22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the place of that person. Thus, the signing component (machine, code, and so<br />

forth) must be trusted.<br />

Given the general security of the signing device (that is, the user’s computer) and<br />

the practice of putting keys in escrow (where they are available, technically, to<br />

the administrators and managers of the organization), digital signatures have<br />

proven to have little legal value in a court of law. Thus, the trust in digital<br />

signatures, at this time, should be balanced with an understanding of their<br />

fallibility in matters of complete and absolute non-repudiation.<br />

1.4.6 Public key certificates<br />

We have seen how public key cryptography overcomes the problem of having to<br />

pass a secret from sender to receiver. There is still a need to send a key, but now<br />

it is a public key, that anyone can see because it is only useful to an attacker if he<br />

also has the private key. However, this overlooks one crucial element of trust:<br />

how can you be sure that the public key really came from who you think it came<br />

from?<br />

One answer is to only pass public keys to someone you know. Bob and Alice<br />

have known each other for a long time (in fact, people have started to talk), so<br />

they could share their public keys by exchanging diskettes. For normal cases,<br />

however, you need some way to be sure that a public key is authentic.<br />

The mechanism for doing this is the public key certificate. This is a data structure<br />

containing a public key, plus details of the owner of the key, all digitally signed by<br />

some trusted third party. Now when Alice wants to send Bob her public key she<br />

actually sends a certificate. Bob receives the certificate and checks the<br />

signature. As long as it has been signed by a certifier that he trusts, he can<br />

accept that this really is Alice's key.<br />

Certificates in real life are more complex than this. Descriptions of how they are<br />

used in a variety of ways are in the detailed sections about SSL and Notes<br />

security later in this Redbook.<br />

1.4.7 Public key cryptographic standard<br />

All these cryptographic tools and techniques are not much good without a set of<br />

related, agreed-upon, standards to provide the basis for interoperability. These<br />

are called Public Key Cryptographic Standards (PKCS).<br />

PKCS is the set of informal inter-vendor standards developed in 1991 by RSA<br />

Laboratories with representatives of Apple, Digital, Lotus, Microsoft, MIT,<br />

Northern Telecom, Novell, and Sun. Since its publication in June 1991, PKCS<br />

Chapter 1. Fundamentals of IT security 39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!