Q4: HTTPS / TLS and Certificates (L6) Flashcards

(19 cards)

1
Q

How can a user’s computer with a fresh browser installation connect securely to a website?

A

Modern browsers come with a preloaded set of trusted root Certificate Authorities (CAs)
When visiting a site (e.g., https://example.com), the browser checks that:
1. The site presents a valid digital certificate signed by a CA.
2. The CA is one of the trusted roots or part of a valid trust chain (root –> intermediate –> site certificate)
3. The certificate matches the domain and is within its validity period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of digital certificates?

A

They bind a public key to an entity (such as a domain name) and are digitally signed by a trusted CA to prove authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would web trust look like if certificates had not been invented?

A

We’d rely on manual trust mechanisms, like SSH’s “trust on first use” model – where users accept and remember a site’s key fingerprint themselves.
However, this scales poorly, creates usability risks, and is vulnerable to spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does this contrast with today’s system?

A

Today’s CA-based model automates trust verification via cryptographic signatures and pre-trusted roots, allowing immediate, global trust without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the TLS/SSL handshake?

A

To securely establish a shared session key and verify the server’s (and optionally the client’s) identity before data transfers begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Outline the key steps in the TLS handshake.

A
  1. Client Hello: Client proposes supported protocol versions, cipher suites, and compression options
  2. Server Hello: Server selects protocol and cipher suite, and sends its digital certificate
  3. Certificate Verification: Client verifies the certificate using its trusted CA store.
  4. Key Exchange: Client generates a pre-master secret, encrypts it with the server’s public key, and sends it.
    Both sides derive a session key from this shared secret.
  5. Handshake finished: Each side sends an encrypted “Finished” message, confirming key agreement.
    Secure communication begins using symmetric encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What role do certificates play in this handshake?

A

They authenticate the server’s identity (and optionally the client), enabling trust in the public key used to encrypt the pre-master secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why does SSL/TLS include negotiation of cryptographic protocols and ciphers?

A
  1. Backward compatibility: Allows older clients and servers to communicate using mutually supported cipher suites.
  2. Security flexibility: Enables adaptation to new standards – weaker algorithms can be phased out (e.g., SHA-1 –> SHA-256, RSA –> ECDHE)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is another benefit of negotiation?

A

It allows a client-driven security preference – the client proposes its strongest supported ciphers first, improving connection security without breaking interoperability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why does TLS use asymmetric cryptography only during the handshake?

A

Asymmetric encryption (RSA/ECDHE) is computationally expensive, but only needed for authentication and key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What two benefits come from switching to symmetric cryptography for data transfer?

A
  1. Speed: Symmetric encryption (e.g., AES) is much faster and suitable for large data throughput.
  2. Efficiency: After handshake, both sides share the same session key, reducing CPU load and latency for the remainder of the connection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s an example of this hybrid approach?

A

TLS may use RSA or ECDHE for the handshake and AES-GCM for data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens if the private key corresponding to a site’s certificate is stolen?

A

An attacker can impersonate the legitimate site, decrypt user traffic, or perform man-in-the-middle (MITM) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can the use of a stolen certificate be stopped?

A
  1. Certificate Revocation Lists (CRLs):
    The CA publishes a signed list of revoked certificate serial numbers
    Clients must download and check it (not always timely)
  2. Online Certificate Status Protocol (OCSP):
    Browser queries the CA’s server in real time to check if a certificate is still valid.
    Faster and more up-to-date than CRLs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are weaknesses of revocation systems?

A

CRLs grow over time and can become large.
OSCP can suffer replay attacks or availability issues
Not all clients enforce revocation checking strictly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are client-side certificates used for?

A

They authenticate users to servers (as opposed to servers to clients), proving the user’s identity via a certificate issued by a trusted CA

17
Q

What is one benefit of client-side certificates?

A

Provide strong, cryptographic authentication, eliminating passwords and reducing phishing or credential reuse risks.

18
Q

What is one downside of client-side certificates?

A

Poor usability and management: Users find it difficult to install, back up, or transfer certificates
Not widely supported by consumer websites – most rely on username/password plus 2FA

19
Q

Where are client certificates more common?

A

Enterprise environments, government systems, and secure VPN access – rarely in public banking or retail contexts.