Given a scenario, implement public key infrastructure Flashcards
Public key infrastructure (PKI)
Key management Certificate authority (CA) Intermediate CA Registration authority (RA) Certificate revocation list (CRL) Certificate attributes Online Certificate Status Protocol (OCSP) Certificate signing request (CSR) CN Subject alternative name Expiration
Key management
Key management refers to operational considerations for the various stages in a key’s life cycle. A key’s life cycle may involve the following stages:
Key generation—creating a secure key pair of the required strength, using the chosen cipher.
Certificate generation—to identify the public part of a key pair as belonging to a subject (user or computer), the subject submits it for signing by the CA as a digital certificate with the appropriate key usage. At this point, it is critical to verify the identity of the subject requesting the certificate and only issue it if the subject passes identity checks.
Storage—the user must take steps to store the private key securely, ensuring that unauthorized access and use is prevented. It is also important to ensure that the private key is not lost or damaged.
Revocation—if a private key is compromised, the key pair can be revoked to prevent users from trusting the public key.
Expiration and renewal—a key pair that has not been revoked expires after a certain period. Giving the key or certificate a “shelf-life” increases security. Certificates can be renewed with new key material.
Key management can be centralized, meaning that one administrator or authority controls the process, or decentralized, in which each user is responsible for his or her keys.
Certificate authority (CA)
A server that guarantees subject identities by issuing signed digital certifcate wrappers for their public keys.
Intermediate CA
A CA that is signed by a superior CA (e.g., a Root CA or another Intermediate CA) and signs CAs (e.g., another Intermediate or Subordinate CA). The Intermediate CA exists in the middle of a trust chain between the Trust Anchor, or Root, and the subscriber certificate issuing Subordinate CAs.
Registration authority (RA)
In PKI, an authority that accepts requests for digital certificates and authenticates the entities making those requests.
Certificate revocation list (CRL)
A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date.
Certificate attributes
Serial number
A number uniquely identifying the certificate within the domain of its CA.
Signature algorithm
The algorithm used by the CA to sign the certificate.
Issuer
The name of the CA.
Valid from/to
Date and time during which the certificate is valid.
Subject
The name of the certificate holder, expressed as a distinguished name (DN).Within this, the common name (CN) part should usually match either the fully qualified domain name (FQDN) of the server or a user email address.
Public key
Public key and algorithm used by the certificate holder.
Extensions
V3 certificates can be defined with extended attributes, such as friendly subject or issuer names, contact email addresses, and intended key usage.
Subject alternative name (SAN)
This extension field is the preferred mechanism to identify the DNS name or names by which a host is identified.
Online Certificate Status Protocol (OCSP)
Allows clients to request the status of a digital certificate, to check whether it is revoked.
Certificate signing request (CSR)
A Base64 ASCII file that a subject sends to a CA to get a certificate.
CN
An X500 attribute expressing a host or user name, also used as the subject identifier for a digital certificate.
Subject alternative name
Field in a digital certificate allowing a host to be identifed by multiple host names/subdomains.
Expiration
Expiration and renewal—a key pair that has not been revoked expires after a certain period. Giving the key or certificate a “shelf-life” increases security. Certificates can be renewed with new key material.
Types of certificates
Wildcard Subject alternative name Code signing Self-signed Machine/computer Email User Root Domain validation Extended validation
Wildcard
Subject alternative name