SlideShare a Scribd company logo
Presentation  On  Digital Signature Algorithm
DIGITAL   SIGNATURES The most important development from the work on public key cryptography is Digital Signature. The Digital Signature provides a set of security capabilities that would be difficult to implement in any other way.
OUR REQUIREMENTS When two parties exchange message there is not complete trust between sender and receiver, something more than authentication is needed. The most attractive solution to this problem is Digital Signature. The Digital Signature is analogous to the handwritten signature .
It must verify the author and the date and time of signature. It must authenticate the contents at the time of the signature. It must verifiable by third parties, to resolve disputes. It must have the following properties
Properties (Contd..) The signature must be a bit pattern that depends on the message being signed. The signature must use some information unique to the sender, to prevent both forgery and denial. It must be relatively easy to produce the digital signature.
Properties (Contd..) It must be relatively easy to recognize and verify the digital signature. It must be computationally infeasible to forge a digital signature , either by constructing a new message for an existing digital signature. It must be practical to retain a copy of the digital signature in store.
Types of Digital Signature: #Direct   Digital   Signature: The direct digital signature involves only the communicating parties (source,destination). The destination knows public-key(assume) of the source. DS may be formed by encrypting the message with the sender`s private key. DS may also be formed by encrypting the HASH of message by shared secret keys
 
 
#  Arbitrated   Digital   Signature : Every signed message goes first to an arbiter A, who subjects the message and its signature to a number of tests to check its origin and content. The message then dated and send to recipient with an indication that it has verified to the satisfaction of the arbiter.
(a) Conventional Encryption,Arbiter Sees Message X-> A : M || EKxa [ IDx || H(M)] A->Y : EKay [ ID x || M || EKxa [IDx || H(M) || T ] (b)  Conventional Encryption, Arbiter Does Not See Message X -> A : IDx || EKxy [M] ||EKxa [ IDx || H(EKxy [M] ) ] || T ] A->Y:EKay[ IDX || EKxy [M] || EKxa [IDX || H(EKxy[M])] ||T] (c)Public Key Encryption, Arbiter Does Not See Message X -> A : IDx || EKRx [Idx || EKUy(EKRx[M])] A -> Y : EKRa [ IDx || EKUy [EKRx [M]] || T]
Function Of Signature #  Evidence  : Signature identifies the signer with the signed document. # Approval : Signature expresses the signer`s approval to the content. # Documents Authentication : Signature provides what is signed so that the contents can not be falsified without detection.
M | | H E M H D Compare KRa RSA Approach KUa E[H[M]]
M H Sig || M H Ver k s r Compare KUg  KRa DSS Approach KUg  KUa
Global Public Key Components p = Prime number where 2 L-1 < p <2 L  for  512<=L<=1024 and L is multiple of 64 bits  i.e. bit length of between 512 and 1024 in increment of 64 bits q = Prime divisor of (p-1) where 2 159 < q < 2 160  i.e. bit length of 160 bits g =  h (p-1)/q  mod p: Where h is any integer with  1< h < (p-1) and g>1
User’s Private Key k = Random or pseudorandom integer with 0< k < q x = Random or pseudorandom integer with 0 < x < q User’s Public Key y = g x  mod p User’s Per Message Secret Number
Singing in DSS f2 M H f1 x  q P  q  g r s k
Signing r = (g k  mod p) mod q s = [k -1  (H(M)+ xr)] mod q Signature = (r,s)
Verifying in DSS M ’ s ’ r ’ H f4 f3 y  q  g q v Compare
Verifying w = (s r ) -1  mod q u1 = [ H(M’) w ] mod q  u2 = (r’) w mod q v = [ (g u1  y u2 ) mod p ] mod q Test :-> v = r’ M = Message to be Signed H(M) = Hash of M using SHA-1 M’ , s’ , r’ = Received version of M , s , r
Proof Of The DSA LEMMA 1 For any Integer t – If  g=h  (p-1)/q  mod p Then g t  mod p = g t   mod q  mod p LEMMA 2 For non Negative Integer a and b g  (a mod q +b mod q)  mod p = g  (a+b)   mod q  mod p
LEMMA 3 y  ( rw ) mod q  mod p = g  ( rxw ) mod q  mod p LEMMA 4 ( ( H(M) + xr ) w ) mod q = k
  =   ((g (H(M)w) mod q y (rw) mod q) mod p) mod q   = ((g (H(M)w) mod q g (xrw) mod q) mod p) mod q = ((g (H(M)w) mod q + (xrw) mod q) mod p) mod q = (g  k   mod p) mod q = r THEOREM   If v = r Then Signature is Valid PROOF = ((g (H(M)w) + xrw) mod q) mod p) mod q =(( g (H(M)w) mod q + (xrw) mod q) mod p) mod q v = ((gu1 yu2) mod p) mod q
X.509 Authentication service
X.509 Authentication Service  part of CCITT X.500 directory service standards distributed servers maintaining user info database defines framework for authentication services  directory may store public-key certificates with public key of user signed by certification authority  also defines authentication protocols  uses public-key crypto & digital signatures  algorithms not standardised, but RSA recommended X.509 certificates are widely used
X.509 Certificates issued by a Certification Authority (CA), containing:  version (1, 2, or 3)  serial number (unique within CA) identifying certificate  signature algorithm identifier  issuer X.500 name (CA)  period of validity (from - to dates)  subject X.500 name (name of owner)  subject public-key info (algorithm, parameters, key)  issuer unique identifier (v2+)  subject unique identifier (v2+)  extension fields (v3)  signature (of hash of all fields in certificate)  notation  CA<<A>>  denotes certificate for A signed by CA
X.509 Certificates
Obtaining a  Certificate  any user with access to CA can get any certificate from it  only the CA can modify a certificate  because cannot be forged, certificates can be placed in a public directory
CA Hierarchy  if both users share a common CA then they are assumed to know its public key  otherwise CA's must form a hierarchy  use certificates linking members of hierarchy to validate other CA's  each CA has certificates for clients (forward) and parent (backward)  each client trusts parents certificates  enable verification of any certificate from one CA by users of all other CAs in hierarchy
CA Hierarchy Use
Certificate Revocation certificates have a period of validity may need to revoke before expiry, eg: user's private key is compromised user is no longer certified by this CA CA's certificate is compromised CA’s maintain list of revoked certificates the Certificate Revocation List (CRL) users should check certificates with CA’s CRL
Authentication Procedures X.509 includes three alternative authentication procedures:  One-Way Authentication  Two-Way Authentication  Three-Way Authentication  all use public-key signatures
One-Way Authentication 1 message ( A->B) used to establish  the identity of A and that message is from A  message was intended for B  integrity & originality of message  message must include timestamp, nonce, B's identity and is signed by A may include additional info for B eg session key
Two-Way Authentication 2 messages (A->B, B->A) which also establishes in addition: the identity of B and that reply is from B  that reply is intended for A  integrity & originality of reply  reply includes original nonce from A, also timestamp and nonce from B may include additional info for A
Three-Way Authentication 3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks  has reply from A back to B containing signed copy of nonce from B  means that timestamps need not be checked or relied upon
X.509 Version 3 has been recognised that additional information is needed in a certificate  email/URL, policy details, usage constraints rather than explicitly naming new fields defined a general extension method extensions consist of: extension identifier criticality indicator extension value
Certificate Extensions key and policy information convey info about subject & issuer keys, plus indicators of certificate policy certificate subject and issuer attributes support alternative names, in alternative formats for certificate subject and/or issuer certificate path constraints allow constraints on use of certificates by other CA’s

More Related Content

PPT
Digital signature algorithm (de la cruz, genelyn).ppt 2
DOC
Dss digital signature standard and dsa algorithm
PPT
Digital signature schemes
PPTX
Digital signature
PPTX
Elgamal &amp; schnorr digital signature scheme copy
PPTX
Digital Signature Certificate
PDF
Electronic Signature
PDF
Blind Signature Scheme
Digital signature algorithm (de la cruz, genelyn).ppt 2
Dss digital signature standard and dsa algorithm
Digital signature schemes
Digital signature
Elgamal &amp; schnorr digital signature scheme copy
Digital Signature Certificate
Electronic Signature
Blind Signature Scheme

What's hot (20)

PPT
Digital signature
PDF
Digital signatures - A mathematical scheme for demonstrating the authenticity...
PPT
Authentication Protocols
PPSX
Digital signature
PPT
Information and data security digital signatures
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 46 digital signature algorithm
PPTX
Digital signatures
PPT
Introduction to Digital signatures
PDF
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
PPT
Iss lecture 4
DOCX
53398506 10-case-study-digital-signature
PPT
Digital signature introduction
PPT
PPTX
DOCX
Literature review of Digital Signature
PPT
Public Key Cryptography
DOCX
Ds over
PPTX
Digitall signature update
Digital signature
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Authentication Protocols
Digital signature
Information and data security digital signatures
Information and network security 45 digital signature standard
Information and network security 46 digital signature algorithm
Digital signatures
Introduction to Digital signatures
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
Iss lecture 4
53398506 10-case-study-digital-signature
Digital signature introduction
Literature review of Digital Signature
Public Key Cryptography
Ds over
Digitall signature update
Ad

Viewers also liked (20)

PPT
Digital signature
DOCX
Cryptography using artificial neural network
PPT
Fuzzy Set | Statistics
PDF
Digital signature
PPTX
Cryptography and applications
PPT
DIGITAL SIGNATURE
PPT
Distribution of public keys and hmac
PPTX
Fuzzy Set
PPTX
Eaack—a secure intrusion detection.ppt
PPT
Lecture 9 key distribution and user authentication
PPT
Protocols for Public Key Management
PPTX
RSA ALGORITHM
PPT
key distribution in network security
PPTX
Digital signature
PDF
Digital signatures
PPT
Public Key Cryptography and RSA algorithm
PPT
Digital signature
PDF
RSA ALGORITHM
PPTX
Fuzzy logic application (aircraft landing)
PPT
Digital signature
Digital signature
Cryptography using artificial neural network
Fuzzy Set | Statistics
Digital signature
Cryptography and applications
DIGITAL SIGNATURE
Distribution of public keys and hmac
Fuzzy Set
Eaack—a secure intrusion detection.ppt
Lecture 9 key distribution and user authentication
Protocols for Public Key Management
RSA ALGORITHM
key distribution in network security
Digital signature
Digital signatures
Public Key Cryptography and RSA algorithm
Digital signature
RSA ALGORITHM
Fuzzy logic application (aircraft landing)
Digital signature
Ad

Similar to Dsa & Digi Cert (20)

PPTX
Hashes_and_Digital_Signatures_Slides.pptx
PPT
ch13.ppt
PPT
PKI and Applications
PPT
Digital Signature Standard
PPT
15 ma cs and signatures
PPT
Public Key Infrastructure and Application_Applications.ppt
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
PDF
Computer security module 4
PPT
PKI_Applications digital certificate.ppt
PPT
PDF
Novel construction of Secure RFID Authentication Protocol
PPT
Web Security
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPT
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
PPT
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
PPT
ch14.ppt
PDF
SHA_and_DS.pdf
PPTX
public key infrastructure
PPT
digital_sign_interview.ppt
Hashes_and_Digital_Signatures_Slides.pptx
ch13.ppt
PKI and Applications
Digital Signature Standard
15 ma cs and signatures
Public Key Infrastructure and Application_Applications.ppt
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
Computer security module 4
PKI_Applications digital certificate.ppt
Novel construction of Secure RFID Authentication Protocol
Web Security
Ch12 Cryptographic Protocols and Public Key Infrastructure
ngrubksgj.pptdagji;jgisofjapfjagiahguhkg
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
ch14.ppt
SHA_and_DS.pdf
public key infrastructure
digital_sign_interview.ppt

More from Ram Dutt Shukla (20)

PPT
Ip Sec Rev1
PPT
Message Authentication
DOC
PPT
I Pv6 Addressing
PPT
Anycast & Multicast
DOC
Congestion Control
PPT
Congestion Control
DOC
Retransmission Tcp
PPT
Tcp Congestion Avoidance
PPT
Tcp Immediate Data Transfer
PPT
Tcp Reliability Flow Control
DOC
Tcp Udp Notes
PPT
Transport Layer [Autosaved]
PPT
Transport Layer
PPT
PPT
Anycast & Multicast
PPT
Mobile I Pv6
PPT
Mobility And Mobile I Pv4
Ip Sec Rev1
Message Authentication
I Pv6 Addressing
Anycast & Multicast
Congestion Control
Congestion Control
Retransmission Tcp
Tcp Congestion Avoidance
Tcp Immediate Data Transfer
Tcp Reliability Flow Control
Tcp Udp Notes
Transport Layer [Autosaved]
Transport Layer
Anycast & Multicast
Mobile I Pv6
Mobility And Mobile I Pv4

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PPTX
master seminar digital applications in india
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Lesson notes of climatology university.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Trump Administration's workforce development strategy
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Computing-Curriculum for Schools in Ghana
RMMM.pdf make it easy to upload and study
Orientation - ARALprogram of Deped to the Parents.pptx
Weekly quiz Compilation Jan -July 25.pdf
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH
master seminar digital applications in india
Chinmaya Tiranga quiz Grand Finale.pdf
Microbial diseases, their pathogenesis and prophylaxis
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Trump Administration's workforce development strategy
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pharma ospi slides which help in ospi learning
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
VCE English Exam - Section C Student Revision Booklet
A systematic review of self-coping strategies used by university students to ...
Computing-Curriculum for Schools in Ghana

Dsa & Digi Cert

  • 1. Presentation On Digital Signature Algorithm
  • 2. DIGITAL SIGNATURES The most important development from the work on public key cryptography is Digital Signature. The Digital Signature provides a set of security capabilities that would be difficult to implement in any other way.
  • 3. OUR REQUIREMENTS When two parties exchange message there is not complete trust between sender and receiver, something more than authentication is needed. The most attractive solution to this problem is Digital Signature. The Digital Signature is analogous to the handwritten signature .
  • 4. It must verify the author and the date and time of signature. It must authenticate the contents at the time of the signature. It must verifiable by third parties, to resolve disputes. It must have the following properties
  • 5. Properties (Contd..) The signature must be a bit pattern that depends on the message being signed. The signature must use some information unique to the sender, to prevent both forgery and denial. It must be relatively easy to produce the digital signature.
  • 6. Properties (Contd..) It must be relatively easy to recognize and verify the digital signature. It must be computationally infeasible to forge a digital signature , either by constructing a new message for an existing digital signature. It must be practical to retain a copy of the digital signature in store.
  • 7. Types of Digital Signature: #Direct Digital Signature: The direct digital signature involves only the communicating parties (source,destination). The destination knows public-key(assume) of the source. DS may be formed by encrypting the message with the sender`s private key. DS may also be formed by encrypting the HASH of message by shared secret keys
  • 8.  
  • 9.  
  • 10. # Arbitrated Digital Signature : Every signed message goes first to an arbiter A, who subjects the message and its signature to a number of tests to check its origin and content. The message then dated and send to recipient with an indication that it has verified to the satisfaction of the arbiter.
  • 11. (a) Conventional Encryption,Arbiter Sees Message X-> A : M || EKxa [ IDx || H(M)] A->Y : EKay [ ID x || M || EKxa [IDx || H(M) || T ] (b) Conventional Encryption, Arbiter Does Not See Message X -> A : IDx || EKxy [M] ||EKxa [ IDx || H(EKxy [M] ) ] || T ] A->Y:EKay[ IDX || EKxy [M] || EKxa [IDX || H(EKxy[M])] ||T] (c)Public Key Encryption, Arbiter Does Not See Message X -> A : IDx || EKRx [Idx || EKUy(EKRx[M])] A -> Y : EKRa [ IDx || EKUy [EKRx [M]] || T]
  • 12. Function Of Signature # Evidence : Signature identifies the signer with the signed document. # Approval : Signature expresses the signer`s approval to the content. # Documents Authentication : Signature provides what is signed so that the contents can not be falsified without detection.
  • 13. M | | H E M H D Compare KRa RSA Approach KUa E[H[M]]
  • 14. M H Sig || M H Ver k s r Compare KUg KRa DSS Approach KUg KUa
  • 15. Global Public Key Components p = Prime number where 2 L-1 < p <2 L for 512<=L<=1024 and L is multiple of 64 bits i.e. bit length of between 512 and 1024 in increment of 64 bits q = Prime divisor of (p-1) where 2 159 < q < 2 160 i.e. bit length of 160 bits g = h (p-1)/q mod p: Where h is any integer with 1< h < (p-1) and g>1
  • 16. User’s Private Key k = Random or pseudorandom integer with 0< k < q x = Random or pseudorandom integer with 0 < x < q User’s Public Key y = g x mod p User’s Per Message Secret Number
  • 17. Singing in DSS f2 M H f1 x q P q g r s k
  • 18. Signing r = (g k mod p) mod q s = [k -1 (H(M)+ xr)] mod q Signature = (r,s)
  • 19. Verifying in DSS M ’ s ’ r ’ H f4 f3 y q g q v Compare
  • 20. Verifying w = (s r ) -1 mod q u1 = [ H(M’) w ] mod q u2 = (r’) w mod q v = [ (g u1 y u2 ) mod p ] mod q Test :-> v = r’ M = Message to be Signed H(M) = Hash of M using SHA-1 M’ , s’ , r’ = Received version of M , s , r
  • 21. Proof Of The DSA LEMMA 1 For any Integer t – If g=h (p-1)/q mod p Then g t mod p = g t mod q mod p LEMMA 2 For non Negative Integer a and b g (a mod q +b mod q) mod p = g (a+b) mod q mod p
  • 22. LEMMA 3 y ( rw ) mod q mod p = g ( rxw ) mod q mod p LEMMA 4 ( ( H(M) + xr ) w ) mod q = k
  • 23. = ((g (H(M)w) mod q y (rw) mod q) mod p) mod q = ((g (H(M)w) mod q g (xrw) mod q) mod p) mod q = ((g (H(M)w) mod q + (xrw) mod q) mod p) mod q = (g k mod p) mod q = r THEOREM If v = r Then Signature is Valid PROOF = ((g (H(M)w) + xrw) mod q) mod p) mod q =(( g (H(M)w) mod q + (xrw) mod q) mod p) mod q v = ((gu1 yu2) mod p) mod q
  • 25. X.509 Authentication Service part of CCITT X.500 directory service standards distributed servers maintaining user info database defines framework for authentication services directory may store public-key certificates with public key of user signed by certification authority also defines authentication protocols uses public-key crypto & digital signatures algorithms not standardised, but RSA recommended X.509 certificates are widely used
  • 26. X.509 Certificates issued by a Certification Authority (CA), containing: version (1, 2, or 3) serial number (unique within CA) identifying certificate signature algorithm identifier issuer X.500 name (CA) period of validity (from - to dates) subject X.500 name (name of owner) subject public-key info (algorithm, parameters, key) issuer unique identifier (v2+) subject unique identifier (v2+) extension fields (v3) signature (of hash of all fields in certificate) notation CA<<A>> denotes certificate for A signed by CA
  • 28. Obtaining a Certificate any user with access to CA can get any certificate from it only the CA can modify a certificate because cannot be forged, certificates can be placed in a public directory
  • 29. CA Hierarchy if both users share a common CA then they are assumed to know its public key otherwise CA's must form a hierarchy use certificates linking members of hierarchy to validate other CA's each CA has certificates for clients (forward) and parent (backward) each client trusts parents certificates enable verification of any certificate from one CA by users of all other CAs in hierarchy
  • 31. Certificate Revocation certificates have a period of validity may need to revoke before expiry, eg: user's private key is compromised user is no longer certified by this CA CA's certificate is compromised CA’s maintain list of revoked certificates the Certificate Revocation List (CRL) users should check certificates with CA’s CRL
  • 32. Authentication Procedures X.509 includes three alternative authentication procedures: One-Way Authentication Two-Way Authentication Three-Way Authentication all use public-key signatures
  • 33. One-Way Authentication 1 message ( A->B) used to establish the identity of A and that message is from A message was intended for B integrity & originality of message message must include timestamp, nonce, B's identity and is signed by A may include additional info for B eg session key
  • 34. Two-Way Authentication 2 messages (A->B, B->A) which also establishes in addition: the identity of B and that reply is from B that reply is intended for A integrity & originality of reply reply includes original nonce from A, also timestamp and nonce from B may include additional info for A
  • 35. Three-Way Authentication 3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks has reply from A back to B containing signed copy of nonce from B means that timestamps need not be checked or relied upon
  • 36. X.509 Version 3 has been recognised that additional information is needed in a certificate email/URL, policy details, usage constraints rather than explicitly naming new fields defined a general extension method extensions consist of: extension identifier criticality indicator extension value
  • 37. Certificate Extensions key and policy information convey info about subject & issuer keys, plus indicators of certificate policy certificate subject and issuer attributes support alternative names, in alternative formats for certificate subject and/or issuer certificate path constraints allow constraints on use of certificates by other CA’s

Editor's Notes

  • #26: X.509 is part of the X.500 series of recommendations that define a directory service, being a server or distributed set of servers that maintains a database of information about users. X.509 defines a framework for the provision of authentication services by the X.500 directory to its users. The directory may serve as a repository of public-key certificates. In addition, X.509 defines alternative authentication protocols based on the use of public-key certificates. X.509 is based on the use of public-key cryptography and digital signatures. The standard does not dictate the use of a specific algorithm but recommends RSA. The X.509 certificate format is widely used, in for example S/MIME, IP Security and SSL/TLS and SET .
  • #27: The X.509 certificate is the heart of the standard. There are 3 versions, with successively more info in the certificate - must be v2 if either unique identifier field exists, must be v3 if any extensions are used. These user certificates are assumed to be created by some trusted certification authority (CA) and placed in the directory by the CA or by the user. The directory server itself is not responsible for the creation of public keys or for the certification function; it merely provides an easily accessible location for users to obtain certificates. The certificate includes the elements shown. The standard uses the notation for a certificate of: CA&lt;&lt;A&gt;&gt; where the CA signs the certificate for user A with its private key.
  • #28: Stallings Figure 14.4 shows the format of an X.509 certificate and CRL.
  • #29: User certificates generated by a CA have the characteristics that any user with access to the public key of the CA can verify the user public key that was certified, and no party other than the certification authority can modify the certificate without this being detected. Because certificates are unforgeable, they can be placed in a directory without the need for the directory to make special efforts to protect them.
  • #30: If both parties use the same CA, they know its public key and can verify others certificates. If not, then there has to be some means to form a chain of certifications between the CA&apos;s used by the two parties, by the use of client and parent certificates. It is assumed that each client trusts its parents certificates.
  • #31: Stallings Figure 14.5 illustrates the use of an X.509 hierarchy to mutually verify clients certificates. Track chains of certificates: A acquires B certificate using chain: X&lt;&lt;W&gt;&gt;W&lt;&lt;V&gt;&gt;V&lt;&lt;Y&gt;&gt;Y&lt;&lt;Z&gt;&gt;Z&lt;&lt;B&gt;&gt; B acquires A certificate using chain: Z&lt;&lt;Y&gt;&gt;Y&lt;&lt;V&gt;&gt;V&lt;&lt;W&gt;&gt;W&lt;&lt;X&gt;&gt;X&lt;&lt;A&gt;&gt;
  • #32: A certificate includes a period of validity. Typically a new certificate is issued just before the expiration of the old one. In addition, it may be desirable on occasion to revoke a certificate before it expires, for one of a range of reasons, such as those shown above. To support this, each CA must maintain a list consisting of all revoked but not expired certificates issued by that CA, known as the certificate revocation list (CRL). When a user receives a certificate in a message, the user must determine whether the certificate has been revoked, by checking the directory CRL each time a certificate is received, this often does not happen in practice.
  • #33: X.509 also includes three alternative authentication procedures that are intended for use across a variety of applications, used when obtaining and using certificates. 1-way for unidirectional messages (like email), 2-way for interactive sessions when timestamps are used, 3-way for interactive sessions with no need for timestamps (and hence synchronised clocks). See Stallings Figure 14.6 for details of each of these alternatives.
  • #34: One way authentication involves a single transfer of information from one user (A) to another (B), and establishes the details shown above. Note that only the identity of the initiating entity is verified in this process, not that of the responding entity. At a minimum, the message includes a timestamp ,a nonce, and the identity of B and is signed with A’s private key. The message may also include information to be conveyed, such as a session key for B.
  • #35: Two-way authentication thus permits both parties in a communication to verify the identity of the other, thus additionally establishing the above details. The reply message includes the nonce from A, to validate the reply. It also includes a timestamp and nonce generated by B, and possible additional information for A.
  • #36: Three-Way Authentication includes a final message from A to B, which contains a signed copy of the nonce, so that timestamps need not be checked, for use when synchronized clocks are not available.
  • #37: The X.509 version 2 format does not convey all of the information that recent design and implementation experience has shown to be needed. Rather than continue to add fields to a fixed format, standards developers felt that a more flexible approach was needed. X.509 v ersion 3 includes a number of optional extensions that may be added to the version 2 format. Each extension consists of an extension identifier, a criticality indicator, and an extension value. The criticality indicator indicates whether an extension can be safely ignored or not (in which case if unknown the certificate is invalid).
  • #38: The certificate extensions fall into three main categories: key and policy information - convey additional information about the subject and issuer keys, plus indicators of certificate policy subject and issuer attributes - support alternative names, in alternative formats, for a certificate subject or certificate issuer and can convey additional information about the certificate subject certification path constraints - allow constraint specifications to be included in certificates issued for CA’s by other CA’s