Basic PKI Implementation
- Alice and Bob have public key certificates issued by Ivan, the Certificate Authority (CA).
- Alice wishes to perform a transaction with Bob and sends him her public key certificate.
- Bob, concerned that Alice's private key may have been compromised, creates an 'OCSP request' that contains Alice's certificate serial number and sends it to Ivan.
- Ivan's OCSP responder reads the certificate serial number from Bob's request. The OCSP responder uses the certificate serial number to look up the revocation status of Alice's certificate. The OCSP responder looks in a CA database that Ivan maintains. In this scenario, Ivan's CA database is the only trusted location where a compromise to Alice's certificate would be recorded.
- Ivan's OCSP responder confirms that Alice's certificate is still OK, and returns a signed, successful 'OCSP response' to Bob.
- Bob cryptographically verifies Ivan's signed response. Bob has stored Ivan's public key sometime before this transaction. Bob uses Ivan's public key to verify Ivan's response.
- Bob completes the transaction with Alice.
Read more about this topic: Online Certificate Status Protocol
Famous quotes containing the word basic:
“The basic Female body comes with the following accessories: garter belt, panti-girdle, crinoline, camisole, bustle, brassiere, stomacher, chemise, virgin zone, spike heels, nose ring, veil, kid gloves, fishnet stockings, fichu, bandeau, Merry Widow, weepers, chokers, barrettes, bangles, beads, lorgnette, feather boa, basic black, compact, Lycra stretch one-piece with modesty panel, designer peignoir, flannel nightie, lace teddy, bed, head.”
—Margaret Atwood (b. 1939)
Related Phrases
Related Words