Page 262 - CISSO_Prep_ Guide
P. 262

issuing CA ID, subject ID, and digital
                          signature.

               Public Key Infrastructure (PKI)
                   •  Provides the foundation for secure e-
                       business.
                   •  A method for distributing trusted keys.
                   •  Provides confidentiality, access control,
                       integrity, authentication, non-repudiation.
                   •  Public keys published as certificates.


               Key Management
                   •  The key-encrypting keys must be separate
                       from the data keys.
                   •  Key escrow: the third party holds on to keys.
                   •  Key distribution center (KDC):
                          •  End-to-end encryption
                          •  Each user gets a key

               Cryptanalysis and Attacks
                   •  Ciphertext only attack:
                          •  You have a sample of ciphertext only.
                          •  Hardest.
                          •  The object is to crack one message.
                   •  Known plaintext attack:
                          •  You have ciphertext & corresponding
                              plaintext.
                          •  Object is to get the key.
                   •  Chosen plaintext attack:
   257   258   259   260   261   262   263   264   265   266   267