L6 - Introduction to Cryptographic Protocols Flashcards
What is a protocol?
a series of steps,
involving two or more
parties,
designed to accomplish a task
What is an arbitrator?
A disinterested third party,
trusted to complete the protocol.
What is the purpose of an arbitrator?
Arbitrators can help complete protocols between parties
that don’t trust each other
Name three examples of real-world arbitrators.
Banks
Public Notaries
Lawyers
What are problems with arbitrators in the virtual world?
- It’s more difficult for people to trust a faceless entity
- An arbitrator can become a bottleneck, as he has to deal with every transaction (-> delays)
- Lots of damage can be caused if arbitrator is subverted
- Someone has to pay for running an arbitration service
What is an adjudicator?
An arbitrator that only gets activated in case of disputes.
What is the reason for using adjudicated protocols?
Arbitrators have high costs, so arbitrated protocols can be split into two sub-protocols:
- A non-arbitrated part
- An arbitrated part that is executed only if there is a dispute = adjudicated protocol
What is a real-world example of an adjudicator?
Judges:
Example: Alice and Bob can enter a contract without a judge; a judge only sees the contract if it is brought before a court
How do adjudicated protocols in the virtual world deter someone from cheating?
- if someone SUSPECTS cheating, the protocol
provides enough evidence to be able to detect this - In a good adjudicated protocol, this EVIDENCE also identifies the cheating party
- Instead of PREVENTING cheating, adjudicated protocols DETECT cheating
- The inevitability of detection acts as a deterrent
What is a self-enforcing protocol?
- a self-enforcing protocol does not need an arbitrator or adjudicator
- the protocol itself guarantees fairness
How do self-enforcing protocols work?
- If one party tries to cheat, the other party is able to detect this immediately
- the protocol then stops and/or punishes the cheating party
What is an example of a self-enforcing protocol?
dividing up things, e.g. a cake
1 Alice divides up the piece of cake
2 Bob chooses which piece to take
Name three applications of protocols involving cryptography.
- secure communication
- user authentication
- key exchange
What could a SYMMETRIC cryptographic protocol look like?
1) Alice and Bob agree on a cryptosystem
2) Alice and Bob agree on a key
3 Alice encrypts her plaintext message using the
cryptosystem and key
4) Alice sends ciphertext to Bob
5) Bob decrypts ciphertext using the cryptosystem and
key
Name two potential problems (for world-spanning communication) in a SYMMETRIC cryptographic protocol which arise from the fact that Alice on Bob’s agreement on a key has to take place in secret?
Key management
Compromised Secrecy
How does one generally calculate the number of keys required in a SYMMETRIC cryptographic protocol?
(n/2)(n − 1)
Explain how COMPROMISED SECRECY would be problematic in a SYMMETRIC cryptographic protocol used for world-spanning communication.
If the key is compromised, then
– Eve can decrypt all messages encrypted with that key
– Mallory could intercept messages and send his own,
pretending to be Alice or Bob
– This protocol assumes that Alice and Bob trust each other: Either one could claim that the key has been compromised and publish the communication anonymously
Explain how KEY MANAGEMENT would be problematic in a SYMMETRIC cryptographic protocol used for world-spanning communication.
– If each pair of users in a network have their own key
then the total number of keys increases rapidly with the
number of users
– Sharing keys among users is not a solution:
If someone leaves the network or is not trusted anymore, all users sharing keys with that person have to change their
keys
Conventionally, which are the Dramatis Personae in cryptographic protocols?
Alice: 1st participant Bob: 2nd participant Carol, Dave: more participants for multi-party protocols Eve: Eavesdropper Mallory: malicious active attacker Trent: trusted arbitrator
What could communication with an ASYMMETRIC cryptographic protocol (public-key cryptosystem) look like?
1) Alice and Bob agree on a public-key cryptosystem
2) Bob sends Alice his public key
3) Alice encrypts her plaintext message using Bob’s public key
4) Alice sends ciphertext to Bob
5) Bob decrypts ciphertext using his private key