- Show how signed data is generated by a sender and how it is validated receiver.
Keys of the Sender:
Pus – Public Key
Prs – Private Key
Cipher capabilities of sender:
SHA2 – Hashing algorithm
Keys of the Receiver: NONE
Ciphers capabilities of receiver:
SHA2 – Hashing algorithm (10 points)
- What is the need for “certificate validation” in Asymmetric Key Cryptography? Show your answer highlighting how Man in the Middle (MITM) attack works. (10 points)
- What is the certificate validation hierarchy? Show the validation process of a X509 certificate from the Root CA and a SubCA.(10 Points)
Certificate 1:
Certificate 2:
- What are the two types of revocation commonly used with public key certificates? Identify the differences between them. (10 points)