Exercise 19.1 What bad things could happen if Alice uses the same keys with multiple PKIs? Exercise 19.2 Suppose a system employs devices that are each capable of storing a list of 50 CRL entries. How...

1 answer below »
Exercise 19.1 What bad things could happen if Alice uses the same keys with multiple PKIs? Exercise 19.2 Suppose a system employs devices that are each capable of storing a list of 50 CRL entries. How can this design decision lead to security problems? Exercise 193 Suppose a system uses a PKI with a CRL A device in that system is asked to verify a certificate but cannot access the CRL database because of a denial-of-service attack What are the possible courses of action for the device, and what are the advantages and disadvantages of each course of action?
Exercise 19.4 Compare and contrast the advantages and disadvantages of PKIs and key servers. Describe one example application for which you would use a PKL Describe one example application fix which you would use a key server. Justify each of your dedsions. Exercise 19.5 Compare and contrast the advantages and disadvantages of CRLs, fast revocation, and online certificate verification. Describe one example application for which you would use a CRL Describe one example application for which you would use fast revocation. Describe one example application for which you would use online certificate verification. Justify each of your decisions.



Document Preview:

Make it short, easy to understand. Use your own word instead of copy from textbook. Use example that people can relate to.






Make it short, easy to understand. Use your own word instead of copy from textbook. Use example that people can relate to. PKI Reality While very useful, there are some fundamental problems with the basic idea of a PKI. Not in theory, but then, theory is something very different from practice. PKIs simply don't work in the real world the way they do in the ideal scenario discussed in Chapter 18. This is why much of the PKI hype has never matched the reality. When talking about PKIs, our view is much broader than just e-mail and the Web. We also consider the role of PKls in authorization and other systems. 1 9. 1 Names We'll start with a relatively simple problem: the concept of a name. The PKI ties Alice's public key to her name. What is a name? Let's begin in a simple setting. In a small village, everybody knows every­ body else by sight. Everybody has a name, and the name is either unique or will be made unique. If there are two Johns, they will quickly come to be called something like Big John and Little John. For each name there is one person, but one person might have several names; Big John might also be called Sheriff or Mr. Smith. The name we are talking about here is not the name that appears on legal documents. It is the name that people use to refer to you. A name is really any kind of signifier that is used to refer to a person, or more generally, to an entity. Your "official" name is just one of many names, and for many people it is one that is rarely used. 181 lal Part IV • Key Management As the village grows into a town, the number of people increases until you no longer know them all. Names start losing their immediate association with a person. There might only be a single J. Smith in town, but you might not know him. Names now start to lead a life of their own, divorced from the actual person. You start talking about people you have never actually met. Maybe you end up talking in the bar about the rich Mr. Smith who just moved here and who is going to sponsor the high school football team next year. Two weeks later, you find out that this is the same person who joined your baseball team two months ago, and whom you know by now as John. People still have multiple names, after all. It just isn't obvious which names belong together, and which person they refer to. As the town grows into a city, this changes even more. Soon you will only know a very small subset of the people. What is more, names are no longer unique. It doesn't really help to know that you are looking for a John Smith if there are a hundred of them in the city. The meaning of a name starts to depend on the context. Alice might know three Johns, but at work when she talks about "John," it is clear from the context that she means John who works upstairs in sales. Later at home, it might mean John the neighbor's kid. The relationship between a name and a person becomes even fuzzier. Now consider the Internet. Over a billion people are online. What does the name "John Smith" mean there? Almost nothing: there are too many of them. So instead of more traditional names we use e-mail addresses. You now communicate with j smi th5 3 3 @yahoo . com. That is certainly a unique name, but in practice it does not link to a person in the sense of someone you will ever meet. Even if you could find out information such as his address and phone number, he is just as likely to live on the other side of the world. You are never going to meet him in person unless you really set out to do so. Not surpri­ singly, it is not uncommon for people to take on different online personalities. And as always, each person has multiple names. Most users acquire multiple e-mail addresses after a while. (We have more than a dozen among us.) But it is extremely difficult to find out whether two e-mail addresses refer to the same person. And to make things more complicated, there are people who share an e-mail address, so that "name" refers to them both. There are large organizations that try to assign names to everybody. The best-known ones are governments. Most countries require each person to have a single official name, which is then used on passports and other official documents. The name itself is not unique-there are many people with the same name-so in practice it is often extended with things like address, driver's license number, and date of birth. This still does not guarantee a unique identifier for a person, however.1 Also, several of these identifiers can change over the course of a person's life. People change their addresses, 1 Driver's license numbers are unique, but not everybody has one. Chapter 1 9 • PKI Reality 283 driver's license numbers, names, and even gender. Just about the only thing that doesn't change is the date of birth, but this is compensated for by the fact that plenty of people lie about their date of birth, in effect changing it. Just in case you thought that each person has a single government-sanc­ tioned official name, this isn't true, either. Some people are stateless and have no papers at all. Others have dual nationalities, with two governments each trying to establish an official name-and for various reasons, they may not agree on what the official name should be. The two governments might use different alphabets, in which case the names cannot be the same. Some countries require a name that fits the national language and will modify foreign names to a similar "proper" name in their own language. To avoid confusion, many countries assign unique numbers to individuals, like the Social Security number (SSN) in the United States or the SoFi number in the Netherlands. The whole point of this number is to provide a unique and fixed name for an individual, so his actions can be tracked and linked together. To a large degree these numbering schemes are successful, but they also have their weaknesses. The link between the actual human and the assigned number is not very tight, and false numbers are used on a large scale in certain sectors of the economy. And as these numbering schemes work on a per-country basis, they do not provide global coverage, nor do the numbers themselves provide global uniqueness. One additional aspect of names deserves mention. In Europe, there are privacy laws that restrict what kind of information an organization can store about people. For example, a supermarket is not allowed to ask for, store, or otherwise process an SSN or SoFi number for its loyalty program. This restricts the reuse of government-imposed naming schemes. So what name should you use in a PKI? Because many people have many different names, this becomes a problem. Maybe Alice wants to have two keys, one for her business and one for her private correspondence. But she might use her maiden name for her business and her married name for her private correspondence. Things like this quickly lead to serious problems if you try to build a universal PKI. This is one of the reasons why smaller application-specific PKIs work much better than a single large one. 1 9.2 Authority Who is this CA that claims authority to assign keys to names? What makes that CA authoritative with respect to these names? Who decides whether Alice is an employee who gets VPN access or a customer of the bank with restricted access? For most of our examples, this is a question that is simple to answer. The employer knows who is an employee and who isn't; the bank knows who is 284 Part IV • Key Management a customer. This gives us our first indication of which organization should be the CA. Unfortunately, there doesn't seem to be an authoritative source for the universal PKI. This is one of the reasons why a universal PKI cannot work. Whenever you are planning a PKI, you have to think about who is autho­ rized to issue the certificates. For example, it is easy for a company to be authoritative with regard to its employees. The company doesn't decide what the employee's name is, but it does know what name the employee is known by within the company. If "Fred Smith" is officially called Alfred, this does not matter. The name "Fred Smith" is a perfectly good name within the context of the employees of the company. 1 9.3 Trust Key management is the most difficult problem in cryptography, and a PKI system is one of the best tools that we have to solve it with. But everything depends on the security of the PKI, and therefore on the trustworthiness of the CA. Think about the damage that can be done if the CA starts to forge certificates. The CA can impersonate anyone in the system, and security completely breaks down. A universal PKI is very tempting, but trust is really the area where it fails. If you are a bank and you need to communicate with your customers, would you trust some dot-com on the other side of the world? Or even your local government bureaucracy? What is the total amount of money you could lose if the CA does something horribly wrong? How much liability is the CA willing to take on? Will your local banking regulations allow you to use a foreign CA? These are all enormous problems. Just imagine the damage that can occur if the CA's private key is published on a website. Think of it in traditional terms. The CA is the organization that hands out the keys to the buildings. Most large office buildings have guards, and most guards are hired
Answered Same DayDec 25, 2021

Answer To: Exercise 19.1 What bad things could happen if Alice uses the same keys with multiple PKIs? Exercise...

David answered on Dec 25 2021
120 Votes
Chapter – 19 (ANSWERS)
1. What bad things could happen if Alice uses the same keys with multiple PKIs?
The significance of a name begins to rely on the specific situation. Alice may know th
ree Johns,
however at work when she discusses "John," it is clear that she implies John who works upstairs
in the sales department. Later at home, it may mean John the neighbor's child. The relationship
between a name and a man turns out to be much fuzzier. Alice needs to have two keys, one for
her business and one for her private correspondence. She might utilize her last name by birth for
her business and her wedded name for her private correspondence. Things like this rapidly
prompt to major issues if we attempt to fabricate a general PKI. This is one reason why small
application-particular PKIs work much superior to a single one.
2. Suppose a system employs devices that are each capable of storing a list of 50 CRL
entries. How can this design decision lead to security problems?
The certificate revocation list, or CRL, is a database that contains the list of repudiated
certificates. Everyone who needs to confirm a certificate must check the CRL database to check
whether the certificate has been disavowed. We can simply let each device download the updated
CRL from a Web server in each half hour at the cost of increasing the repudiation time. This
solution limits the measure of the CRL database. This is like the small booklets of stolen credit
card numbers that used to be sent to every dealer.
3. Suppose a system uses a PKI with a CRL. A device in that system is asked to verify a
certificate but cannot access the CRL database because of a denial of service attack? What
are the possible courses of action for the device, and what are the advantages and
disadvantages of each course of action?
When a system uses PKI with CRL, we can have some rules on the most proficient...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here