Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners. Copyright 2001-2003 Entrust. All rights reserved.
Digital Certificates
What are they?
Digital certificates are electronic files that are used to uniquely identify people and resources over networks such as the Internet. Digital certificates also enable secure, confidential communication between two parties. When you travel to another country, your For more information on trust, passport provides a universal way to establish refer to the White Paper your identity and gain entry. Digital certificates The Concept of Trust in provide similar identification in the electronic Network Security, available at: world. Certificates are issued by a trusted third http://www.entrust.com/ party called a Certification Authority (CA). resourcecenter/whitepapers.htm Much like the role of the passport office, the role of the CA is to validate the certificate holders identity and to sign the certificate so that it cannot be forged or tampered with. Once a CA has signed a certificate, the holder can present their certificate to people, Web sites, and network resources to prove their identity and establish encrypted, confidential communications. A certificate typically includes a variety of information pertaining to its owner and to the CA that issued it, such as: The name of the holder and other identification information required to uniquely identify the holder, such as the URL of the Web server using the certificate, or an individuals e-mail address; The holders public key (more on this below). The public key can be used to encrypt sensitive information for the certificate holder; The name of the Certification Authority that issued the certificate; A serial number; The validity period (or lifetime) of the certificate (a start and an end date).
In creating the certificate, this information is digitally signed by the issuing CA. The CAs signature on the certificate is like a tamper-detection seal on a bottle of pills any tampering with the contents is easily detected. Digital certificates are based on public-key cryptography, which uses a pair of keys for encryption and decryption. With public-key cryptography, keys work in pairs of matched public and private keys. In cryptographic systems, the term key refers to a numerical value used by an algorithm to alter information, making that information secure and visible only to individuals who have the corresponding key to recover the information. For more information on publickey cryptography, refer to the White Paper An Introduction to Cryptography, available at: http://www.entrust.com/ resourcecenter/whitepapers.htm
The public key can be freely distributed without compromising the private key, which must be kept secret by its owner. Since these keys only work as a pair, an operation (for example encryption) done with the public key can only be undone (decrypted) with the corresponding private key, and vice-versa. A digital certificate securely binds your identity, as verified by a trusted third party (a CA), with your public key.
Since the WAP server is the only one with access to its private key, only the server can decrypt the information. This is how the information remains confidential and tamper-proof while in transit across the Internet.
CA certificates
A CA certificate is a certificate that identifies a Certification Authority. CA certificates are just like other digital certificates except that they are self-signed. CA certificates are used to determine whether to trust certificates issued by the CA. In the case of a passport, a passport control officer will verify the validity and authenticity of your passport and determine whether to permit you entry. Similarly, the CA certificate is used to authenticate and validate the WAP server certificate. When a WAP server certificate is presented to a micro-browser, the micro-browser uses the CA certificate to determine whether to trust the WAP server's certificate. If the server certificate is valid, the WTLS session proceeds. If the server certificate is not valid, the server certificate is rejected and the WTLS session is stopped.
The WTLS "handshake" - the process of identifying the two parties that want to establish a WTLS connection - is complete and a secure communications "pipe" has been established. Alice's micro-browser and the WAP server can now use the session key to send encrypted information back and forth, knowing that their communications are confidential and tamper-proof.
Whats Next?
The introduction of mobile phones with the capacity to support user certificates will permit for "mutual authentication" and digital signature processing enabling a wide range of opportunities for the introduction of new e-business applications and services. Entrusts' full range of products and services permit the creation of end-toend trusted e-business transactions. Visit the Entrust Web site for the latest information http://www.entrust.com