CS 683 - Security and Privacy Spring 2018
Instructor: Karim Eldefrawy
University of San Francisco
http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw)
1
CS 683 - Security and Privacy Spring 2018 Instructor: Karim - - PowerPoint PPT Presentation
CS 683 - Security and Privacy Spring 2018 Instructor: Karim Eldefrawy University of San Francisco http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw) 1 Lecture 11 Public Key Distribution
Instructor: Karim Eldefrawy
University of San Francisco
http://www.cs.usfca.edu/~keldefrawy/teaching /spring2018/cs683/cs683_main.htm (https://goo.gl/t396Fw)
1
2
3
0 < i < 2n = N Xi,Yi − − random secret keys indexi = random (secret) value Puzzle P
i = {indexi,Xi,S}Yi
S − − fixed string, e.g., " Alice to Bob"
} 2 | {
n i
i P < <
j
index
Pick random j, 0 < j < 2n Select Pj Break Yj by brute force Obtain {index j,X j,S}
Look up index j Obtain X j
Encrypted communication with X j
?
Is security computational or information theoretic?
4
TTP A B
a , A] PKb
a , N b ] PKa
b ] PKb
Here, TTP acts as an “on-line” certification authority (CA) and takes care of revocation
b , B} SKT
a , A} SKT
5
6
given entity
7
“public file” concept
8
parties” (TTPs) as a means of PK distribution:
its constituent entities and distributes them on- demand
9
“certificates” as yet another public key distribution method
its owner’s (unique!) name
Certificate Authority (CA)
Authenticated Public-Key-based Key Exchange (Station-to-Station or STS Protocol)
10
p a y
v a
mod =
Choose random v
Bob a b bob w b
y y SIG p a y } , { mod = =
Choose random w, Compute
p y K
w a ba
mod ) ( =
Compute
( ) mod { , }
v ab b alice alice a b
K y p SIG y y = =
bob b bob
SIG y CERT , ,
alice alice SIG
CERT ,
11
{ PKB, IDB, issuance_time, expiration_time, etc.,...}SKCA
signatures
12
13
browser)
certificate request. Why?
certificate
encryption of session keys)
encryption
14
new certificate.
Root CA’s certificate is self-signed and its name is “well-known.”
a secure and predictable way according to some policy.
15
1) verify her signatures, and/or 2) encrypt data for her.
validity
16
To be covered later
17
authorization, group membership
18
layer
19
verification of identity
keys!)
to perform revocation checking)
20
compromised
in real time
the CA would help (should be impossible to extract private key)
21
account/name for the sake of authentication
naming attributes from the Subject field
(account)
22
(user support, key loss or compromise)
(encrypted).
private keys encrypted in its configuration directory
/ export private keys via PFX files.
23
US export laws
its importance and typical lifetime of 3-5 years
1536 bits
January 2016 Recommendation from National Security Agency (NSA)
https://cryptome.org/2016/01/CNSA-Suite-and-Quantum-Computing-FAQ.pdf
25
method
Country
State/Province
Locality
Organization
Organizational Unit
Common Name
26
Request for Comments (RFC)
27
28
. . . . . .
World c=AF c=USA
. . .
cn=Osama bin Laden (deceased)
dn:
cn=Osama bin Laden, o=Al Qaeda, c=AF
. . .
29
30
(without asking question on the behalf of client)
31