11-User Identification and Authentication
11-User Identification and Authentication
• X.509:
– Defines a framework to support the use of public
key cryptography
• To enable the validation of digital signatures
• Allows mutual authentication using public key
technology
– Supports the secure distribution of public keys.
– Does not dictate the use of a specific public-key
cryptographic algorithm but recommends RSA,
nor does it define a specific hash algorithm
April IITU, Information Security 13
X.509 – Certificates and Trust
• TTP’s signature certifies
trustworthiness of binding
the Public Key with its
rightful owner’s Identity.
• I.e., it states that the Public
Key is really Alice’s public
key
Alice’s Name
Alice’s
and
Certificate
Public Key
A certificate also includes additional information, e.g.
expiration date of public key ; what else?
April
IITU, Information Security 14
X.509 – X.509v3 Certificate Format