Public Key Infrastructure (PKI) and Cryptography Lecture
Introduction to Public Key Infrastructure (PKI)
Definition: PKI is a broad term in cryptography usually referring to policies, procedures, hardware, and software responsible for creating, distributing, managing, storing, revoking, and performing processes associated with digital certificates.
Importance: Requires substantial planning and decisions about encryption methods within a company.
Association: PKI is used to associate certificates to people or devices, generally with a Certificate Authority (CA).
Trust is based on verifying the identity of users or devices.
Symmetric Encryption
Concept: Uses the same key for encryption and decryption.
Often depicted in movies as a secret key in a suitcase, secured by handcuffs.
Terminology: Sometimes called a "secret key algorithm" or "shared secret".
The same key is shared for encryption and decryption, which can create scalability issues.
Difficult to manage and share keys beyond a small group (e.g., 10 people/devices).
Usage: Despite drawbacks, it's used extensively due to speed and low overhead compared to asymmetric encryption.
Asymmetric Encryption
Concept: Uses two different keys—one for encryption (public key) and another for decryption (private key).
Both keys are mathematically related and created simultaneously.
Key Management:
Private Key: Only accessible to one person or device.
Public Key: Available to the public and used by anyone to encrypt data.
Process:
Data encrypted with a public key can only be decrypted with the corresponding private key.
Security: Public and private keys are mathematically related, but it's impossible to derive one from the other.
Key Generation and Use
Tools: Applications like PGP or GPG facilitate asymmetric encryption.
Creation: Involves randomization, prime numbers, and cryptography, generating a public-private key pair.
Public Key: Distributed widely.
Private Key: Stored securely, often with a password for extra protection.
Example Scenario: Alice and Bob
Scenario:
Alice creates a public-private key pair.
Bob uses Alice's public key to encrypt a message and sends the cipher text to Alice.
Alice uses her private key to decrypt the message, reverting it to plain text.
Security: Only Alice’s private key can decrypt Bob's encrypted message, ensuring security.
Managing Keys in Large Environments
Challenges: Managing numerous public and private key pairs for hundreds or thousands of users.
Solutions:
Key escrow: Third parties manage private keys.
Storing keys locally for continued access even if a user leaves.
Providing access to encrypted data for organizational continuity.
Conclusion
Asymmetric encryption provides robust security by utilizing mathematically related public and private keys.
Effective key management is crucial in large organizations to maintain data access and security.