Digital Signatures and PKI Flashcards

1
Q

What is a digital signature?

A

A digital signature is a certificate that binds a public key to an entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who verifies a digital signature?

A

The certificate that is verified by certificate authorities or trusted third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What properties must digital certificates have?

A

Unforgeable
Authentic
Unalterable
Non-reusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a digital certificate contain to preserve its required properties

A

A message digest (Unalterable)

Encryption via the private key which is unencrypted using the public key (Authentic & Unforgeable)

Label to show identity of the sender (Authentic)

Timestamp for non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process that a sender goes through when sending a digital signature?

A
Hash the message
Encrypt using private key
Add expiration dates, serial numbers etc
Authenticate message
Send
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the process that a receiver goes through when receiving a digital signature?

A

Separate digital signature from the message
Decrypt the signature using the sender’s public key
Hash the message and compare the decrypted hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is confidentiality of the message preserved when using digital signatures?

A

A random key can be encrypted using the receiver’s public key and sent with the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PGP?

A

The Pretty Good Privacy Protocol allows common users access to encryption. Uses two key concepts:

1) A key is only valid iff it’s owned by the person who claims to own it.
2) Trust is a mechanism to validate a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are certificates issued in PGP?

A

Certificates are self-signed, and certificates that you trust are signed by you. There is no high-level authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four levels of trust in PGP?

A

Implicit trust
Full trust
Marginal trust
Untrusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is implicit trust?

A

Reserved for only your own keys. If the keyring contains a private key that signed a public key then you trust that public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is full trust?

A

Keys that are provided by full trust user are trusted without extra verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is marginal trust?

A

Keys provided by this user need to be vouched by at least one other user in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are untrusted users treated in PGP?

A

Keys from this user are disregarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a PKI?

A

Set of policies, procedures and products to aid in trusted communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does PKI allow for pervasive security infrastructure?

A

By allowing for trusted communications over an untrusted public network

17
Q

What happens to trust when using PKI?

A

Trust is moved to authorities in the network from individuals. Users must trust that the chain is integral.

18
Q

How are messages authenticated and kept confidential?

A

Messages are authenticated by using digital signatures and can be kept confidential by using a session key.

19
Q

What are the five stages of PKI certificates go through?

A
Construction
Issuance
Signing
Confirmation/Denial
Invalidation
20
Q

What do certificate authorities do?

A

Trustworthy roots of the network that certify user identity through registration, binding public keys to identity.

All certificates in the network depend on the root nodes.

21
Q

What is the certification revocation list?

A

List of certificates that have been revoked in the network. Suffers from propogation delay.

22
Q

What do certificates consist of?

A

Public key
Name of owner
Hash of name & key

23
Q

What is X.509?

A

Standardized format for the issuing of certificates.

24
Q

What is contained in an X.509 certificate?

A

Serial Number: Used to uniquely identify the certificate.
Subject: The person, or entity identified.
Signature Algorithm: The algorithm used to create the signature.
Signature: The actual signature to verify that it came from the issuer.
Issuer: The entity that verified the information and issued the certificate.
Valid-From
Valid-To
Key-Usage: Purpose of the public key (e.g. encipherment, signature, certificate signing…).
Public Key: The public key.
Thumbprint Algorithm: The algorithm used to hash the public key.
Thumbprint: The hash itself, used as an abbreviated form of the public key

25
What are some of Schneir's identified risks?
How secure is the verifying computer Which John Robinson is he How was the certificate holder identified