Homework 2 will be released today
- Available on the course website
- If you cannot see it, try refreshing the page…
- Due in two weeks: 11/20/19 11:59pm
- Submit through GradeScope
Announc nouncem ements Homework 2 will be released today - - PowerPoint PPT Presentation
Announc nouncem ements Homework 2 will be released today Available on the course website If you cannot see it, try refreshing the page Due in two weeks : 11/20/19 11:59pm Submit through GradeScope 1 Reflection Attack and
Homework 2 will be released today
1. A → B : rA 2. B → A : { rA, rB } K 3. A → B : rB
1. A → E : rA
{ rA, rA’ } K : Reply to (1)
rA’ Solutions?
2
1. A → B : A, rA, 2. B → A : rB, { rB, rA, A } SKB 3. A → B : rA’, { rA’, rB, B } SKA
1. E → B : A, rA 2. B → E : rB, { rB, rA, A } SKB
rA’, { rA’, rB, B } SKA
3
documented failures in the literature.
9798, X.509, …) – use them!
gets much harder as protocols get more complex: more parties, messages and rounds.
4
“Programming Satan’s Computer” by R. Anderson and R. Needham available at: http://www.cl.cam.ac.uk/~rja14/Papers/satan.pdf
5
6
Authenticated Public-Key-based Key Exchange (Station-to-Station or STS Protocol)
7
Choose random v Choose random w, Compute Compute
8
One-msg AB Two-msg AB Three-msg AB
9
[lecture slides are adapted from previous slides by Prof. Gene Tsudik]
10
TTP A B
a , A] PKb
a , N b ] PKa
b ] PKb
Here, TTP acts as an “on-line” certification authority (CA) and takes care of revocation
b , B} SKT
a , A} SKT
11
12
given entity
13
parties” (TTPs) as a means of PK distribution:
its constituent entities and distributes them on- demand
14
“certificates” as yet another public-key distribution method
its owner’s (unique) name
Certificate Authority (CA)
Authenticated Public-Key-based Key Exchange (Station-to-Station or STS Protocol)
15
Choose random v Choose random w, Compute Compute
16
CERTB = {PKB, IDB, issuance_time, expiration_time, etc.,...}SKCA
Bob’s signatures
17
18
browser, email, in person, etc.)
encryption of session keys)
19
new certificate.
Root CA’s certificate is self-signed and pre-installed in devices
a secure and predictable way according to some policy.
20
1) verify her signatures, and/or 2) encrypt data for her.
validity
21
To be covered later
22
layer
23
verification of identity
perform revocation checking)
24
compromised
processed in real time
the CA would help (ideally, to make it impossible to extract CA’s private key)
25
(user support, key loss or compromise)
(encrypted).
private keys encrypted in their configuration directory
/ export private keys via PFX files.
26
its importance and typical lifetime
size of at least 2048 bits
27
January 2016 Recommendation from the NSA
https://cryptome.org/2016/01/CNSA-Suite-and-Quantum-Computing-FAQ.pdf
28
Country
State/Province
Locality
Organization
Organizational Unit
Common Name
29
Request for Comments (RFC)
30
31
. . . . . . World c=AF c=USA
. . . cn=Osama bin Laden (deceased) dn: cn=Osama bin Laden, o=Al Qaeda, c=AF . . .
O=Trump
32
33
(without asking question on the behalf of client)
34