Module 11 Flashcards

1
Q

what is the goal of https?

A

to establish an encrypted session

i.e., the data you are sending is not visible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how do we achieve an encrypted session?

A

some ideas:

  • Diffie hellman key exchange
  • Public key cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a man in the middle attack?

A

An attacker could be proxying the communication between the browser and the server. As we saw in the Diffie-Hellman key exchange, an attacker can talk to Alice and also talk to Bob, and thus can pretend to be both and read all the communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do certificate authorities prevent man in the middle attacks?

A

Once a domain has a certificate, the domain can send this certificate to the browser, thus verifying its identity.

An attacker would not be able to produce a valid certificate because that would require splurging the tuple of upenn.edu and some public key under the secret key of some certificate authority. Because we’re using digital signatures, an adversary is not going to be able to create such forgeries unless they managed to compromise the secret key of some certificate authorities, which has happened in the past.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an X.509 certificate?

A
  • name of the issuer of the certificate
  • domain name of the web server
  • name of the organization
  • valid dates of the certificate
  • public key of the web server
  • key usage?
  • -> digital signatures?
  • -> encryption?
  • information about the public key
  • -> algorithm (e.g. RSA)
  • -> type of padding (e.g., PKCS#1 v1.5)
  • -> kind of hash function used (e.g. SHA256)
  • signature algorithm
  • signature of all the information under the CA’s private key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a CA validate web server?

A

This is tricky!

  • CA needs to verify that the requesting entity indeed owns upenn.edu
  • Common technique: random URL test
  • Not a perfect defense: network / DNS attacker could trick the CA
  • high-profile domain names require more extensive validation
  • -> phone confirmation, in-person audit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do intermediate CAs help?

A
  1. scalability
    - - so root CAs are not responsible for certificates of every single web site
  2. security
    - - root CAs can keep their private key stored safely
  3. better validation
    - - root CAs are global entities, whereas intermediate CAs can be local
    - - specific to a country, state, city, or company
    - - in a better position to verify a request for a certificate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Browsers don’t trust intermediate CAs. So how does it work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the key difference between using RSA handshake or Diffie Hellman handshake for TLS 1.2?

A

in RSA, we’re using the public key for encryption; in DH, we’re using the public key for verifying signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is forward secrecy?

A

if an attacker steals the long-term secret key of the web server (SK), it should not be able to read past sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which TLS handshakes are forward secret?

A

TLS-RSA:
– not forward secret. if sk is compromised, adversary can recover master secret of old sessions. thus, adversary can recover all keys of old sessions

TLS-DH

    • forward secret because sk is used to sign messages, not for encryption
    • if adversary gets sk, it can forge new signatures, but it cannot derive old keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some important changes in TLS 1.3

A
  1. all protocols support forward secrecy
    - no more RSA-KEM
  2. deprecates old ciphers (DES, MD5,SHA1, RSA-KEM)
  3. streamlines some of the handshake messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly