Key Management🔑 Flashcards

1
Q

What is the purpose of the OCSP protocol?

A

Checking if a certificate is still valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key Management

A

The strength of cryptographic security depends on:

  1. The size of the keys
  2. The robustness of cryptographic algorithms/protocols
  3. The protection and management afforded to the keys

Key management provides the foundation for the secure generation, storage, distribution, and destruction of keys. Key management is essential for cryptographic security. Poor key management may easily lead to compromise of systems where the security is based on cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Usage

A

A single key should be used for only one purpose e.g., encryption, authentication, key wrapping, random number generation, or digital signature generation. Using the same key for two different purposes may weaken the security of one or both purposes. Limiting the use of a key limits the damage that could be done if the key is compromised. Some uses of keys interfere with each other, e.g. an asymmetric key pair should only be used for either encryption or digital signatures, not both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crypto keys are classified according to:

A
  • Private/public or symmetric
  • Their intended use
  • For asymmetric keys, also whether they are static(long life) or ephemeral (short life)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Crypto period

A

The crypto period is the time span during which a specific key is authorized for use.

The crypto period is important because it:

  • Limits the amount of information, protected by a given key, that is available for cryptanalysis.
  • Limits the amount of exposure and damage, should a single key be compromised.
  • Limits the use of a particular algorithm to its estimated effective lifetime.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Factors affecting the crypto periods

A

In general, as the sensitivity of the information or the criticality of the processes increases, the crypto-period should decrease in order to limit the damage resulting from compromise.

Short crypto-periods may be counter-productive, particularly where denial of service is the paramount concern, and there is a significant overhead and potential for error in the re-keying, key update or key derivation process. The crypto-period is therefore a trade-off.

The processing period can continue after the protection period. The crypto-period lasts from the beginning of the protection period to the end of the processing period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key Compromise

A

Key compromise occurs when it is known or suspected that an unauthorized entity has obtained a secret/private key. When a key is compromised, immediately stop using the secret/public key for protection, and revoke the compromised key (pair).

A compromised key might be used for continued processing of protected information. In this case, the entity that uses the information must be made fully aware of the risks involved.

Continued key usage for processing depends on the risks, and on the organization’s Key Management Policy. The worst form of key compromise is when a key is compromised without detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key Protection

A

Active keys should be accessible for authorised users, protected from unauthorised users.
Deactivated keys must be kept as long as there exists data protected by keys.

The policy must specify:

  • Where keys shall be kept
  • How keys shall be kept securely
  • How to access keys when required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PKI provides the (5) following security services…

A
  • Confidentiality
  • Access control
  • Integrity
  • Authentication
  • Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public key Certificates

A

A public-key certificate is a record of data, including the subject distinguished name and its public key, all digitally signed by a CA (Certificate Authority).

  • Binds name to public key
  • An authentic copy of the public key is needed in order to validate the certificate.
  • Relying party validates the certificate (i.e. verifies that the digital signature is correct).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Meaning of trust for PKI

A

Trustworthy: When it is objectively secure and reliable.

Trusted: When we decide to depend on it.

A root certificate is trustworthy when it has been received
securely from a honest + reliable CA.

A root certificate is trusted when it is being used to
validate other certificates.

Ideally, only trustworthy root certificates should be trusted.

In reality, many untrustworthy certificates are trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Browser PKI

A

The browser automatically validates certificates by checking: certificate name = domain name.

Criminals buy legitimate certificates which are automatically validated by browsers.
Legitimate certificates can be used for malicious phishing attacks, e.g. to masquerade as a bank.
Malicious sites can have legitimate certificates !!!
Server certificate validation is only syntactic authentication, not semantic authentication
users can’t know if the domain is good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is X.509?

A

The standard for how the CA creates the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trust Models

A

Strict hierarchical model

Advantages:
works well in highly-structured setting such as military and government
unique certification path between two entities (so finding certification paths is trivial)
scales well to larger systems

Disadvantages:
need a trusted third party (root CA)
single point-of-failure target
If any node is compromised, trust impact on all entities stemming from that node
Does not work well for global implementation (who is root TTP?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital signatures and keys?

A

Digital signature?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asymmetric ciphers

A

Private key need confidentiality
Public key need integrity
Authenticity?

17
Q

User centric PKI trust model

A

Each party signs public keys of others whose keys have been verified to be authentic.
Public keys signed by trusted people can be considered authentic too.

User-centric model (PKI trust models)
Each user is completely responsible for deciding which public keys to trust
Example: Pretty Good Privacy (PGP)
Web of trust
Each user may act as a CA, signing public keys that they will trust
Public keys can be distributed by key servers and verified by fingerprints
OpenPGP Public Key Server: http://pgpkeys.mit.edu:11371/

Advantages:
Simple and free
Works well for a small number of users
Does not require expensive infrastructure to operate
User-driven grass-root operation

Disadvantages:
More effort, and relies on human judgment
Works well with technology savvy users who are aware of the issues. Does not work well with the general public
Not appropriate for more sensitive and high risk areas such as finance and government