Chapter5 Certificates and PKIs
Chapter5 Certificates and PKIs
Chair of IT Security
Chapter Overview
CA1 CA2
CA1 CA2
Root CA
There can be more
hierarchy levels of
course
CA1 CA2
Root CA
There can be more
hierarchy levels of
course
CA1 CA2
Root CA
There can be more
hierarchy levels of
course
CA1 CA2
§ The lower level CAs also sign the upper level CAs
§ Advantage: User1 only has to know CA1’s public key in
advance
§ Disadvantage: User1 has to check the signatures on more
certificate
User4 User5
User1 User3
User6
User2
§ Signed Content:
§ Version – The version number
§ Serial Number – An issuer-unique serial number
§ Signature – The signature algorithm identifier (includes hash
function)
§ Issuer – Name of the issuer
§ Validity – from: / to: validity period
§ Subject – Name of the subject
§ SubjectPublicKeyInfo – Public key
§ IssuerUniqueID – Unique identifier of the issuer (optional)
§ SubjectUniqueID – Unique identifier of the subject (optional)
§ Extensions
§ Additional unsigned content
§ SignatureAlgorithm – Algorithm identifier
§ SignatureValue – Signature on the hash of the content
§ Signed content
§ Version - if present must be v2 or v3
§ Signature - Signature algorithm identifier (includes hash function)
§ Issuer - Name
§ thisUpdate - Time
§ nextUpdate - Time (optional)
§ revokedCertificates - List of revoked certificates
ú userCertificate - Certificate serial number
ú revocationDate - Time
ú crlEntryExtensions - optional extensions
§ CrlExtensions - optional
§ SignatureAlgorithm
§ SignatureValue
§ Problem?
§ The signatures are not bound to THIS particular run of the protocol
§ An attacker could record e.g. Alice’s message and replay it to Bob
§ Both parties sign the public DH values received from each other
§ Both parties use public key certificates to exchange their public signature keys
§ Now replay is not possible because Alice can check if Bob correctly received
her public DH value and vice versa
§ Bob and Alice confirm that they both agreed upon the correct
key by using it to encrypt their certificate and their signature
28 IT-Security - Chapter 5: Certificates and PKIs
So…
§ CA root certificates
are distributed via
browser vendors
§ Web servers can
request certificates
from a CA
§ Users can verify
certificate presented
by web site with the
pre-installed CA
certificate
https://www.youtube.com/watch?v=T_kphp
-GbF8