Thursday

Basic Certificate Fields | Public Key Infrastructure



Basic certificate fields for X.509 version 3 are shown in Table 1. The To Be Signed (TBS) certificate field contains the names of the subject and issuer, a public key associated with the subject, a validity period, and other associated information. It usually includes extensions which hold additional optional information. The subject field identifies the entity associated with the public key stored in the subject public key field. It also distinguishes if a certificate is for an end entity, a CA, or a CRL. The Subject Public Key Info (SPKI) field is used to carry the public key and to identify the algorithm by which the key is used (e.g., RSA, DSA, or Diffie-Hellman).
Table 1: Basic Certificate Fields for X.509 
Certificate Fields
Attribute
Type
TBS Certif icate
Version
V1, v2, v3
 
Certificate Serial Number
Integer
 
Algorithm Id
Algorithm Object Id.
 
Issuer
Name
 
Validity
Not before time
  
Not after time
 
Subject
Name
 
Subject Public Key Info
Algorithm Id
  
Bit string
 
Issuer Unique Id
Bit string
 
Subject Unique Id
Bit string
 
Extensions
 
Signature Algorithm
 
Algorithm Id
Signature Value
 
Bit string
The signature algorithm field contains the identifier for the cryptographic algorithm used by the CA to sign the certificate.
The signature value field contains a signature digitally added to the encoded TBS certificate. By generating this signature, a CA certifies the validity of the information in the TBS certificate. To be more specific, the CA certifies the binding between the public key material and the subject of the certificate.

Certificate Revocation List

When a certificate is issued, it is expected to be in use for its entire validity period. However, various circumstances may cause a certificate to become invalid prior to the expiration of the validity period. Such circumstances include change of name, change of association between subject and CA (e.g., an employee terminates employment with an organization), and compromise or suspected compromise of the corresponding private key. Under such circumstances, the CA needs to revoke the certificate.
CRL is similar to notices of stolen or lost credit cards reported to other credit companies. The CA periodically issues a signed data structure called a CRL. A CRL is a time-stamped list identifying revoked certificates. The list is signed by a CA or CRL issuer and made freely available in a public certificate and CRL repository. Each revoked certificate is identified in a CRL by its certificate serial number. When a system employing certificates uses a certificate for verifying a remote user’s digital signature, that system not only checks the certificate signature and validity, but also acquires a recent CRL and checks that the certificate serial number is not on that CRL.

2 comments:

Andrea said...

Nice and informative article. I was looking for a detailed explanation about public key infrastructure, one of my friend suggested me about your blog. You have provided and excellent detail about it. Thanks a lot.
public key infrastructure

lost_in_woods said...

thank you for the post , visit us for
best telephone solution for business

Related Posts with Thumbnails

Link Exchange