Trust Models Flashcards
1
Q
Web of Trust
A
- Decentralized trust model
- To establish the authenticity of the binding public key <-> user
- Used in PGP, GnuPG, and other OpenPGP-compatible systems
- Each party = end-user & CA at the same time (all users distribute their own public keys, and certify those of other users)
2
Q
Key validity vs. owner trust
A
- Key validity: Is the key owner who they claim to be?
- Owner trust: Is the key owner reliable (in respect to signing keys of others)?
3
Q
Assigning key validity and owner trust
A
- Key validity:
-> manually set (key signing)
-> computed from the trust in the corresponding signers, only considering signers with key validity “complete” - Owner trust: manually set (trust setting)
4
Q
Owner trust levels
A
- unknown
- none: The owner is known to improperly sign keys
- marginal: The owner is known to properly sign keys
- complete: The owner is known to put great care in key signing
- ultimate: The owner is known to put great care in keys signing, and is allowed to make trust decisions for you
5
Q
Key validity levels
A
- unknown
- marginal: The key probably belongs to the name
- complete: The key definitely belongs to the name
- ultimate: own keys
6
Q
Key validity computation: complete
A
- Key is signed by at least one user with owner trust complete
- Key is signed by at least x names with owner trust marginal
7
Q
Key validity computation: marginal
A
- If the key is signed by less than x names with owner trust marginal
8
Q
Key validity computation: unknown
A
If the key is signed by no name with at least owner trust marginal
9
Q
Trust signatures & trusted introducers
A
- trust signature is a special type of signature: The signer asserts that the key is not only valid but also trustworthy at the specified level
- Allows trust delegation along a chain of signatures
10
Q
PGP Disadvantages
A
- PGP lacks forward secrecy
- No supervision regarding upgrading algorithms and parameters
- Bad scalability
11
Q
Hierarchical trust
A
- Model with trust anchor and certification path (and intermediate CAs)
12
Q
Trust models in multiple hierarchies: Methods
A
- Trusted list
- Common root
- Cross-certification
- Bridge
13
Q
Trusted list
A
- Every participant has a list of trusted CAs
- Every user maintains their own list
- Used in web browsers (preinstalled + user defined)
14
Q
Common root
A
- Every user who trusts root accepts every other end-user certificate
15
Q
Cross-certification
A
Root CA 1 issues certificate for CA 2 (can be bilateral) or for intermediate CAs