Symmetric Key Exchange
Let’s assume that n participants wants to talk to each other over the network.
In the first scenario, we distribute (over a physical channel) keys to each participants so that each pair of two participants have a unique shared key to talk to each other (naive key distribution in the course slides).
- How many keys each participant will receive individually?
- How many keys will be distributed in total?
In the second scenario, we use a Key Distribution Center that will distribute session keys to participants when they need to communicate between each other. In this setup, we distribute the
- How many keys will be distributed to the Key Distribution Center?
- How many keys each participant will receive individually?
- How many keys will be distributed in total?
Perfect Forward Secrecy
- Explain why the Key Distribution Center example given above does not ensure Perfect-Forward Secrecy?
- Alice and Bob are using GPG to exchange encrypted and signed message. Explain why GPG does not ensure Perfect-Forward Secrecy?
- Explain how Diffie-Hellman ensures Perfect-Forward Secrecy?
TLS 1.3 and the Public Key Infrastructure
TLS 1.3 has only two rounds:
- A -> B: nA, ecdhA
-
B -> A: nB, ecdhB, *[certB, sign(H(nA nB ecdhA ecdhB certB))]k*
- What are ecdhA and ecdhB?
- When Alice’s receives the message from Bob, what does she need to compute and verify?
- Why Mallory cannot do a replay attack on Bob’s response?
- In TLS/SSL, how does Alice’s browser trust a certificate supplied by Bob’s website?
- Describe how a man-in-the-middle attack could succeed on TLS/SSL?