Lec 5: Authentication and Key Distribution Flashcards
What do you use when you want to provide evidence that an object is authentic? What does authentic mean?
- providing evidence that an object is authentic == wanting to provide evidence that an object was endorsed by a particular person
- you use signatures
What do you use when you want to provide evidence that you are who you say you are?
authentication protocols
Consider a paper check used to transfer money from one person to another. What are the properties of the checks and the physical signatures on the checks?
- Signature confirms authenticity
- only legitimate signer can produce signature (Arguable) - in case of alleged forgery
- 3rd party can verify authenticity (arguable) - Checks are cancelled
- so they can’t be reused - Checks are not alterable
- or alterations are easily detected
What are the requirements for digital signatures?
- a mark that only one principal can make, but others can easily recognize
- unforgeable
- if P signs a message M with signature S{P,M} it is computationally infeasible for any other principal to produce the pair (M, S{P,M}) - authentic
- if R receives the pair (M, S{P,M}) purportedly from P,R can check that the signature relaly is from P - Not alterable
- after being transmitted, (M, S{P,M}) cannot be changed by P, M, or an interceptor - Not reusable
- a duplicate message will be detected by the recipient
How do digital signatures with shared keys work?
How does RSA work (Digital Signatures with Public Keys)
RSA is commutative:
- D(E(M, K), k) = E(D(M, k), K)
Opposite from normal use of PK as cipher
◆ Let KA be Alice’s public key
◆ Let kA be her private key
◆ To sign msg, Alice sends D(msg, kA)
◆ Bob can verify the message with Alice’s public key
Works! RSA: (me)d = med = (md)e
What are the advantages and disadvantages of digital signatures with public keys? What is the Alice and Bob drawing that shows how digital signatures with public keys works?
What are the variations on public key signatures?
How do A and B convince each otehr that they are each A and B?
- cryptographic authentication protocols
What is the threat model of communication over a network as it relates to cryptographic protocols?
What is the general definition of “protocol”?
What can the interceptor do?
What is an arbitrator and how do they affect protocols (arbitrated protocols)?
What are real-world examples of arbitrated protocols and what are the issues with arbitrated protocols?
How do adjudicated protocols work?
How do self-enforcing protocols work?
Is the shared key digital signature algorithm an arbitrated or adjudicated protocol?
arbitrated
Is trusted 3rd party provided authenticity an arbitrated or adjudicated protocol?
arbitrated
is public key digital signature algorithm an arbitrated or adjudicated protocol?
adjudicated
What is trusted 3rd party provided non-repudiation mean? Is it an arbitrated or adjudicated protocol?
- Bob can keep Alice’s digitally signed message
- adjudicated
What is the goal of authentication?
What are the threats to authentication?
What situation would we use shared-key authentication?
How does weak authentication work?