x164.htm

来自「The Open–source PKI Book Version 2.4.6 E」· HTM 代码 · 共 179 行

HTM
179
字号
<HTML><HEAD><TITLE>Certification Authority chains</TITLE><METANAME="GENERATOR"CONTENT="Modular DocBook HTML Stylesheet Version 1.55"><LINKREL="HOME"TITLE="The Open&#8211;source PKI Book"HREF="ospki-book.htm"><LINKREL="UP"TITLE="Basic functionality of a Public Key Infrastructure[TODO]"HREF="description-pki.htm"><LINKREL="PREVIOUS"TITLE="Signing of the certificate request by the Certification Authority"HREF="x161.htm"><LINKREL="NEXT"TITLE="Typical uses of public key cryptography"HREF="x169.htm"></HEAD><BODYCLASS="SECT1"BGCOLOR="#FFFFFF"TEXT="#000000"LINK="#0000FF"VLINK="#840084"ALINK="#0000FF"><DIVCLASS="NAVHEADER"><TABLEWIDTH="100%"BORDER="0"CELLPADDING="0"CELLSPACING="0"><TR><THCOLSPAN="3"ALIGN="center">The Open&#8211;source PKI Book: A guide to PKIs and Open&#8211;source Implementations</TH></TR><TR><TDWIDTH="10%"ALIGN="left"VALIGN="bottom"><AHREF="x161.htm">Prev</A></TD><TDWIDTH="80%"ALIGN="center"VALIGN="bottom">Chapter 3. Basic functionality of a Public Key Infrastructure[TODO]</TD><TDWIDTH="10%"ALIGN="right"VALIGN="bottom"><AHREF="x169.htm">Next</A></TD></TR></TABLE><HRALIGN="LEFT"WIDTH="100%"></DIV><DIVCLASS="SECT1"><H1CLASS="SECT1"><ANAME="AEN164">Certification Authority chains</A></H1><P>	Using this certificate, Alice can claim that her public	key is trustworthy. Bob who wants to communicate with her, asks for her Certificate.	Bob, in order to verify her Certificate, finds	the public key of the Certification Authority	that signed the Alice's public key. He needs to 	do that securely. If they are both on the same Certification Authority	then he has it already. If not, he asks	his Certification Authority to contact the other Certification Authority for its public key. For each Certification Authority	Bob's Certification Authority asks, he needs the public	key of the previous one so that the authenticity of the key is assured.	If a chain can be found that leads to the other Certification Authority	then communication can be established.  <DIVCLASS="NOTE"><P></P><TABLECLASS="NOTE"WIDTH="100%"BORDER="0"><TR><TDWIDTH="25"ALIGN="CENTER"VALIGN="TOP"><IMGSRC="stylesheet-images/note.gif"HSPACE="5"ALT="Note"></TD><TDALIGN="LEFT"VALIGN="TOP"><P>  	The issue of inter-CA trust is very important since 	one bad CA can undermine the security of the whole infrastructure.	This issue is not covered here (at least in this version).  </P></TD></TR></TABLE></DIV>  </P></DIV><DIVCLASS="NAVFOOTER"><HRALIGN="LEFT"WIDTH="100%"><TABLEWIDTH="100%"BORDER="0"CELLPADDING="0"CELLSPACING="0"><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top"><AHREF="x161.htm">Prev</A></TD><TDWIDTH="34%"ALIGN="center"VALIGN="top"><AHREF="ospki-book.htm">Home</A></TD><TDWIDTH="33%"ALIGN="right"VALIGN="top"><AHREF="x169.htm">Next</A></TD></TR><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top">Signing of the certificate request by the Certification Authority</TD><TDWIDTH="34%"ALIGN="center"VALIGN="top"><AHREF="description-pki.htm">Up</A></TD><TDWIDTH="33%"ALIGN="right"VALIGN="top">Typical uses of public key cryptography</TD></TR></TABLE></DIV></BODY></HTML>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?