Cryptography and Network Security: Fourth Edition by William Stallings Lecture Slides by Lawrie Brown/Mod. & S. Kondakci
Cryptography and Network Security: Fourth Edition by William Stallings Lecture Slides by Lawrie Brown/Mod. & S. Kondakci
Cryptography and Network Security: Fourth Edition by William Stallings Lecture Slides by Lawrie Brown/Mod. & S. Kondakci
Security
Chapter 11
Fourth Edition
by William Stallings
Henric Johnson 27
X.509 Formats
Henric Johnson 28
Typical Digital Signature
Approach
Henric Johnson 29
Obtaining a User’s Certificate
• Characteristics of certificates generated by CA:
– Any user with access to the public key of the CA
can recover the user public key that was certified.
– No part other than the CA can modify the
certificate without this being detected.
Henric Johnson 30
X.509 CA Hierarchy
Henric Johnson 31
Revocation of Certificates
• Reasons for revocation:
– The users secret key is assumed to be
compromised.
– The user is no longer certified by this CA.
– The CA’s certificate is assumed to be
compromised.
Henric Johnson 32