02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

66 Chapter 3 ■ Cryptography<br />

The CA will require a party to provide information that proves identity. Items such as<br />

name, address, phone, physical data such as faxed records, and other records and personal<br />

interviews might also be required as policy dictates. Once this information is obtained and<br />

validated, the CA will issue the certificate or validate an existing certificate. A publicly<br />

owned CA such as Thawte or VeriSign typically will perform a background check by asking<br />

the requester to provide documentation such as a driver’s license, passport, or other<br />

form of ID.<br />

When a CA issues a certificate, a series of actions that you should know about takes place:<br />

1. The request is received.<br />

2. Background information is requested by the CA and validated.<br />

3. The information provided by the requester is applied to the certificate.<br />

4. The CA hashes the certificate.<br />

5. The issuing CA signs the certificate with their private key.<br />

6. The requester is informed that their certificate is ready for pickup.<br />

7. The requester installs the certificate on their computer or device.<br />

A CA is able to perform a number of roles in addition to the validation process outlined<br />

here. Some actions that a CA is called on to perform include the following:<br />

Generation of the Key Pair When a CA goes through the process of creating a certificate,<br />

a key pair that is made up of a public and private key is generated. The public key is made<br />

available to the public at large whereas the private key is given to the party requesting the<br />

digital certificate.<br />

Generation of Certificates The CA generates digital certificates for any authorized party<br />

when requested. This certificate is generated after validation of the identity of the requesting<br />

party, as mentioned earlier.<br />

Publication of the Public Key The public key is bound to each digital certificate. Anyone<br />

who trusts the CA or requests the public key will get the key for their use.<br />

Validation of Certificates When a certificate is presented by one party to another it must<br />

be validated. Since both parties involved typically do not know each other, they must rely<br />

on a third party who is trusted; this is the role of the CA.<br />

Revocation of Certificates If a certificate is no longer needed or trusted, it can be revoked<br />

before it expires.<br />

All CAs are not the same. The types of CAs are as follows:<br />

Root CA The root CA initiates all trust paths. The root CA is the top of the food chain<br />

and thus must be secured and protected; if its trust is called into question, all other systems<br />

will become invalid.<br />

Trusted Root CA A trusted root CA of a CA which is added to an application such as a<br />

browser by the software vendor. It signifies that the application vendor trusts the CA and<br />

assigns the entity a high level of trust.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!