SLIDE 1
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives
- Define digital certificates
- List the various types of digital certificates and how they are used
- Describe the components of Public Key Infrastructure (PKI)
- List the tasks associated with key management
- Describe the different cryptographic transport protocols
Digital Certificates
- Using digital certificates involves:
– Understanding their purpose – Knowing how they are authorized, stored, and revoked – Determining which type of digital certificate is appropriate for different situations – Used to associate (“bind”) the user’s identity to a public key – User must provide proof of their identity to obtain a Public key from a Trusted Agent. – User’s public key is “digitally signed” by a reputable source entrusted to sign it (trusted Certificate Authority or CA) – Trusted CA’s are recognized by the operating system and provide a path for the verification (root certificate chain) – This provides a mechanism to validate the certificate is valid and not expired or revoked. – Digital Certificates provide an international standards mechanism to exchange messages that provide proof of integrity and non-repudiation
- A digital certificate typically contains the following information:
– Owner’s name or alias – Owner’s public key – Name of the Issuer – Digital signature of the issuer – Serial number of the digital certificate – Expiration date of the public key Certificate Authority (CA): – An entity that publishes digital certificates (typically for others) – Houses Root Certificate Server (offline) – Generates certificates for entities who provide verification of identity – Provides validation services for certificates issued – Provided services to notify users of certificates no longer valid (revoked or expired) – CA’s can be external trusted or internal locally issued Storing and Verifying Digital Certificates
- Private Key Storage
– Stored on the issued individuals system or token – Must be provided tight access controls to only the issued users – Private Key theft allows that user to impersonate the trusted user
- Certificate Repository (CR)