Digital Signatures and PKI Flashcards

1
Q

What is a digital signature?

A

A digital signature is a certificate that binds a public key to an entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who verifies a digital signature?

A

The certificate that is verified by certificate authorities or trusted third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What properties must digital certificates have?

A

Unforgeable
Authentic
Unalterable
Non-reusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a digital certificate contain to preserve its required properties

A

A message digest (Unalterable)

Encryption via the private key which is unencrypted using the public key (Authentic & Unforgeable)

Label to show identity of the sender (Authentic)

Timestamp for non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process that a sender goes through when sending a digital signature?

A
Hash the message
Encrypt using private key
Add expiration dates, serial numbers etc
Authenticate message
Send
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the process that a receiver goes through when receiving a digital signature?

A

Separate digital signature from the message
Decrypt the signature using the sender’s public key
Hash the message and compare the decrypted hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is confidentiality of the message preserved when using digital signatures?

A

A random key can be encrypted using the receiver’s public key and sent with the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PGP?

A

The Pretty Good Privacy Protocol allows common users access to encryption. Uses two key concepts:

1) A key is only valid iff it’s owned by the person who claims to own it.
2) Trust is a mechanism to validate a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are certificates issued in PGP?

A

Certificates are self-signed, and certificates that you trust are signed by you. There is no high-level authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four levels of trust in PGP?

A

Implicit trust
Full trust
Marginal trust
Untrusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is implicit trust?

A

Reserved for only your own keys. If the keyring contains a private key that signed a public key then you trust that public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is full trust?

A

Keys that are provided by full trust user are trusted without extra verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is marginal trust?

A

Keys provided by this user need to be vouched by at least one other user in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are untrusted users treated in PGP?

A

Keys from this user are disregarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a PKI?

A

Set of policies, procedures and products to aid in trusted communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does PKI allow for pervasive security infrastructure?

A

By allowing for trusted communications over an untrusted public network

17
Q

What happens to trust when using PKI?

A

Trust is moved to authorities in the network from individuals. Users must trust that the chain is integral.

18
Q

How are messages authenticated and kept confidential?

A

Messages are authenticated by using digital signatures and can be kept confidential by using a session key.

19
Q

What are the five stages of PKI certificates go through?

A
Construction
Issuance
Signing
Confirmation/Denial
Invalidation
20
Q

What do certificate authorities do?

A

Trustworthy roots of the network that certify user identity through registration, binding public keys to identity.

All certificates in the network depend on the root nodes.

21
Q

What is the certification revocation list?

A

List of certificates that have been revoked in the network. Suffers from propogation delay.

22
Q

What do certificates consist of?

A

Public key
Name of owner
Hash of name & key

23
Q

What is X.509?

A

Standardized format for the issuing of certificates.

24
Q

What is contained in an X.509 certificate?

A

Serial Number: Used to uniquely identify the certificate.
Subject: The person, or entity identified.
Signature Algorithm: The algorithm used to create the signature.
Signature: The actual signature to verify that it came from the issuer.
Issuer: The entity that verified the information and issued the certificate.
Valid-From
Valid-To
Key-Usage: Purpose of the public key (e.g. encipherment, signature, certificate signing…).
Public Key: The public key.
Thumbprint Algorithm: The algorithm used to hash the public key.
Thumbprint: The hash itself, used as an abbreviated form of the public key

25
Q

What are some of Schneir’s identified risks?

A

How secure is the verifying computer
Which John Robinson is he
How was the certificate holder identified