Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. In this model of trust relationships, a CA is a trusted third party – trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. Many public-key infrastructure (PKI) schemes feature CAs.

Overview

Trusted certificates can be used to create secure connections to a server via the Internet. A certificate is essential in order to circumvent a malicious party which happens to be on the route to a target server which acts as if it were the target. Such a scenario is commonly referred to as a man-in-the-middle attack. The client uses the CA certificate to authenticate the CA signature on the server certificate, as part of the authorizations before launching a secure connection. Usually client software –for example, Browsers – include a set of trusted CA certificates. This makes sense, as many users need to trust their client software. A malicious or compromised client can skip any security check and still fool its users into believing otherwise.

The clients of a CA are server supervisors who call for a certificate that their servers will bestow to users. Commercial CA’s charge to issue certificates, and their customers anticipate the CA’s certificate to be contained within the majority of web browsers, so that safe connections to the certified servers work efficiently out-of-the-box. the quantity of internet browsers, other devices and application which trust a particular certificate authority is referred to as ubiquity. Mozilla, which is a non-profit business, issues several commercial CA certificates with its products. While Mozilla developed their own policy, the CA/Browser Forum developed similar guidelines for CA trust. A single CA certificate may be shared among multiple CAs or their resellers. A root CA certificate may be the base to issue multiple intermediate CA certificates with varying validation requirement.

In addition to commercial CAs, some non-profits issue digital certificates to the public without charge; a notable example is CAcert.

Large organization or government bodies may have their own PKIs (public key infrastructure), each containing their own CAs. Any site using self-signed certificates acts as its own CA.

Browser and other clients of sorts characteristically allow users to add or do away with CA certificates at will. While server certificate regularly last for a relatively short period, CAcertificates are further extended, so, for repeatedly visited servers, it is less error-prone importing and trusting the CA issued, rather than confirm asecurity exemption each time the server’s certificate is renewed.

Less often, trustworthy certificates are for encryption or signing messages. CAs dispenses end-user certificates too, which can be used with S/MIME. However, encryption entails the receiver’s public key and, since authors and receivers of encrypted messages apparently know one another, the usefulness of a trusted third party remains confined to the signature verification of messages sent to public mailing lists.

From: https://en.wikipedia.org/wiki/Certificate_authority


'Computer Science > Terminology' 카테고리의 다른 글

Public Key Infrastructure (PKI)  (0) 2018.03.30
Certificate Revocation List (CRL)  (0) 2018.03.30
Communication Processor (CP)  (0) 2018.03.30
Application Processors (AP)  (0) 2018.03.30
Hypertext Transfer Protocol (HTTP)  (0) 2018.03.30

+ Recent posts