Introduction To Computer Security
Introduction To Computer Security
Computer Security
Lecture – 5
((attackk detected)
detected)d)) (
(attack k detected)
detected)
d))
h 6B34339 4C66809 h
4C66809
=?? 87F9024
6B34339 h 4C66809 4C66809
=?? 87F9024 h
message M MAC MAC message M received MAC
computed MAC received computed
message M’ MAC MAC
MAC MAC
https://crypto.stackexchange.com/questions/5646/what-are-the-differences-between-a-digital-signature-a-mac-and-a-hash
Digital certificates
• Public-key cryptography solves the problem of how to get Alice and Bob to
share a common secret key
• But this solution has a flaw:
• How does Alice know that the public key, 𝑃3 , that she used is really the public key for
Bob?
• And if there are lots of Bobs, how can she be sure she used the public key for the
right one?
• Solution:
• Utilise a trusted authority who will verify a user’s identity and then digitally sign a
statement that combines each person’s identity with their public key
• The statement can be something like this:
• “The Bob who lives on 11 Main Street in Gotham City was born on August 4, 1981,
and has email address [email protected], has the public key PB, and I stand by this
certification until December 31, 2011.”
Digital certificates
• Such a statement is called digital certificates
• Such a trusted authority is called a Certificate Authority (CA)
• Since the digital certificate is a strong evidence of the authenticity of
Bob’s public key, Alice can trust it even if it comes from an unsigned
email message or is posted on a third-party web site
• However, Alice also needs to trust the public key of Cas
• This creates a circular problem
• Solution, embed the public keys of the CAs in the OS/Browser
• We will study the protocol for validating digital certificates when we
study web security
certificate for Bob. But there are likely to be only a small number of CAs, so
knowing all their public keys is a reasonable assumption. In practice, the
public keys of commonly accepted CAs come with the operating system.
Digital certificates
Since the digital certificate is strong evidence of the authenticity of Bob’s
public key, Alice can trust it even if it comes from an unsigned email
message or is posted on a third-party web site. Digital Certificates
For example, the digital certificate for a web site typically includes the
following information:
• Thawte).
• Name of the certification authority (e.g., certificate authority
(CA) digitally signs a
• Date of issuance of the certificate (e.g., 1/1/2009).
binding between an
• identity and the
Expiration date of the certificate (e.g., 12/31/2011).
•
identity.
Name of the organization operating the web site (e.g., “Google, Inc.”).
• Public key used of the web server (e.g., an RSA 1, 024-bit key).
• Digital signature. 51
Password length 55
56
57
Secure passwords
Secure Passwords
• A strong password includes characters from at least three of the
• groups:
following A strong password includes characters from at
least three of the following groups: