Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

41
Chapter 8 Secret and Public Keys

Transcript of Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

Page 1: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

Chapter 8

Secret and Public Keys

Page 2: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F01: Using a passphrase for a file encryption key.

Page 3: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F02: Hashing a passphrase for a file encryption key.

Page 4: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F03: Reusing the same key stream.

Courtesy of Dr. Richard Smith

Page 5: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F04: Eliminating both key streams with “xor.”

Courtesy of Dr. Richard Smith

Page 6: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F05: Using a nonce to construct the encryption key.

Page 7: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F06: Wrapping a key: The KEK encrypts the CEK.

Page 8: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F07: Key splitting with xor.

Page 9: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F08: Separation of Duty for an early nuclear missile.

Photographed by Dr. Richard Smith at the Titan Missile Museum

Page 10: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F09: Keys on the DVD hidden track.

Page 11: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F10: Decrypting a DVD sector.

Page 12: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F11: Public-key encryption.

Page 13: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F12: Constructing the public/private key pair.

Page 14: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

TABLE 8.0.T01: Comparison of secret-key and public-key crypto

Page 15: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F13: Asymmetric encryption algorithms.

Page 16: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F14: Procedure for Diffie-Hellman secret sharing.

Page 17: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

EQUATION 8.0.Eq01

Page 18: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

EQUATION 8.0.Eq02

Page 19: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

EQUATION 8.0.Eq03

Page 20: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F15: Encapsulating a key with Alice’s RSA public key.

Page 21: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F16: Retrieving the key with Alice’s RSA private key.

Page 22: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F17: Constructing an RSA key pair.

Page 23: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

EQUATION 8.0.Eq04

Page 24: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

TABLE 8.0.T02: Comparable Key Sizes

Page 25: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F18: Bit-flipping attack on encryption with xor.

Page 26: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F19: Data encrypted with its checksum.

Page 27: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F20: An IOU with an adjustable check value.

Page 28: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

EQUATION 8.0.Eq05

Page 29: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F21: Encrypting a hash: two steps.

Page 30: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F22: Keying a hash: one step.

Page 31: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F23: Signing a check with a digital signature.

Page 32: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F24: Constructing an RSA digital signature.

Page 33: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F25: Verifying an RSA digital signature.

Page 34: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F26: Eve performs a bucket brigade attack.

Page 35: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F27: Constructing a public-key certificate for Alice.

Page 36: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F28: Checking a certificate chain.

Page 37: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F29: A certificate hierarchy that spans multiple enterprises.

Page 38: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F30: A web of trust.

Page 39: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F31: Procedure for verifying a software update.

Page 40: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F32: A set of processes for trusted software update.

Page 41: Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.

FIGURE 8.0.F33: Little brother’s encryption program.