MIT 6 857 - Lecture Notes 10 : CCA, OAEP, Cramer-Shoup, Certificates

Unformatted text preview:

6.857 Computer and Network Security October 8, 2002Lecture Notes 10 : CCA, OAEP, Cramer-Shoup, CertificatesLecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy[These notes come from Fall 2001. These notes are neither sound nor complete. There is morematerial than is covered in lecture, and some is missing. Check with students’ notes for new topicsbrought up in 2002.]1 Outline• Plaintext-aware• OAEP• Adaptive Chosen-Ciphertext Attack• Cramer-Shoup• Public-Key Infrastructure2 Public-Key Infrastructure (PKI)2.1 IntroductionIn cyberspace there is a need to verify the identities of individuals for a number of purposes. Someof these events include sending and receiving secure email, sending and receiving signed email,setting up a secure session (SSL), and accessing a protected resource. The way in which this goal ofauthentication is accomplished is by verifying that a public key belongs to an individual that youknow and trust. Public-Key Infrastructure is designed to allow this kind of authentication.2.2 Diffie Hellman Public-Key Encryption“Public-Key Directory”One way to associate public keys to individuals is by publishing a mapping of names to keys. Thisdirectory would act much like the WhitePages does for distributing phone numbers based on name.The directory must be trusted, therefore it must be authentic but need not be secret. Entries wouldbe of the form:0May be freely reproduced for educational or personal use.12 2 PUBLIC-KEY INFRASTRUCTURE (PKI)Alice −→(RSA, n = ..., e = 3)Bob −→(RSA, n = ..., e = 17)Problem: Need to authenticate the issuer of the directory.Solution: A possible solution would be for the issuer to sign the whole directory. (how do we getthe issuer’s PK? must be recursive)Digital CertificatesDigital Certificates were proposed by Loren Kohnfelder here at MIT in a B.S. thesis in ’78. Theyare an authenticated identifier pairing the public key to a significant name. This allows any user toidentify themselves and establishes trust between themselves and a verifier who trusts the certificateauthority. The CA is assumed to correctly identify the person who has requested the certificate.This is the structure of a signed digital certificate.{“Alice00, (RSA, ...)}CAHere is a representation of the exchange between a user with a certificate and a verifier.(M)SKA,cert−→Bob “relying party”Question: How does PKI deal with issues of dynamics in naming such as changing email addresses?Answer: This does present a problem since information can change. The major issue becomes oneof database update however.Advantages• Alice can include her certificate in an email or post it on the Web• Bob only needs to know the Certificate Authority and its PK• Alice may have more than one key (e.g., one for signing, one for encryption)• Certificates can have a validity period (not before / not after a certain time)Difficulty Issues• Scalability- need multiple CAs- naming (unique? human-readable?)2.3 Naming 3• Robustness-compromised keys? (especially the root key!)-revoked certificate• Certificate as Credential (Attribute Certificate instead of ID certificate)• Trustworthiness of CA and procedures; liability?• Privacy, AnonymityQuestion: How do we deal with privacy issues in the CA?Answer: Use certificate serial numbers instead of names.2.3 NamingPK infrastructure has a very intimate link with naming. We want a system that is easy to use forpeople, similar to that of file names. The naming relationship should be as follows:• Names are for people to use.• Keys are for machines to use.• PKI can provide a binding between the two.Naming is a large issue. Since the CA has the burden of properly identifying and labeling the partieswith certificates, names must be made clear and accurate.Naming provides an interface between people and cyberspace. People must then write securitypolicy based on the name associated with a PK used to sign message. Writers of such policies needto know/understand the relationship between keys and names.Desirable naming properties• Descriptive• Global uniqueness• DynamicExamples• Role (purchasing agent at IBM)• Legal names• Email4 2 PUBLIC-KEY INFRASTRUCTURE (PKI)• Phone #’s (“enum”)• Mail addressCertificates can also be used for identifying much more about an individual than just identity.Attributes of a person can be given by certificates. For attributes, what exactly is the CA allowedto certify?Example: John has brown hair.How do they know?Why should we believe


View Full Document

MIT 6 857 - Lecture Notes 10 : CCA, OAEP, Cramer-Shoup, Certificates

Documents in this Course
Load more
Download Lecture Notes 10 : CCA, OAEP, Cramer-Shoup, Certificates
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes 10 : CCA, OAEP, Cramer-Shoup, Certificates and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 10 : CCA, OAEP, Cramer-Shoup, Certificates 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?