The GemSAFE User Guide provides simple, easy–to–follow instructions
to install, configure, and use GemSAFE 2.1 and the GemSAFE Card Details
Tool, a simple administration tool for GemSAFE cards.
The GemSAFE User Guide addresses topics to effectively use GemSAFE.
The guide does not address all browser–specific topics related to using digital
certificates. Refer to your browser documentation for additional information.
The GemSAFE User Guide was validated on the Windows 2000 platform
with the following versions of Microsoft and Netscape applications: Outlook
Express 5.0, Outlook 2000, Microsoft Internet Explorer 5.0, and Netscape
Communicator 4.6.1.
If you are using a different platform or different versions of Microsoft
or Netscape applications, you may encounter different options regarding
the management and use of your digital certificates.
The GemSAFE Quick Start Guide and GemSAFE User Guide are located in the
\Doc folder of the GemSAFE CD–ROM. You can also refer to GemSAFE
Online Help for quick and easy task instructions. Access GemSAFE Online Help
from the GemSAFE CD–ROM.
NOTE: Use Adobe Acrobat Reader to view all documentation on the GemSAFE
CD–ROM. You can download Acrobat Reader from Adobe’s Web site at
www.adobe.com/acrobat.
1
GEMSAFE BASICS
What Is
What Is a
Learn basic information about GemSAFE, smart cards, public key cryptography,
and current IT standards.
GemSAFE is a smart card−based solution designed to secure e−mail
communication and Internet transactions. The GemSAFE smart card supports
GemSAFE?
encryption/decryption and signature functions. GemSAFE for Windows 2000
also supports secure logon and the capability to sign Office 2000 macros.
The encryption/decryption function enables you to send and receive secure
e–mail to protect confidential or private information. You can use the signature
function to sign your messages. By signing messages, you can prove to the
recipient that you are who you claim to be.
GemSAFE combines the privacy, integrity, and authentication functionalities
provided by cryptographic algorithms with the simplicity, portability, and
convenience of smart cards. Your private key, digital certificate, and other
personal information are securely stored on your GemSAFE card to prevent
fraudulent use of your electronic identity.
The latest industry standards such as SSL3 (for Web access) and S/MIME
(for e−mail) enable inter−operability of security services between any browser
interface and any Web server. However, the security hole in SSL3 and S/MIME
is the management of your private key and digital certificate. Without
GemSAFE, your private key and digital certificate are stored on your hard drive,
which makes them susceptible to unauthorized access and fraudulent use.
Without GemSAFE, your electronic identity is at risk.
Smart Card?
GemSAFE provides double–barreled security! With GemSAFE, you get the
hardware–based security inherent in smart cards and the software–based security
of PIN codes. Hardware–based security is a principal security advantage. It is
significantly more secure than software–only solutions. Without possession of
your smart card and knowledge of your PIN code, no one can use your identity.
GemSAFE is your electronic passport to the digital world.
• Your private key never leaves your smart card.
• The smart card is hardware–based security.
• The PIN code protects key use.
• GemSAFE is portable and convenient.
Smart cards are the latest addition to the IT world. The smart card is the size
of a conventional credit card. But unlike the credit card, which has a magnetic
stripe, the smart card has a silicon microprocessor chip to store and process
electronic data and applications. The advantage of the smart card is SECURITY.
2
GEMSAFE BASICS
Onboard Key
Increased
Gemplus manufactures two types of smart cards: contact and contactless.
Contact smart cards must be inserted into a smart card reader. Contactless smart
cards use a microprocessor chip and antenna to process data.
Smart cards provide the most sophisticated security available on the market.
Your GemSAFE card stores your private key and digital certificate. In the past,
your only option was to store your private key on your local hard drive,
rendering it susceptible to theft and fraudulent use. With GemSAFE, your
electronic identity is secure. You must have both the card and PIN code to use
the card.
The GemSAFE card is tamper resistant. The structure and operating system
of the card make it practically impossible to penetrate, probe, or pilfer card data.
Perhaps the most convenient aspect of the GemSAFE smart card is portability.
With GemSAFE, you can carry your electronic passport with you at all times
and use it on any GemSAFE–equipped computer in the world.
What Is the
GemSAFE
Smart Card?
Generation
Certificate
Storage
The GemSAFE smart card has a robust and flexible design. Three specific
features offer greater freedom and enhanced security.
The GemSAFE card offers onboard key generation. With this feature, every time
you enroll a new certificate on your card, a NEW key pair is generated on your
card. In other words, you are not limited to using the same key pair for every
certificate that you enroll.
One significant advantage of onboard key generation is the ability to monitor
and control the life span of your RSA key pairs.
You can store up to four key pairs and four digital certificates on your
GemSAFE card. This feature provides the convenience of using up to four
digital certificates for whatever purposes you want. For example, you can use
one certificate and key pair with strong encryption (1024–bit RSA key pair)
to communicate securely with contacts in the United States and Canada.
You can then use a second certificate and key pair (512–bit RSA key pair)
to communicate securely with international contacts.
Another reason for obtaining more than one digital certificate is the level
of certification the Certificate Authority (CA) requires. You may want
to obtain and use a digital certificate from a CA that requires stringent identity
certification if you are using the certificate for sensitive business
communications or financial transactions. If, however, you want to encrypt/sign
data for personal communications, you may decide that a certificate from a CA
that requires minimal identity certification meets your needs.
The costs of obtaining a digital certificate from a CA are, somewhat, based on
the degree of identity certification the CA requires. Therefore, it would be to
your advantage to obtain two digital certificates each which meets your
particular security needs.
3
GEMSAFE BASICS
Increased
Signature and
Unwrap
What Is
Public Key
Cryptography?
There are two versions of the GemSAFE smart card: US/Canada and
international. Both cards offer onboard key generation and store up to four key
pairs and four certificates.
The difference between the US/Canada and international versions of the
GemSAFE smart card is the length of the key pairs that you can generate
on the card.
The US/Canada version offers the potential to generate two 512–bit and two
1024–bit RSA key pairs for encrypting and signing.
The international version offers the potential to generate three 512–bit RSA key
pairs for signing and encrypting data. The international version also offers the
potential to generate one 1024–bit RSA key pair for signing data. You cannot
use the international GemSAFE smart card to encrypt data with a 1024–bit RSA
key pair.
Public key cryptography, or asymmetric cryptography, is the most advanced,
secure cryptosystem for encryption and digital signatures. Traditional
cryptography, symmetric cryptography, uses the same key to encrypt and
decrypt data. Public key cryptography relies on a matched key pair to encrypt
and decrypt data.
Introducing the public key removes the need for the sender and recipient to share
or transmit the single secret key used in symmetric cryptography. Therefore,
public key cryptography is significantly more secure than traditional
cryptosystems.
Each user owns an RSA key pair. One key is private; one key is public.
•The private key remains private and accessible only to the owner
of the key pair.
•The public key is made available by the owner of the key pair
to public users.
Each key performs a one–way transformation on the data. One key is the inverse
function of the other; so what one key does, only the other can undo.
To send and receive secure data, the sender encrypts the data using the intended
recipient's public key. Only the recipient's private key can decrypt the data. The
sender also signs the data to provide the recipient with a means of authenticating
the message.
The private and public keys are always mathematically linked. Therefore, it is
possible but not practical to attack the public key cryptosystem and derive the
value of the private key after it has been used numerous times. To avoid
cryptoanalysis, key pair owners should define an appropriate key pair life cycle.
The shorter the key length, the shorter the key pair life cycle.
4
What Is a
Key Pair?
GEMSAFE BASICS
Public key cryptography provides:
Authentication which corroborates the identity of an entity or source
of information.
Confidentiality which protects data from view or access by unauthorized
individuals.
Access Control which restricts access to resources to privileged entities.
Data Integrity which ensures information has not been altered by unauthorized
or unknown means.
Non–Repudiation which prevents the denial of previous commitments
or actions.
A key pair is a matched set of keys used to encrypt/decrypt or sign message data.
One key is the inverse of the other key. As such, what one key does only the
other key can undo. For instance, if one key is used to encrypt a message,
the only way to decrypt the message is to use the matching key.
GemSAFE uses two types of keys:
• Session keys (symmetric)
• RSA keys (asymmetric)
Session keys are single. They do not occur in pairs. The session key is used
to encrypt/decrypt actual message data. They are included in the cryptographic
functionality of both Microsoft IE and Netscape Communicator.
The maximum session key length for US/Canada versions of Microsoft IE
and Netscape Communicator is 128 bits. The maximum session key length
for international versions is 40 bits. Session key lengths are specified in your
browser. You can change the session key length by choosing a different
encryption algorithm within your browser. You may need to reduce the
encryption strength if you are communicating securely with international
contacts.
Session keys are shorter in length than RSA keys, which reduces the amount
of time to encrypt/decrypt message data. It is not practical to encrypt/decrypt
the entire message text using RSA keys.
Although session keys are shorter in length than RSA keys, message security
remains robust. After the entire message text is encrypted using the session key,
the session key is encrypted using the RSA private key.
GemSAFE uses RSA keys to sign data and encrypt/decrypt the session key.
Using RSA keys to encrypt the session key ensures the greatest security
at the greatest speed and convenience.
5
GEMSAFE BASICS
Are There
Different
Security Levels?
GemSAFE offers two versions, each which have different security levels due to
export restrictions. The security level is directly related to the RSA key pair
length. The longer the key length, the greater the security level.
US/Canada
GemSAFE for US/Canada markets includes a smart card that can store four
certificates and key pairs. The key pairs on your smart card can include two
512–bit key pairs and two 1024–bit key pairs. Key pairs have the potential
to unwrap a maximum of 512 bits; however, browser limitations result in a
maximum unwrap capability of 128 bits.
International
GemSAFE for international markets includes a smart card that can store four
certificates and key pairs. The key pairs on your smart card can include three
512–bit key pairs for encryption/decryption and signature functions and one
1024–bit key pair for signing. Key pairs have the potential to unwrap a
maximum of 512 bits; however, browser limitations result in a maximum
unwrap capability of 40 bits.
Unwrap capacity refers to the length of the session (symmetric) keys that
encrypt the actual message data. Encrypting the entire message data using RSA
keys is not feasible due to time requirements. RSA keys are used to
encrypt/decrypt the session key.
It is important to know the cryptographic capacity of the person with whom you
communicate securely. Though you may be able to encrypt and send data using
the recipient's public key; the recipient may not be able to use your public key to
encrypt and send data to you.
What Is a Digital
Certificate?
For example, you may be able to generate a session key with a length of 128
bits. However, if the recipient is restricted to international key length limitations,
40 bits, the message cannot be decrypted.
NOTE: Key length export restrictions are for encryption only. There is no key
length restriction when keys are used for authentication purposes only. However,
GemSAFE was designed to be compliant with Microsoft and Netscape e–mail
and browser applications, all of which are subject to key length restrictions.
A digital certificate is a digital document that serves as your electronic passport.
Your digital certificate stores your public key and other personal information
about you and the certificate.
The most widely accepted standard for digital certificates is defined by
International Telecommunications Union standard ITU–T X.509. Version three
is the most current version of X.509.
The X.509v3 certificate includes the following data fields:
• Version
• Serial number
• Signature algorithm ID
• Issuer name
6
GEMSAFE BASICS
What Are
• Expiration Date
• User name
• User public key information
• Issuer unique identifier
• User unique identifier
• Extensions
• Signature on the above fields
The public key in your digital certificate is signed by a trusted third party, or
Certificate Authority (CA).
As a convenience to recipients, it is standard practice to attach your digital
certificate to every secure e–mail that you send. The recipient uses your public
key, which is in your digital certificate, to encrypt e–mail addressed to you. If
you do not attach your digital certificate to outgoing e–mails, recipients must
retrieve your public key from a public directory.
Upon receiving a secure e–mail from you, recipients use the digital certificate to
authenticate your public key. The recipient then uses the public key to verify the
actual message. Only the CA public key is centrally stored and widely
publicized.
Certificate
Authorities?
What Is a Digital
Signature?
Certificate Authorities (CAs) are trusted third parties that issue digital
certificates to individuals. CAs vouch for the identity of the individual to whom
they are issuing a certificate.
When you obtain your digital certificate, you provide the CA with your public
key and the personal information requested by the CA. The CA verifies the
information and checks the integrity of the public key. After the CA verification
process, the CA issues your digital certificate.
Many CAs issue certificates with varying levels of identification requirements.
CA policies and the level of identification of the digital certificate determine the
method and requirements for proving your identity to the CA. The most simple
digital certificate only requires your e–mail address and name. However, some
CAs require a driver's license, notarized certificate request form, or other
personal documentation attesting to your identity. Some CAs may even require
biometric data such as fingerprints.
The CA certificate must be widely available so that users can validate the
authenticity of its public key. If a CA does not make its certificate available, it
must provide a certificate from a higher–level CA to provide users a means of
verifying its public key. As a result, certification hierarchies are created.
A digital signature is a piece of information created using message data and the
owner's private key. Digital signatures provide message authentication, non–
repudiation of origin, and data integrity.
7
What Is
S/MIME?
GEMSAFE BASICS
Digital signatures are typically created using hash and private signing functions.
The one–way hash function produces a message digest, or fingerprint,
a condensed version of the original text. The message digest is encrypted using
the private key of the sender, turning it into a digital signature.
The digital signature can only be decrypted using the public key of the same
sender. The recipient of the data decrypts the digital signature and compares the
result with a message digest recalculated from the original message text. If the
two are identical, the message has not been tampered with. It is authentic.
Secure/Multipurpose Internet Mail Extensions (S/MIME) is an open protocol
standard developed by RSA Data Security, that provides encryption and digital
signature functionality to Internet e–mail. S/MIME uses public key cryptography
standards to define e–mail security services.
S/MIME makes it possible for you to encrypt and digitally sign Internet e–mail
using Web messaging applications such as Microsoft Outlook, Microsoft
Outlook Express, and Netscape Messenger. S/MIME also enables you to
authenticate incoming messages.
S/MIME provides the following security functions.
What Is SSL?
Message Encryption to ensure that your messages remain private. Netscape
Messenger and Microsoft Outlook Express support domestic and export–level
public key and symmetric key encryption.
Sender Authentication to verify the sender's identity. By reading the sender's
digital signature, the recipient can see who signed the message and view the
certificate for additional details.
Data Integrity to guard against unauthorized manipulation of messages.
S/MIME uses a secure hashing function to detect message tampering.
Interoperability to work with other S/MIME–compliant software.
Secure Sockets Layer (SSL), developed by Netscape Communications and RSA
Data Security, is a standard security protocol that provides security and privacy
on the Web. The protocol allows client/server applications to communicate
securely. SSL uses both asymmetric (public key cryptography) and symmetric
cryptography to provide Web security.
The SSL protocol is application independent, which enables higher–level
protocols such as HyperText Transfer Protocol (HTTP) to be layered on top of it
transparently. Therefore, the SSL protocol can negotiate encryption and
authentication with the server before data is exchanged by the higher–level
application.
The SSL Handshake Protocol process includes two phases:
1. Server Authentication in which the client requests the server's certificate.
In response, the server sends its digital certificate and signature. The
certificate provides the server's public key. The signature proves that the
server currently has the private key that corresponds to the certificate.
8
GEMSAFE BASICS
2. Client Authentication (optional) in which the server requests the client's
certificate. In response, the client sends the digital certificate and signature
to the server.
The SSL process is repeated for every secure session you attempt to establish
unless you specify a permanent session. The SSL process will not proceed if the
Web server's certificate is expired.
SSL provides the following security functions.
Data Encryption to ensure data security and privacy. Both public key and
symmetric key encryption is used to achieve maximum security. All traffic
between an SSL server and SSL client is encrypted using both public key and
symmetric key algorithms. Encryption thwarts the capture and decryption of
TCP/IP sessions.
Mutual Authentication to verify the identities of the server and client.
Identities are digital certificates. The entity presenting the certificate must
digitally sign the data to prove ownership of the certificate. The combination
of the certificate and signature authenticates the entity.
Data Integrity to ensure that SSL session data is not manipulated en route. SSL
uses mathematical functions, or hash functions, to provide the integrity service.
9
GETTING STARTED
Peripherals
E–mail Account
The
GemSAFE Kit
Requirements
Platform
GemSAFE includes:
• GemSAFE smart card
• Gemplus smart card reader
• CD–ROM with GemSAFE software and documentation
GemSAFE requires one of the following platforms:
• Windows 95 (16 MB RAM)
• Windows 98 (16 MB RAM)
• Windows 2000 (64 MB RAM) RC2 or higher
• Windows NT 4.0 SP3, SP4, SP5 (32 MB RAM)
GemSAFE requires the following peripherals:
• 10 MB hard drive space available
• Available COM or PCMCIA port
• CD–ROM drive
Browser
•PS/2 keyboard
GemSAFE also requires a Web browser. Minimum versions:
• Microsoft IE 4.01
• Netscape Communicator 4.5
NOTE: If you do not have either minimum version, you can obtain a standard
or strong key length version from Microsoft at www.microsoft.com or Netscape
at www.netscape.com.
In order to use the secure e–mail application provided with your Web browser,
you need one of the following types of Internet e–mail accounts:
• Post Office Protocol (POP) 3 account
• Internet Message Access Protocol (IMAP)–compatible account
NOTE: You only need an e–mail account if you want to take advantage of the
signature and encryption/decryption capabilities offered by GemSAFE.
10
Loading...
+ 32 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.