10 - Digital Certificates Flashcards
Man in the middle attack (public key context)
For example, change the public key server to have attacker public key then intercept/decrpyt communications and re-encrypt then pass onto the original destination
Digital signature think of it as
“I certify that Bob’s public key is …”
Signed by someone trustworthy
Public Key Management Issues
- Pub keys have to be distributed
- How do we trust that the key belongs to the person it claims?
- How to revoke a public key? (Compromised private keys for example)
- Keys might have an expiry date
Public keys are usually distributed as…
Digital certificates
Digital Certificates contain:
- Public Key (and which algo)
- Info on identity of the key owner
- One or more digital signatures from entities confirming the public key belongs to the owner
- other info
Methods for distributing public keys for individuals
- Manually or by email etc
- Publish on your webpage
- Certificate servers/directory servers
Methods for distributing public keys for organisations
- Public Key Infrastructure (CAs etc)
- ## Once the cert is issues, org can store on own webserver and send to any client
Digital Certificate formats
- X.509
- OpenPGP (commonly used by individuals)
Publishing to a Certification Authority (and Registration Authority)
- Create key pair
- Submit pub key to CA
- RA associated to the CA verifies the identity (RA is human entity)
- CA issues a certificate which is signed using the CA’s private key.
Domain Validation
CA only checks that you control the domain
Organisation validation
CA also checks existence of the organisation that claims to own the domain
Extended Validation
CA performs extended checks on the org
Who issues the certificate of a CA?
- Other CAs in a hierarchical structure
- CAs sign each other certificates
- CAs sign their own certificates
Certificate Revocation
If a private key has been compromised, the certificate should be revoked:
- Communicate revocation to CA
- Certificate Revocation Lists (CRL) are posted on cert servers
Browsers and CAs
Browsers tore a list of trusted CA’s w/ their certs and public keys.