Public-Key Infrastructure (PKI)

Junghoo Cho

cho@cs.ucla.edu

Four Security Guarantees

Confidentiality

Symmetric-Key Cipher

Security of Cipher

Popular Ciphers

Challenges

Key Agreement Problem

Asymmetric-Key Cipher

Asymmetric-Key Cipher

Asymmetric-Key Cipher

RSA: Key Generation

  1. Pick two random prime numbers and .
  2. Pick
  3. Find such that
  4. (, ) becomes public key, (, ) becomes private key where

RSA Cipher

RSA: Two Important Theorems

Security of Asymmetric-Key Cipher

Security of RSA (1)


Security of RSA (2)

Security of RSA (3)

Application of Asymmetric-Key Cipher

Application of Asymmetric-Key Cipher

Public-Key Infrastructure

HTTPS: High-Level Description

  1. When contacted by client, server presents its signed certificate
  2. Client “authenticates” server through challenge/response using the public key
  3. Client/server agrees on a symmetric-key through a secure channel established through asymmetric-key cipher
  4. Client/server communicate securely through symmetric-key cipher

Multi-Factor Authentication

Popular Second Factor

Popular Second Factor

What We Learned