Cryptography

    Subdecks (3)

    Cards (52)

    • Digital Certificate
      Consists of 2 parts: Plaintext and Same plaintext hashed and digitally signed
    • Ways to attack Digital Certificates
      • Convince Digital Certificate Issuer that attacker's public key is the subject's public key
      • Substitute subject's public key with attacker's public key
      • Unauthorized use of issuer's private key
      • Substitute certificate user's public key
    • Digital Certificate issuer is trusted by the user of the certificate

      It is dangerous if the Digital Certificate issuer is fraudulent
    • Attacker gets issuer's private key

      Unauthorized use of issuer's private key
    • Certificate user's private key is intercepted and substituted

      Attacker can substitute user's public key
    • If Black Hat can access certificate user's computer, they can substitute the user's public key with someone else's public key
    • 2 ways to verify a certificate
      • Consumer or user of the certificate must have a trusted issuer's public key
      • Consumer can then chain from his trusted public key to a trusted copy of the issuer's public key
    • Validity of issuer's public key
      • It must be confirmed by a trusted Certificate Authority
    • Example of issuing a certificate
      1. Owner's name
      2. Issuer: CA's name
      3. Private Key of CA
      4. Hash Function (MD5/SHA-1)
      5. RSA Encryption
      6. Owner's public key
      7. Validity: lifetime of cert
      8. Signature algorithm
      9. Signature (signed by the CA)
    • Example of issuing a certificate
      • Dawn is the Owner, Alice is the CA
    • Example of verifying a certificate
      1. Owner's name
      2. Issuer: CA's name
      3. Validity: lifetime of cert
      4. Hash Function (MD5/SHA-1)
      5. Owner's public key
      6. Public key of CA
      7. Signature algorithm
      8. Signature (signed by the CA)
      9. Decryption
    • Owner's public key
      Equal to the public key in the certificate
    See similar decks