19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.84 Forged certificates<br />

<strong>The</strong> purpose of certificates is to link a public cryptographic code to a person.<br />

<strong>The</strong> link of a code to the name of a person is then protected cryptographically<br />

using the digital signature of a reliable neutral organisation. <strong>The</strong>se certificates<br />

are then used by a third person to check digital signatures of the person<br />

identified in the certificate or to send this person data with the code recorded<br />

in the certificate.<br />

If such a certificate is forged, false signatures seem to be correct when<br />

checked and are associated with the person in the certificate or data is encoded<br />

and sent with a code which may be insecure. Both opportunities for attack<br />

may induce a perpetrator to bring forged certificates into circulation.<br />

Forged certificates can be produced in various ways:<br />

- Internal perpetrators from the neutral organisation create a certificate with<br />

false entries using their own signature code. This certificate is authentic<br />

and is verified to be correct when tested.<br />

- Perpetrators pretend to be someone else and demand a certificate which is<br />

made out to this person, although the perpetrators are in possession of the<br />

secret code which corresponds with the public code.<br />

- Perpetrators produce a certificate and sign it with a code of their own. <strong>The</strong><br />

forgery is only noticed if the certificate is tested and it is possible to<br />

determine that the certificate was made out by an unreliable organisation.<br />

Once perpetrators have somehow got hold of a certificate with wrong entries,<br />

they can pretend to be someone else when communicating with peers at any<br />

time, both when sending and when receiving messages.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!