21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter CHAPTER 10 10<br />

Public Key Infrastructure<br />

In Recipe 7.1, we described an attack known as a man-in-the-middle attack, in which<br />

an attacker could intercept and even manipulate communications secured with public<br />

key cryptography. The attack is possible because public key cryptography provides<br />

no means of establishing trust when used on its own. Public key infrastructure<br />

(PKI) provides the means to establish trust by binding public keys and identities,<br />

thus giving reasonable assurance that we are communicating securely with whom we<br />

think we are.<br />

In the real world, we often have no way of knowing firsthand who a public key<br />

belongs to, and that is a big problem. Unfortunately, there is no sure-fire way to<br />

know that we are communicating with whom we think we are. The best we can do is<br />

extend our trust to a third party to certify that a public key belongs to the party that<br />

is claiming ownership of it. That is where PKI fits in.<br />

PKI is important to using public key cryptography effectively and is essential to<br />

understanding and using the SSLprotocol. The recipes in this chapter provide an<br />

overview of PKI and how to use it effectively with both OpenSSL and CryptoAPI.<br />

10.1 Understanding Public Key Infrastructure (PKI)<br />

<strong>Problem</strong><br />

You want a fundamental understanding of PKI.<br />

Solution<br />

Read the following discussion for an overview of basic PKI concepts. For a more<br />

detailed treatment, we recommend the book Planning for PKI: Best Practices Guide<br />

for Deploying Public Key Infrastructure by Russ Housley and Tim Polk (John Wiley<br />

& Sons).<br />

502<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!