Lecture 8 - Certificates Flashcards

1
Q

What is the Attack Based on Public Key, Details of the Attack & can you draw the attack diagram?

A
  • Man-in-the-middle attack
  • The public key stored in a server (for instance) may be hacked, or replaced during transmission
  • Attacker replaces it with the public key of a keypair generated by him
  • Attacker can then intercept the (encrypted) message and decrypt with his matching private key
  • He can also re-encrypt the (possibly modified) message with Bob’s (real) public key and send it along
  • Similar attack for authentication (need sender’s public key to decrypt)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the solution to attacks on public keys systems, explain what it is and draw a diagram about it?

A
  • Solution: Certificate
  • Concretely, a certificate is a signed file:
  • Containing the public key of a subject, some information about the subject, and some information about the issuer of the certificate
  • This is signed by the private key of the issuer (a trusted entity)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to Use Certificates and draw the diagram?

A
  • Obtains the certificate, decrypts it with the issuer’s (trusted entity’s) public key
  • Digest protects public key from modification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Do Certificates Work & Does this really solve the problem?

A
  • Depends on the trustworthiness of the certificate issuer
  • Does this really solve the problem?
    • To decrypt the certificate, you need the issuer’s public key. How to ensure you get this key securely?
    • Solution: Certification Authority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Certificate Chains and Authorities?

A
  • Certificate chains
    • Another certificate to certify this issuer’s public key
    • Yet another certificate to certify this public key
  • Certification Authority (CA): the final answer
    • “Big companies” e.g. VeriSign
    • Self-signed certificates
    • Embedded in browsers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Certificate Revocation?

A
  • Certificate may be revoked prior to its expiry
    • Private key of user compromised
    • Identity of user is forged
    • CA’s private key is compromised
  • CAs keep and publish a Certificate Revocation List of all revoked certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly