Section 8.74 Public Key Infrastructure (PKI) Flashcards

Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.

1
Q

Public Key Infrastructure (PKI)

H.S.P.P.P

A

An entire system involving hardware, software, policies, procedures, and people that is based on asymmetric encrytpion

■ Facilitates secure data transfer, authentication, and encrypted communications

■ Used in HTTPS connections on websites

System that creates asymmetrical key pairs that consist of those public and private keys that are used in the encryption and decryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Establishing a Secure Connection

A

■ User connects to a website via HTTPS

■ Web browser contacts a trusted Certificate Authority for the web server’s Digitial Certificate and Public key. This information is sent to the web browser encrypted with a private key. The web browser will verify the Digitial Certificate of the web server by decrypting the message with the Certificate Authorities Public Key. Once decrypted, the browser conducts a verification of the digital certificate.

■ A random shared secret key is generated for symmetric encryption

■ The shared secret is securely transmitted using the web servers public key encryption

■ The web server decrypts the shared secret with its private key

■ Both parties use the shared secret for symmetric encryption (e.g AES) to create
a secure tunnel for fast communication.

Confidentiality
● Data is encrypted using a shared secret

Authentication
● The web server’s identity is verified using its private key
■ Visual indicators like a padlock show secure communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public Key Infrastructure vs. Public Key Cryptography

A

Public Key Infrastructure (PKI)

● Encompasses the entire system for managing key pairs, policies, and trust
● Involves generating, validating, and managing public and private key pairs
that are used in the encryption and decryption process
● Ensures the security and trustworthiness of keys

Public Key Cryptography:

● Refers to the encryption and decryption process using public and private
keys
● Only a part of the overall PKI architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key Escrow

A

Storage of cryptographic keys in a secure, third-party location (escrow) which enables key retrieval in cases of key loss or for legal investigations

Security Concerns:
● Malicious access to escrowed keys could lead to data decryption
● Requires stringent security measures and access controls

■ Relevance in PKI: In PKI, key escrow ensures that encrypted data is not permanently inaccessible

Useful when individuals or organizations lose access to their encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly