Knowledge

Key authentication

Source đź“ť

22: 180:
algorithms do not evade the problem either. That a public key can be known by all without compromising the security of an encryption algorithm (for some such algorithms, though not for all) is certainly useful, but does not prevent some kinds of attacks. For example, a spoofing attack in which public
124:
is used to solve the problem of authenticating the keys of a person (say "person A") that some other person ("person B") is talking to or trying to talk to. In other words, it is the process of assuring that the key of "person A", held by "person B", does in fact belong to "person A" and vice versa.
131:
The simplest solution for this kind of problem is for the two concerned users to communicate and exchange keys. However, for systems in which there are a large number of users or in which the users do not personally know each other (e.g., Internet shopping), this is not practical. There are various
215:
service, if you will. Such CAs can be private organizations providing such assurances, or government agencies, or some combination of the two. However, in a significant sense, this merely moves the key authentication problem back one level for any CA may make a good faith certification of some key
192:, is easily possible. No public key is inherently bound to any particular user, and any user relying on a defective binding (including Alice herself when she sends herself protected messages) will have trouble. 216:
but, through error or malice, be mistaken. Any reliance on a defective key certificate 'authenticating' a public key will cause problems. As a result, many people find all PKI designs unacceptably insecure.
128:
This is usually done after the keys have been shared among the two sides over some secure channel. However, some algorithms share the keys at the time of authentication.
148:
who is trying to read or spoof the communication. There are various algorithms used now-a-days to prevent such attacks. The most common among the algorithms are
211:) represents to both parties involved that the public keys each holds which allegedly belong to the other, actually do so. A digital 86: 58: 165: 65: 39: 355: 336: 105: 72: 207:(CA) acts as a 'trusted third party' for the communicating users and, using cryptographic binding methods (e.g., 149: 161: 54: 43: 365: 260: 229: 200: 301: 186: 145: 380: 235: 153: 132:
algorithms for both symmetric keys and asymmetric public key cryptography to solve this problem.
32: 79: 306: 286: 240: 196: 255: 250: 204: 291: 8: 276: 157: 185:
is claimed publicly to be that of user Alice, but is in fact a public key belonging to
332: 208: 189: 245: 177: 374: 271: 212: 141: 296: 281: 266: 219:
Accordingly, key authentication methods are being actively researched.
21: 360: 171: 144:
cryptography, this is the problem of assuring that there is no
327:
Tanenbaum, Andrew S.; Wetherall, David J. (7 October 2010).
195:
The most common solution to this problem is the use of
135: 46:. Unsourced material may be challenged and removed. 326: 372: 199:and certificate authorities (CAs) for them in a 361:Kerberos: The Network Authentication Protocol 140:For key authentication using the traditional 172:Authentication using Public Key Cryptography 164:. Other methods that can be used include 106:Learn how and when to remove this message 373: 166:Password-authenticated key agreement 44:adding citations to reliable sources 15: 119: 13: 14: 392: 366:Kerberos Authentication explained 349: 136:Authentication using Shared Keys 20: 31:needs additional citations for 320: 1: 313: 356:Honest Achmed asks for trust 7: 222: 150:Diffie–Hellman key exchange 10: 397: 187:man-in-the-middle attacker 162:Needham–Schroeder protocol 146:man-in-the-middle attacker 261:Identity based encryption 230:Public-key infrastructure 201:public-key infrastructure 302:Transport Layer Security 236:Public-key cryptography 197:public key certificates 154:Key distribution center 152:, authentication using 307:Threshold cryptosystem 287:Public key fingerprint 241:Key-agreement protocol 122:/Config-authentication 256:ID-based cryptography 251:Certificate authority 205:certificate authority 176:Crypto systems using 292:Quantum cryptography 55:"Key authentication" 40:improve this article 277:Pretty Good Privacy 209:digital signatures 203:(PKI) system. The 329:Computer Networks 116: 115: 108: 90: 388: 343: 342: 324: 121: 111: 104: 100: 97: 91: 89: 48: 24: 16: 396: 395: 391: 390: 389: 387: 386: 385: 371: 370: 352: 347: 346: 339: 325: 321: 316: 311: 225: 174: 168:protocols etc. 138: 112: 101: 95: 92: 49: 47: 37: 25: 12: 11: 5: 394: 384: 383: 381:Key management 369: 368: 363: 358: 351: 350:External links 348: 345: 344: 338:978-0132126953 337: 318: 317: 315: 312: 310: 309: 304: 299: 294: 289: 284: 279: 274: 269: 264: 258: 253: 248: 246:Access control 243: 238: 233: 226: 224: 221: 178:asymmetric key 173: 170: 137: 134: 114: 113: 28: 26: 19: 9: 6: 4: 3: 2: 393: 382: 379: 378: 376: 367: 364: 362: 359: 357: 354: 353: 340: 334: 330: 323: 319: 308: 305: 303: 300: 298: 295: 293: 290: 288: 285: 283: 280: 278: 275: 273: 272:PGP word list 270: 268: 265: 262: 259: 257: 254: 252: 249: 247: 244: 242: 239: 237: 234: 231: 228: 227: 220: 217: 214: 210: 206: 202: 198: 193: 191: 188: 184: 179: 169: 167: 163: 159: 155: 151: 147: 143: 142:symmetric key 133: 129: 126: 123: 110: 107: 99: 96:November 2023 88: 85: 81: 78: 74: 71: 67: 64: 60: 57: â€“  56: 52: 51:Find sources: 45: 41: 35: 34: 29:This article 27: 23: 18: 17: 328: 322: 297:Secure Shell 282:Pseudonymity 218: 194: 182: 175: 139: 130: 127: 118: 117: 102: 93: 83: 76: 69: 62: 50: 38:Please help 33:verification 30: 331:. Pearson. 314:References 267:Key escrow 66:newspapers 375:Category 223:See also 158:kerberos 80:scholar 335:  213:notary 190:Mallet 82:  75:  68:  61:  53:  263:(IBE) 232:(PKI) 87:JSTOR 73:books 333:ISBN 181:key 160:and 59:news 120:Key 42:by 377:: 156:, 341:. 183:A 109:) 103:( 98:) 94:( 84:· 77:· 70:· 63:· 36:.

Index


verification
improve this article
adding citations to reliable sources
"Key authentication"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
symmetric key
man-in-the-middle attacker
Diffie–Hellman key exchange
Key distribution center
kerberos
Needham–Schroeder protocol
Password-authenticated key agreement
asymmetric key
man-in-the-middle attacker
Mallet
public key certificates
public-key infrastructure
certificate authority
digital signatures
notary
Public-key infrastructure
Public-key cryptography
Key-agreement protocol
Access control

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑