Problem 1
[35 Points]
Visit the site
www.amazon.com, read its certificate and find the following information.
a)
[5 Points]
Which CA issued and signed the certificate?
b)
[5 Points]
What is the subject’s identity? That is, to which company and website is the certificate issued?
c)
[5 Points]
Which digital signature scheme and hash function is used to sign the certificate?
d)
[5 Points]
Which
public-key
encryption
scheme
is used to secure the communication between your browser and the site
www.amazon.com, and what is the length of the public key?
e)
[5 Points]
Which
private-key
encryption
scheme
is used to secure the communication between your browser and the site
www.amazon.com, what is the length of the key and what is the mode of operation?
f)
[5 Points]
Which key exchange protocol is used to establish a shared private key between your browser and the site
www.amazon.com?
g)
[5 Points]
What is the certification path for
www.amazon.com?
Problem 2
[25 Points]
During the discussions on TLS, we emphasized the importance of the integrity of the certificate authority (CA). What damages can an attacker cause if he is able to compromise a trusted CA? Be as comprehensive as you can in your answer and use a good concrete example to illustrate your answer.