Digital Signatures and PKI Flashcards
What is a digital signature?
A digital signature is a certificate that binds a public key to an entity.
Who verifies a digital signature?
The certificate that is verified by certificate authorities or trusted third parties.
What properties must digital certificates have?
Unforgeable
Authentic
Unalterable
Non-reusable
What does a digital certificate contain to preserve its required properties
A message digest (Unalterable)
Encryption via the private key which is unencrypted using the public key (Authentic & Unforgeable)
Label to show identity of the sender (Authentic)
Timestamp for non-repudiation
What is the process that a sender goes through when sending a digital signature?
Hash the message Encrypt using private key Add expiration dates, serial numbers etc Authenticate message Send
What is the process that a receiver goes through when receiving a digital signature?
Separate digital signature from the message
Decrypt the signature using the sender’s public key
Hash the message and compare the decrypted hash
How is confidentiality of the message preserved when using digital signatures?
A random key can be encrypted using the receiver’s public key and sent with the message
What is PGP?
The Pretty Good Privacy Protocol allows common users access to encryption. Uses two key concepts:
1) A key is only valid iff it’s owned by the person who claims to own it.
2) Trust is a mechanism to validate a key.
How are certificates issued in PGP?
Certificates are self-signed, and certificates that you trust are signed by you. There is no high-level authority
What are the four levels of trust in PGP?
Implicit trust
Full trust
Marginal trust
Untrusted
What is implicit trust?
Reserved for only your own keys. If the keyring contains a private key that signed a public key then you trust that public key
What is full trust?
Keys that are provided by full trust user are trusted without extra verification.
What is marginal trust?
Keys provided by this user need to be vouched by at least one other user in the network.
How are untrusted users treated in PGP?
Keys from this user are disregarded
What is a PKI?
Set of policies, procedures and products to aid in trusted communications