21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A digital certificate contains information about the person or organization to whom<br />

it was issued (the subject) as well as information about the organization that issued<br />

the certificate (the issuer). The issuer signs the certificate with its private key, and the<br />

certificate may contain all of the information necessary to validate that signature,<br />

including its public key. However, such information should not actually be used to<br />

validate the signature on the certificate. After all, anyone could create a key pair to<br />

use in signing, place it in the certificate, and claim it is from the issuer.<br />

Certificates also have a serial number that is unique, at least across all certificates<br />

from a given issuer. The serial number can be used to identify a certificate quickly.<br />

The basic idea here is that the issuer signs the certificate with its private key, so anyone<br />

who has securely obtained the issuer’s public key will be able to validate the<br />

authenticity of the entire certificate. The entity to whom the certificate was issued<br />

cannot change data in it, such as the expiration date. If she tries, the signature will<br />

not check out.<br />

Clearly, the issuer is vouching that the information in the certificate is correct when<br />

it signs. If you trust the issuer’s validation of the core information, you should be<br />

able to trust its signature.<br />

Once a certificate has been issued, it is generally put into production. The entity with<br />

the certificate gives it to parties that wish to communicate. Other people can validate<br />

the certificate by checking the signature, assuming that they have securely<br />

obtained the public key of the issuer. They can encrypt data to the public key found<br />

in the certificate, and only the entity to which the certificate was issued should have<br />

the corresponding private key needed to decrypt the data.<br />

The issuer does not even have a copy of the private key. Generally, the subject generates<br />

a key pair (a public key and an associated private key) and bundles the public<br />

key along with a bunch of information into a certificate-signing request. The certification<br />

authority (often called simply a CA) or its designate authenticates the data,<br />

perhaps requiring interaction from the subject. Then, when it is confident enough,<br />

the CA will create the final certificate, sign it, and give it back to the subject.<br />

Certification authorities<br />

A CA is an organization or company that issues certificates. A CA takes on the<br />

responsibility of ensuring that the certificates it issues are legitimate. Nonetheless,<br />

this does not mean that CAs are infallible. For example, there have been publicly<br />

documented instances where VeriSign has issued certificates in Microsoft’s name to<br />

someone not affiliated with Microsoft.<br />

There are two basic types of CA:<br />

Public CAs<br />

An example is VeriSign. Anyone that a public CA is able to validate can get a certificate.<br />

Understanding Public Key Infrastructure (PKI) | 505<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!