Page 244 - DCAP403_Operating System
P. 244

Unit 12: Security Solution




          12.11 Certifi cate Authority                                                           Notes

          The certifying authority is an digital entity that binds the identity of a person to his public key.

          The certifying authority certifies that a person is the holder of a valid key pair and that person’s
          identity has been authenticated by the certifying authority or its agents. The certifying authority
          thus performs functions that are quasi-governmental and by their very nature require a high
          amount of trust and security.

          A certifying authority creates the digital certificate and digitally signs it using its own private

          key. When any third person wishes to verify the authenticity of a subscriber’s certificate, he uses

          the CA’s public key. The certifying authority thus validates the certificate and establishes a trust
          model for the third party into a transaction with the subscriber.
          Digital certificate is defined as a method to verify (ex. Public Key’s) electronically for


          authenticity.

          A certificate authority will accept merchant public key, along with some proof of the identity of

          the merchant who sends it. Others (correspondents) can request fro verification of merchant’s
          public key from the certifi cate authority.
          Contents of ONES Digital Certifi cate

          It includes:
          1.   Holder’s name, organization, address.
          2.   The name of certifi cate authority
          3.   Public key of the holders for cryptographic use.

          4.   Time limit, these certificate are issued for 6 months to a year long
          5.   Class of certifi cate
          6.   Digital certifi cate identifi cation number
          Class: Based on degree of verifi cation

           Class 1:  Easiest to obtain, it involves the fewest checks on the user’s back-round. (only the name of
                   e-mail address are verifi ed
           Class 2:  I includes user’s driver’s license. Social security number & date of birth along with the other
                   (class 1)
           Class 3:  In addition to class 2 checks, user’s credit card check is added.
           Class 4:  In addition to class 3 checks, user’s position within the organization is added.

          Higher the class, higher the degree of verification and hence higher the fee payable to commercial



          or government certificate authorities. Certificate Revocation List (CRL) is maintained by


          certificate authority. So that the user know which certificate are no longer valid. The CRL doesn’t
          include expired certificate, because each certificate has a built in expiration. Certificate lost may



          be revoked.
          One encryption system is not ideal for all situations. One can use more than one encryption
          method. Table below shows few algorithms for encryption used by PGP (Pretty Good Privacy).
           Function       Algorithms used  Process
           Message encryption IDEA, RSA  Use IDEA with one time session key generated by sender to
                                        encrypt message
                                        Encrypt session key with RSA using recipient’s public key
           Digital signature  MD5, RSA  Generate hash code of message with MD5
                                        Encrypt message digest with RSA using sender’s private key.


                                           LOVELY PROFESSIONAL UNIVERSITY                                   237
   239   240   241   242   243   244   245   246   247   248   249