Lecture-15-Key Distribution
Lecture-15-Key Distribution
PU B LIC KE Y CR Y PT O GR APH Y
Dr. M M Waseem
Iqbal
Key Management
public-key encryption helps address key
distribution problems
1/18/2 0 2 2
U se
B ob gets Alice’s certificate
If he knows Cathy’s public key,he can decipher the
certificate
When was certificate issued?
Is the principal Alice?
Now B ob has Alice’s public key
1/18/2 0 2 2
Certificate Signature Chains
Create certificate
Generate hash of certificate
E ncipher hash with issuer’s private key
V alidate
O btain issuer’s public key
Decipher enciphered hash
R ecompute hash from certificate and compare
1/18/2 0 2 2
X .5 0 9 Chains
Some certificate components in X .5 0 9 v3:
V ersion
Serial number
Signature algorithm identifier: hash algorithm
Issuer’s name;uniquely identifies issuer
Interval of validity
Subject’s name;uniquely identifies subject
Subject’s public key
Signature: enciphered hash
1/18/2 0 2 2
X .5 0 9 Certificate V alidation
O btain issuer’s public key
T he one for the particular signature algorithm
Decipher signature
Gives hash of certificate
1/18/2 0 2 2
Issuers
Certification Authority (CA): entity that issues
certificates
1/18/2 0 2 2
V alidation and Cross-Certifying
Certificates:
Cathy<<Alice>>
Dan<<B ob>
Cathy<<Dan>>
Dan<<Cathy>>
1/18/2 0 2 2
Signing
Single certificate may have multiple signatures
Notion of “trust” embedded in each signature
R ange from “untrusted” to “ultimate trust”
Signer defines meaning of trust level (no standards!)
1/18/2 0 2 2
V alidating Certificates
Alice needs to validate
Arrows show signatures
B ob’s O penPGP cert Self signatures not shown
Does not know Fred,Giselle,
or E llen J ack
Alice gets Giselle’s cert
Knows H enry slightly,but H enry
his signature is at “casual” E llen
level of trust Irene
Alice gets E llen’s cert Giselle
Knows J ack,so uses his
cert to validate E llen’s,then Fred
hers to validate B ob’s
B ob
1/18/2 0 2 2
Key R evocation
Certificates invalidated before expiration
U sually due to compromised key
May be due to change in circumstance (e.g., someone
leaving company)
Problems
E ntity revoking certificate authorized to do so
R evocation information circulates to everyone fast
enough
Network delays,infrastructure problems may delay
information
1/18/2 0 2 2
CR Ls
Certificate revocation list lists certificates that are
revoked
X .5 0 9 : only certificate issuer can revoke certificate
Added to CR L
1/18/2 0 2 2
Public-Key Certificates