Data Protection and Security |
||||||
VIII |
Standards and Protocols |
|||||
VIII.II |
Public Key Infrastructure |
|||||
In Chapter 4, we have seen different public key cryprography algorithms either for encryption and/or digital signatures. In all of these, remember that there are two keys per user. One of these keys is the private key which is known only by its owner. The other key is the public key which should be known by others who either want to send an encrypted message to the user or verify a digital signature orginated by the user. In chapter 4, we have also explained security attacks possible if the link between the public key and its owner is not established securely. This problem of securely distributing public keys is not straightforward to solve. In this chapter, our first goal is to explore the components of the solution to this essential problem. A public key infrastructure consists of components necessary to securely distribute public keys. It consists of:
A (public key) certificate is a signed message vouching that a particular name goes with a particular public key. Here, the assumption is you know and trust the public key corresponding to the private key used to generate the certificate.
|
||||||
VIII.II.I Q |
[+] Question
[-] Question
What if you do not know the public key to be used for verifying the certificate? |
|||||
|
||||||
|
chapter index | |||||