SlideShare a Scribd company logo
Trusted Intermediaries
and
Security Handshake Pitfalls
Prepared By
Sukhvinder Singh
PHD Scholar
Trusted Intermediaries (3rd Party)
Its someone who sits between
two parties, entities that don’t
naturally trust each other and
provides a bridge.
Ex. Banks act as an
intermediaries between
depositors (seeking interest) and
borrowers (seeking debit /
withdrawal)
Who are the Trusted intermediaries in
Network Security ?
Why this third party is required?
Symmetric key problem Public key problem
• How do two entities establish shared
secret key over network?
• When Alice obtains Bob’s public key
(from web site, e-mail, diskette), how does
she know it is Bob’s public key, not Trudy’s?
Solution:
• Trusted key distribution center (KDC)
acting as intermediary between entities
Solution:
Trusted certification authority (CA)
Key Management
In public key setup all the participants will have a pair of public key and
private key
Bob
Alice
Vinod
Paveen
(ev, dv)
(eb, db)
(ep, dp)
(ea, da)
If Alice wants to send message to Paveen. Alice has to get Paveen's Public Key.
How the Alice will get the Paveen's Public Key?
There are two Distinct aspects of the use of public Key
encryptions
---The Distribution of Public Keys.
---The Use of Public Key encryption to distribute secret Keys.
Distribution of Public Key
1 Public announcement
Can be forged
2 Publicly available directory
Can be tampered
3 Public-key authorities (KDC)
Trusted 3rd party to maintain the directory
4 Public-key Certificates(CAs)
(To Avoid the bottleneck of Public-key authorities
they issue the certificates )
Public Announcement of Public Keys
Public Key Directory (PKD)
ID Public Key
Alice 1011001101011101
Bob 0110011110100011
Vinod 11001....................011
Praveen
Suppose Alice wants to send message to Praveen
This file maintained in the Public domain ( Like web sites etc)
Alice
Paveen
(ep )
E ep (m)
(ep )
PROBLEM : The Attacker can change the public key easily as it is Publically available
What is the Solution ?
(ep, dp)
Public-Key Authority
Public Key Certificates
How to obtain a certificate from Authorized party ?
Bob
Alice
Autho
(eAuth, dAuth)
(eb, db)
(ea, da)
Suppose Bob needs certificates
T || IDB || eb
E dAuth ( T || IDB || eb ) = CB
T || IDA || ea
E dAuth ( T || IDA || ea ) = CA
How the Alice and Bob will use the certificate to communicate?
BobAlice (eb, db)
T || IDB || eb
E dAuth ( T || IDB || eb ) = CB
Alice will ask certificate from Bob.
Then Alice has to verify the certificate by decrypting with Authority Public key
CB
D eAuth (CB)
D eAuth (E dAuth ( T || IDB || eb ) ) =
eb E eb (m)
Suppose I want to Modify or change the Public Key
Sukh
Auth
(eAuth, dAuth)
(es, ds)
T* || IDS || es*
Cs* = E dAuth ( T* || IDS || es* )
Cs = E dAuth ( T || IDS || es )
Cs* = E dAuth ( T* || IDS || es* )
New Certificate generated by the Authority
X.509 Authentication service
X.509 Authentication service
questions?

More Related Content

What's hot

Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
 
Minimization of DFA
Minimization of DFAMinimization of DFA
Minimization of DFA
kunj desai
 
Process Management-Process Migration
Process Management-Process MigrationProcess Management-Process Migration
Process Management-Process Migration
MNM Jain Engineering College
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
Assistant Professor
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
danishrafiq
 
Distributed network
Distributed networkDistributed network
Distributed network
Dhani Ahmad
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
Goodthingbetter
 
Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)
Sri Prasanna
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
Raji Lakshmi
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
kumari36
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
Rajat Kumar
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
Jahanzaib Niazi
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentation
Mohsan Ijaz
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Multiprocessor architecture
Multiprocessor architectureMultiprocessor architecture
Multiprocessor architecture
Arpan Baishya
 
recursive transition_networks
recursive transition_networksrecursive transition_networks
recursive transition_networks
Rajendran
 

What's hot (20)

Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
 
Minimization of DFA
Minimization of DFAMinimization of DFA
Minimization of DFA
 
Process Management-Process Migration
Process Management-Process MigrationProcess Management-Process Migration
Process Management-Process Migration
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Distributed network
Distributed networkDistributed network
Distributed network
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 
Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)Logical Clocks (Distributed computing)
Logical Clocks (Distributed computing)
 
Data link control & protocol concepts
Data link control & protocol conceptsData link control & protocol concepts
Data link control & protocol concepts
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Client Centric Consistency Model
Client Centric Consistency ModelClient Centric Consistency Model
Client Centric Consistency Model
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentation
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Multiprocessor architecture
Multiprocessor architectureMultiprocessor architecture
Multiprocessor architecture
 
recursive transition_networks
recursive transition_networksrecursive transition_networks
recursive transition_networks
 

Similar to Trusted intermediaries

Network Security
Network SecurityNetwork Security
Network Security
hj43us
 
Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
Sri Prasanna
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
kicknit123
 
"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014
"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014
"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014
it-people
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
ChSheraz3
 
Protocols for Public Key Management
Protocols for Public Key ManagementProtocols for Public Key Management
Protocols for Public Key Management
Shafaan Khaliq Bhatti
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
13
1313
Authentication (Distributed computing)
Authentication (Distributed computing)Authentication (Distributed computing)
Authentication (Distributed computing)
Sri Prasanna
 
Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
Gary Jan
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
Tutun Juhana
 
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
SmeetaJavalagi
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
MehediHasanShaon1
 
Part2-Apps-Security.pptx
Part2-Apps-Security.pptxPart2-Apps-Security.pptx
Part2-Apps-Security.pptx
Olivier Bonaventure
 
Part2-Apps-Security.pptx
Part2-Apps-Security.pptxPart2-Apps-Security.pptx
Part2-Apps-Security.pptx
Olivier Bonaventure
 

Similar to Trusted intermediaries (15)

Network Security
Network SecurityNetwork Security
Network Security
 
Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
 
1329 n 9460
1329 n 94601329 n 9460
1329 n 9460
 
"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014
"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014
"Writing Secure APIs" Armin Ronacher, PyCon Ru 2014
 
Network security.ppt
Network security.pptNetwork security.ppt
Network security.ppt
 
Protocols for Public Key Management
Protocols for Public Key ManagementProtocols for Public Key Management
Protocols for Public Key Management
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
13
1313
13
 
Authentication (Distributed computing)
Authentication (Distributed computing)Authentication (Distributed computing)
Authentication (Distributed computing)
 
Digital Security 101
Digital Security 101Digital Security 101
Digital Security 101
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
 
Part2-Apps-Security.pptx
Part2-Apps-Security.pptxPart2-Apps-Security.pptx
Part2-Apps-Security.pptx
 
Part2-Apps-Security.pptx
Part2-Apps-Security.pptxPart2-Apps-Security.pptx
Part2-Apps-Security.pptx
 

Recently uploaded

Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 

Recently uploaded (20)

Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 

Trusted intermediaries

  • 1. Trusted Intermediaries and Security Handshake Pitfalls Prepared By Sukhvinder Singh PHD Scholar
  • 2. Trusted Intermediaries (3rd Party) Its someone who sits between two parties, entities that don’t naturally trust each other and provides a bridge. Ex. Banks act as an intermediaries between depositors (seeking interest) and borrowers (seeking debit / withdrawal)
  • 3. Who are the Trusted intermediaries in Network Security ? Why this third party is required?
  • 4. Symmetric key problem Public key problem • How do two entities establish shared secret key over network? • When Alice obtains Bob’s public key (from web site, e-mail, diskette), how does she know it is Bob’s public key, not Trudy’s? Solution: • Trusted key distribution center (KDC) acting as intermediary between entities Solution: Trusted certification authority (CA)
  • 5. Key Management In public key setup all the participants will have a pair of public key and private key Bob Alice Vinod Paveen (ev, dv) (eb, db) (ep, dp) (ea, da) If Alice wants to send message to Paveen. Alice has to get Paveen's Public Key. How the Alice will get the Paveen's Public Key?
  • 6. There are two Distinct aspects of the use of public Key encryptions ---The Distribution of Public Keys. ---The Use of Public Key encryption to distribute secret Keys.
  • 7. Distribution of Public Key 1 Public announcement Can be forged 2 Publicly available directory Can be tampered 3 Public-key authorities (KDC) Trusted 3rd party to maintain the directory 4 Public-key Certificates(CAs) (To Avoid the bottleneck of Public-key authorities they issue the certificates )
  • 9. Public Key Directory (PKD) ID Public Key Alice 1011001101011101 Bob 0110011110100011 Vinod 11001....................011 Praveen Suppose Alice wants to send message to Praveen This file maintained in the Public domain ( Like web sites etc) Alice Paveen (ep ) E ep (m) (ep ) PROBLEM : The Attacker can change the public key easily as it is Publically available What is the Solution ? (ep, dp)
  • 10.
  • 13. How to obtain a certificate from Authorized party ? Bob Alice Autho (eAuth, dAuth) (eb, db) (ea, da) Suppose Bob needs certificates T || IDB || eb E dAuth ( T || IDB || eb ) = CB T || IDA || ea E dAuth ( T || IDA || ea ) = CA
  • 14. How the Alice and Bob will use the certificate to communicate? BobAlice (eb, db) T || IDB || eb E dAuth ( T || IDB || eb ) = CB Alice will ask certificate from Bob. Then Alice has to verify the certificate by decrypting with Authority Public key CB D eAuth (CB) D eAuth (E dAuth ( T || IDB || eb ) ) = eb E eb (m)
  • 15.
  • 16. Suppose I want to Modify or change the Public Key Sukh Auth (eAuth, dAuth) (es, ds) T* || IDS || es* Cs* = E dAuth ( T* || IDS || es* ) Cs = E dAuth ( T || IDS || es ) Cs* = E dAuth ( T* || IDS || es* ) New Certificate generated by the Authority
  • 17.
  • 19.
  • 21.
  • 22.
  • 23.
  • 24.

Editor's Notes

  1. In Slide Show mode, select the arrows to visit links.