Save
Cryptography
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Lance De Guzman
Visit profile
Subdecks (3)
IPSec
Cryptography
16 cards
Digital Signature
Cryptography
11 cards
Cryptocurrency
Cryptography
13 cards
Cards (52)
Digital Certificate
Consists of 2 parts:
Plaintext
and
Same plaintext
hashed and digitally signed
View source
Ways to attack Digital Certificates
Convince Digital Certificate Issuer that
attacker's public key
is the subject's
public key
Substitute subject's
public key
with attacker's
public key
Unauthorized use of issuer's
private key
Substitute certificate user's public key
View source
Digital Certificate issuer is
trusted
by the user of the certificate
It is
dangerous
if the Digital Certificate issuer is
fraudulent
View source
Attacker gets issuer's
private
key
Unauthorized
use of issuer's
private
key
View source
Certificate user's
private
key is
intercepted
and substituted
Attacker can substitute user's
public
key
View source
If Black Hat can access certificate user's computer, they can substitute the user's
public key
with someone else's
public key
View source
2 ways to verify a certificate
Consumer or user of the certificate must have a
trusted
issuer's
public
key
Consumer can then chain from his
trusted
public key to a trusted
copy
of the issuer's public key
View source
Validity of issuer's public key
It must be confirmed by a
trusted Certificate Authority
View source
Example of issuing a certificate
1. Owner's name
2. Issuer: CA's name
3. Private Key of CA
4. Hash Function (MD5/SHA-1)
5. RSA Encryption
6. Owner's public key
7. Validity: lifetime of cert
8. Signature algorithm
9.
Signature
(signed by the CA)
View source
Example of issuing a certificate
Dawn is the
Owner
, Alice is the
CA
View source
Example of verifying a certificate
1. Owner's name
2. Issuer: CA's name
3. Validity: lifetime of cert
4. Hash Function (MD5/SHA-1)
5. Owner's public key
6. Public key of CA
7.
Signature
algorithm
8.
Signature
(signed by the CA)
9.
Decryption
View source
Owner's
public key
Equal to the
public key
in the certificate
View source
See all 52 cards
See similar decks
Cryptography
37 cards
Cryptography
114 cards
Cryptography
17 cards
cryptography
IT A level > Unit 3 cyber security > LO3 Cyber security risk management > Data, encryption and cryptography devices
2 cards
Cryptography
Year 9 > Computer Science
15 cards
Cryptography
Issues of the information age
112 cards
cryprogaphy
21 cards
Classical Cryptography
30 cards
w4-Cryptography
8 cards
Computing - cryptography
82 cards
Crytography
Computer science
11 cards
2)Crytography
Computer Science > 2.8 Data Security and integrity
17 cards
Cryptography and encryption
61 cards
System sec & Cryptography
19 cards
Data, encryption and cryptography devices
IT A level > Unit 3 cyber security > LO3 Cyber security risk management
14 cards
Data, encryption and cryptography devices
IT A level > Unit 3 cyber security > LO3 Cyber security risk management > cyber security controls
2 cards
encryption
IT A level > Unit 3 cyber security > LO3 Cyber security risk management > Data, encryption and cryptography devices
7 cards
data lo3
IT A level > Unit 3 cyber security > LO3 Cyber security risk management > Data, encryption and cryptography devices
5 cards
Cryptography
384 cards
Cryptography
231 cards
Chapter 6 - Cryptography
30 cards