Module 4- Applications of Cryptography Flashcards
FIPS Standard 140
Cryptographic Modules
FIPS Standard 186
Digital Signatures
FIPS Standard 197
AES
FIPS Standard 201
Identity Verification
Encryption of a message digest with the sender’s private key. Provides:
- Authentication
- Integrity
- Non-repudation
Digital Signatures
A digital document that contains a public key and some information to allow your system to verify where that key came from.
Digital Certificate
Uses asymmetric key pairs and combines software, encryption and services to provide a means of protecting the security of business communication and transactions.
PKI (Public Key Infrastructure)
Put in place by RSA to ensure uniform certificate management throughout the internet.
PKCS (Public Key Cryptography Standards)
Certificate, a digital representation of the information that identifies you as a relevant entity.
Trusted Third Party (TTP)
An entity trusted by one or more users to manage certificates.
CA (Certification Authority)
Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between user and CA. Receives request, authenticates it and forwards it to the CA.
RA (Registration Authority)
A set of rules that defines how a certificate may be used.
CP (Certificate Policy)
The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA.
X.509
Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.
X.509
X.509 Certificate Content
Version Certificate holder's public key Serial number Certificate's validity period Unique name of certificate issuer Digital signature of issuer Signature algorithm identifier
X.509 Certificate File Extensions
.pem .cer, .crt., .der .p7b, .p7c .p12 .pfx
a Base64 encoded DER certificate, enclosed between “—–BEGIN CERTIFICATE—–” and “—–END CERTIFICATE—–”
.pem (Privacy Enhanced Mail)
Usually in binary DER form, but Base64-encoded certificates are common also
.cer, .crt, .der
PKCS#7 SignedData structure without data, just certificate(s) or CRL(s).
.p7b, .p7c
PKCS#12, may contain certificate(s) (public) and private keys (password protected).
.p12
Predecessor of PKCS#12 (usually contains data in PKCS#12 format, e.g., w/ PFX files generated in IIS).
.pfx
The primary role of this is to digitally sign and publish the public key bound to a given user. It is an entity trusted by one or more users to manage certificates. Verisign is an example.
Certificate Authority (CA)
Certificate for individuals, intended for email
Certificate Authority - Verisign - Class 1
Certificate for organizations for which proof of identity is required
Certificate Authority - Verisign - Class 2
Certificate for servers and software signing, for which independent verification and checking of identity and authority is done by the issuing CA
Certificate Authority - Verisign - Class 3
Certificate for online business transactions between companies
Certificate Authority - Verisign - Class 4
Certificate for private organizations or governmental security
Certificate Authority - Verisign - Class 5
Used to take the burden off of a CA by handling verification prior to certificates being issued. Acts as a proxy between the user and the CA. Receives request, authenticates it, and forwards it to the CA.
Registration Authority (RA)
Distributes digital certificates that contain public keys. A network of trusted certificate authority servers. An arrangement that binds public keys with user identities by means of a CA.
Public Key Infrastructure (PKI)
A list of certificates that have been revoked.
Certificate Revocation List (CRL)
A real time protocol for verifying certificates (and a newer method than CRL)
Online Certificate Status Protocol (OCSP)
An Internet protocol for determining the path between a X.509 digital certificate and a trusted root (Delegated Path Discovery) and the validation of that path (Delegated Path Validation) according to a particular validation policy.
Server-based Certificate Validation Protocol (SCVP)
Two types of systems:
Centralized key-management systems
Decentralized key-management systems
Digital Certificate Management
Three phases of key life cycle (Digital Certificate Management)
Setup and initialization
Administration
Cancellation
Process components:
Registration
Key pair generation
Certificate Generation Certificate Dissemination
Setup and Initialization Phase
Expiration Renewal Revocation Suspension Destruction
Cancellation and History Phase
Key Storage
Certificate retrieval and validation
Backup or escrow
Recovery
Administration Phase
- Person who can recover keys from the keystore on behalf of a user
- Highly trusted person
- Issue recovery agent
·EFS recovery agent certificate
·Key recovery agent cert
Update and Patch Vulnerabilities
Certificate Authority is at the top
Intermediate CAs are the next level
Users are the bottom level
Hierarchical Trust Model