Outline for November 3, 2003
Reading: Chapters 12.3-12.6
Discussion Problem
The PGP secure mailing system uses both RSA and a classical cipher
called IDEA. When one installs PGP, the software generates two
large (512 bits or so) numbers, to produce a modulus of 1024 bits.
Such a number is too large to be factored easily. The private and
public keys are generated from these quantities. The private key
is enciphered with a classical cipher using a user-supplied pass
phrase as the key. To send a message, a 128-bit key is randomly
generated, and the message enciphered using IDEA with that key;
the key is enciphered using the recipient's public key, and the
message and enciphered key are sent.
- If you needed to compromise a user's PGP private key, what
approaches would you take?
- It's often said that PGP gets you the security of a key with
length 1024. Do you agree?
Outline for the Day
- Challenge-response systems
- Computer issues challenge, user presents response to verify secret information known/item possessed
- Pass-algorithms
- One-time passwords (example: S/Key)
- Hardware: token/calculator, time card
- Attack: dictionary search for k given challenge r,
response Ek(r)
- Defense: encipher random challenges
- Biometrics
- Depend on physical characteristics
- Examples: pattern of typing (remarkably effective), retinal scans, etc.
- Location
- Bind user to some location detection device (human, GPS)
- Authenticate by location of the device
- Combinations
- PAM
Here is a PDF version of this document.