Page 583 - StudyBook.pdf
P. 583

Public Key Infrastructure • Chapter 10  567

                 message, he can check Ben’s signature and validate Ben’s public key with the CA,
                 by verifying that Ben’s certificate has been signed by the CA, and that the CA has
                 not revoked this certificate.Assuming the CA responds that the certificate is valid,
                 Jerry then decrypts the message with his own private key (see Figure 10.6).
                 Because the certificate contains only publicly available information, including the
                 certificate subject’s public key, there is no reason that the certificate shouldn’t be
                 distributed by and to anyone; the CA’s signature in the certificate guarantees its
                 authenticity, no matter what the source.

                 Figure 10.6 The PKI Key Exchange


                                                                CA
                                                              Directory
                                                               Service


                                        1. Ben requests
                                       Jerry’s certificate

                                                                      4. Jerry validates
                                                                       Ben’s public key


                                          2. The CA sends Jerry’s
                                            certificate to Ben

                                            3. Ben encrypts a message using Jerry’s public key
                                                 and signs it with Ben’s private key .


                              Ben’s                                           Jerry’s
                            Computer                                        Computer


                    Let’s look at PKI with a non-technical analogy. Let’s say that in anticipation of
                 the big raise you are going to receive once you pass the Security+ exam, you
                 decide to go to the local electronics store and purchase a new high-definition tele-
                 vision set.You decide to purchase it with a personal check.You give your check
                 and driver’s license to the clerk for processing of the transaction.The clerk verifies
                 the check by comparing the information on the check with the information on
                 your license.
                    What happened here? How does this relate to PKI?

                      ■  You decided which television you wanted to purchase, and brought it to the
                         clerk.You initiated the transaction with the clerk.The clerk now is a relying



                                                                              www.syngress.com
   578   579   580   581   582   583   584   585   586   587   588