This is a Clilstore unit. You can link all words to dictionaries.

UNIT 1 SECURITY- ACTIVITY 3 SIMULATING THE USE OF DIGITAL CERTIFICATES. 4ESO

 

UNIT 1 – SECURITY AND INTEGRITY

 

INTRODUCTION

 

In this part of the unit we are talking about how to make sure, the communications through a shared channel, like internet, where there are many bad guys, who might intercept the messages, read and modify them, and even usurp the identity of other people with evil intent.

 

All these elements are meant to make sure the communications from a legal standpoint. This concept is also known as to provide LEGAL SECURITY in the Internet

 

ACTIVITY 3

AUTHENTICATION THROUGH A CERTIFYING ENTITY

 

The digital signature has an important flaw when it comes to verify the origin of a message. If the sender's public key has been sent through a shared channel like Internet, the receiver can't ascertain that the public key he has received was really coming from the true sender. Maybe it was actually sent for somebody in the middle who pretends to be the sender, or maybe the message from the sender was intercepted for someone in the middle who replaced the authentic sender's public key by its own.

 

All this can sound to you as very unlikely, but from a legal point of view it it is enough that this event is feasible, to have very serious legal consequences, to the point of making impossible, in many situations to prosecute a cyber criminal blatantly caught in the act committing a crime.

 

This problem has two solutions:

 

 

A certifying authority is an organization, usually (but not always) public, who provides digital certificates to users, identifying them against third parts. There are many CA's in the world but in our geographic space, the most important are the ACCV (Autoritat Certificadora de la Comunitat Valenciana) belonging to the Generalitat Valenciana, and the FNMT( Fabrica Nacional de Moneday Timbre) belonging to the Government of Spain. On an International level, the most important certifying entity are the private companies Symantec and Comodo. In order to get a certificate from the FNMT the user must go tot a post office and fill a form. When the user's info is registered in the system he will receive a link to download the files needed to install the certificate into the web browser.

 

 

ACTIVITY 3 SIMULATING THE TRANSFER OF THE MESSAGE USING A DIGITAL CERTIFICATE TO AUTHENTICATE THE SENDER.

 

This activity will be made by a group of three students.

 

STEP 1. ONLY FOR THE STUDENT ACTING AS THE CA

 

.

Click on advanced settings and enable the option authentication.

 

 

IDENTIFICATION AND CERTIFICATE ISSUANCE

 

The student acting as CA must perform this tasks.

 

 

 

 

The identity of this email sender has been reliably verified by CERTIFIED AUTORITY PEPEANTOLIN PEREZ

 

SENDER:FULANO DE TAL

DNI: 3423423423E

 

This document has been encrypted with the private key of CERTIFIED AUTORITY PEPEANTOLIN PEREZ wich entails that to make sure the authenticiy of the sender's identity you just have to decrypt his/her certificate using CERTIFIED AUTORITY PEPEANTOLIN PEREZ public key

 

Download CERTIFIED AUTORITY PEPEANTOLIN PEREZ in this link

 

www.ca-antolinperez.org/publickey

 

 

 

SENDER TASK

 

The sender have to send a document to the receiver , making sure it won't be altered through the net and giving a proof of his identity

 

 

RECEIVER TASKS

 

The receiver, onces received the message from the sender, must check out the sender identity.

 

 

 

Carry out the activity other two times, changing the roles so that each team member acts as a CA, sender and receiver.

 

When finished, call the teacher to assess the activity.

Felipe Martínez. Dept. Informàtica 6/7

IES EL CABANYAL- VALENCIA

Short url:   http://multidict.net/cs/4498