Question Diffie Hellman Key Exchange protocol that we studied in - - PowerPoint PPT Presentation

question
SMART_READER_LITE
LIVE PREVIEW

Question Diffie Hellman Key Exchange protocol that we studied in - - PowerPoint PPT Presentation

Question Diffie Hellman Key Exchange protocol that we studied in the last class is used to exchange: symmetric key or asymmetric key Question What is the mean/method that we studied to exchange asymmetric keys? Hint: If you


slide-1
SLIDE 1

Question

  • Diffie Hellman Key Exchange protocol that we

studied in the last class is used to exchange:

 symmetric key

  • r

 asymmetric key

slide-2
SLIDE 2

Question

  • What is the mean/method that we studied to

exchange asymmetric keys?

 Hint: If you don’t know key of Bob; ask Sam – the TTP

slide-3
SLIDE 3

Digital Certificate

slide-4
SLIDE 4

Digital Certificates

  • Digital Certificates are meant to communicate

public keys

  • Issuer of a digital certificate vouches for the

principal (subject of the certificate) to whom the certificate is issued

  • Anyone who trusts the certificate issuer, trusts

the subject of the certificate

slide-5
SLIDE 5

Certification Authority (CA)

  • An organization that creates, publishes, and revokes

certificates.

  • Verifies the information in the certificate, binds

identities to cryptographic keys.

– May outsource identity verification to registration authorities (RA)

  • Protects general security & policies of the system and

its records.

  • Allows end user to check certificates so they can decide

whether to use them in transactions.

  • Has one/more trusted Roots, called a trust anchor
slide-6
SLIDE 6

PKI – Public Key Infrastructure

  • A setup, meant for public key distribution,

involving an interconnected, hierarchical, network of:

– CA: certification authority – RA: registration authority

slide-7
SLIDE 7
slide-8
SLIDE 8
slide-9
SLIDE 9

Certificate Pinning

slide-10
SLIDE 10

Certificate Pinning Certificate Pinning: Process of hard-coding/inserting a certificate into the trust zone of a computer / application / browsers, etc.

slide-11
SLIDE 11

Hierarchy of CA

slide-12
SLIDE 12

Top-Down flow of Implicit Trust

slide-13
SLIDE 13

Islands of Trust

slide-14
SLIDE 14

Cross-Certification as Trust Delegation

slide-15
SLIDE 15

Exercise

  • I have a certificate issued from IIT Bombay
  • You have a certificate issued from IIT Jodhpur

What are the conditions under which my trust is implied on your certificate?