Chapter 9i: Public Key Infrastructures Flashcards

1
Q

Why do we need PKIs?

  • Advantage of asymmetric crypto: …
  • This allows users to distribute public keys via arbitrary channels, e.g.,
    (1)
    (2)
  • Problem: Who ever utilizes another entities public key must be sure that ….
A

Public keys are not required to be kept secret

1* Alice retrieves Bob’s public key from a mail sent by Bob
2* Bob downloads Alice’s public key from her web site

this public key really belongs to this entity → is authentic → can be trusted!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do need PKIs?

  • Imagine: MitM Eve has exchanged the public keys with keys controlled by her
  • Neither Alice nor Bob can spot that the key they have received is not authentic
  • As Eve owns the private keys, what can she do now?
A
  • compute signatures in the name of Alice and Bob
  • decrypt / re-encrypt confidential messages exchanged between Alice and Bob
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why we need PKIs : How to establish “trust” in a public key?

Manual trust establishment: Alice and Bob exchange their keys via some method.

Explain the idea behind a PKI.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates: The essence of PKI

Definition:

Semantics of the binding: What does the identifier refer to?
What’s always necessary? What do we need to do if the identifier is a name?

A

A certificate is a digitally signed binding of an identifier of an entity and the public key of an asymmetric key pair owned by that entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certificate creation

PKIs are created by issuing certificates between entities. Illustrate.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common forms of PKI

We can now classify PKIs by looking at:

  • Who are the issuers?
  • Which issuers must be trusted = which TTPs exist?
  • How do issuers verify that X and KX-pub belong together, or that X is really X?

Explain the terminology: “issuer”, CA, “Endorser”.

A
  • Depending on the PKI, different words for “issuer” exist
  • Often in hierarchical PKIs: “Certification Authority” (CA)
  • In non-hierarchical PKIs sometimes: “Endorser”
  • These words often hint at the role (power) of the issuers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hierarchical PKIs

Why is this impractical?

A
  • Who decides which global authority is trustworthy for the job?
  • What are the agreed verification steps of an identity?
  • Hard to imagine any government would rely on an authority outside its legal reach.
  • The high load on the CA, might make it easier to trick the CA into mis-issuing a certificate.
  • Single point of failure/attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the role of RAs?

A

Note:
* Registration Authorities are indeed used today by large CAs
* Example: TUM operates a CA for web and mail certificates,
multiple RAs exist for the different faculties and institutes
* RA for informatics: RBG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hierarchical PKIs: ‘Practical’ solutions to the problem

Many CAs :

Defining CAs as trusted:
* A CA must be trusted by participants in order to be useful
* How should participants decide which CAs to trust?
* “Solution”: ….

A
  • One global CA is infeasible, even with RAs → Let us use many CAs, in different legislations.
  • Should we accept them all equally? → No.

operating systems and software like browsers come pre-configured with a set of trusted CAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Webs of Trust may also take many forms:

A
  • Trust metrics to automatically reason about authenticity of bindings between entity and key
  • E.g. introduce rules how many delegations are allowed, store explicit trust values, etc.
  • CAs may act as ‘special’ participants
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Currently deployed PKIs:

  1. Hierarchical PKI(s) with many CAs
  2. Webs of trust

Explain.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly