Page 610 - StudyBook.pdf
P. 610

594    Chapter 10 • Public Key Infrastructure

             Summary of Exam Objectives


             PKI and key management can be difficult topics to understand, mainly because PKI
             is such a robust mechanism and there are so many safeguards in place to protect key
             pairs. However, these are the same reasons why PKI is widely implemented
             throughout the connected world. Let’s review some of the key points regarding PKI:

                  ■   The PKI identification process is based on the use of unique identifiers,
                      known as keys.
                  ■   Each person using the PKI creates two different keys, a public key and a private
                      key.
                  ■   The public key is openly available to the public, while the private key is only
                      known by the person for whom the keys were created.
                  ■   Through the use of these keys, messages can be encrypted and decrypted for
                      transferring messages in private.

                 In order to use PKI, you must possess a digital certificate. Much like a driver’s
             license, a digital certificate holds crucial information about the key holder.
             Information stored in a digital certificate includes:

                  ■   Serial number

                  ■   Subject
                  ■   Signature algorithm

                  ■   Issuer
                  ■   Valid from
                  ■   Valid to

                  ■   Public key
                  ■   Thumbprint algorithm
                  ■   Thumbprint

                 Of course, there must be a checks-and-balances system for managing certifi-
             cates and associated keys.This issue is addressed through the key management life
             cycle. Security professionals have to resolve questions regarding centralized vs. decen-
             tralized key management; how keys will be stored for both online use and key
             archival.They also have to decide how a company will or will not use key escrow.
             Key/certificate management also includes the following maintenance duties:




          www.syngress.com
   605   606   607   608   609   610   611   612   613   614   615