• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
Public Key Distribution

a. The distribution problem.
Fake book of public keys
b. Decentralized vice centralized distribution.
Every user personally goes up to every other user and identifies themselves (face-to-face, using at least one, maybe two, picture IDs) and gives them their public key.

A trustworthyperson is designated as a “Special User”(SU)
2.The Special User collects everyone’s public keys (using face-to-face verification)
3.Everyone gets the Special User’s public key using face-to-face verification
c. Certificate Authority (CA).
The “Special User” in the centralized distribution. Distributes keys by digitally signed messages.
d. Registration Authority (RA) and Local Registration Authority (LRA)
Perform the face to face identification step.
a. Certificate contents.
The essential data in a certificate is:
–a user ID,
–the public key for that user and
–the CA’s digital signature of the above information
b. Certificate creation process.
Certificate verification process.
A trustworthyperson is designated as a “Special User”(SU)
2.The Special User collects everyone’s public keys (using face-to-face verification)
3.Everyone gets the Special User’s public key using face-to-face verification
e. X.509 standard.
The current standard for digital certificates.
X.509 content
Certificate serial number
•The certificate signature algorithm and parameters
•CA identifier
•Algorithm and parameters for the user public key
•Beginning date
•Expiration date
f. Multiple certificates
An encryption certificate used in the data encryption process
–A signing certificate used in the digital signature process
g. Certificate chains
If the DoD CA creates a Certificate with the ABC-Bank-CA-pub we can now verify signatures from Bank employees
h. Self signed certificates
Often a “self-signed certificate” is used to distribute a CA-pub.
. Private key
If someone steals your private key they
–can forge your digital signature (in a complete digital world, they become you)
–can decrypt messages that only you are supposed to be able to decrypt
. Private key

a. Storage
On their PC
–On a removable media (CD, etc.)
–On a smart card
. S/MIME
Secure Multi-purpose Internet Mail Extension (S/MIME) protocol works seamlessly with
–DoD certificates (Common Access Cards (CACs))
–Certificates issued by commercial CAs, such as VeriSign
•Public keys for commercial CAs come preinstalled in e-mail programs
SSL
Another excellent example of a PKI-enabled application is the Secure Socket Layer (SSL) protocol
•It is also called Transport Layer Security (TLS)
•If you buy things on the web you most likely have used SSL
Public Key Certificates
The essential data in a certificate is:
–a user ID,
–the public key for that user and
–the CA’s digital signature of the above information
Certificate Authority
Trusted organization (or server) that maintains and issues digital certificates
Registration Authority
Performs certification registration duties. Confirms the identity of an individual, etc..
Acts as a broker between the user and CA.
Local Registration Authority
Person assigned duties.
SSL 2nd card
•It is also called Transport Layer Security (TLS)
•If you buy things on the web you most likely have used SSL
This is called “Server-Authentication”mode of SSL because it lets the user authenticate the server
•Clicking on the closed lock icon displays the Website’s certificate
•If a website looks like Amazon’s but the certificate is issued to hacker.com you may not want to enter any credit card information
The other mode of SSL is called “Client-Authentication”mode because it lets the Web server authenticate the user
•It requires the user to have a private key and a certificate
•It performs the server-authentication steps already presented and then performs additional steps that are necessary to authenticate the user
S/MIME 2nd card
Secure Multi-purpose Internet Mail Extension (S/MIME) protocol works seamlessly with
–DoD certificates (Common Access Cards (CACs))
–Certificates issued by commercial CAs, such as VeriSign
•Public keys for commercial CAs come preinstalled in e-mail programs
If a user has keys issued by the DoD or a commercial CA, they can
–digitally sign messages,
–verify digitally signed messages,
–encrypt messages and
–decrypt messages