16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

230 Chapter 9<br />

key hidden from the public, then the user can be fairly certain that the unknown certificate has<br />

been verified by the “ trusted ” third-party CA. As long as the CA is trusted by the user, then<br />

verification via this mechanism extends that trust to the unknown party.<br />

Obviously, the trust in the CA is the most important link in a PKI chain. If you do not<br />

trust the company doing the signing, then there is no guarantee that a signed certificate<br />

has any validity whatsoever. However, CA’s rely on trust, so their reputation, and hence<br />

their profits, are directly tied to the verification of certificate holders. Through traditional<br />

and physical means, a CA will usually follow up on the identity of a certificate holder<br />

before providing an authorized digital signature. The caveat here is that the CA provides<br />

only a guarantee that the certificate matches the person (or entity) providing it, not that<br />

the person is inherently trustworthy. It is completely up to the recipient of the certificate<br />

doing the verification to decide if the provider is trustworthy.<br />

Certificate Authorities can also extend trust to other companies or entities that provide<br />

signing services under the umbrella of the root CA’s trust. These companies are called<br />

“ intermediate Certificate Authorities. ” An intermediate CA has its own root certificate<br />

that is actually signed by the root CA. Through this hierarchy, trust can be extended<br />

from the root CA to the intermediate CA, and finally to the end user. This hierarchy of<br />

extended trust is typically referred to as a “ certificate chain, ” since the authentication<br />

forms a chain from the root CA to the end-user certificates. This chain is precisely<br />

like the governmental hierarchy from the analogy above, where the root CA is like the<br />

government, the intermediate CA is like the Department of Motor Vehicles, and the enduser<br />

certificate is like the driver’s license. For better or worse, however, a CA is not an<br />

elected body, but rather a company that has established itself in the industry as a trusted<br />

signing entity. The foremost example of a root CA operating at the “ governmental ” level<br />

is Verisign. A quick look in any web browser at the built-in certificates will show a large<br />

number of Verisign certificates, or certificates from intermediate CA’s that are covered<br />

under the Verisign PKI—see Figure 9.11 for a comparison with our previous driver’s<br />

license example.<br />

PKI is definitely not the only way to provide a network of trust for digital documents,<br />

but it has become the de facto standard because of the perceived trustworthiness in<br />

paying for authentication. One of the major drawbacks of PKI is that a single company<br />

or small group of companies controls the entirety of trust on the Internet, creating both<br />

a bottleneck and a single point of failure. Some security experts are of the opinion that<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!