Homework 1
1. Show how signed data is generated by a sender and how it is validated receiver.
Data
Keys of the Sender:
Pus – Public Key
Prs – Private Key
Cipher capabilities of sender:
SHA2 – Hashing algorithm
Keys of the Receiver: NONE
Ciphers capabilities of receiver:
SHA2 – Hashing algorithm (10 points)
2. What is the need for “certificate validation” in Asymmetric Key Cryptography? Show your answer highlighting how Man in the Middle (MITM) attack works. (10 points)
3. What is the certificate validation hierarchy? Show the validation process of a X509 certificate from the Root CA and a SubCA.(10 Points)
X509 Certificate 2
X509 Certificate 1
SUB CA
ROOT CA
Certificate 1:
Certificate 2:
4. What are the two types of revocation commonly used with public key certificates? Identify the differences between them. (10 points)