Traditional Culture Encyclopedia - Traditional festivals - Principle of digital certificate PKI
Principle of digital certificate PKI
PKI (Public Key Infrastructure) is a system using public key technology and digital certificate providing system information security service, which is responsible for verifying the identity of digital certificate holders. PKI technology is the core of information security technology and the key and basic technology of e-commerce. PKI ensures the privacy, integrity, non-repudiation and source authentication of communication data.
IPSec authentication (pre-* * key sharing method):
IPSec authentication (certificate authentication method in PIK):
Digital certificate:
A Digital certificate (certificate for short) is a file digitally signed by a CA, which contains the owner's public key and related identity information. Digital certificate technology solves the problem that the public key cannot be determined as the designated owner in digital signature technology.
Certificate structure:
The simplest certificate contains a public key, a name and the digital signature of the certification authority. Generally speaking, the certificate also includes the validity period of the key, the name of the issuer (certificate authority), the serial number of the certificate and other information. The structure of the certificate follows the specifications of X.509v3, as follows:
Description of each field of the certificate:
Certificate type
Certificate format
Introduction to CA
Ca (Certificate Authority (CA)). CA is the trust foundation of PKI and the trusted entity that issues and manages digital certificates. It is an authoritative, credible, willful and impartial third-party organization, usually provided by a server, such as Windows Server 2008.
CA usually adopts multi-level hierarchical structure, which is divided into root CA and subordinate CA according to the level of certification authority.
The core function of CA is to issue and manage digital certificates, including certificate issuance, certificate renewal, certificate revocation, certificate inquiry, certificate filing, certificate revocation list (CRL) publishing, etc.
About the characteristics of CA:
CA certificate issuing process
The process of digital certificate verification
Figure 1
Figure 2
Figure 3
Certificate application process
Certificate application method
Certificates are mainly applied in the following ways:
Certificate revocation method
Certificates have a specified lifetime, but CA can shorten this lifetime through a process called certificate revocation. CA publishes a certificate revocation list (CRL), which lists the serial numbers of certificates that are considered no longer available. The lifetime specified by CRL is usually much shorter than that specified by certificate. CA can also add the reason for certificate revocation in CRL. It can also add a start date that is considered applicable to this status change.
You can specify the following as the reason for revoking the certificate:
1. experimental topology
2. Experimental requirements
3.IP address planning
4. Experimental steps
Step 1: IP address and route configuration
Step 2: Configure the clock of the CA server. Site_ 1 and Site_2 are synchronized with CA. And ensure the clock synchronization of Site_ 1 and Site_2.
Step 3: Deploy the Certificate Server
Step 4: Site _ 1 apply for a certificate from the certificate server.
Step 5: Site 2 obtains the certificate.
Step 5: Deploy the basic site-to-site IPsec VPN configuration.
Step 6: Test VPN connectivity.
- Previous article:Tibetan traditional culture how to write an essay 300 words
- Next article:Practice of air-dried hand-torn beef jerky in Inner Mongolia
- Related articles
- What's the difference between Zhangqiu iron pot 300 and 700?
- How many styles are there in Korean kimono?
- Is Yulin Vocational and Technical College a public school?
- What are some of the weird and wacky careers? Top 10 Weirdest Occupations in the World
- What are the environmentally friendly fuels?
- Jinan bazi meat tradition
- Why do many companies have so much work intensity and low wages?
- How to continue the historical context and write contemporary medical chapters
- Is there any interesting place in Sanshui Datang?
- [In recent years, China's trumpet theory literature research review]Literature review 1500 words example essay