26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

228 INTERNET SECURITY<br />

The key identifier field of the authority key identifier extension must be included in<br />

all certificates generated by conforming CAs to facilitate chain building. The value of the<br />

key identifier field should be derived from the public key used to verify the certificate’s<br />

signature or a method that generates unique values. This field helps the correct certificate<br />

for the next certification authority in the chain to be found.<br />

Subject key identifier extension<br />

The subject key identifier extension provides a means of identifying certificates that contain<br />

a particular public key.<br />

To facilitate chain building, this extension must appear in all conforming CA certificates<br />

including the basic constraints extension. The value of the subject key identifier<br />

is the value placed in the key identifier field of the authority key identifier extension of<br />

certificates issued by the subject of the certificate.<br />

For CA certificates, subject key identifiers should be derived from the public key or a<br />

method that generates unique values. Two common methods for generating key identifiers<br />

from the public key are:<br />

• The key identifier is composed of the 160-bit SHA-1 hash value of the bit string of<br />

the subject public key.<br />

• The key identifier is composed of a four-bit-type field with 0100 followed by the least<br />

significant 60 bits of the SHA-1 hash value of the bit string of the subject public key.<br />

For end entity certificates, the subject key identifier extension provides a means of identifying<br />

certificates containing the particular public key used in an application. For an<br />

end entity which has obtained multiple certificates from multiple CAs, the subject key<br />

identifier provides a mean to quickly identify the set of certificates containing a particular<br />

public key.<br />

Key usage extension<br />

This extension defines the key usage for encryption, signature and certificate signing with<br />

the key contained in the certificate. When a key which is used for more than one operation<br />

is to be restricted, the usage restriction is required to be employed. An RSA key should be<br />

used only for signing; the digital signature and/or non-repudiation bits would be asserted.<br />

Likewise, when an RSA key is used only for key management, the key encryption bit<br />

would be asserted. Bits in the key usage type are used as follows:<br />

Key Usage :: = Bit String {<br />

digital signature bit (0)<br />

non-repudiation bit (1)<br />

key encryption bit (2)<br />

data encryption bit (3)<br />

key certificate sign bit (4)<br />

key agreement sign bit (5)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!