• Public key certificates generated by most commercial CAs use the X.509v3 format and contain the following information
  • Table 10-4 shows how public key cryptography relates to file system and eDirectory security




    Download 52,46 Kb.
    bet13/19
    Sana21.03.2017
    Hajmi52,46 Kb.
    #816
    1   ...   9   10   11   12   13   14   15   16   ...   19

    Table 10-4 shows how public key cryptography relates to file system and eDirectory security

  • Public key cryptography provides both authentication and encryption security through the use of mathematically related sets of digital codes called key pairs

  • A key pair consists of a public and private key that is unique to an individual, application, or organization

  • The private key is kept solely by the owner of the key pair and used to create digital signatures and encrypt and decrypt data

  • The public key is made available to all network users and used by outside entities to encrypt data sent to the key pair owner

  • Public key certificates contain, at a minimum, the entity’s public key, a subject name, and a CA-generated digital signature

  • Public key certificates generated by most commercial CAs use the X.509v3 format and contain the following information:

  • The name of the user or organization (subject name)


  • Download 52,46 Kb.
  • 1   ...   9   10   11   12   13   14   15   16   ...   19




    Download 52,46 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Table 10-4 shows how public key cryptography relates to file system and eDirectory security

    Download 52,46 Kb.