  X.521  provide
            metadata for directory information.

            Recommendation ITU-T X.509 is part of the ITU-T X.500 series of Recommendation, but is widely used
            outside a directory context. It provides a framework for both public-key infrastructure (PKI) and for privilege
            management infrastructure (PMI). An X.500 directory may store PKI-related and PMI-related information
            objects to support those infrastructures, and an X.500 directory may use PKI and PMI capabilities to protect
            directory information.


            This section begins with a review of the cryptographic concepts relevant to Recommendation ITU-T X.509.
            This is followed by a discussion of Recommendation ITU-T X.509 and its support of PKI and PMI. The
            security of an ITU-T X.500 directory itself and the need to protect directory information is discussed later.

            6.1     Cryptographic concepts relevant to Recommendation ITU-T X.509


            Cryptography is a key component of both PKI and PMI. Three aspects of cryptography are considered here:

            –       algorithms using both symmetric and asymmetric keys;


            –       hash functions; and

            –       digital signature generation and verification.

            These three areas are described briefly below.


            6.1.1   Symmetric and asymmetric key cryptographic algorithms

            Symmetric (or secret key) cryptography refers to a cryptographic system in which the same key is used for both
            encryption and decryption, as illustrated in Figure 10 (a). In a symmetric cryptosystem, communicating entities
            share a unique secret key. The key must be distributed to the entities by secure means.


            An asymmetric (or public key) cryptography system involves a pair of keys – a public key and a private key.
            The public key can be widely distributed but the private key must always be kept secret by the owning entity.
            The  private  key  is  usually  held  on  a  smart  card  or  on  a  token.  The  public  key  and  the  private  key  are
            mathematically related, but there is no feasible way to derive the private key from the public key.


            There are different types of asymmetric key pairs. Some technologies (such as RSA) allow encryption and
            decryption of data, while other technologies allow only generation and validation of digital signatures.


                                                                             The importance of the Directory  41
   56   57   58   59   60   61   62   63   64   65   66