Chapter 7 - PKI Flashcards
RSA Equation
• Depends on difficulty of factoring the product of prime numbers.
1. Choose 2 large prime numbers (200+ digits), labeled p and q.
2. Computer product of numbers: n=p*q
3. Select a number, e, that satisfies two requirements:
a. E is less than n
b. E and (n-1)(q-1) are relatively prime
c. Find a number,d, such that (ed-1) mod (p-1)(q-1) = 0
Distribute e and n as the public key to all cryptosystem users
Merkle-Hellman Knapsack
- Like RSA, based on difficulty of performing factoring operations, but relies on component of set theory known as super-increasing sets rather than on large prime numbers.
- Broken in 1984.
El Gamal
- Math principles behind Diffie-Hellman could be extended to support an entire public key cryptosystem used for encrypting and decrypting messages.
- Depends on modular arithmetic.
- Advantage over RSA - released to public domain
- Disadvantage - doubles the length of any message it encrypts - difficult over narrow bandwidth
Elliptic Curve
- Any elliptic curve can be defined by: y2 = x3 + ax + b
- Harder to solve than RSA.
- Depends on elliptic curve algorithm problem and provides more security algorithms when both are used with keys of same length.
- 1024-bit RSA key is same strength as ECC 160-bit key.
5 Hash Requirements
Five requirements:
1. Input can be any length 2. Output has fixed length 3. Hash function relatively easy to compute for any input 4. Hash function is one way 5. Hash function is collision free
SHA-1
- Takes input and produces 160-bit message digest.
* Processes a message in 512-bit blocks. Pads message if it doesn’t fit in increments of 512.
SHA-2
- SHA-256 produces 256 bit message digest using a 512-bit block size.
- SHA-224 uses truncated version of the SHA-256 has to produce a 224-bit message digest using a 512-bit block size.
- SHA-512 produces a 512-bit message digest using a 1024 bit block size.
- SHA-384 uses a truncated version of SHA-512 hash to produce a 384-bit digest using a 1024-bit block size.
MD2
• Developed in 1989 to provide a secure hash function for 8-bit processors.
• Pads length for multiple of 16 bytes.
• Computes 16-byte checksum and appends to end of message.
• 128-bit message digest is then generated using entire original message along with the appended checksum.
• If checksum is not appended to message before digest computation, collisions may occur.
Proved not a one way function.
MD4
• Enhanced to support 32-bit processors.
• Padded to ensure that the message length is 64 bits smaller than a multiple of 512 bits.
• Processes 512-bit blocks in three rounds of computation
Final output is 128-bit digest.
MD5
Processes 512 bit blocks of the message, but uses 4 rounds of computation to produce digest of 128 bits.
HMAC
• Hashed Message Authentication Code - implements partial digital signature.
• Guarantees integrity but not nonrepudiation.
Can be used with any message digest algorithm, by using shared key.
DSS Digital Signature Standard
• 3 approved standard encryption algorithms
○ Digital Signature Algorithm (DSA) as specified in FIPS 186-4
○ RSA as specified in ANSI X9.31
Elliptic Curve DSA (ECDSA) as specified in ANSI X9.62
X.509 Certs Contain
○ Version of X.509 to which certificate conforms
○ Serial number (from certificate creator)
○ Signature algorithm identifier (specifies the technique used by the certificate authority to digitally sign the contents of the certificate)
○ Issuer name (CA that issued cert)
○ Validity period (starting and ending dates and times)
○ Subject’s name (DN, distinguished name of entity that owns public key)
Subject’s public key (meat of cert - actual public key used to set up secure communications)
Email Encryption - PGP
• Phil Zimmerman - 1991.
• Web of trust concept - must be trusted by a user to use the system.
• Initially couldn’t be exported outside the country.
• Two versions:
○ Commericial uses RSA for key exchange, IDEA for encryption, MD5 for message digest production.
○ Freeware uses Diffie Hellman key exchange, Carlisle Adams/Stafford Tavares (CAST) 128-bit encryption, and SHA-1 hasing.
Email Encryption - SMIME
- Standard for email encryption
- Uses RSA
- Incorporated in outlook, thunderbird, mac os x mail
- Relies on x.509 certs for exchanging cryptographic keys
- Supports AES, 3DES
- Technical limitations - doesn’t work with web based email (must have browser extension)