Hacker Professional Ebook part 187

Tham khảo tài liệu 'hacker professional ebook part 187', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | How are certificates used A certificate is displayed in order to generate confidence in the legitimacy of a public key. Someone verifying a signature can also verify the signer s certificate to insure that no forgery or false representation has occurred. These steps can be performed with greater or lesser rigor depending on the context. The most secure use of authentication involves enclosing one or more certificates with every signed message. The receiver of the message would verify the certificate using the certifying authority s public key and now confident of the public key of the sender verify the message s signature. There may be two or more certificates enclosed with the message forming a hierarchical chain wherein one certificate testifies to the authenticity of the previous certificate. At the end of a certificate hierarchy is a top-level certifying authority which is trusted without a certificate from any other certifying authority. The public key of the top-level certifying authority must be independently known for example by being widely published. The more familiar the sender is to the receiver of the message the less need there is to enclose and to verify certificates. If Alice sends messages to Bob every day Alice can enclose a certificate chain on the first day which Bob verifies. Bob thereafter stores Alice s public key and no more certificates or certificate verifications are necessary. A sender whose company is known to the receiver may need to enclose only one certificate issued by the company whereas a sender whose company is unknown to the receiver may need to enclose two certificates. A good rule of thumb is to enclose just enough of a certificate chain so that the issuer of the highest level certificate in the chain is well-known to the receiver. According to the PKCS standards for public-key cryptography see Question every signature points to a certificate that validates the public key of the signer. Specifically each signature .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU LIÊN QUAN
5    176    1
5    255    1
5    106    0
5    121    1
6    103    1
6    107    1
6    121    1
6    103    0
6    140    0
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.