ICT2213 Applied Cryptography Lecture 11: Key Management (Key Distribution)

SelfRespectPlanet9829 avatar
SelfRespectPlanet9829
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the primary purpose of public-key cryptography in key distribution?

To distribute secret keys securely between sender and receiver

What is the purpose of a Public Key Infrastructure (PKI) in cryptography?

To create and manage digital certificates

What is the main advantage of the Web-of-Trust model compared to the PKI model?

It does not rely on trusted third parties

What is the purpose of a certificate chain in a PKI system?

<p>To verify the authenticity of a public key</p> Signup and view all the answers

What is the main problem with the PKI model mentioned in the text?

<p>It relies on trusted third parties</p> Signup and view all the answers

What is the main purpose of symmetric encryption in the context of key management?

<p>To distribute secret keys securely</p> Signup and view all the answers

Who can set up a trusted root CA?

<p>Both profit-making and non-profit organizations</p> Signup and view all the answers

How do applications like web browsers typically handle root CA certificates?

<p>By hardcoding a list of presumed trusted root CAs</p> Signup and view all the answers

Who certifies the public key of a root CA?

<p>The root CA itself through a self-signed certificate</p> Signup and view all the answers

What is the main concern regarding trusting root CAs?

<p>Hardcoded root CAs may not always be trustworthy</p> Signup and view all the answers

Why is it challenging to fully trust a self-signed certificate from a root CA?

<p>There is no way to verify the authenticity of a self-signed certificate</p> Signup and view all the answers

What is the primary purpose of PKI (Public Key Infrastructure) in the context of HTTPS websites?

<p>To ensure users are visiting authentic and secure websites</p> Signup and view all the answers

What percentage of phishing websites were reported to be using HTTPS in 2021?

<p>82%</p> Signup and view all the answers

In the Web-of-Trust model, how can a public key be certified?

<p>Both B and C</p> Signup and view all the answers

What is the potential risk associated with the Web-of-Trust model?

<p>Careless or malicious users can impact its security</p> Signup and view all the answers

Which protocol implements the idea of Web-of-Trust for secure communications?

<p>PGP</p> Signup and view all the answers

According to the 'Key continuity management' solution, how can a new public key be trusted?

<p>By trusting public keys that have been in use for a long time</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser